The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

1981-2000hit(2923hit)

  • Robust Speaker Identification System Based on Multilayer Eigen-Codebook Vector Quantization

    Ching-Tang HSIEH  Eugene LAI  Wan-Chen CHEN  

     
    PAPER

      Vol:
    E87-D No:5
      Page(s):
    1185-1193

    This paper presents some effective methods for improving the performance of a speaker identification system. Based on the multiresolution property of the wavelet transform, the input speech signal is decomposed into various frequency subbands in order not to spread noise distortions over the entire feature space. For capturing the characteristics of the vocal tract, the linear predictive cepstral coefficients (LPCC) of the lower frequency subband for each decomposition process are calculated. In addition, a hard threshold technique for the lower frequency subband in each decomposition process is also applied to eliminate the effect of noise interference. Furthermore, cepstral domain feature vector normalization is applied to all computed features in order to provide similar parameter statistics in all acoustic environments. In order to effectively utilize all these multiband speech features, we propose a modified vector quantization as the identifier. This model uses the multilayer concept to eliminate the interference among the multiband speech features and then uses the principal component analysis (PCA) method to evaluate the codebooks for capturing a more detailed distribution of the speaker's phoneme characteristics. The proposed method is evaluated using the KING speech database for text-independent speaker identification. Experimental results show that the recognition performance of the proposed method is better than those of the vector quantization (VQ) and the Gaussian mixture model (GMM) using full-band LPCC and mel-frequency cepstral coefficients (MFCC) features in both clean and noisy environments. Also, a satisfactory performance can be achieved in low SNR environments.

  • Design of a Differential Electromagnetic Transducer for Use in IME System

    Byung-Seop SONG  Min-Kyu KIM  Young-Ho YOON  Sang-Heun LEE  Jin-Ho CHO  

     
    PAPER-Speech and Hearing

      Vol:
    E87-D No:5
      Page(s):
    1231-1237

    A differential electromagnetic transducer (DET) was implemented using micro electro mechanical system (MEMS) technology for use in an implantable middle ear (IME) system. The DET is designed to have good vibration efficiency and structure that can't be interfered by the external environmental magnetic field. In order to preserve the uniform vibration performance, the MEMS technology was introduced to manufacture the elastic membrane using polyimide that is softer than silicon. Using the finite element analysis (FEA), vibration characteristics are simulated and designed so that the resonance frequency of the membrane is closed to that of the middle ear. The results of the vibration experiments of the developed DET showed excellent results. We implemented the IME system using a DET and implanted it into a dog. This showed the IME system performed well in a living body.

  • Non-Supersingular Elliptic Curves for Pairing-Based Cryptosystems

    Taiichi SAITO  Fumitaka HOSHINO  Shigenori UCHIYAMA  Tetsutaro KOBAYASHI  

     
    LETTER

      Vol:
    E87-A No:5
      Page(s):
    1203-1205

    This paper provides methods for construction of pairing-based cryptosystems based on non-supersingular elliptic curves.

  • Handover with Proactive Anchor Router Relocation and Data Buffering

    Shin-ichi ISOBE  Atsushi IWASAKI  Ken IGARASHI  Masami YABUSAKI  

     
    PAPER-Mobility Management

      Vol:
    E87-B No:5
      Page(s):
    1193-1201

    This paper proposes "Handover with Proactive Anchor Router Relocation and Data Buffering" to suppress packet loss and packet miss-ordering during handover. To prevent packet miss-ordering, anchor router is proactively relocated to the optimal position before the mobile terminal performs handover. And, to eliminate packet loss during handover, anchor router buffers the packet only during handover. Moreover, anchor router assigns sequential numbers to the buffered packets to eliminate duplicate packet reception. Simulation results show that our proposal eliminates packet miss-ordering and duplicate reception while preventing packet loss.

  • Non-closure Property of One-Pebble Turing Machines with Sublogarithmic Space

    Atsuyuki INOUE  Akira ITO  Katsushi INOUE  

     
    LETTER

      Vol:
    E87-A No:5
      Page(s):
    1185-1188

    This paper investigates closure properties of one-pebble Turing machines with sublogarithmic space. It shows that for any function log log n L(n) = o(log n), neither of the classes of languages accepted by L(n) space-bounded deterministic and self-verifying nondeterministic one-pebble Turing machines is closed under concatenation, Kleene closure, and length-preserving homomorphism.

  • Complexity Analysis of the Cryptographic Primitive Problems through Square-Root Exponent

    Chisato KONOMA  Masahiro MAMBO  Hiroki SHIZUYA  

     
    LETTER

      Vol:
    E87-A No:5
      Page(s):
    1083-1091

    To examine the computational complexity of cryptographic primitives such as the discrete logarithm problem, the factoring problem and the Diffie-Hellman problem, we define a new problem called square-root exponent, which is a problem to compute a value whose discrete logarithm is a square root of the discrete logarithm of a given value. We analyze reduction between the discrete logarithm problem modulo a prime and the factoring problem through the square-root exponent. We also examine reductions among the computational version and the decisional version of the square-root exponent and the Diffie-Hellman problem and show that the gap between the computational square-root exponent and the decisional square-root exponent partially overlaps with the gap between the computational Diffie-Hellman and the decisional Diffie-Hellman under some condition.

