The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

13201-13220hit(20498hit)

  • Modeling Email Communications

    Yihjia TSAI  Ching-Chang LIN  Ping-Nan HSIAO  

     
    PAPER

      Vol:
    E87-D No:6
      Page(s):
    1438-1445

    Recently, the small-world network model has been popular to describe a wide range of networks such as human social relations and networks formed by biological entities. The network model achieves a small diameter with relatively few links as measured by the ratio of clustering coefficient and the number of links. It is quite natural to consider email communication similar to social network patterns. Quite surprisingly, we find from our empirical study that local email networks follow a different type of network model that falls into the category of scale-free network. We propose new network models to describe such communication structure.

  • Compact CMOS Modelling for Advanced Analogue and RF Applications

    Dirk B.M. KLAASSEN  Ronald van LANGEVELDE  Andries J. SCHOLTEN  

     
    INVITED PAPER

      Vol:
    E87-C No:6
      Page(s):
    854-866

    The rapid down-scaling of minimum feature size in CMOS technologies has boosted the RF performance, thereby opening up the RF application area to CMOS. The concurrent reduction of supply voltage pushes the MOSFETs used in circuit design more and more into the moderate-inversion regime of operation. As a consequence, compact MOS models are needed that are accurate in all operating regimes, including the moderate-inversion regime. Advanced analogue applications require accurate modelling of distortion, capacitances and noise. RF application of MOSFETs require the extension of this accurate modelling up to high frequencies and in addition accurate modelling of impedance levels and power gain. The implications for compact MOS models will be discussed, together with the state-of-the-art in compact MOS modelling. Special attention will be paid to some well-known circuit examples, and the compact model requirements needed for a correct description. Where relevant MOS Model 11 will be used to illustrate the discussion.

  • Multi-Dipole Sources Identification from EEG Topography Using System Identification Method

    Xiaoxiao BAI  Qinyu ZHANG  Yohsuke KINOUCHI  Tadayoshi MINATO  

     
    PAPER-Biological Engineering

      Vol:
    E87-D No:6
      Page(s):
    1566-1574

    The goal of source localization in the brain is to estimate a set of parameters for representing source characteristics; one of such parameters is the source number. We here propose a method combining the Powell algorithm with the information criterion method for determining the optimal dipole number. The potential errors can be calculated by the Powell algorithm with the concentric 4-sphere head model and 32 electrodes, then the number of dipoles is determined by the information criterion method with the potential errors mentioned above. This method has the advantages of a high identification accuracy of dipole number and a small number of EEG data because in this method: (1) only one EEG topography is used in the computation, (2) 32 electrodes are used to obtain the EEG data, (3) the optimal dipole number can be obtained by this method. In order to prove our method to be efficient, precise and robust to noise, 10% white noise is introduced to test this method theoretically. Some investigations are presented here to show our method is an advanced approach for determining the optimal dipole number.

  • The Structures of CPW PHEMT's for Applications of Millimeter-Waves

    Byeong-Ok LIM  Tae-Shin KANG  Bok-Hyung LEE  Mun-Kyo LEE  Jin-Koo RHEE  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1323-1329

    The parasitic capacitances induced in the spaces between an air-bridge interconnection and a drain pad (Cad), and between an air-bridge interconnection and a gate head (Cag) from a power CPW PHEMT are not negligible. In this paper, a modified equivalent circuit model for a CPW PHEMT and an improved CPW PHEMT for millimeter-wave applications are proposed. These were proved by measuring the fabricated CPW PHEMT and improved CPW PHEMT. These capacitances were confirmed by measuring the gate-source coupling using CPW PHEMT patterns without an active layer. From the measurements, the improved CPW PHEMT has the lowest coupling (loss) and the highest S21 gain among four different types tested at 60 GHz. And the improved CPW PHEMT is a feasible device which can be directly applied in millimeter-waves as a power device.

