The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

7921-7940hit(18690hit)

  • Side Lobe Suppression Based on Optimized Phase Rotation Sequence

    Junrong GU  Jae Ho HWANG  Ning HAN  Jae Moung KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    403-406

    This paper proposes an optimized phase rotation sequence method for side lobe suppression by complementing and regulating the side lobe suppression sequence set. The sequence set is efficiently enhanced through the quadratically constrained least square model. The theoretical suppression performance of our method is discussed. Furthermore, our scheme is also suitable for cognitive radio, which is analyzed in the simulation part. The simulation results confirm the effectiveness of our schemes.

  • Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    Abedelaziz MOHAISEN  Nam-Su JHO  Dowon HONG  DaeHun NYANG  

     
    PAPER-Data Mining

      Vol:
    E93-D No:2
      Page(s):
    315-325

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (fs). In particular, our analysis shows that the fs scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of fs by fake transactions filtering. In order to overcome this problem, we improve the fs scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  • Oblivious Transfer from the Additive White Gaussian Noise Channel

    Motohiko ISAKA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:2
      Page(s):
    516-525

    We consider the use of the additive white Gaussian noise channel to achieve information theoretically secure oblivious transfer. A protocol for this primitive that ensures the correctness and privacy for players is presented together with the signal design. We also study the information theoretic efficiency of the protocol, and some more practical issues where the parameter of the channel is unknown to the players.

  • New Extension Method of Quaternary Low Correlation Zone Sequence Sets

    Ji-Woong JANG  Young-Sik KIM  Sang-Hyo KIM  

     
    LETTER-Coding Theory

      Vol:
    E93-A No:2
      Page(s):
    557-560

    We propose an extension method of quaternary low correlation zone (LCZ) sequence set with odd period. From a quaternary LCZ sequence set with parameters (N, M, L, 1), the proposed method constructs a new quaternary LCZ sequence set with parameters (2N, 2M, L, 2), where N is odd. If the employed LCZ sequence set in the construction is optimal, the extended LCZ sequence set becomes also optimal where N = kL, L > 4, and k>2.

  • Secret Image Transmission Scheme Using Secret Codebook

    Shih-Chieh SHIE  Ji-Han JIANG  Long-Tai CHEN  Zeng-Hui HUANG  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E93-D No:2
      Page(s):
    399-402

    A secret image transmission scheme based on vector quantization (VQ) and a secret codebook is proposed in this article. The goal of this scheme is to transmit a set of good-quality images secretly via another high-quality cover image with the same image size. In order to reduce the data size of secret images, the images are encoded by an adaptive codebook. To guarantee the visual quality of secret images, the adaptive codebook applied at the transmitter is transmitted to the receiver secretly as well. Moreover, to enhance the security of the proposed scheme and to compact the data size of the codebook, the adaptive codebook is encoded based on VQ using another codebook generated from the cover image. Experiments show impressive results.

  • Replacement and Preventive Maintenance Models with Random Working Times

    Mingchih CHEN  Syouji NAKAMURA  Toshio NAKAGAWA  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E93-A No:2
      Page(s):
    500-507

    This paper considers replacement and maintenance policies for an operating unit which works at random times for jobs. The unit undergoes minimal repairs at failures and is replaced at a planned time T or at a number N of working times, whichever occurs first. The expected cost rate is obtained, and an optimal policy which minimizes it is derived analytically. The imperfect preventive maintenance (PM) model, where the unit is improved by PM after the completion of each working time, is analyzed. Furthermore, when the work of a job incurs some damage to the unit, the replacement model with number N is proposed. The expected cost rate is obtained by using theory of cumulative processes. Two modified models, where the unit is replaced at number N or at the first completion of the working time over time T, and it is replaced at T or number N, whichever occurs last, are also proposed. Finally, when the unit is replaced at time T, number N or Kth failure, whichever occurs first, the expected cost rate is also obtained.

