The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PA(8249hit)

1781-1800hit(8249hit)

  • Optimization of Learning Time for Learning-Assisted Rendezvous Channel in Cognitive Radio System

    Osamu TAKYU  Takayuki YAMAKITA  Takeo FUJII  Mai OHTA  Fumihito SASAMORI  Shiro HANDA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E98-B No:2
      Page(s):
    360-369

    This paper derives the optimal learning time for the learning-assisted rendezvous channel. One problem with the dynamic spectrum access system of cognitive radio is access channel mismatch between two wireless terminals. In the learning-assisted rendezvous channel, before exchanging packets for link connection, the rate of channel occupancy by the other system is estimated within the learning time; it is referred to as the channel occupancy rate (COR). High speed packet exchange is made possible by selecting a low COR channel. However, the optimal learning time and the impact of COR estimation errors have not been clarified yet. This paper analyzes the time to rendezvous channel (TTR), where TTR is the time needed to complete the rendezvous with a certain probability. The results indicate that the learning time and TTR have a concave relationship which means that the optimal learning time can be determined.

  • Efficient Cloth Pattern Recognition Using Random Ferns

    Inseong HWANG  Seungwoo JEON  Beobkeun CHO  Yoonsik CHOE  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2014/10/31
      Vol:
    E98-D No:2
      Page(s):
    475-478

    This paper proposes a novel image classification scheme for cloth pattern recognition. The rotation and scale invariant delta-HOG (DHOG)-based descriptor and the entire recognition process using random ferns with this descriptor are proposed independent from pose and scale changes. These methods consider maximun orientation and various radii of a circular patch window for fast and efficient classification even when cloth patches are rotated and the scale is changed. It exhibits good performance in cloth pattern recognition experiments. It found a greater number of similar cloth patches than dense-SIFT in 20 tests out of a total of 36 query tests. In addition, the proposed method is much faster than dense-SIFT in both training and testing; its time consumption is decreased by 57.7% in training and 41.4% in testing. The proposed method, therefore, is expected to contribute to real-time cloth searching service applications that update vast numbers of cloth images posted on the Internet.

  • Sum Rate Analysis of MU-MISO Systems with ZF Beamforming over Composite Fading Channels

    Ou ZHAO  Hidekazu MURATA  

     
    PAPER

      Vol:
    E98-A No:2
      Page(s):
    558-568

    The performance of multiuser multiple-input single-output (MU-MISO) systems is not only affected by small-scale multipath fading but also by large-scale fading (i.e., shadowing) and path loss. In this paper, we concentrate on the sum rate distribution of MU-MISO systems employing linear zero-forcing beamforming, accounting for both multipath fading and shadowing effects, as well as spatial correlation at the transmit and receiver sides. In particular, we consider the classical spatially correlated lognormal model and propose closed-form bounds on the distribution of the achievable sum rates in MU-MISO systems. With the help of these bounds, we derive a relationship between the interuser distance and sum rate corresponding to 10% of the cumulative distribution function under different environmental conditions. A practical conclusion from our results based on the considered system is that the effect of spatially correlated shadowing can be considered to be independent when the interuser distance is approximately five times the shadowing correlation distance. Furthermore, a detailed analysis of the effects of composite channel attenuation consisting of multipath fading and shadowing is also provided.

  • A Controlled Retransmission Scheme for Burst Segmentation in OBS Networks on the Consideration of Path Relevance

    Rui HOU  Tingting HE  Mingming ZHENG  Tengyue MAO  

     
    PAPER-Systems and Control

      Vol:
    E98-A No:2
      Page(s):
    676-683

    In this paper, we propose a controlled retransmission scheme in optical burst switching (OBS) networks. Different from previous works in the literature, we set a different value to retransmission probability at each contention and propose a retransmission analytical model for burst segmentation contention resolution scheme. In addition, we consider the effect of relevance in traffic come from multiple paths. We take into account the load at each link (include the given links and the other correlated links taking traffic) due to both the fresh and the retransmitted traffic and calculate the path blocking probability and the byte loss probability (ByLP) in cases of without and with full- wavelength conversion to evaluate the network performance. An extensive simulation is proposed to validate our analytical model, and results have shown that both path blocking probability and ByLP are affected by the load and the retransmission probability in each contention along a path and the correlated traffic carried links on the path.

