The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

11941-11960hit(20498hit)

  • Detection System of Clustered Microcalcifications on CR Mammogram

    Hideya TAKEO  Kazuo SHIMURA  Takashi IMAMURA  Akinobu SHIMIZU  Hidefumi KOBATAKE  

     
    PAPER-Biological Engineering

      Vol:
    E88-D No:11
      Page(s):
    2591-2602

    CR (Computed Radiography) is characterized by high sensitivity and wide dynamic range. Moreover, it has the advantage of being able to transfer exposed images directly to a computer-aided detection (CAD) system which is not possible using conventional film digitizer systems. This paper proposes a high-performance clustered microcalcification detection system for CR mammography. Before detecting and classifying candidate regions, the system preprocesses images with a normalization step to take into account various imaging conditions and to enhance microcalcifications with weak contrast. Large-scale experiments using images taken under various imaging conditions at seven hospitals were performed. According to analysis of the experimental results, the proposed system displays high performance. In particular, at a true positive detection rate of 97.1%, the false positive clusters average is only 0.4 per image. The introduction of geometrical features of each microcalcification for identifying true microcalcifications contributed to the performance improvement. One of the aims of this study was to develop a system for practical use. The results indicate that the proposed system is promising.

  • Hybrid Image Composition Mechanism for Enhancing Volume Graphics Clusters

    Jorji NONAKA  Nobuyuki KUKIMOTO  Yasuo EBARA  Masato OGATA  Takeshi IWASHITA  Masanori KANAZAWA  Koji KOYAMADA  

     
    PAPER-Computer Graphics

      Vol:
    E88-D No:11
      Page(s):
    2582-2590

    Volume Graphics Clusters (VG Clusters) have proven to be efficient in a wide range of visualization applications and have also shown promise in some other applications where the image composition device could be fully utilized. The main differentiating feature from other graphics clusters is a specialized image composition device, commercially available as the MPC Image Compositor, which enables the building of do-it-yourself VG Clusters. Although this device is highly scalable, the unidirectional composition flow limits the data subdivision to the quantity of physically available rendering nodes. In addition, the limited buffer memory limits the maximum capable image composition size, therefore limiting its use in large-scale data visualization and high-resolution visualization. To overcome these limitations, we propose and evaluate an image composition mechanism in which additional hardware is used for assisting the image composition process. Because of the synergistic use of two distinct image composition hardware devices we named it "Hybrid Image Composition". Some encouraging results were obtained showing the effectiveness of this solution in improving the VG Cluster 's potential. A low-cost parallel port based hardware barrier is also presented as an efficient method for further enhancing this kind of small-scale VG Cluster. Moreover, this solution has proven to be especially useful in clusters built using low-speed networks, such as Fast Ethernet, which are still in common use.

  • Design of Deep Guard Ring for Geiger Mode Operation Avalanche Photodiode

    Toshiaki KAGAWA  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E88-C No:11
      Page(s):
    2136-2140

    The performance of avalanche photodiodes with deep guard rings for Geiger mode operation is studied. The electric field distribution is calculated using the finite element method and the carrier multiplication characteristic is calculated along typical lines in the device. The nonlinear dependence of the ionization rates on the electric field strength can make a guard ring less effective in Geiger mode operation. The maximum single photon detection efficiency that can be obtained without breakdown at the guard ring is calculated for several structure parameters. It is shown that the single photon detection efficiency strongly depends on the guard ring design.

  • Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks

    Chou-Chen YANG  Ren-Chiun WANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:11
      Page(s):
    4370-4372

    In 2002, Zhu et al. proposed a password-based authenticated key exchange protocol based on RSA. Zhu et al. claimed the protocol is efficient for the low-power devices in wireless networks. Unfortunately, Yeh et al. pointed out that Zhu et al.'s protocol was weak against undetectable on-line password guessing attack. Not only that, Zhu et al.'s protocol does not achieve explicit key authentication. At the same time, Yeh et al. proposed an improved method. However, in this paper, we shall point out that Yeh et al.'s improvement is vulnerable to the off-line password guessing attack. At the same time, we shall propose a solution to resist the above attack.

  • Joint Channel Parameter Estimation and Signal Detection for Downlink MIMO DS-CDMA Systems

    Yung-Yi WANG  Jiunn-Tsair CHEN  Ying LU  

     
    PAPER

      Vol:
    E88-B No:11
      Page(s):
    4229-4236

    This paper proposes two space-time joint channel parameter estimation and signal detection algorithms for downlink DS-CDMA systems with multiple-input-multiple-output (MIMO) wireless multipath fading channels. The proposed algorithms initially use the space-time MUSIC to estimate the DOA-delays of the multipath channel. Based on these estimated DOA-delays, a space-time channel decoupler is developed to decompose the multipath downlink channel into a set of independent parallel subchannels. The fading amplitudes of the multipath can then be estimated from the eigen space of the output of the space-time channel decoupler. With these estimated channel parameters, signal detection is carried out by a maximal ratio combiner on a pathwise basis. Computer simulations show that the proposed algorithms outperform the conventional space-time RAKE receiver while having the similar performance compared with the space-time minimum mean square error receiver.

