The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

11461-11480hit(20498hit)

  • Dexterous Robot Hand Control with Data Glove by Human Imitation

    Kiyoshi HOSHINO  

     
    PAPER-Robot and Interface

      Vol:
    E89-D No:6
      Page(s):
    1820-1825

    The purpose of the study is to obtain the automatic and optimal matching between a motion-measurement device such as a data glove and an output device such as a dexterous robot hand, where there are many differences in the numbers of degree of freedom, sensor and actuator positions, and data format, by means of motion imitation by the humans. Through the algorithm proposed here, a system engineer or user need no labor of determining the values of gains and parameters to be used. In the system, a subject with data glove imitated the same motion with a dexterous robot hand which was moving according to a certain mathematical function. Autoregressive models were adapted to the matching, where each joint angle in the robot and data glove data of the human were used as object and explanatory variables respectively. The partial regression coefficients were estimated by means of singular value decomposition with a system-noise reduction algorithm utilizing statistical properties. The experimental results showed that the robot hand was controlled with high accuracy with small delay, suggesting that the method proposed in this study is proper and easy way and is adaptive to many other systems between a pair of motion-measurement device and output device.

  • Split Multi-Path Routing Protocol with Load Balancing Policy (SMR-LB) to Improve TCP Performance in Mobile Ad Hoc Networks

    Takeshi MURAKAMI  Masaki BANDAI  Iwao SASASE  

     
    PAPER-Switching for Communications

      Vol:
    E89-B No:5
      Page(s):
    1517-1525

    In this paper, we propose Split Multi-path Routing protocol with Load Balancing policy (SMR-LB) to improve TCP performance in mobile ad hoc networks. In SMR-LB, each intermediate node records how many primary paths are attempted to construct as well as which source nodes attempt to construct the primary path. Each intermediate node decides which primary path should be constructed by using the primary path and the source node ID information. As a result, SMR-LB can balance the loads and so reduce the probability of congestion and avoid the continuous link breakage time between the specific source and destination pair. Computer simulation results show that SMR-LB can improve TCP performance compared with the conventional protocols.

  • Solving the Graph Planarization Problem Using an Improved Genetic Algorithm

    Rong-Long WANG  Kozo OKAZAKI  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E89-A No:5
      Page(s):
    1507-1512

    An improved genetic algorithm for solving the graph planarization problem is presented. The improved genetic algorithm which is designed to embed a graph on a plane, performs crossover and mutation conditionally instead of probability. The improved genetic algorithm is verified by a large number of simulation runs and compared with other algorithms. The experimental results show that the improved genetic algorithm performs remarkably well and outperforms its competitors.

  • Sublogarithmic Space-Bounded Multi-Inkdot Alternating Turing Machines with Only Existential (Universal) States

    Tsunehiro YOSHINAGA  Jianliang XU  Katsushi INOUE  

     
    LETTER

      Vol:
    E89-A No:5
      Page(s):
    1417-1420

    This paper investigates the accepting powers of two-way alternating Turing machines (2ATM's) with only existential (universal) states which have inkdots and sublogarithmic space. It is shown that for sublogarithmic space-bounded computations, (i) multi-inkdot 2ATM's with only existential states and the ones with only universal states are incomparable, (ii) k-inkdot 2ATM's are better than k-inkdot 2ATM's with only existential (universal) states, k ≥ 0, and (iii) the class of sets accepted by multi-inkdot 2ATM's with only existential (universal) states is not closed under complementation.

  • 2-D Laplace-Z Transformation

    Yang XIAO  Moon Ho LEE  

     
    LETTER-Digital Signal Processing

      Vol:
    E89-A No:5
      Page(s):
    1500-1504

    Based on recent results for 2-D continuous-discrete systems, this paper develops 2-D Laplace-z transform, which can be used to analyze 2-D continuous-discrete signals and system in Laplace-z hybrid domain. Current 1-D Laplace transformation and z transform can be combined into the new 2-D s-z transform. However, 2-D s-z transformation is not a simple extension of 1-D transform, in 2-D case, we need consider the 2-D boundary conditions which don't occur in 1-D case. The hybrid 2-D definitions and theorems are given in the paper. To verify the results of this paper, we also derived a numerical inverse 2-D Laplace-z transform, applying it to show the 2-D pulse response of a stable 2-D continuous-discrete system.

  • Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure

    Dong-Guk HAN  Katsuyuki OKEYA  Tae Hyun KIM  Yoon Sung HWANG  Beomin KIM  Young-Ho PARK  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1316-1327

    We propose a new analysis technique against a class of countermeasure using randomized binary signed digit (BSD) representations. We also introduce some invariant properties between BSD representations. The proposed analysis technique can directly recover the secret key from power measurements without information for algorithm because of the invariant properties of BSD representation. Thus the proposed attack is applicable to all countermeasures using BSD representations. Finally, we give the simulation results against some countermeasures using BSD representation such as Ha-Moon method, Ebeid-Hasan method, and the method of Agagliate et al. The results show that the proposed attack is practical analysis method.

  • Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator

    Pino CABALLERO-GIL  Amparo FUSTER-SABATER  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1166-1172

    The aim of this research is the efficient cryptanalysis of the Shrinking Generator through its characterization by means of Linear Hybrid Cellular Automata. This paper describes a new known-plaintext attack based on the computation of the characteristic polynomials of sub-automata and on the generation of the Galois field associated to one of the Linear Feedback Shift Registers components of the generator. The proposed algorithm allows predicting with absolute certainty, many unseen bits of the keystream sequence, thanks to the knowledge of both registers lengths, the characteristic polynomial of one of the registers, and the interception of a variable number of keystream bits.

  • A Note on Construction of Orthogonal Arrays with Unequal Strength from Error-Correcting Codes

    Tomohiko SAITO  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1307-1315

    Orthogonal Arrays (OAs) have been playing important roles in the field of experimental design. It has been known that OAs are closely related to error-correcting codes. Therefore, many OAs can be constructed from error-correcting codes. But these OAs are suitable for only cases that equal interaction effects can be assumed, for example, all two-factor interaction effects. Since these cases are rare in experimental design, we cannot say that OAs from error-correcting codes are practical. In this paper, we define OAs with unequal strength. In terms of our terminology, OAs from error-correcting codes are OAs with equal strength. We show that OAs with unequal strength are closer to practical OAs than OAs with equal strength. And we clarify the relation between OAs with unequal strength and unequal error-correcting codes. Finally, we propose some construction methods of OAs with unequal strength from unequal error-correcting codes.

  • Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares

    Mitsugu IWAMOTO  Lei WANG  Kazuki YONEYAMA  Noboru KUNIHIRO  Kazuo OHTA  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1382-1395

    In this paper, a method is proposed to construct a visual secret sharing (VSS) scheme for multiple secret images in which each share can be rotated with 180 degrees in decryption. The proposed VSS scheme can encrypt more number of secret images compared with the normal VSS schemes. Furthermore, the proposed technique can be applied to the VSS scheme that allows to turn over some shares in decryption. From the theoretical point of view, it is interesting to note that such VSS schemes cannot be obtained from so-called basis matrices straightforwardly.

  • Performance Analysis of MIMO Systems in Spatially Correlated Fading Using Matrix-Monotone Functions

    Eduard A. JORSWIECK  Holger BOCHE  

     
    PAPER-Information Theory

      Vol:
    E89-A No:5
      Page(s):
    1454-1472

    The average performance of a single-user MIMO system under spatially correlated fading and with different types of CSI at the transmitter and with perfect CSI at the receiver was studied in recent work. In contrast to analyzing a single performance metric, e.g. the average mutual information or the average bit error rate, we study an arbitrary representative of the class of matrix-monotone functions. Since the average mutual information as well as the average normalized MSE belong to that class, this universal class of performance functions brings together the information theoretic and signal processing performance metric. We use Lowner's representation of operator monotone functions in order to derive the optimum transmission strategies as well as to characterize the impact of correlation on the average performance. Many recent results derived for average mutual information generalize to arbitrary matrix-monotone performance functions, e.g. the optimal transmit strategy without CSI at the transmitter is equal power allocation. The average performance without CSI is a Schur-concave function with respect to transmit and receive correlation. In addition to this, we derive the optimal transmission strategy with long-term statistics knowledge at the transmitter and propose an efficient iterative algorithm. The beamforming-range is the SNR range in which only one data stream spatially multiplexed achieves the maximum average performance. This range is important since it has a simple receiver structure and well known channel coding. We entirely characterize the beamforming-range. Finally, we derive the generalized water-filling transmit strategy for perfect CSI and characterize its properties under channel correlation.

