The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

7981-8000hit(20498hit)

  • Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code

    Shun WATANABE  Ryutaroh MATSUMOTO  Tomohiko UYEMATSU  

     
    PAPER-Information Theory

      Vol:
    E93-A No:9
      Page(s):
    1650-1659

    Privacy amplification is a technique to distill a secret key from a random variable by a function so that the distilled key and eavesdropper's random variable are statistically independent. There are three kinds of security criteria for the key distilled by privacy amplification: the normalized divergence criterion, which is also known as the weak security criterion, the variational distance criterion, and the divergence criterion, which is also known as the strong security criterion. As a technique to distill a secret key, it is known that the encoder of a Slepian-Wolf (the source coding with full side-information at the decoder) code can be used as a function for privacy amplification if we employ the weak security criterion. In this paper, we show that the encoder of a Slepian-Wolf code cannot be used as a function for privacy amplification if we employ the criteria other than the weak one.

  • User Scheduling for Distributed-Antenna Zero-Forcing Beamforming Downlink Multiuser MIMO-OFDM Systems

    Masaaki FUJII  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:9
      Page(s):
    2370-2380

    We describe a user scheduling scheme suitable for zero-forcing beamforming (ZFBF) downlink multiuser multiple-input multiple-output (MU-MIMO) orthogonal frequency-division multiplexing (OFDM) transmissions in time-division-duplex distributed antenna systems. This user scheduling scheme consists of inter-cell-interference mitigation scheduling by using fractional frequency reuse, proportional fair scheduling in the OFDM frequency domain, and high-capacity ZFBF-MU-MIMO scheduling by using zero-forcing with selection (ZFS). Simulation results demonstrate in a severe user-distribution condition that includes cell-edge users that the proposed user scheduling scheme achieves high average cell throughputs close to that provided by only ZFS and that it also achieves almost the same degree of user fairness as round-robin user scheduling.

  • Correcting Syntactic Annotation Errors Using a Synchronous Tree Substitution Grammar

    Yoshihide KATO  Shigeki MATSUBARA  

     
    LETTER-Natural Language Processing

      Vol:
    E93-D No:9
      Page(s):
    2660-2663

    This paper proposes a method of correcting annotation errors in a treebank. By using a synchronous grammar, the method transforms parse trees containing annotation errors into the ones whose errors are corrected. The synchronous grammar is automatically induced from the treebank. We report an experimental result of applying our method to the Penn Treebank. The result demonstrates that our method corrects syntactic annotation errors with high precision.

  • Least Absolute Policy Iteration--A Robust Approach to Value Function Approximation

    Masashi SUGIYAMA  Hirotaka HACHIYA  Hisashi KASHIMA  Tetsuro MORIMURA  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E93-D No:9
      Page(s):
    2555-2565

    Least-squares policy iteration is a useful reinforcement learning method in robotics due to its computational efficiency. However, it tends to be sensitive to outliers in observed rewards. In this paper, we propose an alternative method that employs the absolute loss for enhancing robustness and reliability. The proposed method is formulated as a linear programming problem which can be solved efficiently by standard optimization software, so the computational advantage is not sacrificed for gaining robustness and reliability. We demonstrate the usefulness of the proposed approach through a simulated robot-control task.

  • BS-CPA: Built-In Determined Sub-Key Correlation Power Analysis

    Yuichi KOMANO  Hideo SHIMIZU  Shinichi KAWAMURA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:9
      Page(s):
    1632-1638

    Correlation power analysis (CPA) is a well-known attack against cryptographic modules with which an attacker evaluates the correlation between the power consumption and the sensitive data candidates calculated from a guessed sub-key and known data such as plaintexts and ciphertexts. This paper enhances CPA to propose a new general power analysis, built-in determined sub-key CPA (BS-CPA), which finds a new sub-key by using the previously determined sub-keys recursively to compute the sensitive data candidates and to increase the signal-to-noise ratio in its analysis. BS-CPA also reuses the power traces in the repetitions of finding sub-keys to decrease the total number of the required traces for determining the all sub-keys. BS-CPA is powerful and effective when the multiple sensitive data blocks such as sbox outputs are processed simultaneously as in the hardware implementation. We apply BS-CPA to the power traces provided at the DPA contest and succeed in finding a DES key using fewer traces than the original CPA does.