  • Novel Digital Controller with Static Model Reference for Switching DC-DC Power Converters

    Hirofumi MATSUO  Fujio KUROKAWA  Haruhi ETO  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E88-B No:11
      Page(s):
    4346-4352

    It is often observed that the operation of the digitally controlled dc-dc power converter becomes unstable when the relatively large integral coefficient is used to extend the regulation range of the output voltage to handle variations in the input voltage and load. This paper presents a novel digital controller with static model reference for switching dc-dc power converters to improve the performance characteristics and discusses its design-oriented analysis in the steady-state characteristics. It is clarified theoretically and experimentally that using the static model reference, the wide regulation range of the output voltage to handle variations in the input voltage and load current can be achieved with the appropriate small integral coefficient in the digital P-I-D controller. Therefore, since the integral coefficient is selected to cover the maximum instantaneous variation value of the static reference model, the integral coefficient is small and the operation is always stable.

  • Soft-Prioritization Based System Selection Strategy for Software Defined Radio

    Tomoya TANDAI  Toshihisa NABETANI  Kiyoshi TOSHIMITSU  Hiroshi TSURUMI  

     
    PAPER

      Vol:
    E88-B No:11
      Page(s):
    4176-4185

    The next-generation wireless networks will bring users with Software Defined Radio (SDR) terminals seamless mobility and ubiquitous computing through heterogeneous networks. This paper proposes a soft-prioritization based system selection algorithm performed by SDR terminal and investigates the effectiveness of the soft-prioritization based system selection by using a concrete simulation model. To maximize the quality of service (QoS), wireless communication systems are prioritized on the basis of criteria for system selection such as data rate, channel quality and cost, and should be dynamically changed. However, frequent inter-system handovers based on hard-prioritization are undesirable in view of interrupting and dropping, particularly for real-time traffic and managing channel capacities. Wireless communication systems are softly prioritized in the soft-prioritization based system selection algorithm, and therefore inter-system handovers between systems with the same priority aren't initiated. To elucidate the validity of the soft-prioritization based system selection algorithm, a system simulation model consisting of five wireless communication systems is employed. Simulation results confirm that the soft-prioritization system selection algorithm offers higher performance in terms of the number of inter-system handovers and throughput of best effort traffic.

  • An LCD Backlight-Module Driver Using a New Multi-Lamp Current Sharing Technique

    Chang-Hua LIN  John Yanhao CHEN  Fuhliang WEN  

     
    PAPER

      Vol:
    E88-C No:11
      Page(s):
    2111-2117

    This paper proposes a backlight module which drives multiple cold-cathode fluorescent lamps (CCFLs) with a current mirror technique to equalize the driving current for each lamp. We first adopt a half-bridge parallel-resonant inverter as the main circuit and use a single-input, multiple-output transformer to drive the multi-CCFLs. Next, we introduce current-mirror circuits to create a new current-sharing circuit, in which its current reference node and the parallel-connected multi-load nodes are used to accurately equalize all CCFLs' driving current. This will balance each lamp's brightness and, consequently, improve the picture display quality of the related liquid crystal display (LCD). This paper details the design concept for each component value with the assistance of an actual design example. The results of the example are examined with its actual measurements, which consequently verify the correctness of the proposed control strategy.

  • Classification of Driving Methods for TFT-OLEDs and Novel Proposal Using Time Ratio Grayscale and Current Uniformization

    Mutsumi KIMURA  Yuji HARA  Hiroyuki HARA  Tomoyuki OKUYAMA  Satoshi INOUE  Tatsuya SHIMODA  

     
    REVIEW PAPER

      Vol:
    E88-C No:11
      Page(s):
    2043-2050

    Driving methods for TFT-OLEDs are explained with their features and classified from the viewpoints of grayscale methods and uniformizing methods. This classification leads us to a novel proposal using time ratio grayscale and current uniformization. This driving method maintains current uniformity and simultaneously overcomes charging shortage of the pixel circuit for low grayscale levels and current variation due to the shift of operating points. Tolerance toward degraded characteristics, linearity of grayscale and luminance uniformity against degraded characteristics are confirmed using circuit simulation.

