The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

6641-6660hit(8214hit)

  • Algorithms in Discrete Convex Analysis

    Kazuo MUROTA  

     
    INVITED SURVEY PAPER-Algorithms for Matroids and Related Discrete Systems

      Vol:
    E83-D No:3
      Page(s):
    344-352

    This is a survey of algorithmic results in the theory of "discrete convex analysis" for integer-valued functions defined on integer lattice points. The theory parallels the ordinary convex analysis, covering discrete analogues of the fundamental concepts such as conjugacy, the Fenchel min-max duality, and separation theorems. The technical development is based on matroid-theoretic concepts, in particular, submodular functions and exchange axioms.

  • A High-Performance and Low-Power Cache Architecture with Speculative Way-Selection

    Koji INOUE  Tohru ISHIHARA  Kazuaki MURAKAMI  

     
    PAPER

      Vol:
    E83-C No:2
      Page(s):
    186-194

    This paper proposes a new approach to achieving high performance and low energy consumption for set-associative caches. The cache, called way-predicting set-associative cache, speculatively selects a single way, which is likely to contain the data desired by the processor, from the set designated by a memory address, before it starts a normal cache access. By accessing only the single way predicted, instead of accessing all the ways in a set, energy consumption can be reduced. In order for the way-predicting cache to perform well, accuracy of way prediction is important. This paper shows that the accuracy of an MRU (most recently used)-based way prediction is higher than 90% for most of the benchmark programs. The proposed way-predicting cache improves the ED (energy-delay) product by 60-70% compared to the conventional set-associative cache.

  • IFS Optimization Using Discrete Parameter Pools

    Hiroyuki HONDA  Miki HASEYAMA  Hideo KITAJIMA  

     
    PAPER-Image Processing, Image Pattern Recognition

      Vol:
    E83-D No:2
      Page(s):
    233-241

    This paper proposes an Iterated Function System (IFS) which can reduce effects of quantization errors of the IFS parameters. The proposed method skips conventional analog-parameter search and directly selects optimum IFS parameters from pools of discrete IFS parameters. In conventional IFS-based image coding the IFS parameters are quantized after their analog optimum values are determined. The image reconstructed from the quantized parameters is degraded with errors that are traced back to quantization errors amplified in the iterated mappings. The effectiveness of this new realistic approach is demonstrated by simulation results over the conventional method.

  • Fuzzy Rule-Based Edge Detection Using Multiscale Edge Images

    Kaoru ARAKAWA  

     
    PAPER

      Vol:
    E83-A No:2
      Page(s):
    291-300

    Fuzzy rule-based edge detection using multiscale edge images is proposed. In this method, the edge image is obtained by fuzzy approximate reasoning from multiscale edge images which are obtained by derivative operators with various window sizes. The effect of utilizing multiscale edge images for edge detection is already known, but how to design the rules for deciding edges from multiscale edge images is not clarified yet. In this paper, the rules are represented in a fuzzy style, since edges are usually defined ambiguously, and the fuzzy rules are designed optimally by a training method. Here, the fuzzy approximate reasoning is expressed as a nonlinear function of the multiscale edge image data, and the nonlinear function is optimized so that the mean square error of the edge detection be the minimum. Computer simulations verify its high performance for actual images.

  • Integration of ATM and Satellite Networks: Traffic Management Issues

    Antonio IERA  Antonella MOLINARO  Salvatore MARANO  Domenico MIGNOLO  

     
    PAPER-Wireless ATM

      Vol:
    E83-B No:2
      Page(s):
    321-329

    The design of effective traffic and resource management policies is a key issue in the deployment of ATM-satellite systems. This paper proposes a technique of call admission control and dynamic resource management to support ATM traffic classes in satellite environments. The effectiveness of the strategy is assessed by referring to the EuroSkyWay multimedia satellite platform, based on Ka-band payload and on-board processing. The main advantage is the effective exploitation of the satellite bandwidth by means of the statistical multiplexing of traffic sources and the guarantee of QoS provisioning to both real-time and non real-time, constant and variable bit rate sources.

  • Connection Admission Control Techniques with and without Real-time Measurements

    Teck Kiong LEE  Moshe ZUKERMAN  

     
    LETTER-Traffic Control and Network Management

      Vol:
    E83-B No:2
      Page(s):
    350-352

    We compare between four Connection Admission Control schemes that use either the Gaussian or the Effective Bandwidth model with and without real-time traffic measurements. We demonstrate that under heavy multiplexing, the Gaussian is more efficient than the Effective Bandwidth approach in either case.