  • A Parallel Transmission Scheme for All-to-All Broadcast in Underwater Sensor Networks

    Soonchul PARK  Jaesung LIM  

     
    PAPER-Network

      Vol:
    E93-B No:9
      Page(s):
    2309-2315

    This paper is concerned with the packet transmission scheduling problem for repeating all-to-all broadcasts in Underwater Sensor Networks (USN) in which there are n nodes in a transmission range. All-to-all communication is one of the most dense communication patterns. It is assumed that each node has the same size packet. Unlike the terrestrial scenarios, the propagation time in underwater communications is not negligible. We define all-to-all broadcast as the one where every node transmits packets to all the other nodes in the network except itself. So, there are in total n(n - 1) packets to be transmitted for an all-to-all broadcast. The optimal transmission scheduling is to schedule in a way that all packets can be transmitted within the minimum time. In this paper, we propose an efficient packet transmission scheduling algorithm for underwater acoustic communications using the property of long propagation delay.

  • Reliable Wireless Broadcast with Linear Network Coding for Multipoint-to-Multipoint Real-Time Communications

    Yoshihisa KONDO  Hiroyuki YOMO  Shinji YAMAGUCHI  Peter DAVIS  Ryu MIURA  Sadao OBANA  Seiichi SAMPEI  

     
    PAPER-Network

      Vol:
    E93-B No:9
      Page(s):
    2316-2325

    This paper proposes multipoint-to-multipoint (MPtoMP) real-time broadcast transmission using network coding for ad-hoc networks like video game networks. We aim to achieve highly reliable MPtoMP broadcasting using IEEE 802.11 media access control (MAC) that does not include a retransmission mechanism. When each node detects packets from the other nodes in a sequence, the correctly detected packets are network-encoded, and the encoded packet is broadcasted in the next sequence as a piggy-back for its native packet. To prevent increase of overhead in each packet due to piggy-back packet transmission, network coding vector for each node is exchanged between all nodes in the negotiation phase. Each user keeps using the same coding vector generated in the negotiation phase, and only coding information that represents which user signal is included in the network coding process is transmitted along with the piggy-back packet. Our simulation results show that the proposed method can provide higher reliability than other schemes using multi point relay (MPR) or redundant transmissions such as forward error correction (FEC). We also implement the proposed method in a wireless testbed, and show that the proposed method achieves high reliability in a real-world environment with a practical degree of complexity when installed on current wireless devices.

  • Improvements of the One-to-Many Eigenvoice Conversion System

    Yamato OHTANI  Tomoki TODA  Hiroshi SARUWATARI  Kiyohiro SHIKANO  

     
    PAPER-Voice Conversion

      Vol:
    E93-D No:9
      Page(s):
    2491-2499

    We have developed a one-to-many eigenvoice conversion (EVC) system that allows us to convert a single source speaker's voice into an arbitrary target speaker's voice using an eigenvoice Gaussian mixture model (EV-GMM). This system is capable of effectively building a conversion model for an arbitrary target speaker by adapting the EV-GMM using only a small amount of speech data uttered by the target speaker in a text-independent manner. However, the conversion performance is still insufficient for the following reasons: 1) the excitation signal is not precisely modeled; 2) the oversmoothing of the converted spectrum causes muffled sounds in converted speech; and 3) the conversion model is affected by redundant acoustic variations among a lot of pre-stored target speakers used for building the EV-GMM. In order to address these problems, we apply the following promising techniques to one-to-many EVC: 1) mixed excitation; 2) a conversion algorithm considering global variance; and 3) adaptive training of the EV-GMM. The experimental results demonstrate that the conversion performance of one-to-many EVC is significantly improved by integrating all of these techniques into the one-to-many EVC system.

