The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

7681-7700hit(18690hit)

  • Enhanced Cancelable Biometrics for Online Signature Verification

    Daigo MURAMATSU  Manabu INUMA  Junji SHIKATA  Akira OTSUKA  

     
    LETTER-Analog Signal Processing

      Vol:
    E93-A No:6
      Page(s):
    1254-1259

    Cancelable approaches for biometric person authentication have been studied to protect enrolled biometric data, and several algorithms have been proposed. One drawback of cancelable approaches is that the performance is inferior to that of non-cancelable approaches. In this paper, we propose a scheme to improve the performance of a cancelable approach for online signature verification. Our scheme generates two cancelable dataset from one raw dataset and uses them for verification. Preliminary experiments were performed using a distance-based online signature verification algorithm. The experimental results show that our proposed scheme is promising.

  • Evolution of Cellular Automata toward a LIFE-Like Rule Guided by 1/f Noise

    Shigeru NINAGAWA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:6
      Page(s):
    1489-1496

    There is evidence in favor of a relationship between the presence of 1/f noise and computational universality in cellular automata. To confirm the relationship, we search for two-dimensional cellular automata with a 1/f power spectrum by means of genetic algorithms. The power spectrum is calculated from the evolution of the state of the cell, starting from a random initial configuration. The fitness is estimated by the power spectrum with consideration of the spectral similarity to the 1/f spectrum. The result shows that the rule with the highest fitness over the most runs exhibits a 1/f type spectrum and its transition function and behavior are quite similar to those of the Game of Life, which is known to be a computationally universal cellular automaton. These results support the relationship between the presence of 1/f noise and computational universality.

  • Extensions of the Access Point Allocation Algorithm for Wireless Mesh Networks

    Walaa HASSAN  Nobuo FUNABIKI  Toru NAKANISHI  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E93-B No:6
      Page(s):
    1555-1565

    Previously, we have proposed an access point (AP) allocation algorithm in indoor environments for the Wireless Internet-access Mesh NETwork (WIMNET) using one gateway (GW) to the Internet. WIMNET consists of multiple APs that are connected wirelessly mainly by the Wireless Distribution System (WDS), to expand the coverage area inexpensively and flexibly. In this paper, we present two extensions of this algorithm to enhance the applicability to the large-scale WIMNET. One is the multiple GW extension of the algorithm to increase the communication bandwidth with multiple GWs, where all the rooms in the network field are first partitioned into a set of disjoint GW clusters and then, our previous allocation algorithm is applied to each GW cluster sequentially. The APs in a GW cluster share the same GW. The other is the dependability extension to assure the network function by maintaining the connectivity and the host coverage, even if one link/AP fault occurs, where redundant APs are added to the AP allocation by our previous algorithm. The effectiveness of our proposal in terms of the number of APs and the throughput is verified through simulations using the WIMNET simulator.

  • Performance of UWB Channel Gain Estimation Algorithm Based on Frequency Response Correlation

    Jinwon CHOI  Yu-Suk SUNG  Yong-Hwa KIM  Seong-Cheol KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1624-1627

    This letter proposes an Ultra WideBand (UWB) channel gain estimation algorithm that is based on frequency response correlation. From data measured in indoor and outdoor environments, the frequency correlation statistics of the UWB channel are characterized by correlation coefficients, which are represented as functions of the frequency separation according to the propagation environments. We use empirically established correlation coefficient models to develop the proposed channel gain estimation algorithm. In this algorithm, unknown channel gains of intermediate frequencies are estimated from known channel gains of neighboring reference frequencies. The performance of the proposed algorithm is evaluated against various configurations of reference frequencies and compared with that of a conventional estimation algorithm using a linear interpolation scheme.

