The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

8721-8740hit(18690hit)

  • A Novel Power Allocation and Relay Selection Scheme in AF Cooperative Networks with Mean Channel Gain Information

    Hui HUI  Shihua ZHU  Guobing LI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    342-345

    In this letter, a novel power allocation scheme is proposed to improve the outage performance of an amplify-and-forward (AF) cooperative communication network with multiple potential relays under the assumption that only mean channel gains are available at the transmitters. In this scheme, power allocation is studied jointly with a relay selection algorithm which has low computational complexity. Simulation results demonstrate the performance improvement of the proposed scheme in terms of outage behavior.

  • Regularization Super-Resolution with Inaccurate Image Registration

    Ju LIU  Hua YAN  Jian-de SUN  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E92-D No:1
      Page(s):
    59-68

    Considering the inaccuracy of image registration, we propose a new regularization restoration algorithm to solve the ill-posed super-resolution (SR) problem. Registration error is used to obtain cross-channel error information caused by inaccurate image registration. The registration error is considered as the noise mean added into the within-channel observation noise which is known as Additive White Gaussian Noise (AWGN). Based on this consideration, two constraints are regulated pixel by pixel within the framework of Miller's regularization. Regularization parameters connect the two constraints to construct a cost function. The regularization parameters are estimated adaptively in each pixel in terms of the registration error and in each observation channel in terms of the AWGN. In the iterative implementation of the proposed algorithm, sub-sampling operation and sampling aliasing in the detector model are dealt with respectively to make the restored HR image approach the original one further. The transpose of the sub-sampling operation is implemented by nearest interpolation. Simulations show that the proposed regularization algorithm can restore HR images with much sharper edges and greater SNR improvement.

  • Efficient Ray-Launching Method For 2D Indoor Propagation Analysis

    Ryoichi SATO  Hiroshi SHIRAI  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    40-45

    This paper presents an easy and efficient modification of simplified 2D ray-launching method, by approximately including multiple reflection effect inside walls for indoor environment. In order to precisely carry out the ray-launching procedure inside lossy wall, a simple modification using a true real refraction angle is first introduced, instead of complex one. Furthermore, an efficient approximation is carried out to collect the internal multiple reflected rays into the primary one. We here call it collective ray approach. Consequently, it is confirmed from the detailed considerations that the present ray representations obtained by introducing the real refraction angle are well suitable for indoor propagation analysis, and in particular the collective ray solution can be utilized confidently even when the internal reflections strongly contribute to the propagation feature of the considered indoor environment.

  • On Some Properties of M-Ary Sidel'nikov Sequences

    Jung-Soo CHUNG  Young-Sik KIM  Tae-Hyung LIM  Jong-Seon NO  Habong CHUNG  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E92-A No:1
      Page(s):
    342-345

    In this letter, we enumerate the number of cyclically inequivalent M-ary Sidel'nikov sequences of given length as well as the number of distinct autocorrelation distributions that they can have, while we change the primitive element for generating the sequence.

  • A Simple Expression of BER Performance in COFDM Systems over Fading Channels

    Fumihito SASAMORI  Yuya ISHIKAWA  Shiro HANDA  Shinjiro OSHITA  

     
    LETTER-Communication Theory and Signals

      Vol:
    E92-A No:1
      Page(s):
    332-336

    Both adaptive modulation and diversity combining are attractive techniques to combat fading and these two can be applicable to each digital-modulated symbol in OFDM transmission. In this letter, aiming to combat severe fading more effectively than the adaptive modulation, we theoretically analyze the benefit of a frequency diversity scheme within one OFDM symbol, which is a simple kind of coded OFDM (COFDM) based on IEEE 802.16 protocols. A simple closed form equation of bit error rate (BER) is derived, and then the advantages of correlated diversity gain and interference suppression by the diversity scheme are verified by both theoretical analysis and Monte Carlo simulation.

