The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] GES(423hit)

201-220hit(423hit)

  • Congestion Avoidance and Fair Event Detection in Wireless Sensor Network

    Md. MAMUN-OR-RASHID  Muhammad Mahbub ALAM  Md. Abdur RAZZAQUE  Choong Seon HONG  

     
    PAPER

      Vol:
    E90-B No:12
      Page(s):
    3362-3372

    Congestion in WSN increases the energy dissipation rates of sensor nodes as well as the loss of packets and thereby hinders fair and reliable event detection. We find that one of the key reasons of congestion in WSN is allowing sensing nodes to transfer as many packets as possible. This is due to the use of CSMA/CA that gives opportunistic medium access control. In this paper, we propose an energy efficient congestion avoidance protocol that includes source count based hierarchical and load adaptive medium access control and weighted round robin packet forwarding. We also propose in-node fair packet scheduling to achieve fair event detection. The results of simulation show our scheme exhibits more than 90% delivery ratio even under bursty traffic condition which is good enough for reliable event perception.

  • Mobile Positioning and Tracking Based on TOA/TSOA/TDOA/AOA with NLOS-Reduced Distance Measurements

    Wei-Kai CHAO  Kuen-Tsair LAY  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E90-B No:12
      Page(s):
    3643-3653

    In this paper, we address the issue of mobile positioning and tracking after measurements have been made on the distances and possibly directions between an MS (mobile station) and its nearby base stations (BS's). The measurements can come from the time of arrival (TOA), the time sum of arrival (TSOA), the time difference of arrival (TDOA), and the angle of arrival (AOA). They are in general corrupted with measurement noise and NLOS (non-line-of-sight) error. The NLOS error is the dominant factor that degrades the accuracy of mobile positioning. Assuming specific statistic models for the NLOS error, however, we propose a scheme that significantly reduces its effect. Regardless of which of the first three measurement types (i.e. TOA, TSOA, or TDOA) is used, the proposed scheme computes the MS location in a mathematically unified way. We also propose a method to identify the TOA measurements that are not or only slightly corrupted with NLOS errors. We call them nearly NLOS-error-free TOA measurements. From the signals associated with TOA measurements, AOA information can be obtained and used to aid the MS positioning. Finally, by combining the proposed MS positioning method with Kalman filtering, we propose a scheme to track the movement of the MS.

  • Theoretical Investigation on Required Number of Bits for Monochrome Density Images on High-Luminance Electronic Display

    Junji SUZUKI  Isao FURUKAWA  

     
    LETTER-Image

      Vol:
    E90-A No:8
      Page(s):
    1713-1716

    This paper proposes a design method for representing monochrome medical X-ray images on an electronic display. The required quantizing resolution of the input density and output voltage are theoretically clarified. The proposed method makes it easier to determine the required quantizing resolution which is important in a X-ray diagnostic system.

  • QoS Control Mechanism Based on Real-Time Measurement of Elephant Flows

    Rie HAYASHI  Takashi MIYAMURA  Eiji OKI  Kohei SHIOMOTO  

     
    PAPER-Network

      Vol:
    E90-B No:8
      Page(s):
    2081-2089

    This proposes a scalable QoS control scheme, called Elephant Flow Control Scheme (EFCS) for high-speed large-capacity networks; it controls congestion and provides appropriate bandwidth to normal users' flows by controlling just the elephant flows. EFCS introduces a sampling packet threshold and drops packets considering flow size. EFCS also adopts a compensation parameter to control elephant flows to an appropriate level. Numerical results show that the sampling threshold increases control accuracy by 20% while reducing the amount of memory needed for packet sampling by 60% amount of memory by packet sampling; the elephant flows are controlled as intended by the compensation parameter. As a result, EFCS provides sufficient bandwidth to normal TCP flows in a scalable manner.

