The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

9581-9600hit(20498hit)

  • Performance Analysis of a Collision Detection Algorithm of Spheres Based on Slab Partitioning

    Takashi IMAMICHI  Hiroshi NAGAMOCHI  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2308-2313

    In this paper, we consider a collision detection problem of spheres which asks to detect all pairs of colliding spheres in a set of n spheres located in d-dimensional space. We propose a collision detection algorithm for spheres based on slab partitioning technique and a plane sweep method. We derive a theoretical upper bound on the time complexity of the algorithm. Our bound tells that if both the dimension and the maximum ratio of radii of two spheres are bounded, then our algorithm runs in O(n log n + K) time with O(n + K) space, where K denotes the number of pairs of colliding spheres.

  • Bandwidth Reallocation Strategy for Video Communications on NGN

    Bin SONG  Hao QIN  Chunfang GUO  Linhua MA  

     
    LETTER-Multimedia Systems for Communications

      Vol:
    E91-B No:9
      Page(s):
    3037-3040

    Based on an estimation model of video subjective quality, a bandwidth reallocation strategy for video communications on NGN is presented. Experimental results show that the average PSNR of recovery video quality can be greatly increased by using the proposed method when the network bandwidth decreases.

  • A QoS Management Technique of Urgent Information Provision in ITS Services Using DSRC for Autonomous Base Stations

    Akitoshi SHIMURA  Takeiki AIZONO  Masashi HIRAIWA  Shigeki SUGANO  

     
    PAPER

      Vol:
    E91-D No:9
      Page(s):
    2276-2284

    A QoS management technique based on an autonomous decentralized mobility system, which is an autonomous decentralized system enhanced to provide mobile stations with information about urgent roadway situations, is proposed in this paper. This technique enables urgent messages to be flexibly and quickly transmitted to mobile stations by multiple decentralized base stations using dedicated short range communication. It also supports the easy addition of additional base stations. Each station autonomously creates information-delivery communities based on the urgency of the messages it receives through the roadside network and the distances between the senders and receivers. Each station dynamically determines the urgency of messages according to the message content and the speed of the mobile stations. Evaluation of this technique applied to the Smart Gateway system, which provides driving-assistance services to mobile stations through dedicated short-range communication, demonstrated its effectiveness and that it is suitable for actual systems.

  • Motion Evaluation for Rehabilitation Training of the Disabled

    Tae-young KIM  Jun PARK  Cheol-Su LIM  

     
    LETTER-Vision

      Vol:
    E91-A No:9
      Page(s):
    2688-2690

    In this paper, a motion evaluation technique for rehabilitation training is introduced. Motion recognition technologies have been developed for determining matching motions in the training set. However, we need to measure how well and how much of the motion has been followed for training motion evaluation. We employed a Finite State Machine as a framework of motion evaluation. For similarity analysis, we used weighted angular value differences although any template matching algorithm may be used. For robustness under illumination changes, IR LED's and cameras with IR-pass filter were used. Developed technique was successfully used for rehabilitation training of the disabled. Therapists appraised the system as practically useful.

  • Composite Signaling Coded Cooperation for Fast and Slow Fading

    Asaduzzaman  Hyung Yun KONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:9
      Page(s):
    3025-3029

    Motivated by the recent works of coded cooperation this letter presents a composite signal structure based coded cooperation technique. Our proposed protocol performs well in both slow and fast fading whereas, conventional coded cooperation is ineffective in fast fading. We develop the bounds on BER and FER of our proposal. Simulations confirm our developed bound and shows that the proposed coded cooperation protocol outperforms direct transmission in both fast and slow fading environments.

  • Integration Architecture of Content Addressable Memory and Massive-Parallel Memory-Embedded SIMD Matrix for Versatile Multimedia Processor

    Takeshi KUMAKI  Masakatsu ISHIZAKI  Tetsushi KOIDE  Hans Jurgen MATTAUSCH  Yasuto KURODA  Takayuki GYOHTEN  Hideyuki NODA  Katsumi DOSAKA  Kazutami ARIMOTO  Kazunori SAITO  

