The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] FA(3430hit)

1761-1780hit(3430hit)

  • A Computational Model for Recognizing Emotion with Intensity for Machine Vision Applications

    P. Ravindra De SILVA  Minetada OSANO  Ashu MARASINGHE  Ajith P. MADURAPPERUMA  

     
    PAPER-Face, Gesture, and Action Recognition

      Vol:
    E89-D No:7
      Page(s):
    2171-2179

    One of the challenging issues in affective computing is to give a machine the ability to recognize the affective states with intensity of a person. Few studies are directed toward this goal by categorizing affective behavior of the person into a set of discrete categories. But still two problems exist: gesture is not yet a concern as a channel of affective communication in interactive technology, and existing systems only model discrete categories but not affective dimensions, e.g., intensity. Modeling the intensity of emotion has been well addressed in synthetic autonomous agent and virtual environment literature, but there is an evident lack of attention in other important research areas such as affective computing, machine vision, and robotic. In this work, we propose an affective gesture recognition system that can recognize the emotion of a child and the intensity of the emotion states in a scenario of game playing. We used levels of cognitive and non-cognitive appraisal factors to estimate intensity of emotion. System has an intelligent agent (called Mix) that takes these factors into consideration and adapt the game state to create a more positive interactive environment for the child.

  • Interactive Object Recognition through Hypothesis Generation and Confirmation

    Md. Altab HOSSAIN  Rahmadi KURNIA  Akio NAKAMURA  Yoshinori KUNO  

     
    PAPER-Interactive Systems

      Vol:
    E89-D No:7
      Page(s):
    2197-2206

    An effective human-robot interaction is essential for wide penetration of service robots into the market. Such robot needs a vision system to recognize objects. It is, however, difficult to realize vision systems that can work in various conditions. More robust techniques of object recognition and image segmentation are essential. Thus, we have proposed to use the human user's assistance for objects recognition through speech. This paper presents a system that recognizes objects in occlusion and/or multicolor cases using geometric and photometric analysis of images. Based on the analysis results, the system makes a hypothesis of the scene. Then, it asks the user for confirmation by describing the hypothesis. If the hypothesis is not correct, the system generates another hypothesis until it correctly understands the scene. Through experiments on a real mobile robot, we have confirmed the usefulness of the system.

  • A Simplified Autocorrelation-Based Single Frequency Estimator

    Young-Hwan YOU  Dae-Ki HONG  Sung-Jin KANG  Jang-Yeon LEE  Jin-Woong CHO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:7
      Page(s):
    2096-2098

    This letter proposes a low-complexity single frequency estimator for flat fading channels. The simplified estimator decreases the number of computations in the calculation of the autocorrelation function (AF) when compared to AF-based conventional estimators. The simplified estimator yields a comparable estimation performance to the existing estimators, while retaining the same frequency range.

  • Surface Reconstruction from Stereo Data Using a Three-Dimensional Markov Random Field Model

    Hotaka TAKIZAWA  Shinji YAMAMOTO  

     
    PAPER-Stereo and Multiple View Analysis

      Vol:
    E89-D No:7
      Page(s):
    2028-2035

    In the present paper, we propose a method for reconstructing the surfaces of objects from stereo data. Both the fitness of stereo data to surfaces and interrelation between the surfaces are defined in the framework of a three-dimensional (3-D) Markov Random Field (MRF) model. The surface reconstruction is accomplished by searching for the most likely state of the MRF model. Three experimental results are shown for synthetic and real stereo data.

  • Development and Calibration of a Gonio-Spectral Imaging System for Measuring Surface Reflection

    Akira KIMACHI  Norihiro TANAKA  Shoji TOMINAGA  

     
    PAPER-Photometric Analysis

      Vol:
    E89-D No:7
      Page(s):
    1994-2003

    This paper proposes a gonio-spectral imaging system for measuring light reflection on an object surface by using two robot arms, a multi-band lighting system, and a monochrome digital camera. It allows four degrees of freedom in incident and viewing angles necessary for full parametrization of a reflection model function. Spectral images captured for various incident and viewing angles are warped as if they were all captured from the same viewing direction. The intensity of reflected light is thus recorded in a normalized image form for any incident and viewing directions. The normalized images are used to estimate reflection model parameters at each surface point. To ensure point-wise reflection modeling, a calibration method is also proposed based on a geometrical model of the robot arms and camera. The proposed system can deal with objects with surface texture. Experiments are done on system calibration, reflection model, and spectral estimation. The results using colored objects show the feasibility of the proposed imaging system.