  • Evaluation of Reliable Multicast Delivery in Base Station Diversity Systems

    Katsuhiro NAITO  Kazuo MORI  Hideo KOBAYASHI  

     
    LETTER-Internet

      Vol:
    E93-B No:6
      Page(s):
    1615-1619

    This paper proposes a multicast delivery system using base station diversity for cellular systems. Conventional works utilize single wireless link communication to achieve reliable multicast. In cellular systems, received signal intensity declines in cell edge areas. Therefore, wireless terminals in cell edge areas suffer from many transmission errors due to low received signal intensity. Additionally, multi-path fading also causes dynamic fluctuation of received signal intensity. Wireless terminals also suffer from transmission errors due to the multi-path fading. The proposed system utilizes multiple wireless link communication to improve transmission performance. Each wireless terminal communicates with some neighbor base stations, and combines frame information which arrives from different base stations. Numerical results demonstrate that the proposed system can achieve multicast data delivery with a short transmission period and can reduce consumed wireless resource due to retransmission.

  • A CFAR Circuit with Multiple Detection Cells for Automotive UWB Radars

    Satoshi TAKAHASHI  

     
    PAPER-Sensing

      Vol:
    E93-B No:6
      Page(s):
    1574-1582

    Future high-resolution short-range automotive radar will have a higher false alarm probability than the conventional low-resolution radar has. In a high-resolution radar, the reception signal becomes sensitive to the difference between intended and unintended objects. However, automotive radars must distinguish targets from background objects that are the same order of size; it leads to an increase in the false alarm probability. In this paper, a CFAR circuit for obtaining the target mean power, as well as the background mean power, is proposed to reduce the false alarm probability for high-resolution radars working in automotive environments. The proposed method is analytically evaluated with use of the characteristic function method. Spatial correlation is also considered in the evaluation, because the sizes of the both target and background objects approach the dimension of several range cells. Result showed the proposed CFAR with use of two alongside range cells could reduce the ratio of 6.4 dB for an example of an automotive situation.

  • IP-MAC: A Distributed MAC for Spatial Reuse in Wireless Networks

    Md. Mustafizur RAHMAN  Choong Seon HONG  Sungwon LEE  JangYeon LEE  Jin Woong CHO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1534-1546

    The CSMA/CA driven MAC protocols withhold packet transmissions from exposed stations when they detect carrier signal above a certain threshold. This is to avoid collisions at other receiving stations. However, this conservative scheme often exposes many stations unnecessarily, and thus minimizes the utilization of the spatial spectral resource. In this paper, we demonstrate that remote estimation of the status at the active receivers is more effective at avoiding collisions in wireless networks than the carrier sensing. We apply a new concept of the interference range, named as n-tolerant interference range, to guarantee reliable communications in the presence of n (n≥ 0) concurrent transmissions from outside the range. We design a distributed interference preventive MAC ( IP-MAC ) using the n-tolerant interference range that enables parallel accesses from the noninterfering stations for an active communication. In IP-MAC, an exposed station goes through an Interference Potentiality Check (IPC) to resolve whether it is potentially interfering or noninterfering to the active communication. During the resolve operation, IPC takes the capture effect at an active receiver into account with interfering signals from a number of possible concurrent transmissions near that receiver. The performance enhancement offered by IP-MAC is studied via simulations in different environments. Results reveal that IP-MAC significantly improves network performance in terms of throughput and delay.

  • 3-Hop Cooperative Diversity Using Quasi-Orthogonal Space-Time Block Code

    Tomoya YAMAOKA  Yoshitaka HARA  Noriyuki FUKUI  Hiroshi KUBO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1636-1640

    We propose 3-hop cooperative diversity using QOSTBC (Quasi-Orthogonal Space-Time Block Code), which offers 3-hop cooperative diversity without signal separation in relay nodes. The key of our proposed scheme is encoding signal sequence in different signal unit according to relay stage. This letter explains details of the proposed scheme and shows that it offers interference reduction among streams and space diversity gain by result of simulations.

