The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

2161-2180hit(8214hit)

  • A Monolithic Sub-sampling PLL based 6–18 GHz Frequency Synthesizer for C, X, Ku Band Communication

    Hanchao ZHOU  Ning ZHU  Wei LI  Zibo ZHOU  Ning LI  Junyan REN  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E98-C No:1
      Page(s):
    16-27

    A monolithic frequency synthesizer with wide tuning range, low phase noise and spurs was realized in 0.13,$mu$m CMOS technology. It consists of an analog PLL, a harmonic-rejection mixer and injection-locked frequency doublers to cover the whole 6--18,GHz frequency range. To achieve a low phase noise performance, a sub-sampling PLL with non-dividers was employed. The synthesizer can achieve phase noise $-$113.7,dBc/Hz@100,kHz in the best case and the reference spur is below $-$60,dBc. The core of the synthesizer consumes about 110,mA*1.2,V.

  • Software-Defined Data Plane Enhancing SDN and NFV Open Access

    Akihiro NAKAO  

     
    INVITED PAPER

      Vol:
    E98-B No:1
      Page(s):
    12-19

    In this paper, we posit that extension of SDN to support deeply and flexibly programmable, software-defined data plane significantly enhance SDN and NFV and their interaction in terms of (1) enhanced interaction between applications and networks, (2) optimization of network functions, and (3) rapid development of new network protocols. All of these benefits are expected to contribute to improving the quality of diversifying communication networks and services. We identify three major technical challenges for enabling software-defined data plane as (1) ease of programming, (2) reasonable and predictable performance and (3) isolation among multiple concurrent logics. We also promote application-driving thinking towards defining software defined data-plane. We briefly introduce our project FLARE and its related technologies and review four use cases of flexible and deeply programmable data plane.

  • Modeling User Behavior in P2P Data Storage System

    Masato UCHIDA  Hideaki IIDUKA  Isao SUGINO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    33-41

    In recent years, there has been growing interest in systems for sharing resources, which were originally used for personal purposes by individual users, among many unspecified users via a network. An example of such systems is a peer-to-peer (P2P) data storage system that enables users to share a portion of unused space in their own storage devices among themselves. In a recent paper on a P2P data storage system, the user behavior model was defined based on supply and demand functions that depend only on the storage space unit price in a virtual marketplace. However, it was implicitly assumed that other factors, such as unused space of storage devices possessed by users and additional storage space asked by users, did not affect the characteristics of the supply and demand functions. In addition, it was not clear how the values of parameters used in the user behavior model were determined. Therefore, in this paper, we modify the supply and demand functions and determine the values of their parameters by taking the above mentioned factors as well as the price structure of storage devices in a real marketplace into account. Moreover, we provide a numerical example to evaluate the social welfare realized by the P2P data storage system as a typical application of the modified supply and demand functions.

  • Similar Speaker Selection Technique Based on Distance Metric Learning Using Highly Correlated Acoustic Features with Perceptual Voice Quality Similarity

    Yusuke IJIMA  Hideyuki MIZUNO  

     
    PAPER-Speech and Hearing

      Pubricized:
    2014/10/15
      Vol:
    E98-D No:1
      Page(s):
    157-165

    This paper analyzes the correlation between various acoustic features and perceptual voice quality similarity, and proposes a perceptually similar speaker selection technique based on distance metric learning. To analyze the relationship between acoustic features and voice quality similarity, we first conduct a large-scale subjective experiment using the voices of 62 female speakers and perceptual voice quality similarity scores between all pairs of speakers are acquired. Next, multiple linear regression analysis is carried out; it shows that four acoustic features are highly correlated to voice quality similarity. The proposed speaker selection technique first trains a transform matrix based on distance metric learning using the perceptual voice quality similarity acquired in the subjective experiment. Given an input speech, acoustic features of the input speech are transformed using the trained transform matrix, after which speaker selection is performed based on the Euclidean distance on the transformed acoustic feature space. We perform speaker selection experiments and evaluate the performance of the proposed technique by comparing it to speaker selection without feature space transformation. The results indicate that transformation based on distance metric learning reduces the error rate by 53.9%.

