The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PA(8249hit)

901-920hit(8249hit)

  • Modified Generalized Sidelobe Canceller for Nonuniform Linear Array Radar Space-Time Adaptive Processing

    Xiang ZHAO  Zishu HE  Yikai WANG  Yuan JIANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:9
      Page(s):
    1585-1587

    This letter addresses the problem of space-time adaptive processing (STAP) for airborne nonuniform linear array (NLA) radar using a generalized sidelobe canceller (GSC). Due to the difficulty of determining the spatial nulls for the NLAs, it is a problem to obtain a valid blocking matrix (BM) of the GSC directly. In order to solve this problem and improve the STAP performance, a BM modification method based on the modified Gram-Schmidt orthogonalization algorithm is proposed. The modified GSC processor can achieve the optimal STAP performance and as well a faster convergence rate than the orthogonal subspace projection method. Numerical simulations validate the effectiveness of the proposed methods.

  • Improving Spectral Efficiency of Non-Orthogonal Space Time Block Coded-Continuous Phase Modulation

    Kazuyuki MORIOKA  Satoshi YAMAZAKI  David ASANO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    2024-2032

    We consider space time block coded-continuous phase modulation (STBC-CPM), which has the advantages of both STBC and CPM at the same time. A weak point of STBC-CPM is that the normalized spectral efficiency (NSE) is limited by the orthogonality of the STBC and CPM parameters. The purpose of this study is to improve the NSE of STBC-CPM. The NSE depends on the transmission rate (TR), the bit error rate (BER) and the occupied bandwidth (OBW). First, to improve the TR, we adapt quasi orthogonal-STBC (QO-STBC) for four transmit antennas and quasi-group orthogonal Toeplitz code (Q-GOTC) for eight transmit antennas, at the expense of the orthogonality. Second, to evaluate the BER, we derive a BER approximation of STBC-CPM with non-orthogonal STBC (NO-STBC). The theoretical analysis and simulation results show that the NSE can be improved by using QO-STBC and Q-GOTC. Third, the OBW depends on CPM parameters, therefore, the tradeoff between the NSE and the CPM parameters is considered. A computer simulation provides a candidate set of CPM parameters which have better NSE. Finally, the adaptation of non-orthogonal STBC to STBC-CPM can be viewed as a generalization of the study by Silvester et al., because orthogonal STBC can be thought of as a special case of non-orthogonal STBC. Also, the adaptation of Q-GOTC to CPM can be viewed as a generalization of our previous letter, because linear modulation scheme can be thought of as a special case of non-linear modulation.

  • Joint Estimation of Frequency and DOA with Spatio-Temporal Sub-Nyquist Sampling Based on Spectrum Correction and Chinese Remainder Theorem

    Xiangdong HUANG  Mengkai YANG  Mingzhuo LIU  Lin YANG  Haipeng FU  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    2007-2016

    This paper addresses joint estimation of the frequency and the direction-of-arrival (DOA), under the relaxed condition that both snapshots in the temporal domain and sensors in the spacial domain are sparsely spaced. Specifically, a novel coprime sparse array allowing a large range for interelement spacings is employed in the proposed joint scheme, which greatly alleviates the conventional array's half-wavelength constraint. Further, by incorporating small-sized DFT spectrum correction with the closed-form robust Chinese Remainder Theorem (CRT), both spectral aliasing and integer phase ambiguity caused by spatio-temporal under-sampling can be removed in an efficient way. As a result, these two parameters can be efficiently estimated by reusing the observation data collected in parallel at different undersampling rates, which remarkably improves the data utilization. Numerical results demonstrate that the proposed joint scheme is highly accurate.