  • Speech Synthesis with Various Emotional Expressions and Speaking Styles by Style Interpolation and Morphing

    Makoto TACHIBANA  Junichi YAMAGISHI  Takashi MASUKO  Takao KOBAYASHI  

     
    PAPER

      Vol:
    E88-D No:11
      Page(s):
    2484-2491

    This paper describes an approach to generating speech with emotional expressivity and speaking style variability. The approach is based on a speaking style and emotional expression modeling technique for HMM-based speech synthesis. We first model several representative styles, each of which is a speaking style and/or an emotional expression, in an HMM-based speech synthesis framework. Then, to generate synthetic speech with an intermediate style from representative ones, we synthesize speech from a model obtained by interpolating representative style models using a model interpolation technique. We assess the style interpolation technique with subjective evaluation tests using four representative styles, i.e., neutral, joyful, sad, and rough in read speech and synthesized speech from models obtained by interpolating models for all combinations of two styles. The results show that speech synthesized from the interpolated model has a style in between the two representative ones. Moreover, we can control the degree of expressivity for speaking styles or emotions in synthesized speech by changing the interpolation ratio in interpolation between neutral and other representative styles. We also show that we can achieve style morphing in speech synthesis, namely, changing style smoothly from one representative style to another by gradually changing the interpolation ratio.

  • Timing-Driven Global Routing with Efficient Buffer Insertion

    Jingyu XU  Xianlong HONG  Tong JING  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E88-A No:11
      Page(s):
    3188-3195

    Timing optimization is an important goal of global routing in deep submicron era. To guarantee the timing performance of the circuit, merely adopting topology optimization becomes inadequate. In this paper, we present an efficient timing-driven global routing algorithm with buffer insertion. Our approach is capable of applying topological-based timing optimization and buffer insertion simultaneously with routablity considerations. Compared with previous works, we efficiently solve the timing issues under a limited buffer usage. The experimental results have demonstrated significant delay improvement within short runtime with very small number of buffers inserted.

  • Characteristics of a Chromatic Dispersion Measurement Method Using the Bidirectional Modulation of Optical Intensity Modulator

    Keum-Soo JEON  Young-Seok WANG  Sang-Chul MOON  Jae-Kyung PAN  

     
    LETTER-Measurement Technology

      Vol:
    E88-A No:11
      Page(s):
    3260-3263

    We had recently measured a chromatic dispersion of optical fiber and a time delay of chirped fiber grating based on a bidirectional modulation of an optical intensity modulator. In this paper, we analyze characteristics of the chromatic dispersion measurement method using a bidirectional modulation of an optical intensity modulator, and give a detailed explanation about the selection of measurement setup parameters to achieve an accurate measurement. We also propose a modified measurement system to decrease relative intensity noise caused by the bidirectional transmission through a device under test.

  • Convergence Analysis of Adaptive Filters Using Normalized Sign-Sign Algorithm

    Shin'ichi KOIKE  

     
    LETTER-Digital Signal Processing

      Vol:
    E88-A No:11
      Page(s):
    3218-3224

    This letter develops convergence analysis of normalized sign-sign algorithm (NSSA) for FIR-type adaptive filters, based on an assumption that filter tap weights are Gaussian distributed. We derive a set of difference equations for theoretically calculating transient behavior of filter convergence, when the filter input is a White & Gaussian process. For a colored Gaussian input and a large number of tap weights, approximate difference equations are also proposed. Experiment with simulations and theoretical calculations of filter convergence demonstrates good agreement between simulations and theory, proving the validity of the analysis.

  • Self-Organizing Map Based on Block Learning

    Akitsugu OHTSUKA  Naotake KAMIURA  Teijiro ISOKAWA  Nobuyuki MATSUI  

     
    PAPER-Nonlinear Problems

      Vol:
    E88-A No:11
      Page(s):
    3151-3160

    A block-matching-based self-organizing map (BMSOM) is presented. Finding a winner is carried out for each block, which is a set of neurons arranged in square. The proposed learning process updates the reference vectors of all of the neurons in a winner block. Then, the degrees of vector modifications are mainly controlled by the size (i.e., the number of neurons) of the winner block. To prevent a single cluster with neurons from splitting into some disjointed clusters, the restriction of the block size is imposed in the beginning of learning. At the main stage, this restriction is canceled. In BMSOM learning, the size of a winner block does not always decrease monotonically. The formula used to update the reference vectors is basically uncontrolled by time. Therefore, even if a map is in a nonstationary environment, training the map is probably pursued without interruption to adjust time-controlled parameters such as learning rate. Numerical results demonstrate that the BMSOM makes it possible to improve the plasticity of maps in a nonstationary environment and incremental learning.

