The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

4861-4880hit(20498hit)

  • Real-Time Touch Controller with High-Speed Touch Accelerator for Large-Sized Touch Screens

    SangHyuck BAE  DoYoung JUNG  CheolSe KIM  KyoungMoon LIM  Yong-Surk LEE  

     
    LETTER-Human-computer Interaction

      Pubricized:
    2014/10/17
      Vol:
    E98-D No:1
      Page(s):
    193-196

    For a large-sized touch screen, we designed and evaluated a real-time touch microarchitecture using a field-programmable gate array (FPGA). A high-speed hardware accelerator based on a parallel touch algorithm is suggested and implemented in this letter. The touch controller also has a timing control unit and an analog digital convert (ADC) control unit for analog touch sensing circuits. Measurement results of processing time showed that the touch controller with its proposed microarchitecture is five times faster than the 32-bit reduced instruction set computer (RISC) processor without the touch accelerator.

  • Theoretical and Experimental Approaches to Select Resistive Switching Material

    Takeki NINOMIYA  Zhiqiang WEI  Shinichi YONEDA  Kenji SHIRAISHI  

     
    BRIEF PAPER-Electronic Materials

      Vol:
    E98-C No:1
      Page(s):
    62-64

    We considered the oxygen diffusivity around a conductive filament of resistive switching oxides, with the aim of designing material appropriate for highly reliable non-volatile memory. Both theoretical and experimental analyses were performed for this consideration. The theoretically obtained oxygen chemical potential difference, which works as a driving force for diffusion, significantly depends on a material. Then, we experimentally confirmed that the oxygen diffusion behaviors vary greatly depending on the chemical potential differences.

  • Speech Watermarking Method Based on Formant Tuning

    Shengbei WANG  Masashi UNOKI  

     
    PAPER

      Vol:
    E98-D No:1
      Page(s):
    29-37

    This paper proposes a speech watermarking method based on the concept of formant tuning. The characteristic that formant tuning can improve the sound quality of synthesized speech was employed to achieve inaudibility for watermarking. In the proposed method, formants were firstly extracted with linear prediction (LP) analysis and then embedded with watermarks by symmetrically controlling a pair of line spectral frequencies (LSFs) as formant tuning. We evaluated the proposed method by two kinds of experiments regarding inaudibility and robustness compared with other methods. Inaudibility was evaluated with objective and subjective tests and robustness was evaluated with speech codecs and speech processing. The results revealed that the proposed method could satisfy both inaudibility and robustness that required for speech watermarking.

  • Robust Segmentation of Highly Dynamic Scene with Missing Data

    Yinhui ZHANG  Zifen HE  Changyu LIU  

     
    LETTER-Pattern Recognition

      Pubricized:
    2014/09/29
      Vol:
    E98-D No:1
      Page(s):
    201-205

    Segmenting foreground objects from highly dynamic scenes with missing data is very challenging. We present a novel unsupervised segmentation approach that can cope with extensive scene dynamic as well as a substantial amount of missing data that present in dynamic scene. To make this possible, we exploit convex optimization of total variation beforehand for images with missing data in which depletion mask is available. Inpainting depleted images using total variation facilitates detecting ambiguous objects from highly dynamic images, because it is more likely to yield areas of object instances with improved grayscale contrast. We use a conditional random field that adapts to integrate both appearance and motion knowledge of the foreground objects. Our approach segments foreground object instances while inpainting the highly dynamic scene with a variety amount of missing data in a coupled way. We demonstrate this on a very challenging dataset from the UCSD Highly Dynamic Scene Benchmarks (HDSB) and compare our method with two state-of-the-art unsupervised image sequence segmentation algorithms and provide quantitative and qualitative performance comparisons.

  • Distance-Based Fair Resource Allocation Algorithm for Device-to-Device Multicast Communication in SFN System

    Wenrong GONG  Xiaoxiang WANG  Mingming LI  Zijia HUANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:1
      Page(s):
    252-259

    Device-to-device (D2D) multicast communication is a useful way to improve the communication efficiency of local services. This study considers a scenario of D2D multicast communication in a single frequency network (SFN) system and investigates the frequency resource allocation problem. Firstly, we propose that D2D user equipments (DUEs) do not share frequency with cellular user equipments (CUEs) in the same SFN, but reuse frequency with CUEs in other SFNs, by which the interference between D2D and cellular communications can be avoided. Then, under the principle that two nearest D2D multicast groups cannot reuse the same frequency, the study develops a distance-based fair frequency resource allocation (DFRA) algorithm. The DFRA algorithm ensures control of the interference within a reasonable range and fairly allocate the available frequency resources to the D2D multicast groups. Numerical simulation results show that the proposed resource allocation algorithm is effective in improving the data rate and reducing the outage probability for D2D communications.