  • Video Saliency Detection Using Spatiotemporal Cues

    Yu CHEN  Jing XIAO  Liuyi HU  Dan CHEN  Zhongyuan WANG  Dengshi LI  

     
    PAPER

      Pubricized:
    2018/06/20
      Vol:
    E101-D No:9
      Page(s):
    2201-2208

    Saliency detection for videos has been paid great attention and extensively studied in recent years. However, various visual scene with complicated motions leads to noticeable background noise and non-uniformly highlighting the foreground objects. In this paper, we proposed a video saliency detection model using spatio-temporal cues. In spatial domain, the location of foreground region is utilized as spatial cue to constrain the accumulation of contrast for background regions. In temporal domain, the spatial distribution of motion-similar regions is adopted as temporal cue to further suppress the background noise. Moreover, a backward matching based temporal prediction method is developed to adjust the temporal saliency according to its corresponding prediction from the previous frame, thus enforcing the consistency along time axis. The performance evaluation on several popular benchmark data sets validates that our approach outperforms existing state-of-the-arts.

  • Sparse Graph Based Deep Learning Networks for Face Recognition

    Renjie WU  Sei-ichiro KAMATA  

     
    PAPER

      Pubricized:
    2018/06/20
      Vol:
    E101-D No:9
      Page(s):
    2209-2219

    In recent years, deep learning based approaches have substantially improved the performance of face recognition. Most existing deep learning techniques work well, but neglect effective utilization of face correlation information. The resulting performance loss is noteworthy for personal appearance variations caused by factors such as illumination, pose, occlusion, and misalignment. We believe that face correlation information should be introduced to solve this network performance problem originating from by intra-personal variations. Recently, graph deep learning approaches have emerged for representing structured graph data. A graph is a powerful tool for representing complex information of the face image. In this paper, we survey the recent research related to the graph structure of Convolutional Neural Networks and try to devise a definition of graph structure included in Compressed Sensing and Deep Learning. This paper devoted to the story explain of two properties of our graph - sparse and depth. Sparse can be advantageous since features are more likely to be linearly separable and they are more robust. The depth means that this is a multi-resolution multi-channel learning process. We think that sparse graph based deep neural network can more effectively make similar objects to attract each other, the relative, different objects mutually exclusive, similar to a better sparse multi-resolution clustering. Based on this concept, we propose a sparse graph representation based on the face correlation information that is embedded via the sparse reconstruction and deep learning within an irregular domain. The resulting classification is remarkably robust. The proposed method achieves high recognition rates of 99.61% (94.67%) on the benchmark LFW (YTF) facial evaluation database.

  • Formal Method for Security Analysis of Electronic Payment Protocols

    Yi LIU  Qingkun MENG  Xingtong LIU  Jian WANG  Lei ZHANG  Chaojing TANG  

     
    PAPER-Information Network

      Pubricized:
    2018/06/19
      Vol:
    E101-D No:9
      Page(s):
    2291-2297

    Electronic payment protocols provide secure service for electronic commerce transactions and protect private information from malicious entities in a network. Formal methods have been introduced to verify the security of electronic payment protocols; however, these methods concentrate on the accountability and fairness of the protocols, without considering the impact caused by timeliness. To make up for this deficiency, we present a formal method to analyze the security properties of electronic payment protocols, namely, accountability, fairness and timeliness. We add a concise time expression to an existing logical reasoning method to represent the event time and extend the time characteristics of the logical inference rules. Then, the Netbill protocol is analyzed with our formal method, and we find that the fairness of the protocol is not satisfied due to the timeliness problem. The results illustrate that our formal method can analyze the key properties of electronic payment protocols. Furthermore, it can be used to verify the time properties of other security protocols.

