The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

9461-9480hit(20498hit)

  • Fabrication of Rugate Optical Filters Using a-SiOx:H Thin Films

    Hidehiko YODA  Koichi MURO  Kazuo SHIRAISHI  

     
    PAPER

      Vol:
    E91-C No:10
      Page(s):
    1639-1643

    Rugate thin film optical filters are useful for designing arbitrary-shaped spectra, such as multistep or triangular spectra. A technique for synthesizing the refractive index distribution of rugate filters was used to suppress unwanted ripples on the spectrum. The refractive index of an amorphous hydrogenated silicon oxide (a-SiOx:H) rugate thin film was minutely controlled with a resolution of 0.001 using radio-frequency (RF) magnetron sputtering. The fabricated rugate filters had multistep bands over a wavelength range of 1260-1670 nm or good linearity over 1290-1650 nm.

  • Detailed Evolution of Degree Distributions in Residual Graphs with Joint Degree Distributions

    Takayuki NOZAKI  Kenta KASAI  Tomoharu SHIBUYA  Kohichi SAKANIWA  

     
    PAPER-Coding Theory

      Vol:
    E91-A No:10
      Page(s):
    2737-2744

    Luby et al. derived evolution of degree distributions in residual graphs for irregular LDPC code ensembles. Evolution of degree distributions in residual graphs is important characteristic which is used for finite-length analysis of the expected block and bit error probability over the binary erasure channel. In this paper, we derive detailed evolution of degree distributions in residual graphs for irregular LDPC code ensembles with joint degree distributions.

  • UWB Localization for NLOS under Indoor Multipath Channel: Scheme and TOA Estimation

    Zhu XIAO  Ke-Chu YI  Bin TIAN  Yong-Chao WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3391-3394

    This letter proposes a UWB signaling localization scheme for indoor multipath channel. It demonstrates that the proposed method does not require LOS path (LP) and is suitable for severe non line-of-sight (NLOS) condition. A low-complexity TOA estimation algorithm, the strongest path (SP) detection by convolution, is designed, which is easier to implement than the LP detection since it dispenses with the process of threshold setting. Experiments under NLOS channels in IEEE.802.15.4a are conducted and the localization influences due to the algorithm parameters are discussed. The results prove the feasibility of the proposed localization scheme under the indoor multipath NLOS environment.

  • A Support Vector Machine-Based Gender Identification Using Speech Signal

    Kye-Hwan LEE  Sang-Ick KANG  Deok-Hwan KIM  Joon-Hyuk CHANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E91-B No:10
      Page(s):
    3326-3329

    We propose an effective voice-based gender identification method using a support vector machine (SVM). The SVM is a binary classification algorithm that classifies two groups by finding the voluntary nonlinear boundary in a feature space and is known to yield high classification performance. In the present work, we compare the identification performance of the SVM with that of a Gaussian mixture model (GMM)-based method using the mel frequency cepstral coefficients (MFCC). A novel approach of incorporating a features fusion scheme based on a combination of the MFCC and the fundamental frequency is proposed with the aim of improving the performance of gender identification. Experimental results demonstrate that the gender identification performance using the SVM is significantly better than that of the GMM-based scheme. Moreover, the performance is substantially improved when the proposed features fusion technique is applied.

  • QR-LRL Signal Detection for Spatially Multiplexed MIMO Systems

    Seungjae BAHNG  Youn-Ok PARK  Jaekwon KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3383-3386

    The performance of the ordered successive interference cancellation (OSIC) signal detection method is well known to depend on the successful detection of the first layer. In a previous work, in an effort to mitigate the error propagation effect, all the constellation points were tried as the first layer symbol, thereby achieving a better performance. In this letter, we show that the selection of the first layer impacts the error performance significantly, and based on the observation, we propose a novel signal detection method QR-LRL. In the proposed work, the least reliable layer (LRL) is chosen to be the first layer, which is shown to be the best choice in terms of noise enhancement in detecting the other layers. Also, we discuss Log Likelihood Ratio (LLR) computation when the proposed method is used. Computer simulations confirm the efficacy of the proposed method.