  • Distributed Synchronization for Message-Passing Based Embedded Multiprocessors

    Hao XIAO  Ning WU  Fen GE  Guanyu ZHU  Lei ZHOU  

     
    LETTER-Architecture

      Vol:
    E98-D No:2
      Page(s):
    272-275

    This paper presents a synchronization mechanism to effectively implement the lock and barrier protocols in a decentralized manner through explicit message passing. In the proposed solution, a simple and efficient synchronization control mechanism is proposed to support queued synchronization without contention. By using state-of-the-art Application-Specific Instruction-set Processor (ASIP) technology, we embed the synchronization functionality into a baseline processor, making the proposed mechanism feature ultra-low overhead. Experimental results show the proposed synchronization achieves ultra-low latency and almost ideal scalability when the number of processors increases.

  • A Robust Wireless Image Transmission for ITS Broadcast Environment Using Compressed Sensing

    Masaki TAKANASHI  Satoshi MAKIDO  

     
    LETTER-Intelligent Transport System

      Vol:
    E98-A No:2
      Page(s):
    783-787

    Providing images captured by an on-board camera to surrounding vehicles is an effective method to achieve smooth road traffic and to avoid traffic accidents. We consider providing images using WiFi technology based on the IEEE802.11p standard for vehicle-to-vehicle (V2V) communication media. We want to compress images to suppress communication traffic, because the communication capacity of the V2V system is strictly limited. However, there are difficulties in image compression and transmission using wireless communication especially in a vehicular broadcast environment, due to transmission errors caused by fading, packet collision, etc. In this letter, we propose an image transmission technique based on compressed sensing. Through computer simulations, we show that our proposed technique can achieve stable image reconstruction despite frequent packet error.

  • Reproduction of Four-Leg Animal Gaits Using a Coupled System of Simple Hardware CPG Models

    Hayate KOJIMA  Yoshinobu MAEDA  Taishin NOMURA  

     
    LETTER

      Vol:
    E98-A No:2
      Page(s):
    508-509

    We proposed a hard-wired CPG hardware network to reproduce the gaits of four-legged animals. It should reproduce walking and bounding, and they should be switchable with each other by changing the value of only one voltage.

  • Extension of Parallel Combinatory Multicode Transmission with Constant-Amplitude Signaling and Its Theoretical Analysis

    Tatsuya OHTA  Kouji OHUCHI  

     
    PAPER

      Vol:
    E98-A No:2
      Page(s):
    528-536

    A multicode transmission (MC) system can transmit multiple data streams at one time. However, the amplitude of the transmission signal has sharp fluctuations. To avoid this problem, constant amplitude (CA) signaling schemes were studied, and some MC systems were developed such as the MC system with CA signaling (MC-CA) and the parallel combinatory MC system with CA signaling (PCMC-CA). In this paper, extension systems of PCMC-CA system are developed. In particular, two demodulation methods are discussed for the extension systems. Then, the bit error rate (BER) and data transmission rate are theoretically analyzed. The results shows that the extension systems has a better performance than the MC-CA system in both of the BER and data transmission rate.

