The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] OMP(3945hit)

2101-2120hit(3945hit)

  • Feature Compensation with Model-Based Estimation for Noise Masking

    Young Joon KIM  Nam Soo KIM  

     
    LETTER-Speech and Hearing

      Vol:
    E90-D No:2
      Page(s):
    603-605

    In this letter, we propose a new approach to estimate the degree of noise masking based on a sophisticated model for clean speech distribution. This measure, named as noise masking probability (NMP), is incorporated into the feature compensation technique to achieve robust speech recognition in noisy environments. Experimental results show that the proposed approach improves the performance of the baseline recognition system in the presence of various background noises.

  • Fast Transient Simulation of Power Distribution Networks Containing Dispersion Based on Parallel-Distributed Leapfrog Algorithm

    Takayuki WATANABE  Yuichi TANJI  Hidemasa KUBOTA  Hideki ASAI  

     
    PAPER

      Vol:
    E90-A No:2
      Page(s):
    388-397

    This paper presents a fast transient simulation method for power distribution networks (PDNs) of the PCB/Package. Because these PDNs are modeled as large-scale linear circuits consisting of a large number of RLC elements, it takes large costs to solve by conventional circuit simulators, such as SPICE. Our simulation method is based on the leapfrog algorithm, and can solve RLC circuits of PDNs faster than SPICE. Actual PDNs have frequency-dependent dispersions such as the skin-effect of conductors and the dielectric loss. To model these dispersions, more number of RLC elements are required, and circuit structures of these dispersion models are hard to solve by using the leapfrog algorithm. This paper shows that the circuit structures of dispersion models can be converted to suitable structures for the leapfrog algorithm. Further, in order to reduce the simulation time, our proposed method exploits parallel computation techniques. Numerical results show that our proposed method using single processing element (PE) enables a speedup of 20-100 times and 10 times compared to HSPICE and INDUCTWISE with the same level of accuracy, respectively. In a large-scale example with frequency-dependent dispersions, our method achieves over 94% parallel efficiency with 5PEs.

  • A Numerical Solution for Electromagnetic Scattering from Large Faceted Conducting Bodies by Using Physical Optics-SVD Derived Bases

    Gianluigi TIBERI  Agostino MONORCHIO  Giuliano MANARA  Raj MITTRA  

     
    PAPER-Scattering and Diffraction

      Vol:
    E90-C No:2
      Page(s):
    252-257

    A novel procedure for an efficient and rigorous solution of electromagnetic scattering problems is presented. It is based on the use of universal bases that are obtained by applying the SVD procedure to PO-derived basis functions. These bases, constructed by totally bypassing any matrix-type approach, can be used for all angles of incidence and their use leads to a matrix with relatively small dimensions. The method enables us to solve 2D scattering problems in a computationally efficient and numerically rigorous manner.

  • Butterfly Structure for Viterbi Decoders of All Rates k/n

    Tsung Sheng KUO  Chau-Yun HSU  

     
    PAPER-Coding Theory

      Vol:
    E90-A No:2
      Page(s):
    504-510

    This paper proposes a butterfly structure for Viterbi decoders, which works for convolutional codes of all rates k/n. The proposed butterfly structure can exploit the inherent symmetry of trellis branches, so that only some branch metrics need to be computed, while the others can be derived from the computed branches. Consequently, the computational complexity of the Viterbi decoder can be significantly reduced without any error performance loss. The applicability of the butterfly structure is validated by the best codes of rates 1/2, 2/3, and 3/4. Most of the best codes can apply the butterfly structure to reduce their branch metric computation complexity by a factor of 2 or 4. This study also reports a number of new codes with high branch symmetry under the symmetry consideration. Their branch metric computation can be reduced by a factor of 4, 8 or 16 with the similar performance to the best codes.