  • Protection and Utilization of Privacy Information via Sensing Open Access

    Noboru BABAGUCHI  Yuta NAKASHIMA  

     
    INVITED PAPER

      Vol:
    E98-D No:1
      Page(s):
    2-9

    Our society has been getting more privacy-sensitive. Diverse information is given by users to information and communications technology (ICT) systems such as IC cards benefiting them. The information is stored as so-called big data, and there is concern over privacy violation. Visual information such as images and videos is also considered privacy-sensitive. The growing deployment of surveillance cameras and social network services has caused a privacy problem of information given from various sensors. To protect privacy of subjects presented in visual information, their face or figure is processed by means of pixelization or blurring. As image analysis technologies have made considerable progress, many attempts to automatically process flexible privacy protection have been made since 2000, and utilization of privacy information under some restrictions has been taken into account in recent years. This paper addresses the recent progress of privacy protection for visual information, showing our research projects: PriSurv, Digital Diorama (DD), and Mobile Privacy Protection (MPP). Furthermore, we discuss Harmonized Information Field (HIFI) for appropriate utilization of protected privacy information in a specific area.

  • A Strengthened Security Notion for Password-Protected Secret Sharing Schemes

    Shingo HASEGAWA  Shuji ISOBE  Jun-ya IWAZAKI  Eisuke KOIZUMI  Hiroki SHIZUYA  

     
    PAPER-Foundation

      Vol:
    E98-A No:1
      Page(s):
    203-212

    Password-protected secret sharing (PPSS, for short) schemes were proposed by Bagherzandi, Jarecki, Saxena and Lu. In this paper, we consider another attack for PPSS schemes which is based on public parameters and documents. We show that the protocol proposed by Bagherzandi et al. is broken with the attack. We then propose an enhanced protocol which is secure against the attack.

  • MPVUS: A Moving Prediction Based Video Streaming Uploading Scheme over Vehicular Networks

    Xiaojin ZHU  Jingping BI  Jianhang LIU  

     
    PAPER

      Vol:
    E98-A No:1
      Page(s):
    304-312

    Video streaming uploading over vehicular ad hoc networks (VANETs) can support many interesting applications. Due to the high mobility and dynamic topology of VANETs, how to support video streaming using wireless communications between vehicles and road-side access points still remains an open issue. In this paper, we propose a geographical uploading scheme, called MPVUS, which uses the moving prediction to keep the stable forwarding and reduce the high link failure probability over VANETs. The scheme also decides the AP switch opportunity by traffic flow estimation, so as to adjust the forwarding direction timely to avoid the short-sighted switch decision. Simulation results demonstrate the effectiveness of our scheme, which can achieve good performance in terms of the start-up delay, playback interruption ratio and video frame distortion.

  • Object Extraction Using an Edge-Based Feature for Query-by-Sketch Image Retrieval

    Takuya TAKASU  Yoshiki KUMAGAI  Gosuke OHASHI  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2014/10/15
      Vol:
    E98-D No:1
      Page(s):
    214-217

    We previously proposed a query-by-sketch image retrieval system that uses an edge relation histogram (ERH). However, it is difficult for this method to retrieve partial objects from an image, because the ERH is a feature of the entire image, not of each object. Therefore, we propose an object-extraction method that uses edge-based features in order to enable the query-by-sketch system to retrieve partial images. This method is applied to 20,000 images from the Corel Photo Gallery. We confirm that retrieval accuracy is improved by using the edge-based features for extracting objects, enabling the query-by-sketch system to retrieve partial images.

  • Statistical Analysis of Phase-Only Correlation Functions Based on Directional Statistics

    Shunsuke YAMAKI  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Vol:
    E97-A No:12
      Page(s):
    2601-2610

    This paper proposes statistical analysis of phase-only correlation functions based on linear statistics and directional statistics. We derive the expectation and variance of the phase-only correlation functions assuming phase-spectrum differences of two input signals to be probability variables. We first assume linear probability distributions for the phase-spectrum differences. We next assume circular probability distributions for the phase-spectrum differences, considering phase-spectrum differences to be circular data. As a result, we can simply express the expectation and variance of phase-only correlation functions as linear and quadratic functions of circular variance of phase-spectrum differences, respectively.

  • Numerical Examination on Effective Permittivity of Two-Dimensional Multilayered Periodic Structures

    Mitsuhiro YOKOTA  Kazumasa MATSUMOTO  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E97-C No:12
      Page(s):
    1150-1153

    The effective permittivity of the two-dimensional multilayered periodic structures which consist of the rectangular dielectric cylinders is examined numerically. The original periodic structure is replaced with a simple structure such as the dielectric slab. By using the reflectance of the periodic structure obtained by the FDTD method, the effective permittivity of the dielectric slab, which has the same reflectance as that of the periodic structure, is obtained by using the transcendental equation. In order to reduce the procedure to obtain the reflectance from the multilayered periodic structures, the reflectance from one-layered structure is used. The range of the application and validity of this procedure is examined.