  • Photometric Linearization under Near Point Light Sources

    Satoshi SATO  Kazutoyo TAKATA  Kunio NOBORI  

     
    PAPER-Photometric Analysis

      Vol:
    E89-D No:7
      Page(s):
    2004-2011

    We present a method for classifying image pixels of real images into multiple photometric factors: specular reflection, diffuse reflection, attached shadows and cast shadows. Conventional photometric linearization methods cannot correctly classify pixels under near point light sources, since they assume parallel light. To satisfy this assumption, our method utilizes a photometric linearization method that divides images into small regions. It also propagates linearization coefficients from neighboring regions. Our experimental results show that the proposed method can correctly classify image pixels into photometric factors, even if images are obtained under near point light sources.

  • Iterative Sequential OFDM Symbol Estimation Algorithm over Time-Frequency-Selective Fading Channels

    Hoojin LEE  Joonhyuk KANG  Edward J. POWERS  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:6
      Page(s):
    1922-1925

    Time-frequency-selective, i.e., time-variant multipath, fading in orthogonal frequency division multiplexing (OFDM) systems destroys subcarrier orthogonality, resulting in intercarrier interference (ICI). In general, the previously proposed estimation schemes to resolve this problem are only applicable to slowly time-variant channels or suffer from high complexity due to large-sized matrix inversion. In this letter, we propose and develop efficient symbol estimation schemes, called the iterative sequential neighbor search (ISNS) algorithm and the simplified iterative sequential neighbor search (S-ISNS) algorithm. These algorithms achieve enhanced performances with low complexities, compared to the existing estimation methods.

  • LLR-Based Decode-and-Forward Protocol for Relay Networks and Closed-Form BER Expressions

    Ho Van KHUONG  Hyung Yun KONG  

     
    PAPER-Communication Theory and Signals

      Vol:
    E89-A No:6
      Page(s):
    1832-1841

    Decode-and-forward cooperative communications protocol (DFP) allows single-antenna users in wireless medium to obtain the powerful benefits of multi-antenna systems without physical antenna arrays. So far, only signal-to-noise ratio (SNR) or square amplitude of path gain has been used to evaluate the reliability of received signals for relays to decide whether to forward the decoded data so as to prevent unsuccessful detection at the relays. In this paper, we propose using log-likelihood ratio (LLR) as an alternative to SNR in the conventional DFP. Closed-form BER expressions for different versions of DFP are also derived and verified by Monte-Carlo simulations. A variety of numerical results reveal the significant superiority of LLR-based DFP to SNR-based DFP regardless of threshold level and relay position under flat Rayleigh fading channel plus additive white Gaussian noise (AWGN).

  • Toward Robots as Embodied Knowledge Media

    Toyoaki NISHIDA  Kazunori TERADA  Takashi TAJIMA  Makoto HATAKEYAMA  Yoshiyasu OGASAWARA  Yasuyuki SUMI  Yong XU  Yasser F. O. MOHAMMAD  Kateryna TARASENKO  Taku OHYA  Tatsuya HIRAMATSU  

     
    INVITED PAPER

      Vol:
    E89-D No:6
      Page(s):
    1768-1780

    We describe attempts to have robots behave as embodied knowledge media that will permit knowledge to be communicated through embodied interactions in the real world. The key issue here is to give robots the ability to associate interactions with information content while interacting with a communication partner. Toward this end, we present two contributions in this paper. The first concerns the formation and maintenance of joint intention, which is needed to sustain the communication of knowledge between humans and robots. We describe an architecture consisting of multiple layers that enables interaction with people at different speeds. We propose the use of an affordance-based method for fast interactions. For medium-speed interactions, we propose basing control on an entrainment mechanism. For slow interactions, we propose employing defeasible interaction patterns based on probabilistic reasoning. The second contribution is concerned with the design and implementation of a robot that can listen to a human instructor to elicit knowledge, and present the content of this knowledge to a person who needs it in an appropriate situation. In addition, we discuss future research agenda toward achieving robots serving as embodied knowledge media, and fit the robots-as-embodied-knowledge-media view in a larger perspective of Conversational Informatics.