  • Boundary Detection in Echocardiographic Images Using Markovian Level Set Method

    Jierong CHENG  Say-Wei FOO  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E90-D No:8
      Page(s):
    1292-1300

    Owing to the large amount of speckle noise and ill-defined edges present in echocardiographic images, computer-based boundary detection of the left ventricle has proved to be a challenging problem. In this paper, a Markovian level set method for boundary detection in long-axis echocardiographic images is proposed. It combines Markov random field (MRF) model, which makes use of local statistics with level set method that handles topological changes, to detect a continuous and smooth boundary. Experimental results show that higher accuracy can be achieved with the proposed method compared with two related MRF-based methods.

  • On the Generative Powers of Some Extensions of Minimal Linear Grammars

    Kaoru ONODERA  

     
    PAPER-Automata and Formal Language Theory

      Vol:
    E90-D No:6
      Page(s):
    895-904

    This paper concerns the Geffert normal forms for phrase structure grammars. We first generalize them to have a new formulation of minimal linear grammars with cancellation productions, called "cancel minimal linear grammars". Then the generative powers of some classes of those grammars are investigated. It is shown that the class of languages generated by grammars with a unique {AB}-cancellation production properly includes the class of linear languages, while it is included in the class of context-free languages. Furthermore, the corresponding class of languages generated by grammars with a unique {AA}-cancellation production is shown to be a proper subclass of linear languages.

  • Development of an Automated Method for the Detection of Chronic Lacunar Infarct Regions in Brain MR Images

    Ryujiro YOKOYAMA  Xuejun ZHANG  Yoshikazu UCHIYAMA  Hiroshi FUJITA  Takeshi HARA  Xiangrong ZHOU  Masayuki KANEMATSU  Takahiko ASANO  Hiroshi KONDO  Satoshi GOSHIMA  Hiroaki HOSHI  Toru IWAMA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E90-D No:6
      Page(s):
    943-954

    The purpose of our study is to develop an algorithm that would enable the automated detection of lacunar infarct on T1- and T2-weighted magnetic resonance (MR) images. Automated identification of the lacunar infarct regions is not only useful in assisting radiologists to detect lacunar infarcts as a computer-aided detection (CAD) system but is also beneficial in preventing the occurrence of cerebral apoplexy in high-risk patients. The lacunar infarct regions are classified into the following two types for detection: "isolated lacunar infarct regions" and "lacunar infarct regions adjacent to hyperintensive structures." The detection of isolated lacunar infarct regions was based on the multiple-phase binarization (MPB) method. Moreover, to detect lacunar infarct regions adjacent to hyperintensive structures, we used a morphological opening processing and a subtraction technique between images produced using two types of circular structuring elements. Thereafter, candidate regions were selected based on three features -- area, circularity, and gravity center. Two methods were applied to the detected candidates for eliminating false positives (FPs). The first method involved eliminating FPs that occurred along the periphery of the brain using the region-growing technique. The second method, the multi-circular regions difference method (MCRDM), was based on the comparison between the mean pixel values in a series of double circles on a T1-weighted image. A training dataset comprising 20 lacunar infarct cases was used to adjust the parameters. In addition, 673 MR images from 80 cases were used for testing the performance of our method; the sensitivity and specificity were 90.1% and 30.0% with 1.7 FPs per image, respectively. The results indicated that our CAD system for the automatic detection of lacunar infarct on MR images was effective.