  • Hybrid Station Aided Coexistence Scheme between Wireless PANs and Wireless LAN

    Fumihiro INOUE  Takayuki NISHIO  Masahiro MORIKURA  Koji YAMAMOTO  Fusao NUNO  Takatoshi SUGIYAMA  

     
    PAPER

      Vol:
    E98-A No:2
      Page(s):
    578-588

    The problem of coexistence between IEEE 802.11g based wireless LANs (WLANs) and IEEE 802.15.4 based wireless personal area networks (WPANs) in the 2.4GHz band is an important issue for the operation of a home energy management system (HEMS) for smart grids. This paper proposes a coexistence scheme that is called a Hybrid station aided coexistence (HYSAC) scheme to solve this problem. This scheme employs a hybrid-station (H-STA) that possesses two types of network device functions. The scheme improves the data transmission quality of the WPAN devices which transmit energy management information such as power consumption. The proposed HYSAC scheme employs WLAN control frames, which are used to assign WPAN system traffic resources. Moreover, we propose a coexistence method to achieve excellent WLAN throughput where multiple WPANs coexist with a WLAN. We theoretically derive the performance of the proposed scheme by considering the QoS support in WLAN and show that the results of the simulation and theoretical analysis are in good agreement. The numerical results show that the HYSAC scheme decreases the beacon loss rate of WPAN to less than 1% when the WLAN system consists of 10 STAs under saturated traffic conditions. Furthermore, the WLAN throughput of the proposed synchronization method is shown to be 30.6% higher than that of the HYSAC scheme without synchronization when the WLAN that consists of 10 STAs coexists with four WPANs.

  • Improved Iterative Receiver for Co-channel Interference Suppression in MIMO-OFDM Systems

    Zhiting YAN  Guanghui HE  Weifeng HE  Zhigang MAO  

     
    LETTER-Communication Theory and Signals

      Vol:
    E98-A No:2
      Page(s):
    776-782

    Co-channel interference (CCI) is becoming a challenging factor that causes performance degradation in modern communication systems. The receiver equipped with multiple antennas can suppress such interference by exploiting spatial correlation. However, it is difficult to estimate the spatial covariance matrix (SCM) of CCI accurately with limited number of known symbols. To address this problem, this paper first proposes an improved SCM estimation method by shrinking the variance of eigenvalues. In addition, based on breadth-first tree search schemes and improved channel updating, a low complexity iterative detector is presented with channel preprocessing, which not only considers the existence of CCI but also reduces the computational complexity in terms of visited nodes in a search tree. Furthermore, by scaling the extrinsic soft information which is fed back to the input of detector, the detection performance loss due to max-log approximation is compensated. Simulation results show that the proposed iterative receiver provides improved signal to interference ratio (SIR) gain with low complexity, which demonstrate the proposed scheme is attractive in practical implementation.

  • Enhanced Photocurrent Generation at a Spiro-OMeTAD/AuNPs-TiO2 Interface with Grating-coupled Surface Plasmon Excitation

    Hathaithip NINSONTI  Kazuma HARA  Supeera NOOTCHANAT  Weerasak CHOMKITICHAI  Akira BABA  Sukon PHANICHPHANT  Kazunari SHINBO  Keizo KATO  Futao KANEKO  

     
    PAPER

      Vol:
    E98-C No:2
      Page(s):
    104-109

    The fabrication of a grating structure formed by a solid-state electrolyte layer on a dye-TiO$_{2}$ film by the nanoimprinting technique using a polydimethylsiloxane (PDMS) stamp and its application in photoelectric conversion devices are described. The PDMS grating pattern is imprinted from blu-ray disc recordable. A silver electrode was deposited on the patterned solid-state electrolyte layers. Surface plasmon resonance (SPR) excitation was observed in the fabricated solar cells by irradiation with white light. The photoelectric conversion properties were measured to study the effect of the two types of SPR excitations, i.e., the propagating surface plasmon on the Ag grating surface and the localized surface plasmon from the Au nanoparticles on TiO$_{2}$.

  • A Graph-Theory-Based Algorithm for Euler Number Computing

    Lifeng HE  Bin YAO  Xiao ZHAO  Yun YANG  Yuyan CHAO  Atsushi OHTA  

     
    LETTER-Pattern Recognition

      Pubricized:
    2014/11/10
      Vol:
    E98-D No:2
      Page(s):
    457-461

    This paper proposes a graph-theory-based Euler number computing algorithm. According to the graph theory and the analysis of a mask's configuration, the Euler number of a binary image in our algorithm is calculated by counting four patterns of the mask. Unlike most conventional Euler number computing algorithms, we do not need to do any processing of the background pixels. Experimental results demonstrated that our algorithm is much more efficient than conventional Euler number computing algorithms.