  • An Image Completion Algorithm Using Occlusion-Free Images from Internet Photo Sharing Sites

    Hanieh AMIRSHAHI  Satoshi KONDO  Koichi ITO  Takafumi AOKI  

     
    PAPER-Image Processing

      Vol:
    E91-A No:10
      Page(s):
    2918-2927

    In this paper, we propose an image completion algorithm which takes advantage of the countless number of images available on Internet photo sharing sites to replace occlusions in an input image. The algorithm 1) automatically selects the most suitable images from a database of downloaded images and 2) seamlessly completes the input image using the selected images with minimal user intervention. Experimental results on input images captured at various locations and scene conditions demonstrate the effectiveness of the proposed technique in seamlessly reconstructing user-defined occlusions.

  • A Novel MAC Protocol for QoS in Ad Hoc Wireless Networks

    Kiyoshi TAKAHASHI  Takuya TERASAWA  Toshinori TSUBOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3297-3306

    We propose a medium access control (MAC) protocol for real-time applications in one-hop ad-hoc wireless networks. It is a distributed mechanism that takes account of priority and has a bounded packet delay. Nodes use energy signals to contend for the right to access the channel. Nodes, which have a packet to transmit, send energy signals or listen to the channel based on their binary frame. The node that has sent energy signals and has not heard any energy signals wins the right to access the channel. We use two schemes to determine the binary frame: at the beginning of a session, a node determines it based on its priority level and a random number; after successful transmission, based on a count of successful packet transmissions. With the first scheme, in order to reduce contention losses, the nodes that had won the right to access the channel but failed in transmission have priority over the other nodes. With the second scheme, the node that has the largest count, the one that has been waiting the longest, can send a packet without risking collision. The protocol provides higher probability of successful transmission and a limit on maximum packet delay. An analysis of the protocol provides conditions for the protocol to be stable. We evaluate the performance of the proposed protocol using simulations of a network with a mixed population of data and real-time nodes, whose source is constant bit rate (CBR) and a two state Markov on/off process.

  • Optical Cross-Connect Switch Architectures for Hierarchical Optical Path Networks

    Shoji KAKEHASHI  Hiroshi HASEGAWA  Ken-ichi SATO  

     
    PAPER-Switching for Communications

      Vol:
    E91-B No:10
      Page(s):
    3174-3184

    This paper proposes new switch architectures for hierarchical optical path cross-connect (HOXC) systems. The architectures allow incremental expansion of system scale in terms of the number of input/output fiber ports, wavebands, and optical paths per waveband. These features assure the cost-effective introduction of HOXCs even at the outset when traffic volume is not so large. Furthermore the effectiveness of the proposed switch architectures is demonstrated in a comparison with single-layer OXCs (conventional OXCs). The results provide useful criteria for the introduction of HOXCs in terms of hardware scale.

  • BAT: Performance-Driven Crosstalk Mitigation Based on Bus-Grouping Asynchronous Transmission

    Guihai YAN  Yinhe HAN  Xiaowei LI  Hui LIU  

     
    PAPER-Integrated Electronics

      Vol:
    E91-C No:10
      Page(s):
    1690-1697

    Crosstalk delay within an on-chip bus can induce severe transmission performance penalties. The Bus-grouping Asynchronous Transmission (BAT) scheme is proposed to mitigate the performance degradation. Furthermore, considering the distinct spatial locality of transition distribution on some types of buses, we use the locality to optimize the BAT. In terms of the implementation, we propose the Differential Counter Cluster (DCC) synchronous mechanism to synchronize the data transmission, and the Delay Active Shielding (DAS) to protect some critical signals from crosstalk and optimize the routing area overhead. The BAT is scalable with the variation of bus width with little extra implementation complexity. The effectiveness of the BAT is evaluated by focusing on the on-chip buses of a superscalar microprocessor simulator using the SPEC CPU2000 benchmarks. When applied to a 64-bit on-chip instruction bus, the BAT scheme, compared with the conservative approach, Codec and Variable Cycle Transmission (DYN) approaches, improves performance by 55+%, 10+%, 30+%, respectively, at the expense of 13% routing area overhead.