  • Experiment on Synchronous Timing Signal Detection from ISDB-T Terrestrial Digital TV Signal with Application to Autonomous Distributed ITS-IVC Network

    Yoshio KARASAWA  Taichi KUMAGAI  Atsushi TAKEMOTO  Takeo FUJII  Kenji ITO  Noriyoshi SUZUKI  

     
    PAPER-Integrated Systems for Communications

      Vol:
    E92-B No:1
      Page(s):
    296-305

    A novel timing synchronizing scheme is proposed for use in inter-vehicle communication (IVC) with an autonomous distributed intelligent transport system (ITS). The scheme determines the timing of packet signal transmission in the IVC network and employs the guard interval (GI) timing in the orthogonal frequency divisional multiplexing (OFDM) signal currently used for terrestrial broadcasts in the Japanese digital television system (ISDB-T). This signal is used because it is expected that the automotive market will demand the capability for cars to receive terrestrial digital TV broadcasts in the near future. The use of broadcasts by automobiles presupposes that the on-board receivers are capable of accurately detecting the GI timing data in an extremely low carrier-to-noise ratio (CNR) condition regardless of a severe multipath environment which will introduce broad scatter in signal arrival times. Therefore, we analyzed actual broadcast signals received in a moving vehicle in a field experiment and showed that the GI timing signal is detected with the desired accuracy even in the case of extremely low-CNR environments. Some considerations were also given about how to use these findings.

  • Multiparty Computation from El Gamal/Paillier Conversion

    Koji CHIDA  Hiroaki KIKUCHI  Keiichi HIROTA  Gembu MOROHASHI  

     
    PAPER-Secure Protocol

      Vol:
    E92-A No:1
      Page(s):
    137-146

    We propose a protocol for converting the encryption function of a ciphertext into another encryption function while keeping the corresponding message secret. The proposed protocol allows conversions of the El Gamal and Paillier cryptosystems and has the potential to design an efficient multiparty protocol intended for circuits consisting of arithmetic and logical operations. We clarify the condition of circuits such that the multiparty protocol based on the proposed protocol provides better performance than previous approaches. In addition, we introduce some privacy-preserving statistical computations as an effective application of the proposed protocol.

  • Double-Capacitor Technique for Wide Frequency Range Phase Compensation in Gm-C and MOSFET-C Filters

    Phanumas KHUMSAT  Apisak WORAPISHET  Wanlop SURAKAMPONTORN  

     
    LETTER-Electronic Circuits

      Vol:
    E92-C No:1
      Page(s):
    178-182

    A double-capacitor phase error compensation configuration is proposed for Gm-C and MOSFET-C filters. The use of two capacitors enables the effective compensation capacitance to track with the tuning resistance, thereby making it more effective over a wider frequency tuning range as compared to the conventional single-capacitor configuration. Simulations of 5th-order Chebyshev filters in a 0.18 µm CMOS process with more than one octave tuning range were carried out to demonstrate the viability of the proposed double-capacitor configuration for both Gm-C and MOSFET-C filters.

  • High-Accuracy Estimation of Image Rotation Using 1D Phase-Only Correlation

    Sei NAGASHIMA  Koichi ITO  Takafumi AOKI  Hideaki ISHII  Koji KOBAYASHI  

     
    PAPER-Digital Signal Processing

      Vol:
    E92-A No:1
      Page(s):
    235-243

    This paper presents a technique for high-accuracy estimation of image rotation using 1D Phase-Only Correlation (POC). The rotation angle between two images is estimated as follows: (i) compute the amplitude spectra of the given images, (ii) transform the coordinate system of amplitude spectra from Cartesian coordinates to polar coordinates, and (iii) estimate the translational displacement between the polar-mapped amplitude spectra to obtain the rotation angle. While the conventional approach is to employ 2D POC for high-accuracy displacement estimation in (iii), this paper proposes the use of 1D POC with an adaptive line selection scheme. The proposed technique makes possible to improve the accuracy of rotation estimation for low contrast images of artificial objects with regular geometric shapes and to reduce the total computation cost by 50%.