  • The Implementation of Texture-Based Video Up-Scaling on Coarse-Grained Reconfigurable Architecture

    Rui SHI  Shouyi YIN  Leibo LIU  Qiongbing LIU  Shuang LIANG  Shaojun WEI  

     
    PAPER-Application

      Pubricized:
    2014/11/19
      Vol:
    E98-D No:2
      Page(s):
    276-287

    Video Up-scaling is a hotspot in TV display area; as an important brunch of Video Up-scaling, Texture-Based Video Up-scaling (TBVU) method shows great potential of hardware implementation. Coarse-grained Reconfigurable Architecture (CGRA) is a very promising processor; it is a parallel computing platform which provides high performance of hardware, high flexibility of software, and dynamical reconfiguration ability. In this paper we propose an implementation of TBVU on CGRA. We fully exploit the characters of TBVU and utilize several techniques to reduce memory I/O operation and total execution time. Experimental results show that our work can greatly reduce the I/O operation and the execution time compared with the non-optimized ones. We also compare our work with other platforms and find great advantage in execution time and resource utilization rate.

  • Iterative Channel Estimation and Decoding via Spatial Coupling

    Shuhei HORIO  Keigo TAKEUCHI  Tsutomu KAWABATA  

     
    PAPER

      Vol:
    E98-A No:2
      Page(s):
    549-557

    For low-density parity-check codes, spatial coupling was proved to boost the performance of iterative decoding up to the optimal performance. As an application of spatial coupling, in this paper, bit-interleaved coded modulation (BICM) with spatially coupled (SC) interleaving — called SC-BICM — is considered to improve the performance of iterative channel estimation and decoding for block-fading channels. In the iterative receiver, feedback from the soft-in soft-out decoder is utilized to refine the initial channel estimates in linear minimum mean-squared error (LMMSE) channel estimation. Density evolution in the infinite-code-length limit implies that the SC-BICM allows the receiver to attain accurate channel estimates even when the pilot overhead for training is negligibly small. Furthermore, numerical simulations show that the SC-BICM can provide a steeper reduction in bit error rate than conventional BICM, as well as a significant improvement in the so-called waterfall performance for high rate systems.

  • VisualTextualRank: An Extension of VisualRank to Large-Scale Video Shot Extraction Exploiting Tag Co-occurrence

    Nga H. DO  Keiji YANAI  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E98-D No:1
      Page(s):
    166-172

    In this paper, we propose a novel ranking method called VisualTextualRank which ranks media data according to the relevance between the data and specified keywords. We apply our method to the system of video shot ranking which aims to automatically obtain video shots corresponding to given action keywords from Web videos. The keywords can be any type of action such as “surfing wave” (sport action) or “brushing teeth” (daily activity). Top ranked video shots are expected to be relevant to the keywords. While our baseline exploits only visual features of the data, the proposed method employs both textual information (tags) and visual features. Our method is based on random walks over a bipartite graph to integrate visual information of video shots and tag information of Web videos effectively. Note that instead of treating the textual information as an additional feature for shot ranking, we explore the mutual reinforcement between shots and textual information of their corresponding videos to improve shot ranking. We validated our framework on a database which was used by the baseline. Experiments showed that our proposed ranking method, VisualTextualRank, improved significantly the performance of the system of video shot extraction over the baseline.