     
    PAPER

      Vol:
    E91-C No:9
      Page(s):
    1409-1418

    This paper presents an integration architecture of content addressable memory (CAM) and a massive-parallel memory-embedded SIMD matrix for constructing a versatile multimedia processor. The massive-parallel memory-embedded SIMD matrix has 2,048 2-bit processing elements, which are connected by a flexible switching network, and supports 2-bit 2,048-way bit-serial and word-parallel operations with a single command. The SIMD matrix architecture is verified to be a better way for processing the repeated arithmetic operation types in multimedia applications. The proposed architecture, reported in this paper, exploits in addition CAM technology and enables therefore fast pipelined table-lookup coding operations. Since both arithmetic and table-lookup operations execute extremely fast, the proposed novel architecture can realize consequently efficient and versatile multimedia data processing. Evaluation results of the proposed CAM-enhanced massive-parallel SIMD matrix processor for the example of the frequently used JPEG image-compression application show that the necessary clock cycle number can be reduced by 86% in comparison to a conventional mobile DSP architecture. The determined performances in Mpixel/mm2 are factors 3.3 and 4.4 better than with a CAM-less massive-parallel memory-embedded SIMD matrix processor and a conventional mobile DSP, respectively.

  • Spectral Efficiency of Fundamental Cooperative Relaying in Interference-Limited Environments

    Koji YAMAMOTO  Hirofumi MARUYAMA  Takashi SHIMIZU  Hidekazu MURATA  Susumu YOSHIDA  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E91-B No:8
      Page(s):
    2674-2682

    The spectral efficiency of cooperative relaying in interference-limited environments in which a given channel is spatially reused is investigated. Cooperative relaying is a promising technique that uses neighboring stations to forward the data toward the destination in order to achieve spatial diversity gain. It has been reported that by introducing cooperative relaying into communication between an isolated source-destination pair, the error rate or spectral efficiency is generally improved. However, it is not intuitively clear whether cooperative relaying can improve the performance in interference-limited environments because the simultaneous transmission of multiple stations increases the number of interference signals. Assuming the most fundamental cooperative relaying arrangement, which consists of only one relay station, numerical results reveal that cooperative relaying is not always superior to non-cooperative single-hop and two-hop transmissions in terms of spectral efficiency.

  • On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes

    Todorka ALEXANDROVA  Hiroyoshi MORITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2138-2150

    Constructing ideal (t,n) threshold secret sharing schemes leads to some limitations on the maximum number of users, that are able to join the secret sharing scheme. We aim to remove these limitations by reducing the information rate of the constructed threshold secret sharing schemes. In this paper we propose recursive construction algorithms of (t,n) threshold secret sharing schemes, based on the generalized vector space construction. Using these algorithms we are able to construct a (t,n) threshold secret sharing scheme for any arbitrary n.

  • Design of Spectrally Efficient Hermite Pulses for PSM UWB Communications

    Alex CARTAGENA GORDILLO  Ryuji KOHNO  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    2016-2024

    In this paper, we propose a method for designing a set of pulses whose spectrum is efficiently contained in amplitude and bandwidth. Because these pulses are derived from and have shapes that are either equal or similar to the Hermite pulses, we name our proposed transmit pulses as spectrally efficient Hermite pulses. Given that the proposed set of pulses does not constitute an orthonormal one, we also propose a set of receive templates which permit orthonormal detection of the incoming signals at the receiver. The importance of our proposal is in the potential implementation of M-ary pulse shape modulation systems, for ultra wideband communications, with sets of pulses that are efficiently contained within a specific bandwidth and limited to a certain amplitude.

  • An Improved DV-Hop Localization Algorithm with Reduced Node Location Error for Wireless Sensor Networks

    Hongyang CHEN  Kaoru SEZAKI  Ping DENG  Hing Cheung SO  

     
    LETTER-Digital Signal Processing

      Vol:
    E91-A No:8
      Page(s):
    2232-2236

    In this paper, we propose a new localization algorithm and improve the DV-Hop algorithm by using a differential error correction scheme that is designed to reduce the location error accumulated over multiple hops. This scheme needs no additional hardware support and can be implemented in a distributed way. The proposed method can improve location accuracy without increasing communication traffic and computing complexity. Simulation results show the performance of the proposed algorithm is superior to that of the DV-Hop algorithm.