  • Emerging Market for Mobile Remote Physiological Monitoring Services

    Timothy BOLT  Sadahiko KANO  Akihisa KODATE  

     
    PAPER

      Vol:
    E87-D No:6
      Page(s):
    1446-1453

    This paper offers an initial analysis of economic and market issues in the development and deployment of mobile remote physiological monitoring services for medical patients through wireless wearable sensors and actuators. Examining the characteristics of the service technologies and related industries, this study focuses on the structure, participants and roles of standardisation of the layers within the emerging mobile remote physiological monitoring industry. The study concludes that the structure of the emerging mobile remote physiological monitoring industry will be oriented about service provision, be integrated with other personal / patient data storage services and be heavily influenced by the interplay of technological developments, the health market structure, existing players and regulation. Additionally, the keys players are likely to be the system integrators and service providers concentrating on large institutional customers. A focus of the paper is analysing both the causes and implications of a modular, horizontally layered industry structure likely to result from the mix of technologies, suppliers and customers as this market develops. The paper discusses why, although horizontal specialisation is the most likely outcome, there is little risk of key layers becoming commoditised. The paper also discusses the appropriate types and levels of standardisation and equipment certification activities that should be encouraged, along with from which groups and industries the pressure for these will come.

  • An Efficient Optical Burst Switching Technique for Multi-Hop Networks

    Byung-Chul KIM  You-Ze CHO  Doug MONTGOMERY  

     
    LETTER-Switching

      Vol:
    E87-B No:6
      Page(s):
    1737-1740

    In this letter, we investigate the path length priority effect of existing just-enough-time (JET) scheme for optical burst switching (OBS) in the multiple hop network environments. And, we propose a novel hop-by-hop priority increasing (HPI) scheme using the input fiber delay lines (FDLs) at each node. Simulation results showed that the proposed FDL/delayed reservation (DR) with HPI scheme can avoid the path length priority effect and enhance the end-to-end throughput in multiple hop network environments.

  • QoS-Guaranteed Wavelength Allocation for WDM Networks with Limited-Range Wavelength Conversion

    Takuji TACHIBANA  Shoji KASAHARA  

     
    PAPER-Fiber-Optic Transmission

      Vol:
    E87-B No:6
      Page(s):
    1439-1450

    In this paper, we consider QoS-guaranteed wavelength allocation for WDM networks with limited-range wavelength conversion. In the wavelength allocation, the pre-determined number of wavelengths are allocated to each QoS class depending on the required loss probability. Moreover, we consider two wavelength selection rules and three combinations of the rules. We analyze the connection loss probability of each QoS class for a single link using continuous-time Markov chain. We also investigate the connection loss probability for a uni-directional ring network by simulation. In numerical examples, we compare connection loss probabilities for three combinations of selection rules and show how each combination of selection rules affects the connection loss probability of each QoS class. Furthermore, we show how wavelength conversion capability affects the connection loss probability. It is shown that the proposed allocation with appropriate wavelength selection rule is effective for QoS provisioning when the number of wavelengths is large. We also show the effective combination of wavelength selection rules for the case with small wavelength conversion capability.

  • Evaluation of HARQ Scheme with Antenna Permutation and TCM Reassignment for Space-Time Transmission in Slow Nakagami-Rice Fading MIMO Channel

    Toshiaki KOIKE  Hidekazu MURATA  Susumu YOSHIDA  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:6
      Page(s):
    1487-1494

    An automatic-repeat-request (ARQ) scheme for improving the system throughput efficiency is evaluated in coded multiple-input multiple-output (MIMO) transmissions. Supplementary trellis-coded modulation (TCM) code has been proposed for hybrid ARQ schemes. The free distance of the TCM after code combining can be increased by employing different TCM codes for retransmissions. The MIMO scheme offers additional flexibility in preventing successive frame errors by changing the connections between transmitters and transmit antennas upon retransmission. In this paper, an ARQ strategy employing both TCM reassignment and antenna permutation technique is investigated. It is shown through computer simulations that this ARQ scheme achieves high throughput even in severe conditions of low signal-to-noise ratio and high Rician factor over spatially and temporally correlated Nakagami-Rice fading MIMO channels.

  • Analytical Model for Service Differentiation Schemes in IEEE 802.11 Wireless LAN

    Jianhua HE  Lin ZHENG  Zongkai YANG  Chun Tung CHOU  Zuoyin TANG  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E87-B No:6
      Page(s):
    1724-1729

    This paper considers the problem of providing relative service differentiation in IEEE 802.11 Wireless LAN by using different Medium Access Control (MAC) parameters for different service classes. We present an analytical model which predicts the saturation throughput of IEEE 802.11 Distributed Coordination Function with multiple classes of service. This model allows us to show that relative service differentiation can be achieved by varying the initial contention window alone. In this case, the saturation throughput of a station can be shown to be approximately inversely proportional to the initial contention window size being used by that station. The simulation results validate our analytical model.