  • Rapid Hybrid Code Acquisition Scheme in DS/CDMA Systems

    Yang SONG  Guang-Rui HU  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E89-B No:6
      Page(s):
    1876-1878

    The rapid hybrid acquisition of PN sequences is proposed for DS/CDMA systems. The system introduces the excision CFAR method into the background power estimation. A mathematical analysis is done for the single path and multipath environments. The detection performance of the proposed scheme is compared with that of other acquisition schemes. Results show that the proposed method has better detection performance if the excision coefficient is properly selected.

  • Efficient V-BLAST Detection Using Modified Fano Algorithm

    Jongsub CHA  Joonhyuk KANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:6
      Page(s):
    1955-1959

    We propose a sub-optimal but computationally efficient Modified Fano Detection algorithm (MFD) for V-BLAST systems. This algorithm utilizes the QR decomposition of the channel matrix and the sequential detection scheme based on tree searching to find the optimal symbol sequence. For more reliable signal detection, the decoder is designed to move backward for the specified value at the end of the tree. This results in significant reduction of the complexity while the performance of MFD is comparable to that of ML detector.

  • Collusion-Attack Free ID-Based Non-interactive Key Sharing

    Hatsukazu TANAKA  

     
    PAPER-Information Security

      Vol:
    E89-A No:6
      Page(s):
    1820-1824

    A new simply implemented collusion-attack free identity-based non-interactive key sharing scheme (ID-NIKS) has been proposed. A common-key can be shared by executing only once a modular exponentiation which is equivalent to RSA deciphering, and the security depends on the difficulty of factoring and the discrete logarithm problem. Each user's secret information can be generated by solving two simple discrete logarithm problems and synthsizing their solutions by linear combination. The detail comparison with the Maurer-Yacobi's scheme including its modified versions shows that the computational complexity to generate each user's secret information is much smaller and the freedom to select system parameters is much greater than that of the Maurer-Yacobi's scheme. Then our proposed scheme can be implemented very easily and hence it is suitable for practical use.

  • A Novel Intelligent Intrusion Detection, Decision, Response System

    Hongmei KAI  Hongbing ZHU  Kei EGUCHI  Ningping SUN  Toru TABATA  

     
    PAPER

      Vol:
    E89-A No:6
      Page(s):
    1630-1637

    This paper proposed a novel intelligent intrusion detection, decision, response system with fuzzy theory. This system utilized the two essential informations: times and time, of the failed login to decide automatically whether this login is a misuse user as alike as experienced system/security administrators. The database of this system isn't preestablished before working but is built and updated automatically during working. And this system is not only notification system but gives the exact and rapid decision and response to a misuse.

  • Performance and Convergence Analysis of Tree-LDPC Codes on the Min-Sum Iterative Decoding Algorithm

    Kwangseok NOH  Jun HEO  

     
    LETTER

      Vol:
    E89-A No:6
      Page(s):
    1749-1750

    In this paper, the performance of Tree-LDPC code [1] is presented based on the min-sum algorithm with scaling and the asymptotic performance in the water fall region is shown by density evolution. We presents that the Tree-LDPC code show a significant performance gain by scaling with the optimal scaling factor [3] which is obtained by density evolution methods. We also show that the performance of min-sum with scaling is as good as the performance of sum-product while the decoding complexity of min-sum algorithm is much lower than that of sum-product algorithm.

  • Constraint-Based Software Specifications and Verification Using UML

    Chin-Feng FAN  Chun-Yin CHENG  

     
    PAPER-Software Engineering

      Vol:
    E89-D No:6
      Page(s):
    1914-1922

    Constraint-based software specifications enable run-time monitoring to detect probable risk events and ensure the desired system behavior. SpecTRM-RL is a well-developed constraint-based specification method for computer-controlled systems. However, it is desirable to express constraints in familiar visual models. To provide better visualization and popularity, we developed methods to represent all the SpecTRM-RL constraint types in UML. We have also extended SpecTRM's constraints by adding relational and global constraints, and then expressed them in OCL. Safety verification of these specifications is also proposed. We developed a systematic way to construct fault trees for safety analysis based on UML diagrams. Due to the generality of UML as well as the defensive manner of constraints and fault tree analysis, our approach can be adapted for both general applications and safety-critical applications.