  • Novel Optical Fiber Cable with Small Cable Diameter Employing Rollable 20-Fiber Ribbons

    Kazuo HOGARI  Yusuke YAMADA  Kunihiro TOGE  

     
    LETTER-Optical Fiber for Communications

      Vol:
    E93-B No:9
      Page(s):
    2433-2435

    This letter proposes novel optical fiber cables with extremely small cable diameter that employs rollable 20-fiber ribbons, which will improve fiber ribbon and cable productivity compared with optical fiber cable employing rollable 4-fiber ribbons. We fabricated the cables and investigated its feasibility in terms of high-count compactness, cable productivity, fiber strain induced by cable bending, optical loss characteristics and capacity for mass splicing. As a result, we confirmed the excellence of these cables and their fiber splicing workability.

  • Signal and Noise Covariance Estimation Based on ICA for High-Resolution Cortical Dipole Imaging

    Junichi HORI  Kentarou SUNAGA  Satoru WATANABE  

     
    PAPER-Biological Engineering

      Vol:
    E93-D No:9
      Page(s):
    2626-2634

    We investigated suitable spatial inverse filters for cortical dipole imaging from the scalp electroencephalogram (EEG). The effects of incorporating statistical information of signal and noise into inverse procedures were examined by computer simulations and experimental studies. The parametric projection filter (PPF) and parametric Wiener filter (PWF) were applied to an inhomogeneous three-sphere volume conductor head model. The noise covariance matrix was estimated by applying independent component analysis (ICA) to scalp potentials. The present simulation results suggest that the PPF and the PWF provided excellent performance when the noise covariance was estimated from the differential noise between EEG and the separated signal using ICA and the signal covariance was estimated from the separated signal. Moreover, the spatial resolution of the cortical dipole imaging was improved while the influence of noise was suppressed by including the differential noise at the instant of the imaging and by adjusting the duration of noise sample according to the signal to noise ratio. We applied the proposed imaging technique to human experimental data of visual evoked potential and obtained reasonable results that coincide to physiological knowledge.

  • Analysis of a Near-Field Optical Disk with an Acute-Edged Metallic Nano-Aperture

    Toshiaki KITAMURA  Shingo IWATA  

     
    BRIEF PAPER-Storage Technology

      Vol:
    E93-C No:9
      Page(s):
    1474-1477

    Readout characteristics of a near-field optical disk with an acute-edged metallic nano-aperture were investigated. The electromagnetic field distributions of the near field around the aperture were analyzed, and the far-field scattering of the waves transmitted through the phase change disk was calculated by finite-difference time-domain method into which motion equations of free electrons were incorporated. Adjusting the edge angle of the aperture increased the field intensity of near-field light. The influence of the edge angle on output through the recorded mark was also investigated. It was found that there is an optimum edge angle that differs depending on the aperture width.

  • Esophageal Speech Enhancement Based on Statistical Voice Conversion with Gaussian Mixture Models

    Hironori DOI  Keigo NAKAMURA  Tomoki TODA  Hiroshi SARUWATARI  Kiyohiro SHIKANO  

     
    PAPER-Voice Conversion

      Vol:
    E93-D No:9
      Page(s):
    2472-2482

    This paper presents a novel method of enhancing esophageal speech using statistical voice conversion. Esophageal speech is one of the alternative speaking methods for laryngectomees. Although it doesn't require any external devices, generated voices usually sound unnatural compared with normal speech. To improve the intelligibility and naturalness of esophageal speech, we propose a voice conversion method from esophageal speech into normal speech. A spectral parameter and excitation parameters of target normal speech are separately estimated from a spectral parameter of the esophageal speech based on Gaussian mixture models. The experimental results demonstrate that the proposed method yields significant improvements in intelligibility and naturalness. We also apply one-to-many eigenvoice conversion to esophageal speech enhancement to make it possible to flexibly control the voice quality of enhanced speech.