  • Receiver-Based ACK Splitting Mechanism for TCP over Wired/Wireless Heterogeneous Networks Open Access

    Go HASEGAWA  Masashi NAKATA  Hirotaka NAKANO  

     
    PAPER-Network

      Vol:
    E90-B No:5
      Page(s):
    1132-1141

    With the rapid development of wireless network technologies, heterogeneous networks with wired and wireless links are becoming common. However, the performance of TCP data transmission deteriorates significantly when a TCP connection traverses such networks, mainly because of packet losses caused by the high bit error rate of wireless links. Many solutions for this problem have been proposed in the past literature. However, most of them have various drawbacks, such as difficulties in their deployment by the wireless access network provider and end users, violation of TCP's end-to-end principle by splitting the TCP connection, or inapplicability to IP-level encrypted traffic because the base station needs to access the TCP header. In this paper, we propose a new mechanism without such drawbacks to improve the performance of TCP over wired and wireless heterogeneous networks. Our mechanism employs a receiver-based approach, which does not need modifications to be made to the sender TCP or the base station. It uses the ACK-splitting method for increasing the congestion window size quickly in order to restrain the throughput degradation caused by packet losses due to the high bit error rate of wireless links. We evaluate the performance of our mechanism and show that our mechanism can increase throughput by up to 94% in a UMTS network. The simulation results also show that our mechanism does not significantly deteriorate even when the receiver cannot perfectly distinguish whether packet losses are due to network congestion or bit errors on the wireless links.

  • TCP Congestion Control with ACK-Pacing for Vertical Handover

    Yosuke MATSUSHITA  Takahiro MATSUDA  Miki YAMAMOTO  

     
    PAPER-Network

      Vol:
    E90-B No:4
      Page(s):
    885-893

    In this paper, we discuss TCP performance in a wireless overlay network where wireless LANs and cellular networks are integrated. In the overlay network, vertical handover, where a mobile node changes its access link during a session, is one of the most important technologies. When a vertical handover occurs, throughput performance of a TCP flow is degraded due to not only packet losses during the handover, but drastic change of its bandwidth-delay product. In this paper, we propose an ACK-pacing mechanism for TCP congestion control to improve the performance degradation. The proposed system is receiver-driven, so no modification is required to the mechanism of TCP sender. In the proposed system, a TCP receiver adjusts a transmission rate of ACKs according to the relationship between bandwidth-delay products before and after a handover. Since the ACK-clocking mechanism of TCP adjusts the transmission rate of TCP segments, the TCP receiver can seamlessly adjust its congestion window size to the new bandwidth-delay product. Computer simulation results show that the proposed system can improve the TCP performance during the vertical handover.

  • TCP-Ho: A Congestion Control Algorithm with Design and Performance Evaluation

    Cheng-Yuan HO  Yi-Cheng CHAN  Yaw-Chung CHEN  

     
    PAPER-Network

      Vol:
    E90-B No:3
      Page(s):
    516-526

    A critical design issue of Transmission Control Protocol (TCP) is its congestion control that allows the protocol to adjust the end-to-end communication rate based on the detection of packet loss. However, TCP congestion control may function poorly during its slow start and congestion avoidance phases. This is because TCP sends bursts of packets with the fast window increase and the ACK-clock based transmission in slow start, and respond slowly with large congestion windows especially in high bandwidth-delay product (BDP) networks during congestion avoidance. In this article, we propose an improved version of TCP, TCP-Ho, that uses an efficient congestion window control algorithm for a TCP source. According to the estimated available bandwidth and measured round-trip times (RTTs), the proposed algorithm adjusts the congestion window size with a rate between exponential growth and linear growth intelligently. Our extensive simulation results show that TCP-Ho significantly improves the performance of connections as well as remaining fair and stable when the BDP increases. Furthermore, it is feasible to implement because only sending part needs to be modified.

  • Adaptive Vector Directional Filters to Process Multichannel Images

    Volodymyr PONOMARYOV  Alberto ROSALES  Francisco GALLEGOS  Igor LOBODA  

     
    LETTER-Multimedia Systems for Communications

      Vol:
    E90-B No:2
      Page(s):
    429-430

    We present a novel algorithm that can suppress impulsive noise in video colour sequences. It uses order statistics, and directional and adaptive processing techniques.