  • A New LLR Approximation for BICM Systems with HARQ

    Jin Whan KANG  Sang-Hyo KIM  Seokho YOON  Tae Hee HAN  Hyoung Kee CHOI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1628-1632

    In this letter, a new approximation of log-likelihood ratio (LLR) for soft input channel decoding is proposed. Conventional simplified LLR using log-sum approximation can degrade the performance of bit interleaved coded modulation (BICM) systems employing hybrid automatic repeat request (HARQ) at low SNR. The proposed LLR performs as well as the exact LLR, and at the same time, requires only a small number of elementary operations.

  • Fast Interior Point Method for MIMO Transmit Power Optimization with Per-Antenna Power Constraints

    Yusuke OHWATARI  Anass BENJEBBOUR  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1484-1493

    For multiple-input multiple-output (MIMO) precoded transmission that has individual constraints on the maximum power of each transmit antenna or a subset of transmit antennas, the transmit power optimization problem is a non-linear convex optimization problem with a high level of computational complexity. In this paper, assuming the use of the interior point method (IPM) to solve this problem, we propose two efficient techniques that reduce the computational complexity of the IPM by appropriately setting its parameters. Based on computer simulation, the achieved reductions in the level of the computational complexity are evaluated using the proposed techniques for both the fairness and the sum-rate maximization criteria assuming i.i.d Rayleigh fading MIMO channels and block diagonalization zero-forcing as a multi-user MIMO (MU-MIMO) precoder.

  • Precise SER Analysis and Performance Results of OSTBC MIMO-OFDM Systems over Uncorrelated Nakagami-m Fading Channels

    Ejaz AHMAD ANSARI  Nandana RAJATHEVA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1515-1525

    Although the topic of multiple-input multiple-output (MIMO) based orthogonal frequency division multiplexing (OFDM) over different fading channels is well investigated, its closed form symbol error rate (SER) expressions and performance results employing orthogonal space time block codes (OSTBCs) over uncorrelated frequency-selective Nakagami-m fading channels are still not available. The closed form expressions are extremely useful for evaluating system's performance without carrying out time consuming simulations. Similarly, the performance results are also quite beneficial for determining the system's performance in the sense that many practical wireless standards extensively employ MIMO-OFDM systems in conjunction with M-ary quadrature amplitude modulation (M-QAM) constellation. This paper thus, derives exact closed form expressions for the SER of M-ary Gray-coded one and two dimensional constellations when an OSTBC is employed and Nt transmit antennas are selected for transmission over frequency-selective Nakagami-m fading channels. For this purpose, first an exact closed-form of average SER expression of OSTBC based MIMO-OFDM system for M-ary phase shift keying (M-PSK) using traditional probability density function (PDF) approach is derived. We then compute exact closed form average SER expressions for M-ary pulse amplitude modulation (M-PAM) and M-QAM schemes by utilizing this generalized result. These expressions are valid over both frequency-flat and frequency-selective Nakagami-m fading MIMO channels and can easily be evaluated without using any numerical integration methods. We also show that average SER of MIMO-OFDM system using OSTBC in case of frequency-selective Rayleigh fading channels remains independent to the number of taps, L of that fading channel and the performance of the same system for two-tap un-correlated Rayleigh and Nakagami-m fading channels is better than that of the correlated one. Moreover, Monte Carlo simulation of MIMO-OFDM system using multiple transmit and receive antennas for different modulations is presented to validate our theoretical results. Finally, due to availability of closed form expressions, we further provide the performance results of MIMO-OFDM system over frequency-selective Nakagami-m fading channels employing (M-QAM) using OSTBCs under the transmission rate equal to 1, 2 and 3 bit(s)/s/Hz, respectively.

  • Multi-Cell Cooperation with Fairness Constraint in the Downlink OFDMA Cellular Networks

    Hongxing LI  Hanwen LUO  Wen CHEN  Jia GUO  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E93-B No:6
      Page(s):
    1653-1656

    In this letter, we study cell cooperation in the downlink OFDMA cellular networks. The proposed cooperation scheme is based on fractional frequency reuse (FFR), where a cooperation group consists of three sector antennas from three adjacent cells and the subchannels of each cooperation group are allocated coordinately to users. Simulation results demonstrate the effectiveness of the proposed schemes in terms of throughput and fairness.

