The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

7841-7860hit(20498hit)

  • Reduction of Image Degradation due to Viewing Angle in Adaptive Dimming Technique Open Access

    Seiji OGAKI  Kazuma SAKAKIBARA  Tomokazu SHIGA  

     
    INVITED PAPER

      Vol:
    E93-C No:11
      Page(s):
    1572-1576

    An adaptive dimming technique controls both LCD panel transmittance and its backlight luminance adequately and locally according to the input TV signal. The technique reduces the power consumption and also improves the picture quality. However, a steep change in backlight luminance distribution due to the application of the technique causes image degradation around the boundary of the segments when the LCD is viewed from an angle. The main factor of image degradation is the illumination of a pixel by neighboring pixel's corresponding backlight when the LCD is viewed from an angle rather than normal direction. From the subjective evaluation of image quality and computer simulation, it is found that the gradient of the backlight luminance variation to luminance at the border of the segment should be less than 0.022 per pixel in order to suppress the image degradation.

  • Fast Self-Expansion of Sensing Coverage in Autonomous Mobile Sensor Networks

    Youn-Hee HAN  Heon-Jong LEE  Sung-Gi MIN  

     
    LETTER-Network

      Vol:
    E93-B No:11
      Page(s):
    3148-3151

    Random scattering of sensors may cause some location not to be covered. In such a case, it is useful to make use of mobile sensors that can move to eliminate the coverage holes. Wang et al [1]. proposed self-deployment schemes of mobile sensors by using Voronoi polygon. However, some coverage holes still remain after the execution of the schemes. We propose a new self-deployment scheme using the centroid (geometric center) of each sensor's Voronoi polygon as the moving target position. The performance evaluation shows that the proposed scheme achieves better results than the existing schemes in terms of fast coverage expansion.

  • A Cross Layer Perceptual Speech Quality Based Wireless VoIP Service

    Tein-Yaw CHUNG  Yung-Mu CHEN  Liang-Yi HUANG  

     
    PAPER

      Vol:
    E93-A No:11
      Page(s):
    2153-2162

    This paper proposes a cross layer wireless VoIP service which integrates an Adaptive QoS Playout (AQP) algorithm, E-model, Stream Control Transmission Protocol (SCTP), IEEE 802.21 Media Independent Handover (MIH) middleware and two user motion detection services. The proposed AQP algorithm integrates the effect of playout control and lost packet retransmission based on the E-model. Besides, by using the partial reliable transmission service from SCTP and the handoff notification from MIH services in a cross layer manner, AQP can reduce the lateness loss rate and improve speech quality under high frame error rates. In the simulations, the performance of AQP is compared with a fixed playout algorithm and four adaptive playout strategies. The simulation results show that the lateness loss rate of AQP is 2% lower than that of existing playout algorithms and the R-factor is 16% higher than the compared algorithms when a network has 50 ms wired propagation delay and 2.5% frame error rate.

  • Multichannel Random Access Protocol with Capture Effect for Cellular Relaying Networks

    Sunghyun CHO  Young-Ho JUNG  Cheolwoo YOU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:11
      Page(s):
    3093-3101

    This paper proposes a stabilized multichannel random access protocol based on slotted ALOHA for relay deployed cellular networks. To ensure the stability of random access, the proposed protocol dynamically controls the number of random access channels in a BS and a RS and the retransmission probability of the random access packets under heavy load conditions. A mathematical formula is also developed that derives an optimal partition ratio of the shared random access channels between a base station and a relay station without and with capture effect. Numerical results show that the proposed protocol can guarantee the required utilization and delay even in high offered load, which otherwise can cause bistable problem of slotted ALOHA.

  • Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol

    Heru SUKOCO  Yoshiaki HORI  Hendrawan   Kouichi SAKURAI  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2953-2961

    The distribution of streaming multicast and real time audio/video applications in the Internet has been quickly increased in the Internet. Commonly, these applications rarely use congestion control and do not fairly share provided network capacity with TCP-based applications such as HTTP, FTP and emails. Therefore, Internet communities will be threatened by the increase of non-TCP-based applications that likely cause a significant increase of traffics congestion and starvation. This paper proposes a set of mechanisms, such as providing various data rates, background traffics, and various scenarios, to act friendly with TCP when sending multicast traffics. By using 8 scenarios of simulations, we use 6 layered multicast transmissions with background traffic Pareto with the shape factor 1.5 to evaluate performance metrics such as throughput, delay/latency, jitter, TCP friendliness, packet loss ratio, and convergence time. Our study shows that non TCP traffics behave fairly and respectful of the co-existent TCP-based applications that run on shared link transmissions even with background traffic. Another result shows that the simulation has low values on throughput, vary in jitter (0-10 ms), and packet loss ratio > 3%. It was also difficult to reach convergence time quickly when involving only non TCP traffics.

  • A Robust Security Mechanism for Mobile Commerce Transactions

    Eun-Jun YOON  Kee-Young YOO  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2898-2906

    In 2006, Yeh and Tsai proposed a mobile commerce security mechanism. However, in 2008, Yum et al. pointed out that Yeh-Tsai security mechanism is not secure against malicious WAP gateways and then proposed a simple countermeasure against the attack is to use a cryptographic hash function instead of the addition operation. Nevertheless, this paper shows that both Yeh-Tsai's and Yum et al.'s security mechanisms still do not provide perfect forward secrecy and are susceptible to an off-line guessing attack and Denning-Sacco attack. In addition, we propose a new security mechanism to overcome the weaknesses of the previous related security mechanisms.

  • Binary Sequence Pairs with Two-Level Correlation and Cyclic Difference Pairs

    Seok-Yong JIN  Hong-Yeop SONG  

     
    PAPER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2266-2271

    We investigate binary sequence pairs with two-level correlation in terms of their corresponding cyclic difference pairs (CDPs). We define multipliers of a cyclic difference pair and present an existence theorem for multipliers, which could be applied to check the existence/nonexistence of certain hypothetical cyclic difference pairs. Then, we focus on the ideal case where all the out-of-phase correlation coefficients are zero. It is known that such an ideal binary sequence pair exists for length υ = 4u for every u ≥ 1. Using the techniques developed here on the theory of multipliers of a CDP and some exhaustive search, we are able to determine that, for lengths υ ≤ 30, (1) there does not exist "any other" ideal/ binary sequence pair and (2) every example in this range is equivalent to the one of length υ = 4u above. We conjecture that if there is a binary sequence pair with an ideal two-level correlation then its in-phase correlation must be 4. This implies so called the circulant Hadamard matrix conjecture.

  • IP Lookup Using the Novel Idea of Scalar Prefix Search with Fast Table Updates

    Mohammad BEHDADFAR  Hossein SAIDI  Masoud-Reza HASHEMI  Ali GHIASIAN  Hamid ALAEI  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2932-2943

    Recently, we have proposed a new prefix lookup algorithm which would use the prefixes as scalar numbers. This algorithm could be applied to different tree structures such as Binary Search Tree and some other balanced trees like RB-tree, AVL-tree and B-tree with minor modifications in the search, insert and/or delete procedures to make them capable of finding the prefixes of an incoming string e.g. an IP address. As a result, the search procedure complexity would be O(log n) where n is the number of prefixes stored in the tree. More important, the search complexity would not depend on the address length w i.e. 32 for IPv4 and 128 for IPv6. Here, it is assumed that interface to memory is wide enough to access the prefix and some simple operations like comparison can be done in O(1) even for the word length w. Moreover, insertion and deletion procedures of this algorithm are much simpler and faster than its competitors. In what follows, we report the software implementation results of this algorithm and compare it with other solutions for both IPv4 and IPv6. It also reports on a simple hardware implementation of the algorithm for IPv4. Comparison results show better lookup and update performances or superior storage requirements for Scalar Prefix Search in both average and worst cases.