  • Application of the CKY Algorithm to Recognition of Tree Structures for Linear, Monadic Context-Free Tree Grammars

    Akio FUJIYOSHI  

     
    PAPER-Formal Languages

      Vol:
    E90-D No:2
      Page(s):
    388-394

    In this paper, a recognition algorithm for the class of tree languages generated by linear, monadic context-free tree grammars (LM-CFTGs) is proposed. LM-CFTGs define an important class of tree languages because LM-CFTGs are weakly equivalent to tree adjoining grammars (TAGs). The algorithm uses the CKY algorithm as a subprogram and recognizes whether an input tree can be derived from a given LM-CFTG in O(n4) time, where n is the number of nodes of the input tree.

  • Analogical Conception of Chomsky Normal Form and Greibach Normal Form for Linear, Monadic Context-Free Tree Grammars

    Akio FUJIYOSHI  

     
    PAPER-Automata and Formal Language Theory

      Vol:
    E89-D No:12
      Page(s):
    2933-2938

    This paper presents the analogical conception of Chomsky normal form and Greibach normal form for linear, monadic context-free tree grammars (LM-CFTGs). LM-CFTGs generate the same class of languages as four well-known mildly context-sensitive grammars. It will be shown that any LM-CFTG can be transformed into equivalent ones in both normal forms. As Chomsky normal form and Greibach normal form for context-free grammars (CFGs) play a very important role in the study of formal properties of CFGs, it is expected that the Chomsky-like normal form and the Greibach-like normal form for LM-CFTGs will provide deeper analyses of the class of languages generated by mildly context-sensitive grammars.

  • Recognizing and Analyzing of User's Continuous Action in Mobile Systems

    Jonghun BAEK  Ik-Jin JANG  Byoung-Ju YUN  

     
    PAPER-Human-computer Interaction

      Vol:
    E89-D No:12
      Page(s):
    2957-2963

    As a result of the growth of sensor-enabled mobile devices, in recent years, users can utilize diverse digital contents everywhere and anytime. However, the interfaces of mobile applications are often unnatural due to limited computational capability, miniaturized input/output controls, and so on. To complement the poor user interface (UI) and fully utilize mobility as feature of mobile devices, we explore possibilities for a new UI of mobile devices. This paper describes the method for recognizing and analyzing a user's continuous action including the user's various gestures and postures. The application example we created is mobile game called AM-Fishing game on mobile devices that employ the accelerometer as the main interaction modality. The demonstration shows the evaluation for the system usability.

  • The Relations among Watson-Crick Automata and Their Relations with Context-Free Languages

    Satoshi OKAWA  Sadaki HIROSE  

     
    PAPER-Automata and Formal Language Theory

      Vol:
    E89-D No:10
      Page(s):
    2591-2599

    Watson-Crick automata were introduced as a new computer model and have been intensively investigated regarding their computational power. In this paper, aiming to establish the relations among language families defined by Watson-Crick automata and the family of context-free languages completely, we obtain the following results. (1) F1WK = FSWK = FWK, (2) FWK = AWK, (3) there exists a language which is not context-free but belongs to NWK, and (4) there exists a context-free language which does not belong to AWK.

  • A Study on Non-octave Scalable Image Coding and Its Performance Evaluation Using Digital Cinema Test Material

    Takayuki NAKACHI  Tomoko SAWABE  Junji SUZUKI  Tetsuro FUJII  

     
    PAPER-Image

      Vol:
    E89-A No:9
      Page(s):
    2405-2414

    JPEG2000, an international standard for still image compression, offers 1) high coding performance, 2) unified lossless/lossy compression, and 3) resolution and SNR scalability. Resolution scalability is an especially promising attribute given the popularity of Super High Definition (SHD) images like digital-cinema. Unfortunately, its current implementation of resolution scalability is restricted to powers of two. In this paper, we introduce non-octave scalable coding (NSC) based on the use of filter banks. Two types of non-octave scalable coding are implemented. One is based on a DCT filter bank and the other uses wavelet transform. The latter is compatible with JPEG2000 Part2. By using the proposed algorithm, images with rational scale resolutions can be decoded from a compressed bit stream. Experiments on digital cinema test material show the effectiveness of the proposed algorithm.