  • Muffled and Brisk Speech Evaluation with Criterion Based on Temporal Differentiation of Vocal Tract Area Function

    Masanori MORISE  Satoshi TSUZUKI  Hideki BANNO  Kenji OZAWA  

     
    LETTER-Speech and Hearing

      Pubricized:
    2014/09/17
      Vol:
    E97-D No:12
      Page(s):
    3230-3233

    This research deals with muffled speech as the evaluation target and introduces a criterion for evaluating the auditory impression in muffled speech. It focuses on the vocal tract area function (VTAF) to evaluate the auditory impression, and the criterion uses temporal differentiation of this function to track the temporal variation of the shape of the mouth. The experimental results indicate that the proposed criterion can be used to evaluate the auditory impression as well as the subjective impression.

  • A Novel High-Performance Heuristic Algorithm with Application to Physical Design Optimization

    Yiqiang SHENG  Atsushi TAKAHASHI  

     
    PAPER-Physical Level Design

      Vol:
    E97-A No:12
      Page(s):
    2418-2426

    In this paper, a novel high-performance heuristic algorithm, named relay-race algorithm (RRA), which was proposed to approach a global optimal solution by exploring similar local optimal solutions more efficiently within shorter runtime for NP-hard problem is investigated. RRA includes three basic parts: rough search, focusing search and relay. The rough search is designed to get over small hills on the solution space and to approach a local optimal solution as fast as possible. The focusing search is designed to reach the local optimal solution as close as possible. The relay is to escape from the local optimal solution in only one step and to maintain search continuity simultaneously. As one of typical applications, multi-objective placement problem in physical design optimization is solved by the proposed RRA. In experiments, it is confirmed that the computational performance is considerably improved. RRA achieves overall Pareto improvement of two conflicting objectives: power consumption and maximal delay. RRA has its potential applications to improve the existing search methods for more hard problems.

  • Melanosome Tracking Using Automatic Error Correction

    Toshiaki OKABE  Kazuhiro HOTTA  

     
    PAPER-Biological Engineering

      Vol:
    E97-D No:12
      Page(s):
    3201-3209

    This paper proposes an automatic error correction method for melanosome tracking. Melanosomes in intracellular images are currently tracked manually when investigating diseases, and an automatic tracking method is desirable. We detect all melanosome candidates by SIFT with 2 different parameters. Of course, the SIFT also detects non-melanosomes. Therefore, we use the 4-valued difference image (4-VDimage) to eliminate non-melanosome candidates. After tracking melanosome, we re-track the melanosome with low confidence again from t+1 to t. If the results from t to t+1 and from t+1 to t are different, we judge that initial tracking result is a failure, the melanosome is eliminated as a candidate and re-tracking is carried out. Experiments demonstrate that our method can correct the error and improves the accuracy.

  • Power Consumption Characteristics of Autonomous Decentralized Clustering Based on Local Interaction

    Ryo HAMAMOTO  Chisa TAKANO  Kenji ISHIDA  Masaki AIDA  

     
    PAPER-Wireless Network

      Vol:
    E97-D No:12
      Page(s):
    2984-2994

    Mobile ad hoc networks (MANETs) consist of mobile terminals that directly connect with one another to communicate without a network infrastructure, such as base stations and/or access points of wireless local area networks (LANs) connected to wired backbone networks. Large-scale disasters such as tsunamis and earthquakes can cause serious damage to life, property as well as any network infrastructure. However, MANETs can function even after severe disasters have destroyed regular network infrastructure. We have proposed an autonomous decentralized structure formation technology based on local interaction, and have applied it to implement autonomous decentralized clustering on MANETs. This method is known to configure clusters that reflect the network condition, such as residual battery power and the degree of each node. However, the effect of clusters that reflect the network condition has not been evaluated. In this study, we configure clusters using our method, the back-diffusion method, and a bio-inspired method, which is a kind of autonomous decentralized clustering that cannot reflect the network condition. We also clarify the importance of clustering that reflects the network condition, with regard to power consumption and data transfer efficiency.