  • Cryptanalysis on One-Time Password Authentication Schemes Using Counter Value

    Takasuke TSUJI  Akihiro SHIMIZU  

     
    LETTER-Internet

      Vol:
    E87-B No:6
      Page(s):
    1756-1759

    The Internet and mobile communication systems are being developed, and related applications for managing personal information require user authentication for confirming legitimate users. One-time password authentication methods secure user's authorities by changing the verifier every time. The S/Key is a famous one-time password authentication scheme, which is based on Lamport's scheme. T.-C. Yeh et al. have point out security problems of the S/Key scheme and have proposed a variant of the S/Key scheme, which can be applied to smart cards. However, this method risks certain attacks, too. Those two proposed schemes use counter value, which can easily be modified by an attacker. Herein we discuss security problems of the S/Key and Yeh-Shen-Hwang's password authentication schemes using forgery attacks and stolen-verifier attacks.

  • Sequential Estimation of Angles of Arrival via Signal Subspace Projection

    Yang-Ho CHOI  

     
    LETTER-Antenna and Propagation

      Vol:
    E87-B No:6
      Page(s):
    1760-1763

    Sequential estimation of arrival angles allows us to resolve closely located sources that the standard MUSIC fails to do so. A new sequential estimation method is proposed which utilizes only the signal subspace components of the steering vectors for some estimates of the arrival angles. It is theoretically shown that the asymptotic performance of the proposed method is better than that of the conventional sequential method which exploits both the signal and the noise subspace components. Simulation results show that the former outperforms the latter in correlated sources as well as in uncorrelated sources.

  • Efficient Routing of Board-Level Optical Clocks for Ultra High-Speed Systems

    Chung-Seok (Andy) SEO  Abhijit CHATTERJEE  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1310-1317

    A new approach to optical clock distribution utilizing optical waveguide interconnect technology is introduced. In this paper, we develop a new algorithm for design and optimization of embedded optical clock distribution networks for printed wiring boards. The optimization approach takes into account bending and propagation losses of optical waveguides. Less than 26.1 psec in signal timing skew is obtained for a signal flight time of 614.38 psec. About 15% reduction in optical power consumption is also obtained over clock nets routed with existing (optical) methods.

  • Self-Organizing Map-Based Analysis of IP-Network Traffic in Terms of Time Variation of Self-Similarity: A Detrended Fluctuation Analysis Approach

    Masao MASUGI  

     
    PAPER-Nonlinear Problems

      Vol:
    E87-A No:6
      Page(s):
    1546-1554

    This paper describes an analysis of IP-network traffic in terms of the time variation of self-similarity. To get a comprehensive view in analyzing the degree of long-range dependence (LRD) of IP-network traffic, this paper used a self-organizing map, which provides a way to map high-dimensional data onto a low-dimensional domain. Also, in the LRD-based analysis, this paper employed detrended fluctuation analysis (DFA), which is applicable to the analysis of long-range power-law correlations or LRD in non-stationary time-series signals. In applying this method to traffic analysis, this paper performed two kinds of traffic measurement: one based on IP-network traffic flowing into NTT Musashino R&D center (Tokyo, Japan) from the Internet and the other based on IP-network traffic flowing through at an interface point between an access provider (Tokyo, Japan) and the Internet. Based on sequential measurements of IP-network traffic, this paper derived corresponding values for the LRD-related parameter α of measured traffic. As a result, we found that the characteristic of self-similarity seen in the measured traffic fluctuated over time, with different time variation patterns for two measurement locations. In training the self-organizing map, this paper used three parameters: two α values for different plot ranges, and Shannon-based entropy, which reflects the degree of concentration of measured time-series data. We visually confirmed that the traffic data could be projected onto the map in accordance with the traffic properties, resulting in a combined depiction of the effects of the degree of LRD and network utilization rates. The proposed method can deal with multi-dimensional parameters, projecting its results onto a two-dimensional space in which the projected data positions give us an effective depiction of network conditions at different times.

  • Parallel Information Retrieval with Query Expansion

    Yoojin CHUNG  

     
    LETTER-Contents Technology and Web Information Systems

      Vol:
    E87-D No:6
      Page(s):
    1593-1595

    An information retrieval (IR) system with query expansion on a low-cost high-performance PC cluster environment is implemented. We study how query performance is affected by query expansion and two declustering methods using two standard Korean test collections. According to the experiments, the greedy method shows about 20% enhancement overall when compared with the lexical method.

