The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] POS(1110hit)

721-740hit(1110hit)

  • Subband Adaptive Filtering with Maximal Decimation Using an Affine Projection Algorithm

    Hun CHOI  Sung-Hwan HAN  Hyeon-Deok BAE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E89-B No:5
      Page(s):
    1477-1485

    Affine projection algorithms perform well for acoustic echo cancellation and adaptive equalization. Although these algorithms typically provide fast convergence, they are unduly complex when updating the weights of the associated adaptive filter. In this paper, we propose a new subband affine projection (SAP) algorithm and a facile method for its implementation. The SAP algorithm is derived by combining the affine projection algorithm and the subband adaptive structure with the maximal decimation. In the proposed SAP algorithm, the derived weight-updating formula for the subband adaptive filter has a simple form as compared with the normalized least mean square (NLMS) algorithm. The algorithm gives improved convergence and reduced computational complexity. The efficiency of the proposed algorithm for a colored input signal is evaluated experimentally.

  • Balanced C4-Trefoil Decomposition of Complete Multi-Graphs

    Kazuhiko USHIO  Hideaki FUJIMOTO  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1173-1180

    We show that the necessary and sufficient condition for the existence of a balanced C4-trefoil decomposition of the complete multi-graph λKn is λ(n-1) ≡ 0 (mod 24) and n ≤ 10. Decomposition algorithms are also given.

  • Construction of Classifiers by Iterative Compositions of Features with Partial Knowledge

    Kazuya HARAGUCHI  Toshihide IBARAKI  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1284-1291

    We consider the classification problem to construct a classifier c:{0,1}n{0,1} from a given set of examples (training set), which (approximately) realizes the hidden oracle y:{0,1}n{0,1} describing the phenomenon under consideration. For this problem, a number of approaches are already known in computational learning theory; e.g., decision trees, support vector machines (SVM), and iteratively composed features (ICF). The last one, ICF, was proposed in our previous work (Haraguchi et al., (2004)). A feature, composed of a nonempty subset S of other features (including the original data attributes), is a Boolean function fS:{0,1}S{0,1} and is constructed according to the proposed rule. The ICF algorithm iterates generation and selection processes of features, and finally adopts one of the generated features as the classifier, where the generation process may be considered as embodying the idea of boosting, since new features are generated from the available features. In this paper, we generalize a feature to an extended Boolean function fS:{0,1,*}S{0,1,*} to allow partial knowledge, where * denotes the state of uncertainty. We then propose the algorithm ICF* to generate such generalized features. The selection process of ICF* is also different from that of ICF, in that features are selected so as to cover the entire training set. Our computational experiments indicate that ICF* is better than ICF in terms of both classification performance and computation time. Also, it is competitive with other representative learning algorithms such as decision trees and SVM.

  • Low Complexity MIMO-LDPC CDMA Systems over Multipath Channels

    Yang XIAO  Moon Ho LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:5
      Page(s):
    1713-1717

    This paper proposes a low complexity composite CDMA system based on MIMO (Multiple-Input-Multiple-Output) processing and LDPC (low-density parity-check) codec based a CDMA system, which works well even if the complicated case of multipath, multiusers and short length LDPC codes. To explore the practical application, the mobile user in the composite CDMA systems is with only two antennas and adopts short length irregular LDPC codec, each user's data has been divided two LDPC encoded substreams being sent to two transmitter antennas at base station. Since the LDPC encoded substreams of reaching the mobile user are orthogonal to each other in space and time, the CDMA system performances (BER and SINR) can be improved much, but the multipath may ruin the orthogonalilty. To solve the problems, the paper provides the algorithms of main function modules of transmitter and receivers, gives a simple method to test the girth of LDPC codes, and analyzes the performance of MIMO-LDPC CDMA systems theoretically and experimentally. The simulation results show that the hybrid CDMA systems can have better performance than the conventional CDMA systems based on single transmitted antenna at a base station.