  • A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks

    Kisuk KWEON  Hanjin LEE  Hyunsoo YOON  

     
    LETTER-Network

      Vol:
    E93-B No:11
      Page(s):
    3156-3160

    Duty-cycle MAC protocols have been proposed for wireless sensor networks (WSNs) to reduce the energy consumed by idle listening, but they introduce significant end-to-end delivery latency. Several works have attempted to mitigate this latency, but they still have a problem on handling the packet loss. The quality of the wireless channel in WSNs is quite bad, so packets are frequently lost. In this letter, we present a novel duty-cycle MAC protocol, called REMAC (Retransmission-Enhanced duty-cycle MAC), which exploits both the network layer and the physical layer information. REMAC estimates the quality of the wireless channel and properly reserves the wireless channel to handle the packet loss. It can reduce the end-to-end packet delivery latency caused by the packet loss without sacrificing the energy efficiency. Simulation results show that REMAC outperforms RMAC in terms of the end-to-end packet delivery latency.

  • Path Diversity with Fractional Delay Transmission for Fractional Sampling-MIMO-OFDM System

    Haruki HIGUCHI  Yukitoshi SANADA  

     
    PAPER

      Vol:
    E93-A No:11
      Page(s):
    2115-2121

    Through fractional sampling (FS) it is possible to separate multipath components and achieve path diversity. However, if no path component whose delay corresponds to the sampling point, FS cannot obtain diversity gain. In this paper, a novel scheme to improve the performance with FS over a sparse multipath channel is proposed. The proposed scheme uses multiple transmit antennas and sends multiple signals with fractional delays. The performance improvement with the proposed scheme is confirmed through computer simulation. It is shown that the proposed scheme increases the capacity of a MIMO-OFDM system by a factor of 1.5 to 2 and improves the BER performance on the sparse multipath channels.

  • A Reflectance Model for Metallic Paints Using a Two-Layer Structure Surface with Microfacet Distributions

    Gang Yeon KIM  Kwan H. LEE  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E93-D No:11
      Page(s):
    3076-3087

    We present a new method that can represent the reflectance of metallic paints accurately using a two-layer reflectance model with sampled microfacet distribution functions. We model the structure of metallic paints simplified by two layers: a binder surface that follows a microfacet distribution and a sub-layer that also follows a facet distribution. In the sub-layer, the diffuse and the specular reflectance represent color pigments and metallic flakes respectively. We use an iterative method based on the principle of Gauss-Seidel relaxation that stably fits the measured data to our highly non-linear model. We optimize the model by handling the microfacet distribution terms as a piecewise linear non-parametric form in order to increase its degree of freedom. The proposed model is validated by applying it to various metallic paints. The results show that our model has better fitting performance compared to the models used in other studies. Our model provides better accuracy due to the non-parametric terms employed in the model, and also gives efficiency in analyzing the characteristics of metallic paints by the analytical form embedded in the model. The non-parametric terms for the microfacet distribution in our model require densely measured data but not for the entire BRDF(bidirectional reflectance distribution function) domain, so that our method can reduce the burden of data acquisition during measurement. Especially, it becomes efficient for a system that uses a curved-sample based measurement system which allows us to obtain dense data in microfacet domain by a single measurement.

  • NP-Hard and k-EXPSPACE-Hard Cast Puzzles

    Chuzo IWAMOTO  Kento SASAKI  Kenji NISHIO  Kenichi MORITA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:11
      Page(s):
    2995-3004

    A disentanglement puzzle consists of mechanically interlinked pieces, and the puzzle is solved by disentangling one piece from another set of pieces. A cast puzzle is a type of disentanglement puzzle, where each piece is a zinc die-casting alloy. In this paper, we consider the generalized cast puzzle problem whose input is the layout of a finite number of pieces (polyhedrons) in the 3-dimensional Euclidean space. For every integer k ≥ 0, we present a polynomial-time transformation from an arbitrary k-exponential-space Turing machine M and its input x to a cast puzzle c1 of size k-exponential in |x| such that M accepts x if and only if c1 is solvable. Here, the layout of c1 is encoded as a string of length polynomial (even if c1 has size k-exponential). Therefore, the cast puzzle problem of size k-exponential is k-EXPSPACE-hard for every integer k ≥ 0. We also present a polynomial-time transformation from an arbitrary instance f of the SAT problem to a cast puzzle c2 such that f is satisfiable if and only if c2 is solvable.