  • Pattern-Based Ontology Modeling and Reasoning for Emergency System

    Yue TAN  Wei LIU  Zhenyu YANG  Xiaoni DU  Zongtian LIU  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/06/05
      Vol:
    E101-D No:9
      Page(s):
    2323-2333

    Event-centered information integration is regarded as one of the most pressing issues in improving disaster emergency management. Ontology plays an increasingly important role in emergency information integration, and provides the possibility for emergency reasoning. However, the development of event ontology for disaster emergency is a laborious and difficult task due to the increasingly scale and complexity of emergencies. Ontology pattern is a modeling solution to solve the recurrent ontology design problem, which can improve the efficiency of ontology development by reusing patterns. By study on characteristics of numerous emergencies, this paper proposes a generic ontology pattern for emergency system modeling. Based on the emergency ontology pattern, a set of reasoning rules for emergency-evolution, emergency-solution and emergency-resource utilization reasoning were proposed to conduct emergency knowledge reasoning and q.

  • Reciprocal Kit-Build Concept Map: An Approach for Encouraging Pair Discussion to Share Each Other's Understanding

    Warunya WUNNASRI  Jaruwat PAILAI  Yusuke HAYASHI  Tsukasa HIRASHIMA  

     
    PAPER-Educational Technology

      Pubricized:
    2018/05/29
      Vol:
    E101-D No:9
      Page(s):
    2356-2367

    Collaborative learning is an active teaching and learning strategy, in which learners who give each other elaborated explanations can learn most. However, it is difficult for learners to explain their own understanding elaborately in collaborative learning. In this study, we propose a collaborative use of a Kit-Build concept map (KB map) called “Reciprocal KB map”. In a Reciprocal KB map for a pair discussion, at first, the two participants make their own concept maps expressing their comprehension. Then, they exchange the components of their maps and request each other to reconstruct their maps by using the components. The differences between the original map and the reconstructed map are diagnosed automatically as an advantage of the KB map. Reciprocal KB map is expected to encourage pair discussion to recognize the understanding of each other and to create an effective discussion. In an experiment reported in this paper, Reciprocal KB map was used for supporting a pair discussion and was compared with a pair discussion which was supported by a traditional concept map. Nineteen pairs of university students were requested to use the traditional concept map in their discussion, while 20 pairs of university students used Reciprocal KB map for discussing the same topic. The results of the experiment were analyzed using three metrics: a discussion score, a similarity score, and questionnaires. The discussion score, which investigates the value of talk in discussion, demonstrates that Reciprocal KB map can promote more effective discussion between the partners compared to the traditional concept map. The similarity score, which evaluates the similarity of the concept maps, demonstrates that Reciprocal KB map can encourage the pair of partners to understand each other better compared to the traditional concept map. Last, the questionnaires illustrate that Reciprocal KB map can support the pair of partners to collaborate in the discussion smoothly and that the participants accepted this method for sharing their understanding with each other. These results suggest that Reciprocal KB map is a promising approach for encouraging pairs of partners to understand each other and to promote the effective discussions.

  • An Efficient Pattern Matching Algorithm for Unordered Term Tree Patterns of Bounded Dimension

    Takayoshi SHOUDAI  Tetsuhiro MIYAHARA  Tomoyuki UCHIDA  Satoshi MATSUMOTO  Yusuke SUZUKI  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1344-1354

    A term is a connected acyclic graph (unrooted unordered tree) pattern with structured variables, which are ordered lists of one or more distinct vertices. A variable of a term has a variable label and can be replaced with an arbitrary tree by hyperedge replacement according to the variable label. The dimension of a term is the maximum number of vertices in the variables of it. A term is said to be linear if each variable label in it occurs exactly once. Let T be a tree and t a linear term. In this paper, we study the graph pattern matching problem (GPMP) for T and t, which decides whether or not T is obtained from t by replacing variables in t with some trees. First we show that GPMP for T and t is NP-complete if the dimension of t is greater than or equal to 4. Next we give a polynomial time algorithm for solving GPMP for a tree of bounded degree and a linear term of bounded dimension. Finally we show that GPMP for a tree of arbitrary degree and a linear term of dimension 2 is solvable in polynomial time.