  • New Families of Binary Sequences with Low Correlation and Large Size

    Zhengchun ZHOU  Xiaohu TANG  

     
    PAPER-Coding Theory

      Vol:
    E92-A No:1
      Page(s):
    291-297

    In this paper, for odd n and any k with gcd(n,k) = 1, new binary sequence families Sk of period 2n-1 are constructed. These families have maximum correlation , family size 22n+2n+1 and maximum linear span . The correlation distribution of Sk is completely determined as well. Compared with the modified Gold codes with the same family size, the proposed families have the same period and correlation properties, but larger linear span. As good candidates with low correlation and large family size, the new families contain the Gold sequences and the Gold-like sequences. Furthermore, Sk includes a subfamily which has the same period, correlation distribution, family size and linear span as the family So(2) recently constructed by Yu and Gong. In particular, when k=1, is exactly So(2).

  • A Variable Error Data Normalized Step-Size LMS Adaptive Filter Algorithm: Analysis and Simulations

    Chee-Hyun PARK  Kwang-Seok HONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E92-A No:1
      Page(s):
    311-314

    This paper investigates noise reduction performance and performs convergence analysis of a Variable Error Data Normalized Step-Size Least Mean Square (VEDNSS LMS) algorithm. Adopting VEDNSS LMS provides fast convergence at early stages of adaptation while ensuring small final misadjustment. An analysis of convergence and steady-state performance for zero-mean Gaussian inputs is provided. Simulation results comparing the proposed algorithm to existing algorithms indicate its superior performance under various noise and frequency environments.

  • RDFacl: A Secure Access Control Model Based on RDF Triple

    Jaehoon KIM  Seog PARK  

     
    PAPER-Application Information Security

      Vol:
    E92-D No:1
      Page(s):
    41-50

    An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.

  • Context-Aware Resource Management in Heterogenous Smart Environments

    Abhishek ROY  Navrati SAXENA  Jitae SHIN  

     
    LETTER-Network

      Vol:
    E92-B No:1
      Page(s):
    318-321

    An information-theoretic, optimal framework is developed for tracking the residents in a Context-aware Heterogenous Smart Environment. The resident-tracking problem is formulated in terms of weighted entropy. The framework provides an optimal, online learning and prediction of users movement, location as well as most probable path segments from the symbolic domain. Successful prediction helps in on-demand operations of automated indoor devices along the users future paths and locations, thus providing the necessary comfort at a near-optimal cost. Simulation results corroborate the high prediction success, thereby providing resident-comfort while reducing energy consumption and manual operations.

  • Global Motion Representation of Video Shot Based on Vector Quantization Index Histogram

    Fa-Xin YU  Zhe-Ming LU  Zhen LI  Hao LUO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E92-D No:1
      Page(s):
    90-92

    In this Letter, we propose a novel method of low-level global motion feature description based on Vector Quantization (VQ) index histograms of motion feature vectors (MFVVQIH) for the purpose of video shot retrieval. The contribution lies in three aspects: first, we use VQ to eliminate singular points in the motion feature vector space; second, we utilize the global motion feature vector index histogram of a video shot as the global motion signature; third, video shot retrieval based on index histograms instead of original motion feature vectors guarantees the low computation complexity, and thus assures a real-time video shot retrieval. Experimental results show that the proposed scheme has high accuracy and low computation complexity.

  • Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Yu SASAKI  Lei WANG  Kazuo OHTA  Noboru KUNIHIRO  

     
    PAPER-Hash Function

      Vol:
    E92-A No:1
      Page(s):
    96-104

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  • The Unknown Computer Viruses Detection Based on Similarity

    Zhongda LIU  Naoshi NAKAYA  Yuuji KOUI  

     
    PAPER-Application

      Vol:
    E92-A No:1
      Page(s):
    190-196

    New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and known viruses share a common feature. In this paper we propose a new static analysis technology that can circumvent code obfuscation to extract the common feature and detect unknown viruses based on similarity. The results of evaluation experiments demonstrated that this technique is able to detect unknown viruses without false positives.