  • Autocorrelation of New Generalized Cyclotomic Sequences of Period pn

    Seok-Yong JIN  Young-Joon KIM  Hong-Yeop SONG  

     
    LETTER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2345-2348

    In this paper, we calculate autocorrelation of new generalized cyclotomic sequences of period pn for any n > 0, where p is an odd prime number.

  • Opportunistic Spectrum Access in Unslotted Primary Networks

    Yutae LEE  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E93-B No:11
      Page(s):
    3141-3143

    We propose an opportunistic spectrum access scheme for unslotted secondary users exploiting spectrum opportunities in unslotted primary networks. An analytical model is developed to investigate the performance of the proposed scheme, and numerical results are presented to evaluate the performance in unslotted primary networks.

  • A Data Cleansing Method for Clustering Large-Scale Transaction Databases

    Woong-Kee LOH  Yang-Sae MOON  Jun-Gyu KANG  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E93-D No:11
      Page(s):
    3120-3123

    In this paper, we emphasize the need for data cleansing when clustering large-scale transaction databases and propose a new data cleansing method that improves clustering quality and performance. We evaluate our data cleansing method through a series of experiments. As a result, the clustering quality and performance were significantly improved by up to 165% and 330%, respectively.

  • A New Set of Optimal Frequency-Hopping Sequences

    Fang LIU  Daiyuan PENG  Xiaohu TANG  

     
    LETTER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2332-2336

    In frequency-hopping (FH) multiple access systems, frequency-hopping sequences (FHSs) with optimal Hamming correlation properties are needed. Based on the d-form functions with ideal autocorrelation properties, a new set of FHSs is constructed. The new FHS set is optimal with respect to the Peng-Fan bounds and each FHS in the set is optimal with respect to the Lempel-Greenberger bound.

  • Active Contour Model Based on Salient Boundary Point Image for Object Contour Detection in Natural Image

    Yan LI  Siwei LUO  Qi ZOU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E93-D No:11
      Page(s):
    3136-3139

    This paper combines the LBP operator and the active contour model. It introduces a salient gradient vector flow snake (SGVF snake), based on a novel edge map generated from the salient boundary point image (SBP image). The MDGVM criterion process helps to reduce feature detail and background noise as well as retaining the salient boundary points. The resultant SBP image as an edge map gives powerful support to the SGVF snake because of the inherent combination of the intensity, gradient and texture cues. Experiments prove that the MDGVM process has high efficiency in reducing outliers and the SGVF snake is a large improvement over the GVF snake for contour detection, especially in natural images with low contrast and small texture background.

  • Digital Image Stabilization Based on Correction for Basic Reference Frame Jitter

    Yuefei ZHANG  Mei XIE  Ling MAO  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E93-D No:11
      Page(s):
    3149-3152

    In this letter, we first study the impact of the basic reference frame jitter on the digital image stabilization. Next, a method for stabilizing the digital image sequence based on the correction for basic reference frame jitter is proposed. The experimental results show that our proposed method can effectively decrease the excessive undefined areas in the stable image sequence resulting from the basic reference frame jitter.

  • A Relay Selection Based on Eigenvalue Decomposition for Cooperative Communications in Indoor Ubiquitous Sensor Networks

    Sekchin CHANG  

     
    LETTER

      Vol:
    E93-B No:11
      Page(s):
    2967-2970

    A new best-relay selection scheme is proposed in this letter in order to maintain a reliable cooperative communications for ubiquitous sensor networks in indoor environments. The suggested technique relies on eigenvalue decomposition to select the best relay. The simulation results confirm that the performance of the proposed approach is better than that of the previous scheme in indoor environments.

  • Estimation of the Effects in the Experimental Design Using Fourier Transforms

    Yoshifumi UKITA  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    LETTER-Information Theory

      Vol:
    E93-A No:11
      Page(s):
    2077-2082

    We propose that the model in experimental design be expressed in terms of an orthonormal system. Then, we can easily estimate the effects using Fourier transforms. We also provide the theorems with respect to the sum of squares needed in analysis of variance. Using these theorems, it is clear that we can execute the analysis of variance in this model.

7841-7860hit(20498hit)