  • A Fault-Tolerant Content Addressable Network

    Daisuke TAKEMOTO  Shigeaki TAGASHIRA  Satoshi FUJITA  

     
    PAPER-Networks

      Vol:
    E89-D No:6
      Page(s):
    1923-1930

    In this paper, we propose a new method to enhance the fault-tolerance of the Content Addressable Network (CAN), which is known as a typical pure P2P system based on the notion of Distributed Hash Table (DHT). The basic idea of the proposed method is to introduce redundancy to the management of index information distributed over the nodes in the given P2P network, by allowing each index to be assigned to several nodes, which was restricted to be one in the original CAN system. To keep the consistency among several copies of indices, we propose an efficient synchronization scheme based on the notion of labels assigned to each copy in a distinct manner. The performance of the proposed scheme is evaluated by simulation. The result of simulations indicates that the proposed scheme significantly enhances the fault-tolerance of the CAN system.

  • Power, Rate and Hopping Adaptations in Hybrid DS/FH CDMA Communications over Slow Rayleigh Fading Channels

    Ye Hoon LEE  Dong Ho KIM  Jaekwon KIM  Cheolwoo YOU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:6
      Page(s):
    1799-1806

    We consider a hybrid direct-sequence frequency-hopped (DS/FH) code division multiple access (CDMA) communication system, where the transmission power, data rate (i.e. spreading gain), and hopping frequency are adapted relative to the channel variations. Instead of random frequency hopping, hopping pattern is adaptively adjusted to obtain the maximum channel gain among available frequency slots. Transmission power and/or data rate are also adapted such that a target transmission quality is maintained. It is shown that the proposed scheme provides a higher average data rate than pure DS/CDMA with power and rate adaptations, subject to the identical bandwidth and average transmission power constraints.

  • Fast Handover Failure-Case Analysis in Hierarchical Mobile IPv6 Networks

    Dong SU  Sang-Jo YOO  

     
    LETTER-Network

      Vol:
    E89-B No:6
      Page(s):
    1892-1895

    The fast handover protocol adopted in a IPv6 hierarchical structure provides a seamless handover in wireless IP networks by minimizing the handover latency. To reduce the handover latency, the fast handover uses anticipation based on layer 2 trigger. Nonetheless, a mobile node can still lose its connection with the old link during the fast handover procedures. Accordingly, this paper analyzes the handover latency and packet delivery costs associated with fast handover failure cases based on a timing diagram.

  • Fast Image Identification Methods for JPEG Images with Different Compression Ratios

    Fitri ARNIA  Ikue IIZUKA  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E89-A No:6
      Page(s):
    1585-1593

    Two schemes for fast identification of JPEG coded images are proposed in this paper. The aim is to identify the JPEG images that are generated from the same original image and have equivalent or different compression ratios. Fast identification can be achieved since the schemes work on the quantized Discrete Cosine Transform (DCT) domain. It is not required to inverse the quantization and the DCT. Moreover, only a few coefficients are commonly required for identification. The first approach can avoid identification leakage or false negative (FN), and probably result in a few false positives (FP). The second approach can avoid both FN and FP, with a slightly higher processing time. By combining the two schemes, a faster and a more perfect identification can be achieved, in which FN and FP can be avoided.

  • Distributed Channel Access for QoS Control in Link Adaptive Wireless LANs

    Ryoichi SHINKUMA  Junpei MAEDA  Tatsuro TAKAHASHI  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E89-B No:6
      Page(s):
    1846-1855

    In wireless local area networks (WLANs), the necessity of quality-of-service (QoS) control for uplink flows is increasing because interactive applications are becoming more popular. Fairness between flows transmitted by stations with different physical transmission rates must be ensured in QoS control for link-adaptive WLANs, which are widely used nowadays. We propose a novel distributed access scheme called QC-DCA to satisfy these requirements. QC-DCA adaptively controls the parameters of carrier sense multiple access with collision avoidance (CSMA/CA). QC-DCA has two QoS control functions: guarantee and classification. QC-DCA guarantees target throughputs and packet delays by quickly adjusting CSMA/CA parameters. In QoS classification, the difference of throughputs and packet delays between different QoS classes is maintained. These two functions allow QC-DCA to suppress the unfairness caused by differences of transmission rates in the physical layer. We evaluated the throughput and delay performances of our scheme using computer simulations. The results show the viability of our scheme.

1761-1780hit(3430hit)