  • Pile-Shifting Scramble for Card-Based Protocols

    Akihiro NISHIMURA  Yu-ichi HAYASHI  Takaaki MIZUKI  Hideaki SONE  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1494-1502

    Card-based cryptographic protocols provide secure multi-party computations using a deck of physical cards. The most important primitive of those protocols is the shuffling operation, and most of the existing protocols rely on uniform cyclic shuffles (such as the random cut and random bisection cut) in which each possible outcome is equally likely and all possible outcomes constitute a cyclic subgroup. However, a couple of protocols with non-uniform and/or non-cyclic shuffles were proposed by Koch, Walzer, and Härtel at Asiacrypt 2015. Compared to the previous protocols, their protocols require fewer cards to securely produce a hidden AND value, although to implement of such unconventional shuffles appearing in their protocols remains an open problem. This paper introduces “pile-shifting scramble,” which can be a secure implementation of those shuffles. To implement such unconventional shuffles, we utilize physical cases that can store piles of cards, such as boxes and envelopes. Therefore, humans are able to perform the shuffles using these everyday objects. Furthermore, we show that a certain class of non-uniform and/or non-cyclic shuffles having two possible outcomes can be implemented by the pile-shifting scramble. This also implies that we can improve upon the known COPY protocol using three card cases so that the number of cases required can be reduced to two.

  • Compressive Phase Retrieval Realized by Combining Generalized Approximate Message Passing with Cartoon-Texture Model

    Jingjing SI  Jing XIANG  Yinbo CHENG  Kai LIU  

     
    LETTER-Image

      Vol:
    E101-A No:9
      Page(s):
    1608-1615

    Generalized approximate message passing (GAMP) can be applied to compressive phase retrieval (CPR) with excellent phase-transition behavior. In this paper, we introduced the cartoon-texture model into the denoising-based phase retrieval GAMP(D-prGAMP), and proposed a cartoon-texture model based D-prGAMP (C-T D-prGAMP) algorithm. Then, based on experiments and analyses on the variations of the performance of D-PrGAMP algorithms with iterations, we proposed a 2-stage D-prGAMP algorithm, which makes tradeoffs between the C-T D-prGAMP algorithm and general D-prGAMP algorithms. Finally, facing the non-convergence issues of D-prGAMP, we incorporated adaptive damping to 2-stage D-prGAMP, and proposed the adaptively damped 2-stage D-prGAMP (2-stage ADD-prGAMP) algorithm. Simulation results show that, runtime of 2-stage D-prGAMP is relatively equivalent to that of BM3D-prGAMP, but 2-stage D-prGAMP can achieve higher image reconstruction quality than BM3D-prGAMP. 2-stage ADD-prGAMP spends more reconstruction time than 2-stage D-prGAMP and BM3D-prGAMP. But, 2-stage ADD-prGAMP can achieve PSNRs 0.2∼3dB higher than those of 2-stage D-prGAMP and 0.3∼3.1dB higher than those of BM3D-prGAMP.

  • Analysis and Implementation of a QoS Optimization Method for Access Networks

    Ling ZHENG  Zhiliang QIU  Weitao PAN  Yibo MEI  Shiyong SUN  Zhiyi ZHANG  

     
    PAPER-Network System

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    1949-1960

    High-performance Network Over Coax, or HINOC for short, is a broadband access technology that can achieve bidirectional transmission for high-speed Internet service through a coaxial medium. In HINOC access networks, buffer management scheme can improve the fairness of buffer usage among different output ports and the overall loss performance. To provide different services to multiple priority classes while reducing the overall packet loss rate and ensuring fairness among the output ports, this study proposes a QoS optimization method for access networks. A backpressure-based queue threshold control scheme is used to minimize the weighted average packet loss rate among multiple priorities. A theoretical analysis is performed to examine the performance of the proposed scheme, and optimal system parameters are provided. Software simulation shows that the proposed method can improve the average packet loss rate by about 20% to 40% compared with existing buffer management schemes. Besides, FPGA evaluation reveals that the proposed method can be implemented in practical hardware and performs well in access networks.