  • Analysis of Automation Surprises in Human-Machine Systems with Time Information

    Masakazu ADACHI  Toshimitsu USHIO  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    1027-1034

    This paper analyzes automation surprises in human-machine systems with time information. Automation surprises are phenomena such that the underlying machine's behavior diverges from user's intention and may lead to critical situations. Thus, designing human-machine systems without automation surprises is one of fundamental issues to achieve reliable user interaction with the machines. In this paper, we focus on timed human-machine interaction and address their formal aspects. The presented framework is essentially an extension of untimed human-machine interaction and will cover the previously proposed methodologies. We employ timed automata as a model of human-machine systems with time information. Modeling the human-machine systems as timed automata enables one to deal with not only discrete behavior but also time constraints. Then, by introducing the concept of timed simulation of the machine model and the user model, conditions which guarantee the nonexistence of automation surprises are derived. Finally, we construct a composite model in which a machine model and a user model evolve concurrently and show that automation surprises can be detected by solving a reachability problem in the composite model.

  • A Code Whose Codeword Length is Shorter than n in Almost All of Sufficiently Large Positive Integers

    Hirofumi NAKAMURA  Sadayuki MURASHIMA  

     
    LETTER-Information Theory

      Vol:
    E89-A No:4
      Page(s):
    1132-1139

    A recursive-type positive integer code is proposed. It prefixes the information about the length of the component of the codeword recursively. It is an asymptotically optimal code. The codeword length for a positive integer n is shorter than n bits in almost all of sufficiently large positive integers, where n is the log-star function.

  • Meta-Modeling Based Version Control System for Software Diagrams

    Takafumi ODA  Motoshi SAEKI  

     
    PAPER

      Vol:
    E89-D No:4
      Page(s):
    1390-1402

    In iterative software development methodology, a version control system is used in order to record and manage modification histories of products such as source codes and models described in diagrams. However, conventional version control systems cannot manage the models as a logical unit because the systems mainly handle source codes. In this paper, we propose a version control technique for handling diagrammatical models as logical units. Then we illustrate the feasibility of our approach with the implementation of version control functions of a meta-CASE tool that is able to generate a modeling tool in order to deal with various diagrams.

  • Known Postfix Based Cell Search Technique for OFDM Cellular Systems

    Younghyun JEON  Jongkyung KIM  Hyunkyu YU  Jonghyung KWUN  Sanghoon LEE  Jongsoo SEO  Daesik HONG  

     
    PAPER-Integrated Systems for Communications

      Vol:
    E89-B No:4
      Page(s):
    1405-1412

    A cell search technique utilizing a known postfix for OFDM (orthogonal frequency division multiplexing) cellular systems is described. The known postfix is generated in the time domain by inserting pilots in the frequency domain and plays the role of the cyclic prefix in general OFDM systems. Since it demonstrates good correlation properties, it can be facilitated to synchronize each symbol with an identified postfix. In this paper, two different known postfixes are allocated to each cell. One is used for cell identification and symbol synchronization, which is designed to be different among neighboring cells. The other is used for frame synchronization and is the same for all cells. In the simulation, the cell search is accomplished with a probability greater than 10-3 at -27 dB in a vehicular channel. Even at -30 dB, the cell search probability is greater than 10-2 in a pedestrian channel as well as 10-3 in the AWGN (additive white gaussian noise) channel.

  • A W-Band Microstrip Composite Right/Left-Handed Leaky Wave Antenna

    Shin-ichiro MATSUZAWA  Kazuo SATO  Shuji ASO  Atushi SANADA  Hiroshi KUBO  

     
    LETTER-Antennas and Propagation

      Vol:
    E89-B No:4
      Page(s):
    1464-1466

    A planar composite right/left-handed leaky wave antenna which operates at W-band is fabricated and its backward to forward beam scanning operation including broadside direction is confirmed experimentally. The scanning angle from 61 to 114 degrees with a frequency scanning range of 76 to 79 GHz is achieved.