  • A Nearly Perfect Total-Field/Scattered-Field Boundary for the One-Dimensional CIP Method

    Yoshiaki ANDO  Hiroyuki SAITO  Masashi HAYAKAWA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E91-C No:10
      Page(s):
    1677-1683

    A total-field/scattered-field (TF/SF) boundary which is commonly used in the finite-difference time-domain (FDTD) method to illuminate scatterers by plane waves, is developed for use in the constrained interpolation profile (CIP) method. By taking the numerical dispersion into account, the nearly perfect TF/SF boundary can be achieved, which allows us to calculate incident fields containing high frequency components without fictitious scattered fields. First of all, we formulate the TF/SF boundary in the CIP scheme. The numerical dispersion relation is then reviewed. Finally the numerical dispersion is implemented in the TF/SF boundary to estimate deformed incident fields. The performance of the nearly perfect TF/SF boundary is examined by measuring leaked fields in the SF region, and the proposed method drastically diminish the leakage compared with the simple TF/SF boundary.

  • Implementation of Multi-Agent Object Attention System Based on Biologically Inspired Attractor Selection

    Ryoji HASHIMOTO  Tomoya MATSUMURA  Yoshihiro NOZATO  Kenji WATANABE  Takao ONOYE  

     
    PAPER-Video Processing Systems

      Vol:
    E91-A No:10
      Page(s):
    2909-2917

    A multi-agent object attention system is proposed, which is based on biologically inspired attractor selection model. Object attention is facilitated by using a video sequence and a depth map obtained through a compound-eye image sensor TOMBO. Robustness of the multi-agent system over environmental changes is enhanced by utilizing the biological model of adaptive response by attractor selection. To implement the proposed system, an efficient VLSI architecture is employed with reducing enormous computational costs and memory accesses required for depth map processing and multi-agent attractor selection process. According to the FPGA implementation result of the proposed object attention system, which is accomplished by using 7,063 slices, 640512 pixel input images can be processed in real-time with three agents at a rate of 9 fps in 48 MHz operation.

  • Variable-Focus Liquid Crystal Lenses Used in Imaging Systems as Focusing Elements

    Mao YE  Bin WANG  Satoshi YANASE  Susumu SATO  

     
    INVITED PAPER

      Vol:
    E91-C No:10
      Page(s):
    1599-1603

    Liquid crystal (LC) lenses that have hole-patterned electrodes and are driven by two voltages used as imaging devices are reported. Two different LC lenses are applied in image formation systems. One LC lens is used with a polarizer in a relay lens scope, and another LC lens that is polarization independent is used in a TV lens. Both LC lenses play roles of focusing elements in lens systems; objects are separately brought into focus by the LC lenses. Very sharp black-and-white and color images are formed by the systems.

  • Scheduling Parallel Tasks with Communication Overhead in an Environment with Multiple Machines

    Jiann-Fu LIN  

     
    PAPER-Algorithm Theory

      Vol:
    E91-D No:10
      Page(s):
    2379-2385

    This paper investigates the problem of nonpreemptively scheduling independent parallel tasks in an environment with multiple machines, which is motivated from the recent studies in scheduling tasks in a multi-machine environment. In this scheduling environment, each machine contains a number of identical processors and each parallel task can simultaneously require a number of processors for its processing in any single machine. Whenever tasks are processed in parallel in a parallel machine, message communication among processors is often inevitable. The problem of finding a shortest schedule length on scheduling independent parallel tasks with the consideration of communication overhead in a multi-machine environment is NP-hard. The aim of this paper is to propose a heuristic algorithm for this kind of problem and to analyze the performance bound of this heuristic algorithm.