  • Structural Models that Manage IT Portfolio Affecting Business Value of Enterprise Architecture

    Takaaki KAMOGAWA  

     
    PAPER-Office Information Systems, e-Business Modeling

      Vol:
    E93-D No:9
      Page(s):
    2566-2576

    This paper examines the structural relationships between Information Technology (IT) governance and Enterprise Architecture (EA), with the objective of enhancing business value in the enterprise society. Structural models consisting of four related hypotheses reveal the relationship between IT governance and EA in the improvement of business values. We statistically examined the hypotheses by analyzing validated questionnaire items from respondents within firms listed on the Japanese stock exchange who were qualified to answer them. We concluded that firms which have organizational ability controlled by IT governance are more likely to deliver business value based on IT portfolio management.

  • Reduced Complexity in Antenna Selection for Polarized MIMO System with SVD for the Practical MIMO Communication Channel Environment

    Maung SANN MAW  Iwao SASASE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:9
      Page(s):
    2389-2399

    In the conventional multi-input multi-output (MIMO) communication systems, most of the antenna selection methods considered are suitable only for spatially separated uni-polarized system under Rayleigh fading channel in non-line of sight (NLOS) condition. There have a few antenna selection schemes for the cross-polarized system in LOS condition and Ricean fading channel, and no antenna selection scheme for the MIMO channel with both LOS and NLOS. In the practical MIMO channel case, influence of LOS and NLOS conditions in the channel can vary from time to time according to the channel parameters and user movement in the system. Based on these influences and channel condition, uni-polarized system may outperform a cross-polarized. Thus, we should consider this kind of practical MIMO channel environment when developing the antenna selection scheme. Moreover, no research work has been done on reducing the complexity of antenna selection for this kind of practical MIMO channel environment. In this paper, reduced complexity in antenna selection is proposed to give the higher throughput in the practical MIMO channel environment. In the proposed scheme, suitable polarized antennas are selected based on the calculation of singular value decomposition (SVD) of channel matrix and then adaptive bit loading is applied. Simulation results show that throughput of the system can be improved under the constraint of target BER and total transmit power of the MIMO system.

  • Effect of Contact Materials of Ag/SnO2 and Ag/ZnO on Rotational Motion of Break Arcs Driven by Radial Magnetic Field

    Junya SEKIKAWA  Takayoshi KUBONO  

     
    PAPER

      Vol:
    E93-C No:9
      Page(s):
    1387-1392

    Break arcs are generated between electrical contacts in a DC 42 V resistive circuit. Contact materials are Ag/SnO2 and Ag/ZnO. Circuit current when contacts are closed is varied from 5 A to 21 A. The radial magnetic field to drive break arcs is formed between the contact gap with a permanent magnet embedded in the cathode. The arc motion is observed with a high-speed camera. Experimental results with the magnet are compared with those without the magnet. Following results are shown. Similar experimental results to pure silver contacts are obtained for Ag/SnO2 and Ag/ZnO contact pairs. The rotational motion of the break arcs and the shortening effect of the arc duration are confirmed. The ring-shaped, wide and uniform traces are observed on the contact surfaces after break operations. This result shows the prevention effect of local erosion of electrical contacts and the reduction of total amount of contact erosion. The rotational frequency f is increased with the increase of the arc current Iarc. These results for Ag/SnO2 and Ag/ZnO contact pairs are similar to the results for pure silver contacts in our previous experiments. The rotational frequency of the break arc for the Ag/SnO2 and Ag/ZnO contacts is lower than that for the pure silver contacts.

  • A Robust Closed-Loop Transmit-Diversity Scheme with Unknown CSI Reliability

    Eunchul YOON  Joon-Tae KIM  Taewon HWANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:9
      Page(s):
    2400-2406

    In a closed-loop scenario, the performance of transmit-diversity schemes for a multiple antenna system depends on the reliability of the channel state information (CSI). However, estimating the reliability of the instantaneous CSI at the transmitter is a challenging task. In this paper, we propose a robust transmit-diversity scheme for the case when the instantaneous CSI available at the transmitter is imperfect and its reliability is unknown to the transmitter. We show by simulation that our proposed scheme is efficient when the CSI reliability varies arbitrarily in every channel realization.