  • Performance Analysis of Code Combining Based Cooperative Protocol with Amplified-and-Forward (AF) Relaying

    Asaduzzaman   Hyung-Yun KONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    411-414

    In this letter, we analyze the error performance of a code combining based cooperative diversity protocol. For coded transmission schemes, code-combining can obtain a near optimal low rate code by combining repeated codewords. An analytical method for evaluating the performances of such scheme is presented. We develop a closed form expression for pairwise error probability and tight upper bounds for bit error rate (BER) and frame error rate (FER) under Rayleigh fading environment. The analytical upper bounds are verified with simulation results.

  • An Adaptive Wavelet-Based Denoising Algorithm for Enhancing Speech in Non-stationary Noise Environment

    Kun-Ching WANG  

     
    PAPER-Speech and Hearing

      Vol:
    E93-D No:2
      Page(s):
    341-349

    Traditional wavelet-based speech enhancement algorithms are ineffective in the presence of highly non-stationary noise because of the difficulties in the accurate estimation of the local noise spectrum. In this paper, a simple method of noise estimation employing the use of a voice activity detector is proposed. We can improve the output of a wavelet-based speech enhancement algorithm in the presence of random noise bursts according to the results of VAD decision. The noisy speech is first preprocessed using bark-scale wavelet packet decomposition ( BSWPD ) to convert a noisy signal into wavelet coefficients (WCs). It is found that the VAD using bark-scale spectral entropy, called as BS-Entropy, parameter is superior to other energy-based approach especially in variable noise-level. The wavelet coefficient threshold (WCT) of each subband is then temporally adjusted according to the result of VAD approach. In a speech-dominated frame, the speech is categorized into either a voiced frame or an unvoiced frame. A voiced frame possesses a strong tone-like spectrum in lower subbands, so that the WCs of lower-band must be reserved. On the contrary, the WCT tends to increase in lower-band if the speech is categorized as unvoiced. In a noise-dominated frame, the background noise can be almost completely removed by increasing the WCT. The objective and subjective experimental results are then used to evaluate the proposed system. The experiments show that this algorithm is valid on various noise conditions, especially for color noise and non-stationary noise conditions.

  • Evolutionary P2P Networking That Fuses Evolutionary Computation and P2P Networking Together

    Kei OHNISHI  Yuji OIE  

     
    PAPER-Network

      Vol:
    E93-B No:2
      Page(s):
    317-327

    In the present paper, we propose an evolutionary P2P networking technique that dynamically and adaptively optimizes several P2P network topologies, in which all of the nodes are included at the same time, in an evolutionary manner according to given evaluation criteria. In addition, through simulations, we examine whether the proposed evolutionary P2P networking technique can provide reliable search capability in dynamic P2P environments. In simulations, we assume dynamic P2P environments in which each node leaves and joins the network with its own probability and in which search objects vary with time. The simulation results show that topology reconstruction by the evolutionary P2P networking technique is better than random topology reconstruction when only a few types of search objects are present in the network at any moment and these search objects are not replicated. Moreover, for the scenario in which the evolutionary P2P networking technique is more effective, we show through simulations that when each node makes several links with other nodes in a single network topology, the evolutionary P2P networking technique improves the reliable search capability. Finally, the number of links that yields more reliable search capability appears to depend on how often nodes leave and join the network.

  • Negation-Limited Inverters of Linear Size

    Hiroki MORIZUMI  Genki SUZUKI  

     
    PAPER

      Vol:
    E93-D No:2
      Page(s):
    257-262

    An inverter is a circuit which outputs ¬ x1, ¬ x2, ..., ¬ xn for any Boolean inputs x1, x2, ..., xn. We consider constructing an inverter with AND gates and OR gates and a few NOT gates. Beals, Nishino and Tanaka have given a construction of an inverter which has size O(nlog n) and depth O(log n) and uses ⌈ log (n+1) ⌉ NOT gates. In this paper we give a construction of an inverter which has size O(n) and depth log 1+o(1)n and uses log 1+o(1)n NOT gates. This is the first negation-limited inverter of linear size using only o(n) NOT gates. We also discuss implications of our construction for negation-limited circuit complexity.