  • Wide Angle Scanning Circular Polarized Meta-Structured Antenna Array

    Chang-Hyun LEE  Jeong-Hae LEE  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    2017-2023

    This paper presents a meta-structured circular polarized array antenna with wide scan angle. In order to widen the scanning angle of array antennas, this paper investigates unit antenna beamwidth and the coupling effects between array elements, both of which directly affect the steering performance. As a result, the optimal array distance, the mode configuration, and the antenna structure are elucidated. By using the features of the miniaturized mu-zero resonance (MZR) antenna, it is possible to design the antenna at optimum array distance for wide beamwidth. In addition, by modifying via position and gap configuration of the antenna, it is possible to optimize the mode configuration for optimal isolation. Finally, the 3dB steerable angle of 66° is successfully demonstrated using a 1x8 MZR CP antenna array without any additional decoupling structure. The measured beam patterns at a scan angle of 0°, 22°, 44°, and 66°agree well with the simulated beam patterns.

  • Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field

    Yuta KODERA  Takeru MIYAZAKI  Md. Al-Amin KHANDAKER  Md. Arshad ALI  Takuya KUSAKA  Yasuyuki NOGAMI  Satoshi UEHARA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1525-1536

    The authors have proposed a multi-value sequence called an NTU sequence which is generated by a trace function and the Legendre symbol over a finite field. Most of the properties for NTU sequence such as period, linear complexity, autocorrelation, and cross-correlation have been theoretically shown in our previous work. However, the distribution of digit patterns, which is one of the most important features for security applications, has not been shown yet. In this paper, the distribution has been formulated with a theoretic proof by focusing on the number of 0's contained in the digit pattern.

  • Comfortable Intelligence for Evaluating Passenger Characteristics in Autonomous Wheelchairs

    Taishi SAWABE  Masayuki KANBARA  Norihiro HAGITA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1308-1316

    In recent years, autonomous driving technologies are being developed for vehicles and personal mobility devices including golf carts and autonomous wheelchairs for various use cases, not only outside areas but inside areas like shopping malls, hospitals and airpots. The main purpose of developing these autonomous vehicles is to avoid the traffic accidents caused by human errors, to assist people with walking, and to improve human comfort by relieving them from driving. Most relevant research focuses on the efficiency and safety of autonomous driving, however, in order to use by the widespread of people in the society, it is important to consider passenger comfort inside vehicles as well as safety and efficiency. Therefore, in this work, we emphasize the importance of considering passenger comfort in designing the control loop of autonomous navigation for the concept of comfortable intelligence in the future autonomous mobility. Moreover, passenger characteristics, in terms of ride comfort in an autonomous vehicle, have not been investigated with regard to safety and comfort, depending on each passenger's driving experience, habits, knowledge, personality, and preference. There are still few studies on the optimization of autonomous driving control reflecting passenger characteristics and different stress factors during the ride. In this study, passenger stress characteristics with different stress factors were objectively analyzed using physiological indices (heart rate and galvanic skin response sensors) during autonomous wheelchair usages. Two different experimental results from 12 participants suggest that there are always at least two types of passengers: one who experiences stress and the other who does not, depending on the stress factors considered. Moreover, with regard to the classification result for the stress reduction method, there are two types of passenger groups, for whom the solution method is, respectively, either effective or ineffective.

  • Inserting Layer-5 to Provide Applications with Richer Functions through Common API