  • Thermal-Aware Test Access Mechanism and Wrapper Design Optimization for System-on-Chips

    Thomas Edison YU  Tomokazu YONEDA  Krishnendu CHAKRABARTY  Hideo FUJIWARA  

     
    PAPER-Dependable Computing

      Vol:
    E91-D No:10
      Page(s):
    2440-2448

    Rapid advances in semiconductor manufacturing technology have led to higher chip power densities, which places greater emphasis on packaging and temperature control during testing. For system-on-chips, peak power-based scheduling algorithms have been used to optimize tests under specified power constraints. However, imposing power constraints does not always solve the problem of overheating due to the non-uniform distribution of power across the chip. This paper presents a TAM/Wrapper co-design methodology for system-on-chips that ensures thermal safety while still optimizing the test schedule. The method combines a simplified thermal-cost model with a traditional bin-packing algorithm to minimize test time while satisfying temperature constraints. Furthermore, for temperature checking, thermal simulation is done using cycle-accurate power profiles for more realistic results. Experiments show that even a minimal sacrifice in test time can yield a considerable decrease in test temperature as well as the possibility of further lowering temperatures beyond those achieved using traditional power-based test scheduling.

  • Effective Acoustic Modeling for Pronunciation Quality Scoring of Strongly Accented Mandarin Speech

    Fengpei GE  Changliang LIU  Jian SHAO  Fuping PAN  Bin DONG  Yonghong YAN  

     
    PAPER-Speech and Hearing

      Vol:
    E91-D No:10
      Page(s):
    2485-2492

    In this paper we present our investigation into improving the performance of our computer-assisted language learning (CALL) system through exploiting the acoustic model and features within the speech recognition framework. First, to alleviate channel distortion, speaker-dependent cepstrum mean normalization (CMN) is adopted and the average correlation coefficient (average CC) between machine and expert scores is improved from 78.00% to 84.14%. Second, heteroscedastic linear discriminant analysis (HLDA) is adopted to enhance the discriminability of the acoustic model, which successfully increases the average CC from 84.14% to 84.62%. Additionally, HLDA causes the scoring accuracy to be more stable at various pronunciation proficiency levels, and thus leads to an increase in the speaker correct-rank rate from 85.59% to 90.99%. Finally, we use maximum a posteriori (MAP) estimation to tune the acoustic model to fit strongly accented test speech. As a result, the average CC is improved from 84.62% to 86.57%. These three novel techniques improve the accuracy of evaluating pronunciation quality.

  • An Efficient Signature Matching Scheme for Mobile Security

    Ruhui ZHANG  Makoto IWATA  

     
    PAPER-Network Management/Operation

      Vol:
    E91-B No:10
      Page(s):
    3251-3261

    The development of network technology reveals the clear trend that mobile devices will soon be equipped with more and more network-based functions and services. This increase also results in more intrusions and attacks on mobile devices; therefore, mobile security mechanisms are becoming indispensable. In this paper, we propose a novel signature matching scheme for mobile security. This scheme not only emphasizes a small resource requirement and an optimal scan speed, which are both important for resource-limited mobile devices, but also focuses on practical features such as stable performance, fast signature set updates and hardware implementation. This scheme is based on the finite state machine (FSM) approach widely used for string matching. An SRAM-based two-level finite state machine (TFSM) solution is introduced to utilize the unbalanced transition distribution in the original FSM to decrease the memory requirement, and to shorten the critical path of the single-FSM solution. By adjusting the boundary of the two FSMs, optimum memory usage and throughput are obtainable. The hardware circuit of our scheme is designed and evaluated by both FPGA and ASIC technology. The result of FPGA evaluation shows that 2,168 unique patterns with a total of 32,776 characters are stored in 177.75 KB SelectRAM blocks of Xilinx XC4VLX40 FPGA and a 3.0 Gbps throughput is achieved. The result of ASIC evaluation with 180 nm-CMOS library shows a throughput of over 4.5 Gbps with 132 KB of SRAM. Because of the small amount of memory and logic cell requirements, as well as the scalability of our scheme, higher performance is achieved by instantiating several signature matching engines when more resources are provided.