  • Large Code Set for Double User Capacity and Low PAPR Level in Multicarrier Systems

    Khoirul ANWAR  Masato SAITO  Takao HARA  Minoru OKADA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E91-A No:8
      Page(s):
    2183-2194

    In this paper, a new large spreading code set with a uniform low cross-correlation is proposed. The proposed code set is capable of (1) increasing the number of assigned user (capacity) in a multicarrier code division multiple access (MC-CDMA) system and (2) reducing the peak-to-average power ratio (PAPR) of an orthogonal frequency division multiplexing (OFDM) system. In this paper, we derive a new code set and present an example to demonstrate performance improvements of OFDM and MC-CDMA systems. Our proposed code set with code length of N has K=2N+1 number of codes for supporting up to (2N+1) users and exhibits lower cross correlation properties compared to the existing spreading code sets. Our results with subcarrier N=16 confirm that the proposed code set outperforms the current pseudo-orthogonal carrier interferometry (POCI) code set with gain of 5 dB at bit-error-rate (BER) level of 10-4 in the additive white Gaussian noise (AWGN) channel and gain of more than 3.6 dB in a multipath fading channel.

  • Analysis of Simple Single/Parallel Switched Dynamical Systems Based on Two Switching Strategies

    Yuki ISHIKAWA  Daisuke KIMURA  Yasuhide ISHIGE  Toshimichi SAITO  

     
    PAPER-Nonlinear Problems

      Vol:
    E91-A No:8
      Page(s):
    2076-2083

    This paper studies two kinds of simple switched dynamical systems with piecewise constant characteristics. The first one is based on the single buck converter whose periodic/chaotic dynamics are analyzed precisely using the piecewise linear phase map. The second one is based on a paralleled system of the buck converters for lower voltages with higher current capabilities. Referring to the results of the single system, it is clarified that stable multi-phase synchronization is always possible by the proper use of the switching strategies and adjustment of the clock period. Presenting a simple test circuit, typical operations are confirmed experimentally.

  • Combining Attention Model with Hierarchical Graph Representation for Region-Based Image Retrieval

    Song-He FENG  De XU  Bing LI  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E91-D No:8
      Page(s):
    2203-2206

    The manifold-ranking algorithm has been successfully adopted in content-based image retrieval (CBIR) in recent years. However, while the global low-level features are widely utilized in current systems, region-based features have received little attention. In this paper, a novel attention-driven transductive framework based on a hierarchical graph representation is proposed for region-based image retrieval (RBIR). This approach can be characterized by two key properties: (1) Since the issue about region significance is the key problem in region-based retrieval, a visual attention model is chosen here to measure the regions' significance. (2) A hierarchical graph representation which combines region-level with image-level similarities is utilized for the manifold-ranking method. A novel propagation energy function is defined which takes both low-level visual features and regional significance into consideration. Experimental results demonstrate that the proposed approach shows the satisfactory retrieval performance compared to the global-based and the block-based manifold-ranking methods.

  • Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback

    Rongrong NI  Qiuqi RUAN  

     
    LETTER-Application Information Security

      Vol:
    E91-D No:8
      Page(s):
    2196-2198

    A neighbor-aided authentication watermarking based on a chaotic system with feedback is proposed in this paper. This algorithm can not only detect malicious manipulations but reveal block substitutions when the VQ attack occurs. An image is partitioned into non-overlapped blocks. The pixels in one block and its neighboring block are combined to produce an authentication watermark based on a chaotic system with feedback, which is sensitive to the initial value. The produced watermark is embedded into the current block. During detection, the detector extracts the watermark firstly, then generates a reference sequence and compares it with the extracted watermark to authenticate the integrity of the image and locate the tampered regions. Experimental results prove the effectiveness of our method.

  • Photo Data Retrieval via P300 Evoked Potentials

    Hideaki TOUYAMA  

     
    LETTER-Biological Engineering

      Vol:
    E91-D No:8
      Page(s):
    2212-2213

    In this letter, a new concept of life log retrieval using human brain activities is presented. The non-invasive electroencephalogram (EEG) recording was applied to have P300 evoked potentials during the photo retrieving tasks. Three subjects tried to select the photo images that interest them among nine according to their mental states. It was found that with four times EEG averaging, the performances of target photo selections could reach 90% for two subjects. This concept would be applicable in future to achieve intuitive retrieval of life log with large quantities of data.

  • An Effective GA-Based Scheduling Algorithm for FlexRay Systems

    Shan DING  Hiroyuki TOMIYAMA  Hiroaki TAKADA  

     
    PAPER-System Programs

      Vol:
    E91-D No:8
      Page(s):
    2115-2123

    An advanced communication system, the FlexRay system, has been developed for future automotive applications. It consists of time-triggered clusters, such as drive-by-wire in cars, in order to meet different requirements and constraints between various sensors, processors, and actuators. In this paper, an approach to static scheduling for FlexRay systems is proposed. Our experimental results show that the proposed scheduling method significantly reduces up to 36.3% of the network traffic compared with a past approach.