  • Separation of Mixed Audio Signals by Decomposing Hilbert Spectrum with Modified EMD

    Md. Khademul Islam MOLLA  Keikichi HIROSE  Nobuaki MINEMATSU  

     
    PAPER-Speech/Audio Processing

      Vol:
    E89-A No:3
      Page(s):
    727-734

    The Hilbert transformation together with empirical mode decomposition (EMD) produces Hilbert spectrum (HS) which is a fine-resolution time-frequency representation of any nonlinear and non-stationary signal. The EMD decomposes the mixture signal into some oscillatory components each one is called intrinsic mode function (IMF). Some modification of the conventional EMD is proposed here. The instantaneous frequency of every real valued IMF component is computed with Hilbert transformation. The HS is constructed by arranging the instantaneous frequency spectra of IMF components. The HS of the mixture signal is decomposed into subspaces corresponding to the component sources. The decomposition is performed by applying independent component analysis (ICA) and Kulback-Leibler divergence based K-means clustering on the selected number of bases derived from HS of the mixture. The time domain source signals are assembled by applying some post processing on the subspaces. We have produced experimental results using the proposed separation technique.

  • Low Computing Post Processing to Suppress Annoying Artifacts of Compressed Video Sequences

    Min-Cheol HONG  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E89-D No:3
      Page(s):
    1214-1220

    In this paper, we introduce a low computing post processing algorithm to simultaneously suppress blocking and ringing artifacts of compressed video sequences. A new regularization function to incorporate smoothness to neighboring pixels is defined, where the function is composed of four sub-functions combined with pixel-based data fidelity and smoothing terms. Therefore, the solution can be obtained without inverse matrix or vector-matrix computation, so that low complexity implementation is possible. In addition, the regularization parameter controlling the relative importance between the data fidelity and the degree of smoothness is estimated from the available overhead information in decoder, such as, macroblock type and quantization step size. The experimental results show the capability and efficiency of the proposed algorithm.

  • Reducing Stopband Peak Errors of R-Regular 4th-Band Linear Phase FIR Filters by Superimposing

    LinnAung PE  Toshinori YOSHIKAWA  Yoshinori TAKEI  Xi ZHANG  Yasunori SUGITA  

     
    LETTER-Digital Signal Processing

      Vol:
    E89-A No:2
      Page(s):
    615-619

    R-regular Mth band filters are an important class of digital filters and are used in constructing Mth-band wavelet filter banks, where the regularity is essential. But this kind of filter has larger stopband peak errors compared with a minimax filter of the same length. In this paper, peak errors in stopband of R-regular 4th-band filters are reduced by means of superimposing two filters with successive regularities. Then the stopband peak errors in the resulting filters are compared with the original ones. The results show that the stopband peak errors are reduced significantly in the synthesized filter that has the same length as the longer one of the two original filters, at the cost of regularity.

  • Channel Estimation with Selective Superimposed Pilot Sequences under Fast Fading Environments

    Fumiaki TSUZUKI  Tomoaki OHTSUKI  

     
    PAPER-Antennas and Propagation

      Vol:
    E89-B No:2
      Page(s):
    556-563

    Recently, superimposed pilot channel estimation has been proposed for wireless communications, where the pilot symbol sequence is superimposed on a data symbol sequence and transmitted together, and thus there is no drop in information rate. In this scheme, the receiver correlates the received signal sequence with the pilot symbol sequence, and obtains the channel estimate. However, the correlation between the pilot symbol sequence and the data symbol sequence deteriorates the channel estimation accuracy. The use of the longer frame leads to the lower correlation, but also to the lower channel tracking capability. In this paper, we propose a selective superimposed pilot channel estimation scheme with selecting a pilot sequence that has a low correlation with a data symbol sequence from the set of the pilot sequences assigned to the transmitter. Note that the superimposed channel estimation scheme with one pilot sequence assigned to the transmitter is the conventional superimposed channel estimation scheme. We show that the proposed channel estimation scheme is superior to the conventional superimposed channel estimation scheme (pilot sequence = 1). We also show that the proposed channel estimation scheme can achieve the good channel estimate even under fast fading environments. Moreover, we show that the proposed channel estimation scheme is superior to the pilot assisted channel estimation scheme, although pilot symbol power is a deterioration factor in the proposed channel estimation scheme.