  • Optimized 16-QAM Constellation for Binary Turbo Codes

    Keunhyung LEE  Donghoon KANG  Hyobae PARK  Wangrok OH  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E93-B No:2
      Page(s):
    381-384

    It is well known that the performance of turbo codes can be improved by optimizing the energy allocation on coded symbols. Based on this fact, we propose an optimized 16-quadrature amplitude modulation (QAM) constellation for binary turbo codes. In the proposed scheme, the energy allocated on turbo coded symbols is optimized by modifying the constellation of QAM. The proposed 16-QAM constellation combined with a binary turbo code offers better coding gain compared to the conventional combination of binary turbo code and QAM.

  • Closed Form Solutions to L2-Sensitivity Minimization Subject to L2-Scaling Constraints for Second-Order State-Space Digital Filters with Real Poles

    Shunsuke YAMAKI  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Vol:
    E93-A No:2
      Page(s):
    476-487

    This paper proposes closed form solutions to the L2-sensitivity minimization subject to L2-scaling constraints for second-order state-space digital filters with real poles. We consider two cases of second-order digital filters: distinct real poles and multiple real poles. The proposed approach reduces the constrained optimization problem to an unconstrained optimization problem by appropriate variable transformation. We can express the L2-sensitivity by a simple linear combination of exponential functions and formulate the L2-sensitivity minimization problem by a simple polynomial equation. As a result, L2-sensitivity is expressed in closed form, and its minimization subject to L2-scaling constraints is achieved without iterative calculations.

  • Adaptive Multi-Path Routing with Guaranteed Target-Delivery Ratio of Critical Events in Wireless Sensor Networks

    Jang Woon BAEK  Young Jin NAM  Dae-Wha SEO  

     
    LETTER-Network

      Vol:
    E93-B No:2
      Page(s):
    392-395

    Wireless sensor networks are subject to node and link failures for a variety of reasons. This paper proposes a k-disjoint-path routing algorithm that varies the number of disjoint paths (k) in order to meet a target-delivery ratio of critical events and to reduce energy consumption. The proposed algorithm sends packets to the base station through a single path without the occurrence of critical events, however, it sends packets to the base station through k disjoint paths (k>1) under the occurrence of critical events, where k is computed from a well-defined fault model. The proposed algorithm detects the occurrence of critical events by monitoring collected data patterns. The simulation results reveal that the proposed algorithm is more resilient to random node failure and patterned failure than other routing algorithms, and it also decreases energy consumption much more than the multi-path and path-repair algorithms.

  • Space-Time Block Codes from Quasi-Orthogonal Designs with Maximal Rate or Minimal Decoding Complexity

    Huanfei MA  Zhihao WU  Haibin KAN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    399-402

    This letter investigates the space-time block codes from quasi-orthogonal design as a tradeoff between high transmission rate and low decoding complexity. By studying the role orthogonality plays in space-time block codes, upper bound of transmission rate and lower bound of decoding complexity for quasi-orthogonal design are claimed. From this point of view, novel algorithms are developed to construct specific quasi-orthogonal designs achieving these bounds.

  • Refinement of Representation Theorems for Context-Free Languages

    Kaoru FUJIOKA  

     
    PAPER

      Vol:
    E93-D No:2
      Page(s):
    227-232

    In this paper, we obtain some refinement of representation theorems for context-free languages by using Dyck languages, insertion systems, strictly locally testable languages, and morphisms. For instance, we improved the Chomsky-Schützenberger representation theorem and show that each context-free language L can be represented in the form L=h(D ∪ R), where D is a Dyck language, R is a strictly 3-testable language, and h is a morphism. A similar representation for context-free languages can be obtained, using insertion systems of weight (3,0) and strictly 4-testable languages.

  • A Novel Bi-directional Relaying Scheme with Low Complexity

    Feng HU  Hua ZHANG  Xiaohu YOU  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E93-B No:2
      Page(s):
    423-427

    In this paper we investigate a low complexity channel estimation and data transmission scheme for bi-directional relaying networks. We also propose a semi-orthogonal pilot structure for channel estimation to increase the efficiency of data transmission between the Base Station (BS) and Mobile Station (MS) via a fixed Relay Node (RN).