  • Frequency-Interleaved Spread Spectrum with MMSE Frequency-Domain Equalization

    Kazuaki TAKEDA  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:2
      Page(s):
    260-268

    The use of frequency-domain equalization (FDE) based on minimum mean square error (MMSE) criterion can significantly improve the downlink bit error rate (BER) performances of DS- and MC-CDMA in a frequency-selective fading channel. However, the uplink BER performance degrades due to a strong multi-user interference (MUI). In this paper, we propose frequency-interleaved spread spectrum (SS) using MMSE-FDE, in which the subcarrier components of each user's signal are interleaved onto a wider bandwidth. Then, the frequency-interleaved frequency-domain signal is transformed into a time-domain signal by the inverse fast Fourier transform (IFFT). Frequency-interleaving patterns assigned to different users are orthogonal to each other. The proposed scheme can avoid the MUI completely while achieving frequency diversity gain due to MMSE-FDE. It is shown by computer simulation that the use of frequency-interleaving can significantly improve the uplink performance in a frequency-selective Rayleigh fading channel.

  • Evaluation of Isolation Structures against High-Frequency Substrate Coupling in Analog/Mixed-Signal Integrated Circuits

    Daisuke KOSAKA  Makoto NAGATA  Yoshitaka MURASAKA  Atsushi IWATA  

     
    PAPER

      Vol:
    E90-A No:2
      Page(s):
    380-387

    Substrate-coupling equivalent circuits can be derived for arbitrary isolation structures by F-matrix computation. The derived netlist represents a unified impedance network among multiple sites on a chip surface as well as internal nodes of isolation structures and can be applied with SPICE simulation to evaluate isolation strengths. Geometry dependency of isolation attributes to layout parameters such as area, width, and location distance. On the other hand, structural dependency arises from vertical impurity concentration specific to p+/n+ diffusion and deep n-well. Simulation-based prototyping of isolation structures can include all these dependences and strongly helps establish an isolation strategy against high-frequency substrate coupling in a given technology. The analysis of isolation strength provided by p+/n+ guard ring, deep n-well guard ring as well as deep n-well pocket well explains S21 measurements performed on high-frequency test structures targeting 5 GHz bandwidth, that was formed in a 0.25-µm CMOS high frequency.

  • Application of Topology Optimization to H-Plane Waveguide Component

    Koichi HIRAYAMA  Yasuhide TSUJI  Tsuyoshi NOMURA  Kazuo SATO  Shinji NISHIWAKI  

     
    PAPER-Numerical Techniques, Computational Electromagnetic

      Vol:
    E90-C No:2
      Page(s):
    282-287

    We investigate the usefulness of the topology optimization with the finite element method in the optimization of an H-plane waveguide component. Design sensitivity is computed efficiently using the adjoint variable method. Employing the optimization procedure, optimized structures of an H-plane waveguide filter and T-junction are obtained from an initial homogeneous structure.

  • Optimization Design of Biorthogonal Wavelets for Embedded Image Coding

    Zaide LIU  Nanning ZHENG  Yuehu LIU  Huub VAN DE WETERING  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E90-D No:2
      Page(s):
    569-578

    We present here a simple technique for parametrization of popular biorthogonal wavelet filter banks (BWFBs) having vanishing moments (VMs) of arbitrary multiplicity. Given a prime wavelet filter with VMs of arbitrary multiplicity, after formulating it as a trigonometric polynomial depending on two free parameters, we prove the existence of its dual filter based on the theory of Diophantine equation. The dual filter permits perfect reconstruction (PR) and also has VMs of arbitrary multiplicity. We then give the complete construction of two-parameter families of 17/11 and 10/18 BWFBs, from which any linear-phase 17/11 and 10/18 BWFB possessing desired features could be derived with ease by adjusting the free parameters. In particular, two previously unpublished BWFBs for embedded image coding are constructed, both have optimum coding gains and rational coef ficients. Extensive experiments show that our new BWFBs exhibit performance equal to Winger's W-17/11 and Villasenor's V-10/18 (superior to CDF-9/7 by Cohen et al. and Villasenor's V-6/10) for image compression, and yet require slightly lower computational costs.