  • ATM VP-Based Economical Transport Network Architecture for Multi-Reliability and Broadband Integrated Service Infrastructure

    Yoshihiko UEMATSU  Hiroshi OHTA  Ryoichi IWASE  Koji WATANABE  Masayuki MATSUDA  Seiichi TAKAGI  Toshinori TSUBOI  

     
    PAPER-Traffic Control and Network Management

      Vol:
    E83-B No:2
      Page(s):
    299-306

    The ATM Virtual Path(VP)-based transport network is a candidate for the future multi-reliability and broadband integrated service infrastructure. This paper compares the performance attributes of the VP transport network with those of the conventional SDH network and future optical path-based transport network. This paper shows that the VP-based network is superior in terms of path-grooming efficiency and connection capability, and will still play an important role when WDM technologies are introduced to carrier networks. This paper also describes the recently fabricated VP Cross Connect(VP-XC) system configuration and the VP Automatic Protection Switching(APS) performance of the XC.

  • Data Hiding via Steganographic Image Transformation

    Shuichi TAKANO  Kiyoshi TANAKA  Tatsuo SUGIMURA  

     
    PAPER

      Vol:
    E83-A No:2
      Page(s):
    311-319

    This paper presents a new data hiding scheme via steganographic image transformation, which is different from conventional data hiding techniques. The transformation is achieved in the frequency domain and the concept of Fourier filtering method is used. An input image is transformed into a fractal image, which can be used in Computer Graphic (CG) applications. One of the main advantages of this scheme is the amount of data to be hidden (embedded) is equal to that of the host signal (generated fractal image) while it is in general limited in the conventional data hiding schemes. Also both the opened fractal image and the hidden original one can be properly used depending on the situation. Unauthorized users will not notice the "secret" original image behind the fractal image, but even if they know that there is a hidden image it will be difficult for them to estimate the original image from the transformed image. Only authorized users who know the proper keys can regenerate the original image. The proposed method is applicable not only as a security tool for multimedia contents on web pages but also as a steganographic secret communication method through fractal images.

  • A Voice Activity Detection Algorithm for Wireless Communication Systems with Dynamically Varying Background Noise

    Jae Won KIM  Min Sik SEO  Byung Sik YOON  Song In CHOI  Young Gap YOU  

     
    LETTER-Mobile Communication

      Vol:
    E83-B No:2
      Page(s):
    414-418

    Speech can be modeled as short bursts of vocal energy separated by silence gaps. During typical conversation, talkspurts comprise only 40% of each party's speech and remaining 60% is silence. Communication systems can achieve spectral gain by disconnecting the users from the spectral resource during silence periods. This letter develops a simple and efficient Voice Activity Detection (VAD) algorithm to work in a mobile environment exhibiting dynamically varying background noise. The VAD uses a classification method involving the full-band energy, ratio of low-band energy to full-band energy, zero-crossing rate, and peakiness measure.

  • Prediction of Stock Trends by Using the Wavelet Transform and the Multi-Stage Fuzzy Inference System Optimized by the GA

    Yoshinori KISHIKAWA  Shozo TOKINAGA  

     
    PAPER

      Vol:
    E83-A No:2
      Page(s):
    357-366

    This paper deals with the prediction of stock trends by using the wavelet transform and the multi-stage fuzzy inference system based upon the optimization of membership function by using the GA. The system is expected to recognize the short-term feature which is usually used to estimate the rise/fall of price by human experts. In the prediction of stock prices, the wavelet transform is used to describe the short term feature of the stock trend. The fractal dimension and the variance of the time series are also used as the input variables. By dividing the inference system into multiple stages, the total number of rules is sufficiently depressed compared to the single stage system. In each stage of inference only a portion of input variables are used as the input, and output of the stage is treated as an input to the next stage. To give better performance, the shape of the membership function of the inference rules is optimized by using the GA. Each individual corresponds to an inference system, and its fitness is calculated as the ratio of the correct recognition. In the simulation study, we define the rise and fall of prices by considering the threshold value for the price change, and the interval of prediction. Then, the parameters of the system are adjusted by using the data for learning and the performance is evaluated by comparing the prediction and observation. The simulation study shows that the inference system gives about a 70% correct prediction of the price change of stocks. The result is compared to the prediction by the neural network, and we see better classification of the fuzzy system.

  • Low-Voltage Current Mode Power Factor Function Generator

    Kiattisak KUMWACHARA  Nobuo FUJII  

     
    INVITED PAPER

      Vol:
    E83-A No:2
      Page(s):
    172-178

    This paper proposes a realization of power factor function generator having an arbitrary base and power factor which are determined by the ratios of the currents provided from outside of the circuit. The circuit characteristics do not depend on any transistor parameters, temperature, and other environmental conditions. The circuit operation is based on current mode that has a capability of low power supply voltage operation below than 2.0 V. SPICE simulation has been carried out using 0.7 µm BiCMOS parameters and shows quite good transfer characteristics.