  • Mimetic Code Using Successive Additive Color Mixture

    Shigeyuki KOMURO  Shigeru KURIYAMA  Takao JINNO  

     
    LETTER

      Vol:
    E98-D No:1
      Page(s):
    98-102

    Multimedia contents can be enriched by introducing navigation with image codes readable by camera-mounted mobile devices such as smartphones. Data hiding technologies were utilized for embedding such codes to make their appearances inconspicuous, which can reduce esthetic damage on visual media. This article proposes a method of embedding two-dimensional codes into images based on successive color mixture for a blue-color channel. This technology can make the color of codes mimic those used on a cover image, while preserving their readability for current general purpose image sensors.

  • Behavior Analysis of Video Application Users on Smart Phones Based on State Transition Diagram

    Norihiro FUKUMOTO  Shigehiro ANO  Shigeki GOTO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    42-50

    Video traffic occupies a major part of current mobile traffic. The characteristics of video traffic are dominated by the behavior of the video application users. This paper uses a state transition diagram to analyze the behavior of video application users on smart phones. Video application users are divided into two categories; keyword search users and initial screen users. They take different first action in video viewing. The result of our analysis shows that the patience of video application users depends on whether they have a specific purpose when they launch a video application or not. Mobile network operators can improve the QoE of video application users by utilizing the results of this study.

  • Object Extraction Using an Edge-Based Feature for Query-by-Sketch Image Retrieval

    Takuya TAKASU  Yoshiki KUMAGAI  Gosuke OHASHI  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2014/10/15
      Vol:
    E98-D No:1
      Page(s):
    214-217

    We previously proposed a query-by-sketch image retrieval system that uses an edge relation histogram (ERH). However, it is difficult for this method to retrieve partial objects from an image, because the ERH is a feature of the entire image, not of each object. Therefore, we propose an object-extraction method that uses edge-based features in order to enable the query-by-sketch system to retrieve partial images. This method is applied to 20,000 images from the Corel Photo Gallery. We confirm that retrieval accuracy is improved by using the edge-based features for extracting objects, enabling the query-by-sketch system to retrieve partial images.

  • A Fixed-Parameter Algorithm for Detecting a Singleton Attractor in an AND/OR Boolean Network with Bounded Treewidth

    Chia-Jung CHANG  Takeyuki TAMURA  Kun-Mao CHAO  Tatsuya AKUTSU  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E98-A No:1
      Page(s):
    384-390

    The Boolean network can be used as a mathematical model for gene regulatory networks. An attractor, which is a state of a Boolean network repeating itself periodically, can represent a stable stage of a gene regulatory network. It is known that the problem of finding an attractor of the shortest period is NP-hard. In this article, we give a fixed-parameter algorithm for detecting a singleton attractor (SA) for a Boolean network that has only AND and OR Boolean functions of literals and has bounded treewidth k. The algorithm is further extended to detect an SA for a constant-depth nested canalyzing Boolean network with bounded treewidth. We also prove the fixed-parameter intractability of the detection of an SA for a general Boolean network with bounded treewidth.

  • Cooperation between Channel Access Control and TCP Rate Adaptation in Multi-Hop Ad Hoc Networks

    Pham Thanh GIANG  Kenji NAKAGAWA  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    79-87

    In this paper, we propose a new cross-layer scheme Cooperation between channel Access control and TCP Rate Adaptation (CATRA) aiming to manage TCP flow contention in multi-hop ad hoc networks. CATRA scheme collects useful information from MAC and physical layers to estimate channel utilization of the station. Based on this information, we adjust Contention Window (CW) size to control the contention between stations. It can also achieve fair channel access for fair channel access of each station and the efficient spatial channel usage. Moreover, the fair value of bandwidth allocation for each flow is calculated and sent to the Transport layer. Then, we adjust the sending rate of TCP flow to solve the contention between flows and the throughput of each flow becomes fairer. The performance of CATRA is examined on various multi-hop network topologies by using Network Simulator (NS-2).