  • A Novel Feature Selection for Fuzzy Neural Networks for Personalized Facial Expression Recognition

    Dae-Jin KIM  Zeungnam BIEN  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1386-1392

    This paper proposes a novel feature selection method for the fuzzy neural networks and presents an application example for 'personalized' facial expression recognition. The proposed method is shown to result in a superior performance than many existing approaches.

  • A Basic Study on Control Command Input Device Using Head Movement for FES System--Availability of Acceleration Sensors--

    Hiroki HIGA  Ikuo NAKAMURA  Nozomu HOSHIMIYA  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1441-1445

    As one of control command input methods for functional electrical stimulation (FES) system, using the head movements was considered in this paper. In order to detect the head movements, we designed a prototype control command input device using acceleration sensors and verified its validity in experiments. The experimental results showed that the head movements in the lateral flexion and in the flexion/extension were highly detected and separated by the acceleration sensors.

  • Low Cost Printed Omni-Directional Spiral-Mode Monopole Antenna for Wireless Applications

    I-Fong CHEN  

     
    LETTER-Antenna and Propagation

      Vol:
    E87-B No:6
      Page(s):
    1764-1766

    A low cost printed omni-directional spiral-mode mono-pole antenna for wireless communication applications has been designed. This antenna has an integrated open-stub to adjust impedance matching. The 10 dB bandwidth is 336 MHz that achieved 13.7 and radiating characteristics are presented.

  • Web First Adaptive Traffic Engineering

    Guangyi LIU  Yang YANG  Xiaokang LIN  

     
    LETTER-Network

      Vol:
    E87-B No:6
      Page(s):
    1750-1755

    Internet traffic engineering is much important for Internet Service Providers (ISPs) today, since it can be used to fully utilize already deployed network resources. For ISPs, the requirements for traffic engineering should be simple, easy to configure, cost-effective and efficient. Based on these considerations, we propose an algorithm called Web First Adaptive Traffic Engineering (WFATE). Since World Wide Web (WWW) services dominate most of the total Internet traffic and WWW flows are not long-lived, we only apply load balancing to WWW traffic in the algorithm. It can be shown that the number of coexistent WWW flows at an ingress node is almost certainly below a bound, and thus a forward-per-flow mechanism without keeping track of the state of each flow is feasible. This mechanism can balance traffic load at fine granularity and therefore get better performance. Through simulations and performance comparison, it is shown that WFATE is quite efficient, which can improve the network throughput averagely by 26% under the "dense source" traffic pattern and 9% under the "sparse source" traffic pattern.

  • Three Point Based Registration for Binocular Augmented Reality

    Steve VALLERAND  Masayuki KANBARA  Naokazu YOKOYA  

     
    PAPER-Multimedia Pattern Processing

      Vol:
    E87-D No:6
      Page(s):
    1554-1565

    In order to perform the registration of virtual objects in vision-based augmented reality systems, the estimation of the relation between the real and virtual worlds is needed. This paper presents a three-point vision-based registration method for video see-through augmented reality systems using binocular cameras. The proposed registration method is based on a combination of monocular and stereoscopic registration methods. A correction method that performs an optimization of the registration by correcting the 2D positions in the images of the marker feature points is proposed. Also, an extraction strategy based on color information is put forward to allow the system to be robust to fast user's motion. In addition, a quantification method is used in order to evaluate the stability of the produced registration. Timing and stability results are presented. The proposed registration method is proven to be more stable than the standard stereoscopic registration method and to be independent of the distance. Even when the user moves quickly, our developed system succeeds in producing stable three-point based registration. Therefore, our proposed methods can be considered as interesting alternatives to produce the registration in binocular augmented reality systems when only three points are available.

  • Density Attack to the Knapsack Cryptosystems with Enumerative Source Encoding

    Keiji OMURA  Keisuke TANAKA  

     
    PAPER-Information Security

      Vol:
    E87-A No:6
      Page(s):
    1564-1569

    We analyze the Lagarias-Odlyzko low-density attack precisely, and show that this low-density attack can be applied to the Chor-Rivest and the Okamoto-Tanaka-Uchiyama cryptosystemes, which are considered to be secure against the low-density attack. According to our analysis, these schemes turn out to be no longer secure against the low-density attack.

13201-13220hit(20498hit)