  • Universal Lossy Coding for Individual Sequences Based on Complexity Functions

    Shigeaki KUZUOKA  Tomohiko UYEMATSU  

     
    PAPER-Information Theory

      Vol:
    E90-A No:2
      Page(s):
    491-503

    This paper investigates the fixed-rate and fixed-distortion lossy coding problems of individual sequences subject to the subadditive distortion measure. The fixed-rate and fixed-distortion universal lossy coding schemes based on the complexity of the sequence are proposed. The obtained coding theorems reveal that the optimal distortion (resp. rate) attainable by the fixed-rate (resp. fixed-distortion) lossy coding is equal to the optimal average distortion (resp. rate) with respect to the overlapping empirical distribution of the given sequence. Some connections with the lossy coding problem of ergodic sources are also investigated.

  • Synthesis Method of All Low-Voltage CMOS Instantaneous-Companding Log Domain Integrators

    Ippei AKITA  Kazuyuki WADA  Yoshiaki TADOKORO  

     
    PAPER

      Vol:
    E90-A No:2
      Page(s):
    339-350

    This paper proposes a synthesis method of all low-voltage CMOS instantaneous-companding log domain integrators. The method is based on the exhaustive search of all low-voltage CMOS instantaneous-companding log domain integrators. All the integrators are derived from a general block diagram. A function of each block can be realized by any of a family of circuits and elemental circuits chosen from such families are combined to build an integrator. It is clarified that each family contains a few circuit topologies. All topologies of integrators including new ones are obtained from combinational procedure. Comparing characteristics of all generated integrators, ones satisfying required performances are found out.

  • A MATLAB-Based Code Generator for Parallel Sparse Matrix Computations Utilizing PSBLAS

    Taiji SASAOKA  Hideyuki KAWABATA  Toshiaki KITAMURA  

     
    PAPER-Parallel Programming

      Vol:
    E90-D No:1
      Page(s):
    2-12

    Parallel programs for distributed memory machines are not easy to create and maintain, especially when they involve sparse matrix computations. In this paper, we propose a program translation system for generating parallel sparse matrix computation codes utilizing PSBLAS. The purpose of the development of the system is to offer the user a convenient way to construct parallel sparse code based on PSBLAS. The system is build up on the idea of bridging the gap between the easy-to-read program representations and highly-tuned parallel executables based on existing parallel sparse matrix computation libraries. The system accepts a MATLAB program with annotations and generates subroutines for an SPMD-style parallel program which runs on distributed-memory machines. Experimental results on parallel machines show that the prototype of our system can generate fairly efficient PSBLAS codes for simple applications such as CG and Bi-CGSTAB programs.

  • Viewpoint Vector Rendering for Efficient Elemental Image Generation

    Kyoung Shin PARK  Sung-Wook MIN  Yongjoo CHO  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    233-241

    This paper presents a fast elemental image generation algorithm, called the Viewpoint Vector Rendering (VVR), for the computer-generated integral imaging system. VVR produces a set of elemental images in real-time by assembling the segmented area of the directional scenes taken from a range of viewpoints. This algorithm is less affected by system factors such as the number of elemental lens and the number of polygons. It also supports all display modes of the integral imaging system, real, virtual and focused mode. This paper first describes the characteristics of integral imaging system. It then discusses the design, implementation, and performance evaluation of the VVR algorithm, which can be easily adapted to render the integral images of complex 3D objects.

  • A Robust Detection Scheme of Orthogonal Space-Time Block Codes over Very Fast Fading Channels

    Donghun YU  Jae Hong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:1
      Page(s):
    171-175

    This letter proposes a robust detection scheme of orthogonal space-time block codes that face very fast fading channels. The proposed detection scheme employs a QR decomposition on the channel matrix and minimizes noise enhancement and impact of channel estimation errors which occur in a conventional detection scheme. It is shown by simulations that the proposed detection scheme outperforms the conventional detection scheme when the channel fading is very fast.