  • Asymptotic Analysis of the Light Propagation in a Random Waveguide System

    Akira KOMIYAMA  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    85-91

    The asymptotic behaviour of the light power at large distance in a random waveguide system with a short correlation length and a mathematical mechanism of the asymptotic behaviour are clarified. The discussion is based on the coupled mode theory. First, for the light propagation in an ordered waveguide system a new description in terms of the light power is presented. A solution of the integro-differential equation describing the light power is expressed as a contour integral in the Laplace transform domain. Singularities of the integrand are branch points and the branch cut integral determines the asymptotic behaviour of the solution. The light power decreases in inverse proportion to the distance. Secondly the description is extended to the case of a random waveguide system. The differential equation of the recurrence type describing the incoherent power is reduced to the integro-differential equation and it is shown that the kernel is the product of the kernel for an ordered system and the damping term. The equation is solved by using the same procedure as that for an ordered system and a contour integral representation of the solution is obtained. Singularities of the integrand are poles and branch points. The poles arise from the damping term of the kernel and the residues of the poles determine the asymptotic behaviour of the solution. The incoherent power decreases in inverse proportion to the square root of the distance.

  • An NFC Transceiver with Dual Antenna Structure to Support RF-Powered Transponder Mode

    Junghyun CHO  Jikon KIM  Shiho KIM  

     
    LETTER-Devices/Circuits for Communications

      Vol:
    E92-B No:1
      Page(s):
    310-313

    A single chip NFC transceiver with Dual Antenna structure supporting not only NFC active and passive mode but also 13.56 MHz RFID reader and tag mode is designed and fabricated. The proposed NFC transceiver can operate as a RFID tag even without external power supply thanks to a dual antenna structure for initiator and target. The area increment due to additional target antenna is negligible because the target antenna is constructed by using a shielding layer of the initiator antenna.

  • Local Optimal File Delivery Scheduling in a Hop by Hop File Delivery System on a One Link Model

    Hiromi TSURUMI  Takamichi MIYATA  Katsunori YAMAOKA  Yoshinori SAKAI  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    34-45

    Many content distribution systems such as CDN and P2P file sharing have been developed. In these systems, file-type contents require downloads to be completed before they can be played and they have no value before the download finishes. Therefore, a user's satisfaction depends on the length of the service latency. That is, the length of time from when the user issued a request until the user received an entire file. Reducing the sum of that time is necessary for the whole delivery system to satisfy users and maintain dependability on system performance. We discuss a hop-by-hop file delivery system suitable for delivering file contents whereby the sum of service latency is reduced by using the request conditions. Moreover, we propose a file delivery scheduling algorithm for a one-link model given that the content request frequency is unknown. The algorithm is based on a local optimal strategy. We performed a characteristic analysis by computer simulation. The results showed that our algorithm performs at nearly the theoretical efficiency limit of the hop-by-hop system when the request frequency distribution of each content has a deviation.

  • Real-Time Color Correction Method for a Low-Cost Still/Video Camera

    Dongil HAN  Hak-Sung LEE  Chan IM  Seong Joon YOO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E92-D No:1
      Page(s):
    97-101

    This paper describes a color correction method of low-cost still/video camera images. Instead of using complex and non-linear equations, the concept of a three-dimensional reduced resolution look-up table is used for the real-time color gamut expansion of low-cost cameras. The proposed method analyzes the color gamut of low cost cameras and constructs 3-dimensional rule tables during the off-line stage. And, real-time color correction is conducted using that rule table. The experimental result shows that output images have more vivid and natural colors compared with originals. The proposed method can be easily implemented with small software and/or hardware resources.

8721-8740hit(18690hit)