  • Background TCP Data Transfer with Inline Network Measurement

    Tomoaki TSUGAWA  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E89-B No:8
      Page(s):
    2152-2160

    In the present paper, ImTCP-bg, a new background TCP data transfer mechanism that uses an inline network measurement technique, is proposed. ImTCP-bg sets the upper limit of the congestion window size of the sender TCP based on the results of the inline network measurement, which measures the available bandwidth of the network path between the sender and receiver hosts. ImTCP-bg can provide background data transfer without affecting the foreground traffic, whereas previous methods cannot avoid network congestion. ImTCP-bg also employs an enhanced RTT-based mechanism so that ImTCP-bg can detect and resolve network congestion, even when reliable measurement results cannot be obtained. The performance of ImTCP-bg is investigated through simulations, and the effectiveness of ImTCP-bg in terms of the degree of interference with foreground traffic and the link bandwidth utilization is also investigated.

  • Removal of Adherent Waterdrops from Images Acquired with a Stereo Camera System

    Yuu TANAKA  Atsushi YAMASHITA  Toru KANEKO  Kenjiro T. MIURA  

     
    PAPER-Stereo and Multiple View Analysis

      Vol:
    E89-D No:7
      Page(s):
    2021-2027

    In this paper, we propose a new method that can remove view-disturbing noises from stereo images. One of the thorny problems in outdoor surveillance by a camera is that adherent noises such as waterdrops on the protecting glass surface lens disturb the view from the camera. Therefore, we propose a method for removing adherent noises from stereo images taken with a stereo camera system. Our method is based on the stereo measurement and utilizes disparities between stereo image pair. Positions of noises in images can be detected by comparing disparities measured from stereo images with the distance between the stereo camera system and the glass surface. True disparities of image regions hidden by noises can be estimated from the property that disparities are generally similar with those around noises. Finally, we can remove noises from images by replacing the above regions with textures of corresponding image regions obtained by the disparity referring. Experimental results show the effectiveness of the proposed method.

  • Preceding Vehicle Detection Using Stereo Images and Non-scanning Millimeter-Wave Radar

    Eigo SEGAWA  Morito SHIOHARA  Shigeru SASAKI  Norio HASHIGUCHI  Tomonobu TAKASHIMA  Masatoshi TOHNO  

     
    PAPER-Intelligent Transport Systems

      Vol:
    E89-D No:7
      Page(s):
    2101-2108

    We developed a system that detects the vehicle driving immediately ahead of one's own car in the same lane and measures the distance to and relative speed of that vehicle to prevent accidents such as rear-end collisions. The system is the first in the industry to use non-scanning millimeter-wave radar combined with a sturdy stereo image sensor, which keeps cost low. It can operate stably in adverse weather conditions such as rain, which could not easily be done with previous sensors. The system's vehicle detection performance was tested, and the system can correctly detect vehicles driving 3 to 50 m ahead in the same lane with higher than 99% accuracy in clear weather. Detection performance in rainy weather, where water drops and splashes notably degraded visibility, was higher than 90%.

  • Rate-Based Supervisory Congestion Control for Ad Hoc Networks

    Hong-Seok CHOI  Hee-Jung BYUN  Jong-Tae LIM  

     
    LETTER-Network

      Vol:
    E89-B No:6
      Page(s):
    1899-1902

    In this letter, we suggest a rate-based supervisory congestion control scheme for the ad hoc networks that use TCP as the transport protocol. This scheme makes it possible for the TCP sender to distinguish the causes of packet loss. In addition, this scheme guarantees the fair sharing of the available bandwidth among the connections. We show the reliability of our scheme by using the supervisory control framework and simulations confirm the effectiveness of our scheme.

201-220hit(423hit)