  • Observation of Blue-Light Emission from Tantalum Oxide Films Deposited by Radio-Frequency Magnetron Sputtering

    Kenta MIURA  Hiroki MIYAZAKI  Osamu HANAIZUMI  

     
    PAPER

      Vol:
    E91-C No:10
      Page(s):
    1669-1672

    We obtained blue photoluminescence from tantalum oxide films deposited by radio-frequency magnetron sputtering after annealing. The maximum peak intensity of the photoluminescence was observed from a sample annealed at 600 for 20 min, and the peak wavelength was approximately 430 nm. Tantalum oxide films that emit blue light may be useful materials for novel active optical devices utilizing Ta2O5/SiO2 multilayered photonic crystals.

  • Automated Fast and Accurate Display Calibration Using ADT Compensated LCD for Mobile Phone

    Chan-Ho HAN  Kil-Houm PARK  

     
    LETTER

      Vol:
    E91-C No:10
      Page(s):
    1604-1607

    Gamma correction is an essential function and is time consuming task in every display device such as CRT and LCD. And gray scale CCT reproduction in most LCD are quite different from those of standard CRT. An automated fast and accurate display adjusment method and system for gamma correction and for constant gray scale CCT calibration of mobile phone LCD is presented in this paper. We develop the test pattern disply and register control program in mobile phone and devleop automatic measure program in computer using spectroradimeter. The proposed system is maintain given gamma values and CCT values accuratly. In addition, This system is possible to fast mobile phone LCD adjusment within one hour.

  • Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis

    Jongsung KIM  Changhoon LEE  Jaechul SUNG  Seokhie HONG  Sangjin LEE  Jongin LIM  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    3047-3058

    The design and analysis of block ciphers is an established field of study which has seen significant progress since the early 1990s. Nevertheless, what remains on an interesting direction to explore in this area is to design block ciphers with provable security against powerful known attacks such as differential and linear cryptanalysis. In this paper we introduce seven new block cipher structures, named Feistel-variant A, B, CLEFIA and MISTY-FO-variant A, B, C, D structures, and show that these structures are provably resistant against differential cryptanalysis. The main results of this paper are that the average differential probabilities over at least 2 rounds of Feistel-variant A structure and 1 round of Feistel-variant B structure are both upperbounded by p2, while the average differential probabilities over at least 5 rounds of CLEFIA, MISTY-FO-variant A, B, C and D structures are upperbounded by p4+2p5, p4, p4, 2p4 and 2p4, respectively, if the maximum differential probability of a round F function is p. We also give provable security for the Feistel-variant A, B and CLEFIA structures against linear cryptanalysis. Our results are attained under the assumption that all of components in our proposed structures are bijective. We expect that our results are useful to design block ciphers with provable security against differential and linear cryptanalysis.

  • OFDM Transmission Characteristics where the Delay Profile Exceeds the Guard Interval in Nakagami-Rice Fading Environment

    Yoshio KARASAWA  Changarkame VANMANY  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3262-3271

    In order to evaluate the effect of Nakagami-Rice fading on Orthogonal Frequency Division Multiplex (OFDM) signal transmission when the delay profile exceeds the guard interval, a simple prediction model is developed by extending the Equivalent Transmission-Path (ETP) model for Rayleigh fading. The validity of the model is demonstrated by comparing the calculated values of BER to those obtained by computer simulation. Using the newly developed ETP-OFDM model, digital transmission characteristics of the OFDM signal in a multipath environment when the delay profile exceeds the guard interval are shown as a function of K factor, delay spread, guard interval and OFDM symbol period.

9461-9480hit(20498hit)