  • Channel Estimation for OFDM-Based WLANs in the Presence of Wiener Phase Noise and Residual Frequency Offset

    Yong-Hwa KIM  Jong-Ho LEE  Seong-Cheol KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:5
      Page(s):
    1709-1712

    In orthogonal frequency-division multiplexing (OFDM)-based wireless local area networks (WLANs), phase noise (PHN) and residual frequency offset (RFO) can cause the common phase error (CPE) and the inter-carrier interferences (ICI), which seriously degrade the performance of systems. In this letter, we propose a combined pilot symbol assisted and decision-directed channel estimation scheme based on the least-squares (LS) and the maximum-likelihood (ML) algorithms. Simulation results present that the proposed scheme significantly improves the performance of OFDM-based WLANs.

  • Dynamic Activating and Deactivating Loss Recovery Router for Live Streaming Multicast

    Yuthapong SOMCHIT  Aki KOBAYASHI  Katsunori YAMAOKA  Yoshinori SAKAI  

     
    PAPER-Network

      Vol:
    E89-B No:5
      Page(s):
    1534-1544

    Live streaming is delay sensitive and can tolerate some amount of loss. The QoS Multicast for Live Streaming (QMLS) Protocol, focuses on the characteristics of live streaming. It has been shown to improve the performance of live streaming multicast by reducing the end-to-end packet loss probability. However, the placement of active routers performing the QMLS function has not been discussed. This paper proposes a dynamic method to activate and deactivate routers in order to minimize the number of active routers for each QMLS-packet flow and discusses its parameters. The results of an evaluation show that the proposed method can reduce the number of active routers for each flow and adjust the active routers according to changes in the multicast tree.

  • An Embedded 8b 240 MS/s 1.36 mm2 104 mW 0.18 µm CMOS ADC for DVDs with Dual-Mode Inputs

    Young-Jae CHO  Se-Won KIM  Kyung-Hoon LEE  Hee-Cheol CHOI  Young-Lok KIM  Seung-Hoon LEE  

     
    PAPER-Electronic Circuits

      Vol:
    E89-C No:5
      Page(s):
    636-641

    This work describes an 8b 240 MS/s CMOS ADC as one of embedded core circuits for high-performance displays based on low-noise on-chip references and dual-mode inputs with the requirements of limited pins, low power, and small size at high speed. The proposed ADC uses externally connected pins only for analog inputs, digital outputs, and supplies. The ADC employs (1) a two-step pipeline architecture to optimize power and chip size at the target sampling frequency of 240 MHz, (2) advanced bootstrapping techniques to achieve high signal bandwidth in the input SHA, and (3) RC filter-based on-chip current and voltage references to improve noise performance with a power-off function for portable applications. The prototype ADC is implemented in a 0.18 µm CMOS and simultaneously integrated in a DVD system with dual-mode inputs. The prototype ADC shows the measured DNL and INL within 0.49LSB and 0.69LSB, and the SNDR and SFDR exceeding 38 dB and 50 dB for inputs up to the Nyquist frequency at 240 MS/s. The ADC consumes 104 mW at 240 MS/s and an active die area is 1.36 mm2 .

  • Human Foot Reconstruction from Multiple Camera Images with Foot Shape Database

    Jiahui WANG  Hideo SAITO  Makoto KIMURA  Masaaki MOCHIMARU  Takeo KANADE  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E89-D No:5
      Page(s):
    1732-1742

    Recently, researches and developments for measuring and modeling of the human body have been receiving much attention. Our aim is to reconstruct an accurate shape of a human foot from multiple camera images, which can capture dynamic behavior of the object. In this paper, a foot-shape database is used for accurate reconstruction of human foot. By using Principal Component Analysis, the foot shape can be represented with new meaningful variables. The dimensionality of the data is also reduced. Thus, the shape of object can be recovered efficiently, even though the object is partially occluded in some input views. To demonstrate the proposed method, two kinds of experiments are presented: reconstruction of human foot in a virtual reality environment with CG multi-camera images, and in real world with eight CCD cameras. In the experiments, the reconstructed shape error with our method is around 2 mm in average, while the error is more than 4 mm with conventional volume intersection method.

  • Routing in Hexagonal Networks under a Corner-Based Addressing Scheme

    Huaxi GU  Jie ZHANG  Zengji LIU  Xiaoxing TU  

     
    LETTER-Networks

      Vol:
    E89-D No:5
      Page(s):
    1755-1758

    In this letter, a new addressing scheme for hexagonal networks is proposed. Using the new addressing scheme, many routing algorithms designed for networks using square-based topologies such as mesh and torus can also be applied to hexagonal networks. Methods of applying the turn model to hexagonal networks are derived, with some new minimal and partial adaptive routing algorithms obtained. Simulations of the new routing algorithms under different working conditions are carried on hexagonal networks of various sizes. The results show that the proposed algorithms can offer lower packet delay and loss rate than the popular dimension order routing algorithm.