  • Approaches for Reducing Power Consumption in VLSI Bus Circuits

    Kunihiro ASADA  Makoto IKEDA  Satoshi KOMATSU  

     
    INVITED PAPER

      Vol:
    E83-C No:2
      Page(s):
    153-160

    This paper summarizes power reduction methods applicable for VLSI bus systems in terms of reduction of signal swing, effective capacitance reduction and reduction of signal transition, which have been studied in authors' research group. In each method the basic concept is reviewed quickly along with some examples of its application. A future perspective is also described in conclusion.

  • Disparity Mapping Technique and Fast Rendering Technique for Image Morphing

    Toshiyuki MORITSU  Makoto KATO  

     
    PAPER-Computer Graphics

      Vol:
    E83-D No:2
      Page(s):
    275-282

    We have developed a new disparity mapping technique for image morphing which prevents synthesized images from blurring and a fast rendering technique which realizes interactive morphing animation. In the image morphing rendering process, all pixels are moved according to their disparity maps and then distorted images are mixed with each other. Calculation costs of this process tend to be high because pixel per pixel moving and mixing are included. And if the accuracy of the disparity maps is low, synthesized images become blurred. This paper describes new two techniques for overcoming these problems. One is a disparity mapping technique by which the edges in each input image are accurately mapped to each other. This technique reduces blurring in synthesized images. The other is a data transformation technique by which the morphing rendering process is replaced with texture mapping, orthographic camera, α-brending and z-buffering. This transformation enables the morphing rendering process to be accelerated by 3D accelerators, thus enabling interactive morphing animations to be achieved on ordinary PCs.

  • A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet

    Ching-Yun LEE  Yi-Shiung YEH  Deng-Jyi CHEN  Kuo-Lung KU  

     
    PAPER-Applications of Information Security Techniques

      Vol:
    E83-D No:2
      Page(s):
    190-199

    The use of Internet for various business applications and resource sharing has grown tremendously over the last few years. Internet security has become an important issue for both academic and industrial sectors. Much related network security research has been conducted such as user authentication, data confidentiality, and data integrity. In some applications, a critical document can be divided into pieces and allocated in different locations over the Internet for security access concern. To access such an important document, one must reconstruct the divided pieces from different locations under the given Internet environment. In this paper, a probability model for reconstructing secret sharing and algorithms to perform share assignment are presented. Also, an evaluation algorithm to measure the probability of secret sharing reconstruction is proposed. Illustrative examples and simulation results are provided to demonstrate the applicability of our method.

  • An Experimental Study on Performance during Congestion for TCP/IP Traffic over Wide Area ATM Network Using VBR with Selective Cell Discard

    Shigehiro ANO  Toru HASEGAWA  Toshihiko KATO  

     
    PAPER-IP/ATM

      Vol:
    E83-B No:2
      Page(s):
    155-164

    It is important to establish the technology to accommodate best effort TCP/IP traffic over wide area ATM networks. The UBR (Unspecified Bit Rate) service category is the most typical service category for the best effort traffic, especially in the LAN environment. On the other hand, the VBR (Variable Bit Rate) service category with SCD (Selective Cell Discard) option is considered as the service category which is appropriate for wide area networks due to its fairness and minimum guarantee of the cell transmission using not only PCR (Peak Cell Rate) but SCR (Sustainable Cell Rate) and MBS (Maximum Burst Size). However, there is no actual evaluation for such service. We have, therefore, performed the experimental studies on TCP/IP over VBR with SCD along with UBR and VBR without SCD by VC (Virtual Channel) level policing when each TCP connection is mapped to a different VC. Through these experiments, we measured the link utilization of the effective data and the fairness between each obtained TCP throughput during the congestion of the ATM switch. From the results of the link utilization, the value is over 95% under the various conditions. Therefore, even in the case of the cell losses due to SCD or buffer overflow in ATM switch congestion, average throughput is almost the same as the value which equals the trunk line speed divided by the number of the accommodated TCP connections. From the results of the fairness, VBR with SCD per VC is better than UBR and also obtains better TCP throughput than VBR without SCD. Furthermore, to confirm those characteristics more generally, we adopt the accommodated TCP connections not only with the same TCP send/receive socket buffer size but with different sizes. Finally, we discuss the effectiveness between VBR with SCD and the other service categories, such as UBR and ABR (Available Bit Rate) and GFR (Guaranteed Frame Rate), and conclude that VBR with SCD is one of the most suitable ATM service categories for accommodating best effort traffic.