  • Fixed-Width Group CSD Multiplier Design

    Yong-Eun KIM  Kyung-Ju CHO  Jin-Gyun CHUNG  Xinming HUANG  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:6
      Page(s):
    1497-1503

    This paper presents an error compensation method for fixed-width group canonic signed digit (GCSD) multipliers that receive a W-bit input and generate a W-bit product. To efficiently compensate for the truncation error, the encoded signals from the GCSD multiplier are used for the generation of the error compensation bias. By Synopsys simulations, it is shown that the proposed method leads to up to 84% reduction in power consumption and up to 78% reduction in area compared with the fixed-width modified Booth multipliers.

  • A New Method for Low SNR Estimation of Noisy Speech Signals Using Fourth-Order Moments

    Roghayeh DOOST  Abolghasem SAYADIAN  Hossein SHAMSI  

     
    PAPER-Speech and Hearing

      Vol:
    E93-D No:6
      Page(s):
    1599-1607

    In this paper the SNR estimation is performed frame by frame, during the speech activity. For this purpose, the fourth-order moments of the real and imaginary parts of frequency components are extracted, for both the speech and noise, separately. For each noisy frame, the mentioned fourth-order moments are also estimated. Making use of the proposed formulas, the signal-to-noise ratio is estimated in each frequency index of the noisy frame. These formulas also predict the overall signal-to-noise ratio in each noisy frame. What makes our method outstanding compared to conventional approaches is that this method takes into consideration both the speech and noise identically. It estimates the negative SNR almost as well as the positive SNR.

  • Chip-to-Chip Half Duplex Spiking Data Communication over Power Supply Rails

    Takushi HASHIDA  Makoto NAGATA  

     
    PAPER

      Vol:
    E93-C No:6
      Page(s):
    842-848

    Chip-to-chip serial data communication is superposed on power supply over common Vdd/Vss connections through chip, package, and board traces. A power line transceiver demonstrates half duplex spiking communication at more than 100 Mbps. A pair of transceivers consumes 1.35 mA from 3.3 V, at 130 Mbps. On-chip power line LC low pass filter attenuates pseudo-differential communication spikes by 30 dB, purifying power supply current for internal circuits. Bi-directional spiking communication was successfully examined in a 90-nm CMOS prototype setup of on-chip waveform capturing. A micro controller forwards clock pulses to and receives data streams from a comparator based waveform capturer formed on a different chip, through a single pair of power and ground traces. The bit error rate is small enough not to degrade waveform acquisition capability, maintaining the spurious free dynamic range of higher than 50 dB.

  • Query Processing in a Traceable P2P Record Exchange Framework

    Fengrong LI  Yoshiharu ISHIKAWA  

     
    PAPER-Parallel and Distributed Databases

      Vol:
    E93-D No:6
      Page(s):
    1433-1446

    As the spread of high-speed networks and the development of network technologies, P2P technologies are actively used today for information exchange in the network. While information exchange in a P2P network is quite flexible, there is an important problem--lack of reliability. Since we cannot know the details of how the data was obtained, it is hard to fully rely on it. To ensure the reliability of exchanged data, we have proposed the framework of a traceable P2P record exchange based on database technologies. In this framework, records are exchanged among autonomous peers, and each peer stores its exchange and modification histories in it. The framework supports the function of tracing queries to query the details of the obtained data. A tracing query is described in datalog and executed as a recursive query in the P2P network. In this paper, we focus on the query processing strategies for the framework. We consider two types of queries, ad hoc queries and continual queries, and present the query processing strategies for their executions.