  • Hidden Credential Retrieval, Revisited

    SeongHan SHIN  Kazukuni KOBARA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:1
      Page(s):
    428-433

    Hidden Credential Retrieval (HCR) protocols are designed for access credentials management where users who remember short passwords can retrieve his/her various credentials (access keys and tokens) with the help of a remote storage server over insecure networks (e.g., the Internet). In this paper, we revisit two HCR protocols, both of which are based on blind signature schemes: one (we call it B-HCR) was proposed in ASIACCS 2009 and the other (we call it MRS-HCR) was in WISA 2010. In particular, we show that the B-HCR protocol is insecure against an outside attacker who impersonates server S. Specifically, the attacker can find out the user's password pw with off-line dictionary attacks by eavesdropping the communications between the user and a third-party online service provider. Also, we show that the MRS-HCR protocol does not work correctly itself. In other words, user U can not retrieve the plaintext Msg (i.e., credentials) even if he/she has a knowledge of the password.

  • An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting

    Junghyun NAM  Kim-Kwang Raymond CHOO  Juryon PAIK  Dongho WON  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:1
      Page(s):
    424-427

    Although password-only authenticated key exchange (PAKE) in the three-party setting has been widely studied in recent years, it remains a challenging area of research. A key challenge in designing three-party PAKE protocols is to prevent insider dictionary attacks, as evidenced by the flaws discovered in many published protocols. In this letter, we revisit Abdalla and Pointcheval's three-party PAKE protocol from FC 2005 and demonstrate that this protocol, named 3PAKE, is vulnerable to a previously unpublished insider offline dictionary attack. Our attack is dependant on the composition of 3PAKE and the higher-level protocol that uses the established session key.

  • Blind Residual CFO Estimation under Single Data Block for Uplink Interleaved OFDMA

    Ann-Chen CHANG  Chih-Chang SHEN  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:1
      Page(s):
    411-414

    In this letter, an iterative carrier frequency offset (CFO) estimation approach is presented which finds a new CFO vector based on first order Taylor series expansion of the one initially given for interleaved orthogonal frequency division multiple access uplink systems. The problem of finding the new CFO vector is formulated as the closed form of a generalized eigenvalue problem, which allows one to readily solve it. The proposed estimator combined center-symmetric trimmed correlation matrix and orthogonal projection technique, which doesn't require eigenvalue decomposition and it only needs single data block.

  • Dual Pairing Vector Spaces and Their Applications

    Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  

     
    INVITED PAPER

      Vol:
    E98-A No:1
      Page(s):
    3-15

    The concept of dual pairing vector spaces (DPVS) was introduced by Okamoto and Takashima in 2009, and it has been employed in various applications, functional encryption (FE) including attribute-based encryption (ABE) and inner-product encryption (IPE) as well as attribute-based signatures (ABS), generic conversion from composite-order group based schemes to prime-order group based ones and public-key watermarking. In this paper, we show the concept of DPVS, the major applications to FE and the key techniques employed in these applications. This paper presents them with placing more emphasis on plain and intuitive descriptions than formal preciseness.

  • Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing

    Zhangjie FU  Xingming SUN  Qi LIU  Lu ZHOU  Jiangang SHU  

     
    PAPER-Network

      Vol:
    E98-B No:1
      Page(s):
    190-200

    Cloud computing is becoming increasingly popular. A large number of data are outsourced to the cloud by data owners motivated to access the large-scale computing resources and economic savings. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. So how to design an efficient, in the two aspects of accuracy and efficiency, searchable encryption scheme over encrypted cloud data is a very challenging task. In this paper, for the first time, we propose a practical, efficient, and flexible searchable encryption scheme which supports both multi-keyword ranked search and parallel search. To support multi-keyword search and result relevance ranking, we adopt Vector Space Model (VSM) to build the searchable index to achieve accurate search results. To improve search efficiency, we design a tree-based index structure which supports parallel search to take advantage of the powerful computing capacity and resources of the cloud server. With our designed parallel search algorithm, the search efficiency is well improved. We propose two secure searchable encryption schemes to meet different privacy requirements in two threat models. Extensive experiments on the real-world dataset validate our analysis and show that our proposed solution is very efficient and effective in supporting multi-keyword ranked parallel searches.

1781-1800hit(8249hit)