  • Chroma Key Using a Checker Pattern Background

    Hiroki AGATA  Atsushi YAMASHITA  Toru KANEKO  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    242-249

    In this paper, we propose a new region extraction method using chroma key with a two-tone checker pattern background. The method solves the problem in conventional chroma key techniques that foreground objects become transparent if their colors are the same as the background color. The method utilizes the adjacency condition between two-tone regions of the background and the geometrical information of the background grid line. The procedure of the proposed method consists of four steps: 1) background color extraction, 2) background grid line extraction, 3) foreground extraction, and 4) image composition. As to background color extraction, a color space approach is used. As to background grid line extraction, it is difficult to extract background grid line by a color space approach because the color of this region may be a composite of two background colors and different from them. Therefore, the background grid line is extracted from adjacency conditions between two background colors. As to foreground extraction, the boundary between the foreground and the background is detected to recheck the foreground region whose color is same as the background, and the background region whose color is same as the foreground. To detect regions whose colors are same as the background, the adjacency conditions with the background grid line are utilized. As to image composition, the process that smoothes the color of the foreground's boundary against the new background is carried out to create natural images. Experimental results show that the foreground objects can be segmented exactly from the background regardless of the colors of the foreground objects.

  • CPU Load Predictions on the Computational Grid

    Yuanyuan ZHANG  Wei SUN  Yasushi INOGUCHI  

     
    PAPER-Grid Computing

      Vol:
    E90-D No:1
      Page(s):
    40-47

    To make the best use of the resources in a shared grid environment, an application scheduler must make a prediction of available performance on each resource. In this paper, we examine the problem of predicting available CPU performance in time-shared grid system. We present and evaluate a new and innovative method to predict the one-step-ahead CPU load in a grid. Our prediction strategy forecasts the future CPU load based on the variety tendency in several past steps and in previous similar patterns, and uses a polynomial fitting method. Our experimental results on large load traces collected from four different kinds of machines demonstrate that this new prediction strategy achieves average prediction errors which are between 22% and 86% less than those incurred by four previous methods.

  • A New Coding Technique for Digital Holographic Video Using Multi-View Prediction

    Young-Ho SEO  Hyun-Jun CHOI  Jin-Woo BAE  Hoon-Jong KANG  Seung-Hyun LEE  Ji-Sang YOO  Dong-Wook KIM  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    118-125

    In this paper, we proposed an efficient coding method for digital hologram (fringe pattern) acquired with a CCD camera or by computer generation using multi-view prediction and MPEG video compression standard techniques. It processes each R, G, or B color component separately. The basic processing unit is a partial image segmented as the size of MN. Each partial image retains the information of the whole object. This method generates an assembled image for a column of the segmented and frequency-transformed partial images, which is the basis of the coding process. That is, a motion estimation and compensation technique of MPEG is applied between the reconstructed images from the assembled images with the disparities found during generation of assembled image and the original partial images. Therefore the compressed results are the disparity of each partial image to form the assembled image for the corresponding column, assembled image, and the motion vectors and the compensated image for each partial image. The experimental results with the implemented algorithm showed that the proposed method has NC (Normalized Correlation) values about 4% higher than the previous method at the same compression ratios, which convinced us that ours has better compression efficiency. Consequently, the proposed method is expected to be used effectively in the application areas to transmit or store in digital format the digital hologram data.

  • Disjointed SRLG Routing for GMPLS Networks by Hierarchically Distributed PCE

    Hiroshi MATSUURA  Naotaka MORITA  Tatsuro MURAKAMI  Kazumasa TAKAMI  

     
    PAPER-Internet

      Vol:
    E90-B No:1
      Page(s):
    51-62

    Multilayered network interaction among various networks such as IP/MPLS packet networks and optical fiber networks are now achieved using generalized multiprotocol label switching (GMPLS) technology. One unique feature of GMPLS networks is that GMPLS packet-layer label switching paths (LSPs), such as IP/MPLS LSPs, sometimes tunnel through GMPLS lower layer LSPs such as optical fiber/lambda LSPs. One problem that occurs in this situation is protecting an important primary packet LSP by using a protection LSP that is physically separated from the primary LSP. The packet router has difficulty recognizing lower layer LSPs that are totally disjointed from the primary LSP. This is because, in a GMPLS's packet layer, a source router only differentiates one lower layer LSP from another, and does not check the disjointedness of segments through which the lower layer path passes. Sometimes, different lower LSPs pass through the same optical fiber, and a malfunction of one optical fiber sometimes causes many lower layer LSPs to malfunction at the same time. To solve this problem, a shared risk link group (SRLG) is introduced. Network links that belong to the same SRLG share a common physical resource. We apply this SRLG to the proposed hierarchically distributed path computation elements (HDPCEs) and achieve effective disjointed SRLG protection for important primary GMPLS packet paths.