  • Analysis and Fabrication of an All-Optical Wavelength Converter Based on Directionally-Coupled Semiconductor Optical Amplifiers

    Byongjin MA  Masumi SAITOH  Yoshiaki NAKANO  

     
    PAPER-Optoelectronics

      Vol:
    E83-C No:2
      Page(s):
    248-254

    The operation of a novel all-optical wavelength converter based on directionally-coupled semiconductor optical amplifiers is described. Merits such as extinction enhancement and digital response are expected through a simple analytical model and a sophisticated transfer matrix method developed to take into account the spatial distributions of the optical power, carrier density, refractive index, propagation constant, and coupling coefficient along device. We fabricated devices operating at 1.55 µm band using an InGaAsP/InP material system and demonstrated successfully the static characteristics of wavelength conversion with the expected advantages. Devices are as small as 1.5 mm and do not need any active/passive integration step during fabrication.

  • 3D Face Expression Estimation and Generation from 2D Image Based on a Physically Constraint Model

    Takahiro ISHIKAWA  Shigeo MORISHIMA  Demetri TERZOPOULOS  

     
    PAPER-Image Processing, Image Pattern Recognition

      Vol:
    E83-D No:2
      Page(s):
    251-258

    Muscle based face image synthesis is one of the most realistic approaches to the realization of a life-like agent in computers. A facial muscle model is composed of facial tissue elements and simulated muscles. In this model, forces are calculated effecting a facial tissue element by contraction of each muscle string, so the combination of each muscle contracting force decides a specific facial expression. This muscle parameter is determined on a trial and error basis by comparing the sample photograph and a generated image using our Muscle-Editor to generate a specific face image. In this paper, we propose the strategy of automatic estimation of facial muscle parameters from 2D markers'movements located on a face using a neural network. This corresponds to the non-realtime 3D facial motion capturing from 2D camera image under the physics based condition.

  • Bicomplex Waves in Electromagnetic Scattering and Diffraction Problems

    Masahiro HASHIMOTO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E83-C No:2
      Page(s):
    236-247

    The mathematical theory of bicomplex electromagnetic waves in two-dimensional scattering and diffraction problems is developed. The Vekua's integral expression for the two-dimensional fields valid only in the closed source-free region is generalized into the radiating field. The boundary-value problems for scattering and diffraction are formulated in the bicomplex space. The complex function of a single variable, which obeys the Cauchy-Riemann relations and thus expresses low-frequency aspects of the near field at a wedge of the scatterer, is connected with the radiating field by an integral operator having a suitable kernel. The behaviors of this complex function in the whole space are discussed together with those of the far-zone field or the amplitude of angular spectrum. The Hilbert's factorization scheme is used to find out a linear transformation from the far-zone field to the bicomplex-valued function of a single variable. This transformation is shown to be unique. The new integral expression for the field scattered by a thin metallic strip is also obtained.

  • A Programmable ATM Multicast Service with Congestion Control

    Hung Keng PUNG  Naftali BAJRACH  

     
    PAPER-ATM Switch and System Development

      Vol:
    E83-B No:2
      Page(s):
    253-263

    This paper presents a design and implementation of a ATM multicast service based on programmable and active network concepts. It aims to address the design and implementation issues of creating new network services--multicast in this case--through a set of corba-based network interfaces, and with a java based user codes injection mechanism for supporting customization of network services. We demonstrate the feasibility of our prototype through the implementation of a wavelet video multicast application with active filters implanted at intermediate nodes for supporting heterogeneous receivers and the implementation of a congestion control scheme. The performance of the prototype over an ATM test-bed is measured and evaluated.

  • Economical Unified Platform Using ATM Transport System to Carry both STM and ATM Signals

    Ryoichi IWASE  Koji WATANABE  Yoshihiko UEMATSU  Hiroshi OHTA  Mitsugu HIRAKI  Yukiharu KANAYAMA  Toshinori TSUBOI  

     
    PAPER-Switching and Communication Processing

      Vol:
    E83-B No:2
      Page(s):
    353-361

    This paper describes the roles and benefits of an ATM transport network composed of ATM transport systems, such as ATM cross-connect systems and/or ATM add-drop multiplexers. The ATM transport network is an economical way of providing the ATM public network and a virtual path service for enterprise users. This paper exemplifies the effectiveness of a VP grooming function in the ATM transport system by comparing it to the network costs with direct fiber connection, an alternative to VP grooming. Main and junction module architecture for the ATM cross-connect system is proposed to realize an economical network that supports small to large traffic. For implementing a large-scale cross-connect switch, a cell congestion control method that employs re-arrangement control and a concentration network is proposed. Implementation of multiple service classes and VP protection switching in the ATM cross-connect system are mentioned. We also describe an SDH signal transmission method based on ATM cells, that offers a cost effective and reliable transport network.

6641-6660hit(8214hit)