  • Further Result on the Symbol Error Probability of MPSK with I/Q Phase Unbalance

    Jaeyoon LEE  Dongweon YOON  Sang Kyu PARK  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E89-B No:5
      Page(s):
    1675-1677

    The quadrature component unbalance generated by a non-ideal component such as an imperfect 90-degree phase shifter is an inevitable physical phenomenon and leads to performance degradation in a practical coherent M-ary phase shift keying (MPSK) transceiver. In this letter, we present an exact and general expression involving the one- and two-dimensional Gaussian Q-functions for the symbol error rate (SER) of MPSK with I/Q phase unbalance over an additive white Gaussian noise (AWGN) channel. The SER expression provided here offers a convenient way to evaluate the performance of MPSK systems for various cases of practical interest.

  • How Much Does Color Information Help Optical Flow Computation?

    Naoya OHTA  Satoe NISHIZAWA  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E89-D No:5
      Page(s):
    1759-1762

    Optical flow is usually computed only on the basis of intensity information of images. Therefore, if we use color information in addition to the intensity, it is expected that more accurate optical flow can be computed. However, this intuition will be correct only when the following conditions are satisfied. First, the images should contain rich color variations. Moreover, it is also required that the image gradient of each color band differs in its direction. In this report, we empirically examined the difference of gradient directions on each band using 500 images, and evaluated quantitatively the advantage of using color information for optical flow computation.

  • Multicast Communication for Video Broadcasting Service over IPv4 Network Using IP Option

    I Gusti Bagus Baskara NUGRAHA  Sumiya MARUGAMI  Mikihiko NISHIARA  Hiroyoshi MORITA  

     
    PAPER-Internet

      Vol:
    E89-B No:5
      Page(s):
    1570-1580

    In this paper, we propose a protocol for multicast communication called Multicast Datagram Transfer Protocol (MDTP) to provide multicast for video broadcasting service on the Internet. MDTP is a one-to-many multicast communication protocol, which is constructed based on IPv4 unicast protocol by utilizing IP Router Alert Option, and it uses unicast addressing and unicast routing protocol. A mechanism is presented to allow a router to remove identical video stream, to duplicate a video stream, and to forward each copy of the duplicated video stream to its destinations. Ordinary IP routers that do not support MDTP will treat the MDTP packets as normal unicast packets. Hence, gradual deployment is possible without tunneling technique. With a delegation mechanism, MDTP router is also able to handle request from clients, and serve the requested video stream. The simulation results show that the average bandwidth usage of MDTP is close to the average bandwidth usage of IP multicast. MDTP also has greater efficiency than XCAST, and its efficiency becomes significant for a large number of clients.

  • Dimensioning Models of Shared Resources for Optical Packet Switching in Unbalanced Input/Output Traffic Scenarios

    Vincenzo ERAMO  Marco LISTANTI  Luca Silvio BOVO  

     
    PAPER-Switching for Communications

      Vol:
    E89-B No:5
      Page(s):
    1505-1516

    This paper compares selected Optical Packet Switching architectures that use the wavelength conversion technique to solve the packet contention problem. The architectures in question share wavelength converters, which are needed to wavelength translate arriving packets. This paper focuses on two architectures: the Shared Per Output Line (SPOL) and the Shared Per Input Line (SPIL) architectures, in which the wavelength converters are shared per output and input fiber respectively. The performance of the proposed architectures is evaluated for all the balance/unbalance combinations of input/output traffic. Packet loss probability is expressed as a function of the number of wavelength converters used, by means of analytical models validated by simulations. The results obtained show that the SPIL architecture, when compared to the SPOL architecture, allows for greater economies in terms of number of wavelength converters needed. While the performance of the two architectures tends to have similar values in a scenario with unbalanced input traffic and balanced output traffic, in unbalanced output traffic scenarios the SPIL architecture requires about 50% less wavelength converters than the SPOL architecture does, for a given packet loss probability.

  • An Enhanced Time-Domain Circuit Simulation Technique Based on LIM

    Hidemasa KUBOTA  Yuichi TANJI  Takayuki WATANABE  Hideki ASAI  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E89-A No:5
      Page(s):
    1505-1506

    In this paper, we show the generalized method of the time-domain circuit simulation based on LIM. Our method is applicable to any structure of circuits by combination with the SPICE-like method. In order to show the validity and efficiency of our method, an example circuit is simulated and the proposed method is compared with the conventional ones.

11461-11480hit(20498hit)