  • Performance of MPEG-4 Transmission over SCTP Multi-Streaming in Wireless Networks

    Li WANG  Ken'ichi KAWANISHI  

     
    PAPER-Internet

      Vol:
    E93-B No:9
      Page(s):
    2336-2347

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol for the next generation Internet. SCTP is a connection-oriented protocol that carries over TCP's features but also supports UDP-like message-oriented data transmission. In this paper, we make use of SCTP's multi-streaming feature to transmit MPEG-4 video efficiently, and evaluate its transmission performance under the policy with/without differentiated retransmission. Moreover, to enhance the communication quality, we extend SCTP multi-streaming to realize selective retransmission policy. Our extension utilizes packet-by-packet timestamps to control retransmission of lost packets. By computer simulation, we show that SCTP can (1) improve the video quality by exploiting the multi-streaming and partial reliability features, (2) enhance the video transmission quality by adjusting SCTP fast retransmit threshold, and (3) SCTP with our selective retransmission extension can further improve the whole performance.

  • Nationwide SIP Telephony Network Design to Prevent Congestion Caused by Disaster

    Daisuke SATOH  Kyoko ASHITAGAWA  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E93-B No:9
      Page(s):
    2273-2281

    We present a session initiation protocol (SIP) network design for a voice-over-IP network to prevent congestion caused by people calling friends and family after a disaster. The design increases the capacity of SIP servers in a network by using all of the SIP servers equally. It takes advantage of the fact that equipment for voice data packets is different from equipment for signaling packets in SIP networks. Furthermore, the design achieves simple routing on the basis of telephone numbers. We evaluated the performance of our design in preventing congestion through simulation. We showed that the proposed design has roughly 20 times more capacity, which is 57 times the normal load, than the conventional design if a disaster were to occur in Niigata Prefecture struck by the Chuetsu earthquake in 2004.

  • Totem-Pole Power-Factor-Correction Converter under Critical-Conduction-Mode Interleaved Operation

    Eka FIRMANSYAH  Satoshi TOMIOKA  Seiya ABE  Masahito SHOYAMA  Tamotsu NINOMIYA  

     
    PAPER

      Vol:
    E93-B No:9
      Page(s):
    2250-2256

    This paper proposes a new power-factor-correction (PFC) topology, and explains its operation principle, its control mechanism, related application problems followed by experimental results. In this proposed topology, critical-conduction-mode (CRM) interleaved technique is applied to a bridgeless PFC in order to achieve high efficiency by combining benefits of each topology. This application is targeted toward low to middle power applications that normally employs continuous-conduction-mode boost converter.

  • User Location in Picocells -- A Paging Algorithm Derived from Measured Data

    Stephan WANKE  Hiroshi SAITO  Yutaka ARAKAWA  Shinsuke SHIMOGAWA  

     
    PAPER-Network

      Vol:
    E93-B No:9
      Page(s):
    2291-2298

    We present a new paging algorithm for wireless networks with ultra-short-range radio access links (picocells). The ubiquitous office (u-office) network is a good example of such a network, and we present some u-office example applications. In addition, we show that conventional paging algorithms are not feasible in such networks. Therefore, we derived a new paging algorithm from the measurement results of an experimental sensor network with short-range wireless links deployed in our office. We equipped persons with sensors and deployed sensor readers at selected places in our office. The sensors transmit messages to the sensor readers at regular intervals. If no sensor reader is in range, the message is lost. Our main observation is that, if a picocell shows an attraction property to a certain person, the residence time of an attached mobile terminal is not gamma distributed (as described in the literature) and the probability of long-lasting residences increases. Thus, if the residence time is larger than a certain threshold, the probability of a long-lasting residence time increases if a sensor reader location has an attraction property to a person. Based on this observation, our proposed paging algorithm registers the location of the mobile terminal only when the residence time in the cell is longer than a predetermined constant. By appropriately setting this constant, we can significantly reduce the registration message frequency while ensuring that the probability of the network successfully connecting to a mobile terminal remains high.

7981-8000hit(20498hit)