  • Fast J-Unitary Array Form of the Hyper H Filter

    Kiyoshi NISHIYAMA  

     
    PAPER-Digital Signal Processing

      Vol:
    E88-A No:11
      Page(s):
    3143-3150

    In our previous work, the hyper H∞ filter is developed for tracking of unknown time-varying systems. Additionally, a fast algorithm, called the fast H∞ filter, of the hyper H∞ filter is derived on condition that the observation matrix has a shifting property. This algorithm has a computational complexity of O(N) where N is the dimension of the state vector. However, there still remains a possibility of deriving alternative forms of the hyper H∞ filter. In this work, a fast J-unitary form of the hyper H∞ filter is derived, providing a new H∞ fast algorithm, called the J-fast H∞ filter. The J-fast H∞ filter possesses a computational complexity of O(N), and the resulting algorithm is very amenable to parallel processing. The validity and performance of the derived algorithm are confirmed by computer simulations.

  • Decentralized Supervisory Control of Discrete Event Systems Based on Reinforcement Learning

    Tatsushi YAMASAKI  Toshimitsu USHIO  

     
    PAPER

      Vol:
    E88-A No:11
      Page(s):
    3045-3050

    A supervisor proposed by Ramadge and Wonham controls a discrete event system (DES) so as to satisfy logical control specifications. However a precise description of both the specifications and the DES is needed for the control. This paper proposes a synthesis method of the supervisor for decentralized DESs based on reinforcement learning. In decentralized DESs, several local supervisors exist and control the DES jointly. Costs for disabling and occurrence of events as well as control specifications are considered. By using reinforcement learning, the proposed method is applicable under imprecise specifications and uncertain environment.

  • Symbolic Reachability Analysis of Probabilistic Linear Hybrid Automata

    Yosuke MUTSUDA  Takaaki KATO  Satoshi YAMANE  

     
    PAPER

      Vol:
    E88-A No:11
      Page(s):
    2972-2981

    We can model embedded systems as hybrid systems. Moreover, they are distributed and real-time systems. Therefore, it is important to specify and verify randomness and soft real-time properties. For the purpose of system verification, we formally define probabilistic linear hybrid automaton and its symbolic reachability analysis method. It can describe uncertainties and soft real-time characteristics.

  • Improved Heuristic Algorithms for Minimizing Initial Markings of Petri Nets

    Satoshi TAOKA  Masahiro YAMAUCHI  Toshimasa WATANABE  

     
    PAPER

      Vol:
    E88-A No:11
      Page(s):
    3051-3061

    The minimum initial marking problem MIM of Petri nets is described as follows: "Given a Petri net and a firing count vector X, find an initial marking M0, with the minimum total token number, for which there is a sequence δ of transitions such that each transition t appears exactly X(t) times in δ, the first transition is enabled at M0 and the rest can be fired one by one subsequently." This paper proposes two heuristic algorithms AAD and AMIM + and shows the following (1) and (2) through experimental results: (1) AAD is more capable than any other known algorithm; (2) AMIM + can produce M0, with a small number of tokens, even if other algorithms are too slow to compute M0 as the size of an input instance gets very large.

  • Failure Trace Analysis of Timed Circuits for Automatic Timing Constraints Derivation

    Tomoya KITAI  Tomohiro YONEDA  Chris MYERS  

     
    PAPER-Dependable Computing

      Vol:
    E88-D No:11
      Page(s):
    2555-2564

    This work proposes a technique to automatically obtain timing constraints for a given timed circuit to operate correctly. A designated set of delay parameters of a circuit are first set to sufficiently large bounds, and verification runs followed by failure analysis are repeated. Each verification run performs timed state space enumeration under the given delay bounds, and produces a failure trace if it exists. The failure trace is analyzed, and sufficient timing constraints to prevent the failure are obtained. Then, the delay bounds are tightened according to the timing constraints by using an ILP (Integer Linear Programming) solver. This process terminates when either some delay bounds under which no failure is detected are found or no new delay bounds to prevent the failures can be obtained. The experimental results using a naive implementation show that the proposed method can efficiently handle asynchronous benchmark circuits and nontrivial GasP circuits.

  • Efficient Execution of Range Top-k Queries in Aggregate R-Trees

    Seokjin HONG  Bongki MOON  Sukho LEE  

     
    PAPER-Database

      Vol:
    E88-D No:11
      Page(s):
    2544-2554

    A range top-k query returns the topmost k records in the order set by a measure attribute within a specified region of multi-dimensional data. The range top-k query is a powerful tool for analysis in spatial databases and data warehouse environments. In this paper, we propose an algorithm to answer the query by selectively traversing an aggregate R-tree having MAX as the aggregate values. The algorithm can execute the query by accessing only a small part of the leaf nodes within a query region. Therefore, it shows good query performance regardless of the size of the query region. We suggest an efficient pruning technique for the priority queue, which reduces the cost of handling the priority queue, and also propose an efficient technique for leaf node organization to reduce the number of node accesses to execute the range top-k queries.

11941-11960hit(20498hit)