  • Design of Circularly Polarized and Electrically Small Antenna with Omnidirectional Radiation Pattern

    Kittima LERTSAKWIMARN  Chuwong PHONGCHAROENPANICH  Takeshi FUKUSAKO  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:12
      Page(s):
    2739-2746

    This paper presents an electrically small and circularly polarized antenna with an omnidirectional radiation pattern. The antenna consists of a horizontal loop element enclosed by two U-shaped elements and a vertical element from the feeding point. The radiation pattern of the circular polarization is omnidirectional and has a maximum gain of -2dBic in parallel to the ground plane at the 900MHz band. The antenna dimensions are 48 × 20 × 13.8mm (0.14λ × 0.06λ × 0.04λ) with ka =0.476 (i.e. < 0.5), where k is the wavenumber at the resonant frequency and a is the radius of a sphere surrounding the antenna. The dimension corresponds to the definition of an electrically small antenna. The omnidirectional circularly polarized pattern of a prototype antenna shows good agreement with that of the simulation. In addition, this paper introduces a mechanism that generates omnidirectional circular polarization from electrically small antennas.

  • On Improving the Performance of a Speech Model-Based Blind Reverberation Time Estimation in Noisy Environments

    Tung-chin LEE  Young-cheol PARK  Dae-hee YOUN  

     
    LETTER-Measurement Technology

      Vol:
    E97-A No:12
      Page(s):
    2688-2692

    This paper proposes a method of improving the performance of blind reverberation time (RT) estimation in noisy environments. RT estimation is conducted using a maximum likelihood (ML) method based on the autocorrelation function of the linear predictive residual signal. To reduce the effect of environmental noise, a noise reduction technique is applied to the noisy speech signal. In addition, a frequency coefficient selection is performed to eliminate signal components with low signal-to-noise ratio (SNR). Experimental results confirm that the proposed method improves the accuracy of RT measures, particularly when the speech signal is corrupted by a colored noise with a narrow bandwidth.

  • Audio Watermarking Based on Eigenvalue Decomposition

    Pranab KUMAR DHAR  Tetsuya SHIMAMURA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:12
      Page(s):
    2658-2661

    This letter presents a new blind audio watermarking scheme using eigenvalue decomposition (EVD). Initially, the original audio is divided into frames and the samples of each frame are arranged into a square matrix. EVD is applied to each of these matrices. Watermark data is embedded into the largest eigenvalue of each diagonal matrix by quantization. Data embedding rate of the proposed scheme is 172.39bps. Simulation results confirm the imperceptibility of the proposed scheme and its higher robustness against various attacks compared to the state-of-the-art watermarking methods available in the literature.

  • Error Detection Performance of TPSK Using AMI Code in Multi-Hop Communications under Rayleigh Fading Environments

    Kotoko YAMADA  Kouji OHUCHI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:12
      Page(s):
    2363-2365

    DetF (Detect-and-Forward) is studied as a relay method in multi-hop networks. When an error detection scheme is introduced, DetF is likely to achieve an efficient transmission. In this study, AMI (Alternate Mark Inversion) code is focused on as an error detection scheme. Error detection performances of ternary PSK (Phase Shift Keying) using AMI code and binary PSK using parity check code are examined. It is shown that ternary PSK using AMI code has a good error detection performance.

  • Finite Length Analysis on Listing Failure Probability of Invertible Bloom Lookup Tables

    Daichi YUGAWA  Tadashi WADAYAMA  

     
    PAPER-Coding Theory

      Vol:
    E97-A No:12
      Page(s):
    2309-2316

    An Invertible Bloom Lookup Tables (IBLT) is a data structure which supports insertion, deletion, retrieval and listing operations for the key-value pair. An IBLT can be used to realize efficient set reconciliation for database synchronization. The most notable feature of the IBLT is the complete listing operation of key-value pairs based on the algorithm similar to the peeling algorithm for low-density parity check (LDPC) codes. In this paper, we will present a stopping set (SS) analysis for the IBLT that reveals finite length behaviors of the listing failure probability. The key of the analysis is enumeration of the number of stopping matrices of given size. We derived a novel recursive formula useful for computationally efficient enumeration. An upper bound on the listing failure probability based on the union bound accurately captures the error floor behaviors.

  • Motion Detection Algorithm for Unmanned Aerial Vehicle Nighttime Surveillance

    Huaxin XIAO  Yu LIU  Wei WANG  Maojun ZHANG  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2014/09/22
      Vol:
    E97-D No:12
      Page(s):
    3248-3251

    In consideration of the image noise captured by photoelectric cameras at nighttime, a robust motion detection algorithm based on sparse representation is proposed in this study. A universal dictionary for arbitrary scenes is presented. Realistic and synthetic experiments demonstrate the robustness of the proposed approach.

2161-2180hit(8214hit)