  • Parallel Adaptive Estimation of Hip Range of Motion for Total Hip Replacement Surgery

    Yasuhiro KAWASAKI  Fumihiko INO  Yoshinobu SATO  Shinichi TAMURA  Kenichi HAGIHARA  

     
    PAPER-Parallel Image Processing

      Vol:
    E90-D No:1
      Page(s):
    30-39

    This paper presents the design and implementation of a hip range of motion (ROM) estimation method that is capable of fine-grained estimation during total hip replacement (THR) surgery. Our method is based on two acceleration strategies: (1) adaptive mesh refinement (AMR) for complexity reduction and (2) parallelization for further acceleration. On the assumption that the hip ROM is a single closed region, the AMR strategy reduces the complexity for N N N stance configurations from O(N3) to O(ND), where 2≤D≤3 and D is a data-dependent value that can be approximated by 2 in most cases. The parallelization strategy employs the master-worker paradigm with multiple task queues, reducing synchronization between processors with load balancing. The experimental results indicate that the implementation on a cluster of 64 PCs completes estimation of 360360180 stance configurations in 20 seconds, playing a key role in selecting and aligning the optimal combination of artificial joint components during THR surgery.

  • Normal Mammogram Detection Based on Local Probability Difference Transforms and Support Vector Machines

    Werapon CHIRACHARIT  Yajie SUN  Pinit KUMHOM  Kosin CHAMNONGTHAI  Charles F. BABBS  Edward J. DELP  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    258-270

    Automatic detection of normal mammograms, as a "first look" for breast cancer, is a new approach to computer-aided diagnosis. This approach may be limited, however, by two main causes. The first problem is the presence of poorly separable "crossed-distributions" in which the correct classification depends upon the value of each feature. The second problem is overlap of the feature distributions that are extracted from digitized mammograms of normal and abnormal patients. Here we introduce a new Support Vector Machine (SVM) based method utilizing with the proposed uncrossing mapping and Local Probability Difference (LPD). Crossed-distribution feature pairs are identified and mapped into a new features that can be separated by a zero-hyperplane of the new axis. The probability density functions of the features of normal and abnormal mammograms are then sampled and the local probability difference functions are estimated to enhance the features. From 1,000 ground-truth-known mammograms, 250 normal and 250 abnormal cases, including spiculated lesions, circumscribed masses or microcalcifications, are used for training a support vector machine. The classification results tested with another 250 normal and 250 abnormal sets show improved testing performances with 90% sensitivity and 89% specificity.

  • Image Authentication Scheme for Resisting JPEG, JPEG2000 Compression and Scaling

    Chih-Hung LIN  Wen-Shyong HSIEH  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    126-136

    This paper presents a secure and simple content-based digital signature method for verifying the image authentication under JPEG, JPEG2000 compression and scaling based on a novel concept named lowest authenticable difference (LAD). The whole method, which is extended from the crypto-based digital signature scheme, mainly consists of statistical analysis and signature generation/verification. The invariant features, which are generated from the relationship among image blocks in the spatial domain, are coded and signed by the sender's private key to create a digital signature for each image, regardless of the image size. The main contributions of the proposed scheme are: (1) only the spatial domain is adopted during feature generation and verification, making domain transformation process unnecessary; (2) more non-malicious manipulated images (JPEG, JPEG2000 compressed and scaled images) than related studies can be authenticated by LAD, achieving a good trade-off of image authentication between fragile and robust under practical image processing; (3) non-malicious manipulation is clearly defined to meet closely the requirements of storing images or sending them over the Internet. The related analysis and discussion are presented. The experimental results indicate that the proposed method is feasible and effective.

2101-2120hit(3945hit)