  • Key-Generation Algorithms for Linear Piece In Hand Matrix Method

    Kohtaro TADAKI  Shigeo TSUJII  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:6
      Page(s):
    1102-1110

    The linear Piece In Hand (PH, for short) matrix method with random variables was proposed in our former work. It is a general prescription which can be applicable to any type of multivariate public-key cryptosystems for the purpose of enhancing their security. Actually, we showed, in an experimental manner, that the linear PH matrix method with random variables can certainly enhance the security of HFE against the Grobner basis attack, where HFE is one of the major variants of multivariate public-key cryptosystems. In 1998 Patarin, Goubin, and Courtois introduced the plus method as a general prescription which aims to enhance the security of any given MPKC, just like the linear PH matrix method with random variables. In this paper we prove the equivalence between the plus method and the primitive linear PH matrix method, which is introduced by our previous work to explain the notion of the PH matrix method in general in an illustrative manner and not for a practical use to enhance the security of any given MPKC. Based on this equivalence, we show that the linear PH matrix method with random variables has the substantial advantage over the plus method with respect to the security enhancement. In the linear PH matrix method with random variables, the three matrices, including the PH matrix, play a central role in the secret-key and public-key. In this paper, we clarify how to generate these matrices and thus present two probabilistic polynomial-time algorithms to generate these matrices. In particular, the second one has a concise form, and is obtained as a byproduct of the proof of the equivalence between the plus method and the primitive linear PH matrix method.

  • Discriminating Semantic Visual Words for Scene Classification

    Shuoyan LIU  De XU  Songhe FENG  

     
    PAPER-Pattern Recognition

      Vol:
    E93-D No:6
      Page(s):
    1580-1588

    Bag-of-Visual-Words representation has recently become popular for scene classification. However, learning the visual words in an unsupervised manner suffers from the problem when faced these patches with similar appearances corresponding to distinct semantic concepts. This paper proposes a novel supervised learning framework, which aims at taking full advantage of label information to address the problem. Specifically, the Gaussian Mixture Modeling (GMM) is firstly applied to obtain "semantic interpretation" of patches using scene labels. Each scene induces a probability density on the low-level visual features space, and patches are represented as vectors of posterior scene semantic concepts probabilities. And then the Information Bottleneck (IB) algorithm is introduce to cluster the patches into "visual words" via a supervised manner, from the perspective of semantic interpretations. Such operation can maximize the semantic information of the visual words. Once obtained the visual words, the appearing frequency of the corresponding visual words in a given image forms a histogram, which can be subsequently used in the scene categorization task via the Support Vector Machine (SVM) classifier. Experiments on a challenging dataset show that the proposed visual words better perform scene classification task than most existing methods.

  • Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition

    Yutaka KAWAI  Shotaro TANNO  Takahiro KONDO  Kazuki YONEYAMA  Kazuo OHTA  Noboru KUNIHIRO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:6
      Page(s):
    1122-1131

    Secret Handshake protocol allows members of the same group to authenticate each other secretly. That is, two members who belong to the same group can learn counterpart is in the same group, while non-member of the group cannot determine whether the counterpart is a member of the group or not. Yamashita and Tanaka proposed Secret Handshake Scheme with Multiple Groups (SHSMG). They extended a single group setting to a multiple groups setting where two members output "accept" iff both member's affiliations of the multiple groups are identical. In this paper, we first show the flaw of their SHSMG, and we construct a new secure SHSMG. Second, we introduce a new concept of Secret Handshake scheme, "monotone condition Secret Handshake with Multiple Groups (mc-SHSMG)," in order to extend the condition of "accept." In our new setting of handshake protocol, members can authenticate each other in monotone condition (not only both member's affiliations are identical but also the affiliations are not identical). The communication costs and computational costs of our proposed mc-SHSMG are fewer than the trivial construction of mc-SHSMG.

  • Evolution Analysis of Parallel Concatenated Coded IDMA Systems

    Hao WANG  Shi CHEN  Xiaokang LIN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1620-1623

    The bit-error-rate (BER) performance predicted by the semi-analytical evolution technique proposed by Li Ping et al. becomes inaccurate for parallel concatenated coded interleave-division multiple-access (PCC-IDMA) systems. To solve this problem, we develop a novel evolution technique of such systems. Numerical results show that the predicted performance agrees well with the simulation results, and that this technique is useful for system optimization.

7681-7700hit(18690hit)