  • Preparation of Double-Sided YBCO Films on LaAlO3 by MOD Using Commercially Available Coating Solution

    Takaaki MANABE  Jun Hyun AHN  Iwao YAMAGUCHI  Mitsugu SOHMA  Wakichi KONDO  Ken-ichi TSUKADA  Kunio KAMIYA  Susumu MIZUTA  Toshiya KUMAGAI  

     
    PAPER

      Vol:
    E89-C No:2
      Page(s):
    186-190

    The 5-cm-diameter double-sided YBa2Cu3O7 (YBCO) films were prepared by metal organic deposition (MOD) using a commercially available metal-naphthenate coating solution. Firstly, YBCO film was prepared by MOD on one side of a double-side-polished 5-cm-diameter LaAlO3 substrate. Secondly, another side was similarly coated with YBCO by MOD. After the latter processing, degradation of average Jc value in the first side was not observed; but the fluctuation of critical current density Jc slightly increased. The double-sided YBCO films showed average Jc values of 0.8-1.0 MA/cm2 at 77 K and microwave surface resistances Rs(12 GHz) of 0.86-1.07 mΩ at 70 K.

  • Partial Key Exposure Attacks on Unbalanced RSA with the CRT

    Hee Jung LEE  Young-Ho PARK  Taekyoung KWON  

     
    LETTER-Information Security

      Vol:
    E89-A No:2
      Page(s):
    626-629

    In RSA public-key cryptosystem, a small private key is often preferred for efficiency but such a small key could degrade security. Thus the Chinese Remainder Theorem (CRT) is tactically used, especially in time-critical applications like smart cards. As for using the CRT in RSA, care must be taken to resist partial key exposure attacks. While it is common to choose two distinct primes with similar size in RSA, May has shown that a composite modulus N can be factored in the balanced RSA with the CRT of half of the least (or most) significant bits of a private key is revealed with a small public key. However, in the case that efficiency is more critical than security, such as smart cards, unbalanced primes might be chosen. Thus, we are interested in partial key exposure attacks to the unbalanced RSA with the CRT. In this paper, we obtain the similar results as the balanced RSA. We show that in the unbalanced RSA if the N1/4 least (or most) significant bits are revealed, a private key can be recovered in polynomial time under a small public key.

  • ECA Rule-Based Workflow Modeling and Implementation for Service Composition

    Lin CHEN  Minglu LI  Jian CAO  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    624-630

    Changes in recent business and scientific environment have created a necessity for more efficient and effective workflow infrastructure. With increasing emphasis on Service-oriented architecture, service composition becomes a hot topic in workflow research. This paper proposes a novel approach of using ECA rules to realize the workflow modeling and implementation for service composition. First of all, the concept and formalization of ECA rule-based workflow is presented. Special activities and data structures are customized for the purpose of service composition. Second, an automatic event composition and decomposition algorithm is developed to ensure the correctness and validness of service composition at design time. Finally, the proposed ECA rule-based approach for service composition is illustrated through the implementation of a workflow prototype system.

  • Audio Narrowcasting and Privacy for Multipresent Avatars on Workstations and Mobile Phones

    Owen Noel Newton FERNANDO  Kazuya ADACHI  Uresh DUMINDUWARDENA  Makoto KAWAGUCHI  Michael COHEN  

     
    PAPER

      Vol:
    E89-D No:1
      Page(s):
    73-87

    Our group is exploring interactive multi- and hypermedia, especially applied to virtual and mixed reality multimodal groupware systems. We are researching user interfaces to control source→sink transmissions in synchronous groupware (like teleconferences, chatspaces, virtual concerts, etc.). We have developed two interfaces for privacy visualization of narrowcasting (selection) functions in collaborative virtual environments (CVES): for a workstation WIMP (windows/icon/menu/pointer) GUI (graphical user interface), and for networked mobile devices, 2.5- and 3rd-generation mobile phones. The interfaces are integrated with other CVE clients, interoperating with a heterogeneous multimodal groupware suite, including stereographic panoramic browsers and spatial audio backends & speaker arrays. The narrowcasting operations comprise an idiom for selective attention, presence, and privacy-- an infrastructure for rich conferencing capability.