  • Localizing Sensors from Their Responses to Targets Open Access

    Shigeo SHIODA  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    145-152

    The spatial relations between sensors placed for target detection can be inferred from the responses of individual sensors to the target objects. Motivated by this fact, this paper proposes a method for estimating the location of sensors by using their responses to target objects. The key idea of the proposal is that when two or more sensors simultaneously detect an object, the distances between these sensors are assumed to be equal to a constant called the basic range. Thus, new pieces of proximity information are obtained whenever an object passes over the area in which the sensors are deployed. This information is then be aggregated and transformed into a two dimensional map of sensors by solving a nonlinear optimization problem, where the value of the basic range is estimated together. Simulation experiments verify that the proposed algorithm yields accurate estimates of the locations of sensors.

  • Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data

    Dai WATANABE  Masayuki YOSHINO  

     
    PAPER-Foundation

      Vol:
    E98-A No:1
      Page(s):
    162-170

    Cryptography is now popularized and is widely used anywhere for many aims such as data confidentiality and integrity. The cryptographic key has a limited lifetime. For example, the National Institute of Standards and Technology published SP800-57 in order to provide cryptographic key management guidance, and it strictly limits the lifetime of the cryptographic key and the lifetime of encrypted data. That means, the data encryption key is required to be periodically updated and the associated encrypted data is required to be re-encrypted with the new key each time. The cost, especially network traffic, is crucial if the encrypted data is away from the key. In this paper we discuss what to be achieved by key updating and propose a key update mechanism reducing the communication and computation cost of re-encryption.

  • Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist

    Yu SASAKI  

     
    PAPER-Symmetric Key Based Cryptography

      Vol:
    E98-A No:1
      Page(s):
    61-71

    In this paper, generic attacks are presented against hash functions that are constructed by a hashing mode instantiating a Feistel or generalized Feistel networks with an SP-round function. It is observed that the omission of the network twist in the last round can be a weakness against preimage attacks. The first target is a standard Feistel network with an SP round function. Up to 11 rounds can be attacked in generic if a condition on a key schedule function is satisfied. The second target is a 4-branch type-2 generalized Feistel network with an SP round function. Up to 15 rounds can be attacked in generic. These generic attacks are then applied to hashing modes of ISO standard ciphers Camellia-128 without FL and whitening layers and CLEFIA-128.

  • Interference Alignment in Two-Cell LTE-Advanced Heterogeneous Networks

    Fei YU  Lu TANG  Luxi YANG  Changchun ZHANG  Weiping ZHU  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    126-133

    In this paper, we address the issue of interference alignment (IA) in a two-cell network and consider both inter-cell and intra-cell interferences. For cell one, a linear processing scheme is proposed to align the inter-cell interference to the same signal dimension space of intra-cell interference. For cell two, we propose a distributed interference alignment scheme to manage the interference from the nearby cell. We assume that the relay works in an amplify-and-forward (AF) mode with a half-duplex and MIMO relaying. We show that the composite desired and interfering signals aggregated over two time slots can be aligned such that the interfering signal is eliminated completely by applying a linear filter at the receiver. The precoding matrix of the relay is optimized jointly with the precoding matrix of the base station (BS). The number of data streams is optimized jointly for every user terminal (UT). The degree of freedom (DoF) performance of the proposed scheme as well as the conventional cooperation scheme are derived for multiple antennas at both base stations, relay station and user terminals. Simulation results show that the proposed alignment scheme can achieve a better DoF performance.

  • Software-Hardware-Cooperative Protocol Processor for Extendable 10G-EPON MAC Chip

    Naoki MIURA  Akihiko MIYAZAKI  Junichi KATO  Nobuyuki TANAKA  Satoshi SHIGEMATSU  Masami URANO  Mamoru NAKANISHI  Tsugumichi SHIBATA  

     
    PAPER-Electronic Circuits

      Vol:
    E98-C No:1
      Page(s):
    45-52

    A 10-gigabit Ethernet passive optical network (10G-EPON) is promising for the next generation of access networks. A protocol processor for 10G-EPON needs to not only achieve 10-Gbps throughput but also to have protocol extendibility for various potential services. However, the conventional protocol processor does not have the ability to install additional protocols after chip fabrication, due to its hardware-based architecture. This paper presents a software-hardware cooperative protocol processor for 10G-EPON that provides the protocol extendibility. To achieve the software-hardware cooperation, the protocol processor newly employs a software-hardware partitioning technique driven by the timing requirements of 10G-EPON and a software-hardware interface circuit with event FIFO to absorb performance difference between software and hardware. The fabricated chip with this protocol processor properly works cooperatively and is able to accept newly standardized protocols. This protocol processor enables network operators to install additional service protocols adaptively for their own services.