    Hiroki WATANABE  Takao KONDO  Kunitake KANEKO  Fumio TERAOKA  

     
    PAPER-Network

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    1967-1981

    Recently, application demands placed on the network have become more multifaceted. Highly functional application-to-application communication services such as bandwidth aggregation, fault tolerant communication, and delay/disruption tolerant networking (DTN) were developed independently in the network layer, the transport layer, and the application layer. As a result, protocol layering has become complicated. This paper proposes to insert Layer-5 (L5) between the application layer and the transport layer to separate communication policies and communication mechanisms to make protocol layering clearer. The transport layer (L4) provides end-to-end communication mechanisms such as reliable byte stream while L5 realizes communication policies such as bandwidth aggregation by combining the communication mechanisms in L4. This paper proposes five types of L5-paths as communication policies: (1) the L5 bundled path for bandwidth aggregation or fault tolerant communication, (2) the L5 spatially-spliced path for communication with middleboxes, (3) the L5 temporally-spliced path for DTN, (4) the L5 spliced-bundled path, and (5) the L5 bundled over spatially-spliced path. An application can select and use an appropriate L5-path depending on the network circumstances through a common API. A prototype of L5 is implemented in the Linux user space as a library to make deployment and maintenance easier. An evaluation shows that establishment time of L5-paths is short enough and performance of L5-paths is comparable or superior to existing technologies.

  • Winding Ratio Design of Transformer in Equivalent Circuit of Circular Patch Array Absorber

    Ryosuke SUGA  Tomohiko NAKAMURA  Daisuke KITAHARA  Kiyomichi ARAKI  Osamu HASHIMOTO  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    651-654

    An equivalent circuit of a circular patch array absorber has been proposed, however the method to identify a winding ratio of a transformer in its circuit have never been reported. In this paper, it is indicated that the ratio is proportionate to the area ratio between patch and unit cell of the absorber, and the design method of the winding ratio is proposed. The winding ratio derived by the proposed method is agreed well with that by using electromagnetic simulator within 3% error. Moreover, the operating frequency and 15 dB bandwidth of the fabricated absorber designed by proposed method are agreed with those derived by the circuit simulation within 0.4% and 0.1% errors. Thus the validity of the proposed method is verified.

  • Averaging Area of Incident Power Density for Human Exposure from Patch Antenna Arrays

    Daisuke FUNAHASHI  Takahiro ITO  Akimasa HIRATA  Takahiro IYAMA  Teruo ONISHI  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    644-646

    This study discusses an area-averaged incident power density to estimate surface temperature elevation from patch antenna arrays with 4 and 9 elements at the frequencies above 10 GHz. We computationally demonstrate that a smaller averaging area (1 cm2) of power density should be considered at the frequency of 30 GHz or higher compared with that at lower frequencies (4 cm2).

  • Binary Sequence Pairs of Period pm-1 with Optimal Three-Level Correlation

    Lianfei LUO  Wenping MA  Feifei ZHAO  

     
    LETTER-Information Theory

      Vol:
    E101-A No:8
      Page(s):
    1263-1266

    Let Fpm be the field of pm elements where p is an odd prime. In this letter, binary sequence pairs of period N=pm-1 are presented, where sequences are generated from the polynomial x2-c for any c Fpm{0}. The cross-correlation values of sequence pairs are completely determined, our results show that those binary sequence pairs have optimal three-level correlation.

  • An Efficient Misalignment Method for Visual Tracking Based on Sparse Representation

    Shan JIANG  Cheng HAN  Xiaoqiang DI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2018/05/14
      Vol:
    E101-D No:8
      Page(s):
    2123-2131

    Sparse representation has been widely applied to visual tracking for several years. In the sparse representation framework, tracking problem is transferred into solving an L1 minimization issue. However, during the tracking procedure, the appearance of target was affected by external environment. Therefore, we proposed a robust tracking algorithm based on the traditional sparse representation jointly particle filter framework. First, we obtained the observation image set from particle filter. Furthermore, we introduced a 2D transformation on the observation image set, which enables the tracking target candidates set more robust to handle misalignment problem in complex scene. Moreover, we adopt the occlusion detection mechanism before template updating, reducing the drift problem effectively. Experimental evaluations on five public challenging sequences, which exhibit occlusions, illuminating variations, scale changes, motion blur, and our tracker demonstrate accuracy and robustness in comparisons with the state-of-the-arts.

901-920hit(8249hit)