  • Realization of 3 m Semi Anechoic Chamber by Using Hybrid EM Wave Absorber Consisting of Composite Magnetic Material

    Hiroshi KURIHARA  Motonari YANAGAWA  Yoshikazu SUZUKI  Toshifumi SAITO  

     
    LETTER

      Vol:
    E89-C No:1
      Page(s):
    69-71

    This letter proposes the thinnest hybrid EM wave absorber using a composite magnetic material, which can be applied to the 3 m semi anechoic chambers. We experimentally designed a new hybrid EM wave absorber of the wedge shape, which was made from the ferrite powder, the inorganic fiber and binder. As a result, the length of this absorber could be realized only 6 cm, which was ascertained having the nonflammable. The 3 m semi anechoic chamber is constructed in the size of L9 mW6 mH5.7 m using this absorber, and then the site attenuation is measured according to ANSI C63.4 in the frequency range of 30 MHz-1 GHz. As a result, the measured normalized site attenuation is obtained within 3 dB to the theoretical normalized site attenuation.

  • Multi-Matcher On-Line Signature Verification System in DWT Domain

    Isao NAKANISHI  Hiroyuki SAKAMOTO  Naoto NISHIGUCHI  Yoshio ITOH  Yutaka FUKUI  

     
    PAPER-Information Hiding

      Vol:
    E89-A No:1
      Page(s):
    178-185

    This paper presents a multi-matcher on-line signature verification system which fuses the verification scores in pen-position parameter and pen-movement angle one at total decision. Features of pen-position and pen-movement angle are extracted by the sub-band decomposition using the Discrete Wavelet Transform (DWT). In the pen-position, high frequency sub-band signals are considered as individual features to enhance the difference between a genuine signature and its forgery. On the other hand, low frequency sub-band signals are utilized as features for suppressing the intra-class variation in the pen-movement angle. Verification is achieved by the adaptive signal processing using the extracted features. Verification scores in the pen-position and the pen-movement angle are integrated by using a weighted sum rule to make total decision. Experimental results show that the fusion of pen-position and pen-movement angle can improve verification performance.

  • A Universally Composable Secure Channel Based on the KEM-DEM Framework

    Waka NAGAO  Yoshifumi MANABE  Tatsuaki OKAMOTO  

     
    PAPER-Public Key Cryptography

      Vol:
    E89-A No:1
      Page(s):
    28-38

    As part of ISO standards on public-key encryption, Shoup introduced the framework of KEM (Key Encapsulation Mechanism), and DEM (Data Encapsulation Mechanism), for formalizing and realizing one-directional hybrid encryption; KEM is a formalization of asymmetric encryption specified for key distribution, which DEM is a formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, that uses KEM and DEM, while KEM supports distribution of a session key and DEM, along with the session key, is used for multiple bi-directional encrypted transactions in a session. This paper shows that KEM, which is semantically secure against adaptively chosen ciphertext attacks (IND-CCA2), and DEM, which is semantically secure against adaptively chosen plaintext/ciphertext attacks (IND-P2-C2), along with secure signatures and ideal certification authority are sufficient to realize a universally composable (UC) secure channel. To obtain the main result, this paper also shows several equivalence results: UC KEM, IND-CCA2 KEM and NM-CCA2 (non-malleable against CCA2) KEM are equivalent, and UC DEM, IND-P2-C2 DEM and NM-P2-C2 DEM are equivalent.

721-740hit(1110hit)