  • Differential Energy Based Watermarking Algorithm Using Wavelet Tree Group Modulation (WTGM) and Human Visual System

    Min-Jen TSAI  Chang-Hsing SHEN  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1961-1973

    Wavelet tree based watermarking algorithms are using the wavelet coefficient energy difference for copyright protection and ownership verification. WTQ (Wavelet Tree Quantization) algorithm is the representative technique using energy difference for watermarking. According to the cryptanalysis on WTQ, the watermark embedded in the protected image can be removed successfully. In this paper, we present a novel differential energy watermarking algorithm based on the wavelet tree group modulation structure, i.e. WTGM (Wavelet Tree Group Modulation). The wavelet coefficients of host image are divided into disjoint super trees (each super tree containing two sub-super trees). The watermark is embedded in the relatively high-frequency components using the group strategy such that energies of sub-super trees are close. The employment of wavelet tree structure, sum-of-subsets and positive/negative modulation effectively improve the drawbacks of the WTQ scheme for its insecurity. The integration of the HVS (Human Visual System) for WTGM provides a better visual effect of the watermarked image. The experimental results demonstrate the effectiveness of our algorithm in terms of robustness and imperceptibility.

  • A CMOS Low Dropout Regulator with Extended Stable Region for the Effective Series Resistance of the Output Capacitor

    Hsuan-I PAN  Chern-Lin CHEN  

     
    PAPER-Electronic Circuits

      Vol:
    E91-C No:8
      Page(s):
    1356-1364

    In this paper, a new compensation scheme and a corresponding pass element structure for a CMOS low-dropout regulator (LDO) are presented. The proposed approach effectively alleviates the strict stability constraint on the ESR of the output capacitor. Stability of a CMOS LDO with the conventional compensation requires the effective series resistance (ESR) of the output capacitor in a tunnel-like region. With the proposed design approach, an LDO can be stable using an output capacitor without ESR. A 2.5 V/150 mA LDO has been implemented using a 0.5-µm 1P2M CMOS process. The experimental results illustrate that the proposed LDO is stable with an output capacitor of 0.33 µF and no ESR.

  • A New Method to Evaluate the Short-Time Withstand Current for Air Circuit Breaker

    Honggang XIANG  Degui CHEN  Xingwen LI  Weixiong TONG  

     
    PAPER-Contactors & Circuit Breakers

      Vol:
    E91-C No:8
      Page(s):
    1292-1298

    Short-time withstand current is one of the crucial nominal parameters in air circuit breaker. A numerical method to evaluate the short-time withstand current is proposed. Cylindrical current carrying bridge is introduced to describe the contact spot between movable and fixed contacts. Taking into account the action of ferromagnetic splitter plates, the variation of the conductor properties with temperature and the variation of contact spot radius with the electro-dynamic repulsion force, a transient finite element calculation model is developed by coupling the electromagnetic field and thermal field. The loaded short circuit current is considered as the short-time withstand current once the highest temperature is near to the melting point of the contact material. It demonstrates that the method is useful to evaluate the performance of the air circuit breaker.

  • Thermal Analysis of AC Contactor Using Thermal Network Finite Difference Analysis Method

    Chunping NIU  Degui CHEN  Xingwen LI  Yingsan GENG  

     
    PAPER-Contactors & Circuit Breakers

      Vol:
    E91-C No:8
      Page(s):
    1286-1291

    To predict the thermal behavior of switchgear quickly, the Thermal Network Finite Difference Analysis method (TNFDA) is adopted in thermal analysis of AC contactor in the paper. The thermal network model is built with nodes, thermal resistors and heat generators, and it is solved using finite difference method (FDM). The main circuit and the control system are connected by thermal resistors network, which solves the problem of multi-sources interaction in the application of TNFDA. The temperature of conducting wires is calculated according to the heat transfer process and the fundamental equations of thermal conduction. It provides a method to solve the problem of boundary conditions in applying the TNFDA. The comparison between the results of TNFDA and measurements shows the feasibility and practicability of the method.

9581-9600hit(20498hit)