  • A Strengthened Security Notion for Password-Protected Secret Sharing Schemes

    Shingo HASEGAWA  Shuji ISOBE  Jun-ya IWAZAKI  Eisuke KOIZUMI  Hiroki SHIZUYA  

     
    PAPER-Foundation

      Vol:
    E98-A No:1
      Page(s):
    203-212

    Password-protected secret sharing (PPSS, for short) schemes were proposed by Bagherzandi, Jarecki, Saxena and Lu. In this paper, we consider another attack for PPSS schemes which is based on public parameters and documents. We show that the protocol proposed by Bagherzandi et al. is broken with the attack. We then propose an enhanced protocol which is secure against the attack.

  • Block Adaptive Algorithm for Signal Declipping Based on Null Space Alternating Optimization

    Tomohiro TAKAHASHI  Kazunori URUMA  Katsumi KONISHI  Toshihiro FURUKAWA  

     
    LETTER-Speech and Hearing

      Pubricized:
    2014/10/06
      Vol:
    E98-D No:1
      Page(s):
    206-209

    This letter deals with the signal declipping algorithm based on the matrix rank minimization approach, which can be applied to the signal restoration in linear systems. We focus on the null space of a low-rank matrix and provide a block adaptive algorithm of the matrix rank minimization approach to signal declipping based on the null space alternating optimization (NSAO) algorithm. Numerical examples show that the proposed algorithm is faster and has better performance than other algorithms.

  • Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations

    Sangwook LEE  Ji Eun SONG  Wan Yeon LEE  Young Woong KO  Heejo LEE  

     
    LETTER

      Vol:
    E98-D No:1
      Page(s):
    95-97

    For digital forensic investigations, the proposed scheme verifies the integrity of video contents in legacy surveillance camera systems with no built-in integrity protection. The scheme exploits video frames remaining in slack space of storage media, instead of timestamp information vulnerable to tampering. The scheme is applied to integrity verification of video contents formatted with AVI or MP4 files in automobile blackboxes.

  • Fast Feature Matching by Coarse-to-Fine Comparison of Rearranged SURF Descriptors

    Hanhoon PARK  Kwang-Seok MOON  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2014/10/03
      Vol:
    E98-D No:1
      Page(s):
    210-213

    Speeded up robust features (SURF) can detect/describe scale- and rotation-invariant features at high speed by relying on integral images for image convolutions. However, the time taken for matching SURF descriptors is still long, and this has been an obstacle for use in real-time applications. In addition, the matching time further increases in proportion to the number of features and the dimensionality of the descriptor. Therefore, we propose a fast matching method that rearranges the elements of SURF descriptors based on their entropies, divides SURF descriptors into sub-descriptors, and sequentially and analytically matches them to each other. Our results show that the matching time could be reduced by about 75% at the expense of a small drop in accuracy.

  • Nearest Neighbor Search with the Revised TLAESA

    Dong WANG  Hiroyuki MITSUHARA  Masami SHISHIBORI  

     
    PAPER

      Vol:
    E98-D No:1
      Page(s):
    65-77

    It is significant to develop better search methods to handle the rapidly increasing volume of multimedia data. For NN (Nearest Neighbor) search in metric spaces, the TLAESA (Tree Linear Approximating and Eliminating Search Algorithm) is a state of art fast search method. In this paper a method is proposed to improve the TLAESA by revising the tree structure with an optimal number of selected global pivots in the higher levels as representatives and employing the best-first search strategy. Based on an improved version of the TLAESA that succeeds in using the best-first search strategy to greatly reduce the distance calculations, this method improves the drawback that calculating less at the price of the lower pruning rate of branches. The lower pruning rate further can lead to lower search efficiency, because the priority queue used in the adopted best-first search strategy stores the information of the visited but unpruned nodes, and need be frequently accessed and sorted. In order to enhance the pruning rate of branches, the improved method tries to make more selected global pivots locate in the higher levels of the search tree as representatives. As more real distances instead of lower bound estimations of the node-representatives are used for approximating the closet node and for “branch and bound”, not only which nodes are close to the query object can be evaluated more effectively, but also the pruning rate of branches can be enhanced. Experiments show that for k-NN queries in Euclidean space, in a proper pivot selection strategy the proposed method can reach the same fewest distance calculations as the LAESA (Linear Approximating and Eliminating Search Algorithm) which saves more calculations than the TLAESA, and can achieve a higher search efficiency than the TLAESA.

4861-4880hit(20498hit)