  • Distributed Spatial-Temporal Precoding with Limited Feedback

    Hang LONG  Wenbo WANG  Fangxiang WANG  Kan ZHENG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    407-410

    Precoding techniques can be introduced into relay systems due to the similarity between relay systems and traditional multi-input-multi-output (MIMO) systems. A channel state information feedback scheme is firstly presented for the MIMO relay system in this letter, where the zero-forcing relaying protocol is proposed to be used so that the information of the equivalent channel and the relaying noise can be compressed into two coefficients. With the proposed feedback scheme, the distributed precoding is presented to be applied through two continuous transmitted vectors of the source node while the co-channel interference cancellation equalizer is used in the destination node. The system outage probability can be improved with the precoding in the source node. Furthermore, various spatial data rates can be conveniently supported by the proposed distributed spatial-temporal precoding method.

  • A Deterministic Approximation Algorithm for Maximum 2-Path Packing

    Ruka TANAHASHI  Zhi-Zhong CHEN  

     
    PAPER

      Vol:
    E93-D No:2
      Page(s):
    241-249

    This paper deals with the maximum-weight 2-path packing problem (M2PP), which is the problem of computing a set of vertex-disjoint paths of length 2 in a given edge-weighted complete graph so that the total weight of edges in the paths is maximized. Previously, Hassin and Rubinstein gave a randomized cubic-time approximation algorithm for M2PP which achieves an expected ratio of - ε ≈ 0.5223 - ε for any constant ε > 0. We refine their algorithm and derandomize it to obtain a deterministic cubic-time approximation algorithm for the problem which achieves a better ratio (namely, 0.5265 - ε for any constant ε>0).

  • A Transformer Noise-Canceling Ultra-Wideband CMOS Low-Noise Amplifier Open Access

    Takao KIHARA  Toshimasa MATSUOKA  Kenji TANIGUCHI  

     
    PAPER-Integrated Electronics

      Vol:
    E93-C No:2
      Page(s):
    187-199

    Previously reported wideband CMOS low-noise amplifiers (LNAs) have difficulty in achieving both wideband input impedance matching and low noise performance at low power consumption and low supply voltage. We present a transformer noise-canceling wideband CMOS LNA based on a common-gate topology. The transformer, composed of the input and shunt-peaking inductors, partly cancels the noise originating from the common-gate transistor and load resistor. The combination of the transformer with an output series inductor provides wideband input impedance matching. The LNA designed for ultra-wideband (UWB) applications is implemented in a 90 nm digital CMOS process. It occupies 0.12 mm2 and achieves |S11|<-10 dB, NF<4.4 dB, and |S21|>9.3 dB across 3.1-10.6 GHz with a power consumption of 2.5 mW from a 1.0 V supply. These results show that the proposed topology is the most suitable for low-power and low-voltage UWB CMOS LNAs.

  • Adaptive Decode-and-Forward Cooperative Networks with Limited Feedback

    Ha Nguyen VU  Hyung Yun KONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    415-418

    We analyze the performance of an adaptive communication scheme in which by employing limited feedback, the source will decide to transmit signal to the destination either by the direct link or by the direct and relaying links. Specifically, by using the instantaneous SNR as the metric, if the S-D link is better, the source will transmit to destination directly. Otherwise, the two-phase transmission mode will be triggered in which source cooperates with the relay or transmits twice within two time slots based on the quality of the received signal at the relay. Initially, the spectral efficiency is derived by calculating the probabilities of direct transmission and two-phase transmission mode. Subsequently, the BER performance for the adaptive cooperation schemes is analyzed by considering the BER routines of two events: the source transmits the signal alone or cooperates with the relay. Also, the optimum power allocation is studied based on the BER result. Finally, Monte-Carlo simulation results are presented to confirm the performance enhancement offered by the proposed scheme.

7921-7940hit(18690hit)