  • Hybrid MOM-Immittance Approach for Full-Wave Characterization of Printed Strips and Slots in Layered Waveguide and Its Applications

    Rakhesh Singh KSHETRIMAYUM  Lei ZHU  

     
    PAPER-General Methods, Materials, and Passive Circuits

      Vol:
    E87-C No:5
      Page(s):
    700-707

    A hybrid method-of-moments (MoM) and immittance approach for efficient and accurate analysis of printed slots and strips of arbitrary shape in layered waveguide for various applications has been proposed. An impedance-type MoM is formulated from the electric field integral equation (EFIE) for printed strip case and an admittance-type MoM is formulated from the magnetic field integral equation (MFIE) for the printed slot case, using the Galerkin's technique. Immittance approach has been used to calculate spectral dyadic Green's functions for the layered waveguide. For efficient analysis of large and complex structures, equivalent circuit parameters of a block are first extracted and complete structure is analyzed through cascaded ABCD matrices. The equivalent circuit characterization of printed strip and slot in layered waveguide has been done for the first time. Finite periodic structure loaded with printed strips has been investigated and it shows the electromagnetic bandgap (EBG) behavior. The electromagnetic (EM) program hence developed is checked for its numerical accuracy and efficiency with results generated with High-frequency structure simulator (HFSS) and shows good performance.

  • An Adaptive Fingerprint-Sensing Scheme for a User Authentication System with a Fingerprint Sensor LSI

    Hiroki MORIMURA  Satoshi SHIGEMATSU  Toshishige SHIMAMURA  Koji FUJII  Chikara YAMAGUCHI  Hiroki SUTO  Yukio OKAZAKI  Katsuyuki MACHIDA  Hakaru KYURAGI  

     
    PAPER-Integrated Electronics

      Vol:
    E87-C No:5
      Page(s):
    791-800

    This paper describes an adaptive fingerprint-sensing scheme for a user authentication system with a fingerprint sensor LSI to obtain high-quality fingerprint images suitable for identification. The scheme is based on novel evaluation indexes of fingerprint-image quality and adjustable analog-to-digital (A/D) conversion. The scheme adjusts dynamically an A/D conversion range of the fingerprint sensor LSI while evaluating the image quality during real-time fingerprint-sensing operation. The evaluation indexes pertain to the contrast and the ridgelines of a fingerprint image. The A/D conversion range is adjusted by changing quantization resolution and offset. We developed a fingerprint sensor LSI and a user authentication system to evaluate the adaptive fingerprint-sensing scheme. The scheme obtained a fingerprint image suitable for identification and the system achieved an accurate identification rate with 0.36% of the false rejection rate (FRR) at 0.075% of the false acceptance rate (FAR). This confirms that the scheme is very effective in achieving accurate identification.

  • A New Post-Filtering Algorithm for Residual Acoustic Echo Cancellation in Hands-Free Mobile Application

    Sangki KANG  Seong-Joon BAEK  

     
    LETTER

      Vol:
    E87-B No:5
      Page(s):
    1266-1269

    We consider a new post-filtering algorithm for residual acoustic echo cancellation in hands-free application. The new post-filtering algorithm is composed of AR analysis, pitch prediction, and noise reduction algorithm. The residual acoustic echo is whitened via AR analysis and pitch prediction during no near-end talker period and then is cancelled by noise reduction algorithm. By removing speech characteristics of the residual acoustic echo, noise reduction algorithm reduces the power of the residual acoustic echo as well as the ambient noise. For the hands-free application in the moving car, the proposed system attenuated the interferences more than 15 dB at a constant speed of 80 km/h.

  • A New Visual Cryptographic Scheme Using Latin Squares

    Avishek ADHIKARI  Mausumi BOSE  

     
    LETTER

      Vol:
    E87-A No:5
      Page(s):
    1198-1202

    Combinatorial designs are normally used to construct visual cryptographic schemes. For such schemes two parameters are very important viz. pixel expansion and contrast. Optimizing both is a very hard problem. The schemes having optimal contrast tend to use a high pixel expansion. The focus of the paper is to construct schemes for which pixel expansion is modest and the contrast is close to optimality. Here the tool is latin squares that haven't been used earlier for this purpose.

  • Effect of a New Channel Assignment Strategy on Multihop Wireless Networks

    Futoshi TASAKI  Fumito UTA  Hiroshi TAMURA  Masakazu SENGOKU  Shoji SHINODA  

     
    PAPER-Ad-hoc Network

      Vol:
    E87-B No:5
      Page(s):
    1095-1103

    Recently, the mulitihop wireless network system attracts the interest of many people as a communication network system of the next generation. The multihop wireless network has unique features in which neither base stations nor wired backbone networks are required and a terminal can communicate with the other terminal beyond the transmission range by multihopping. In this network, a communication link between two terminals which can communicate directly is required a channel. Since cochannel interference may occur, we need to assign channels to communication links carefully. In this paper, we describe a channel assignment strategy which takes the degree of cochannel interference into consideration, and we evaluate an effectiveness of this strategy by computer simulations. We show that this strategy is more effective than a strategy which does not take the degree of cochannel interference into consideration. And we also consider a few channel assignment algorithms briefly.

  • Performance Evaluation of K Shortest Path Algorithms in MPLS Traffic Engineering

    Guangyi LIU  Yang YANG  Xiaokang LIN  

     
    LETTER-Fundamental Theories

      Vol:
    E87-B No:4
      Page(s):
    1007-1011

    A number of on-line and off-line algorithms for load balancing on multiple paths for MPLS (MultiProtocol Label Switching) traffic engineering have now been proposed, in which it is always assumed that sets of LSPs (Label Switched Path) have already been established between node pairs. While how to choose these paths is an important issue in traffic engineering, it has not been well studied yet. In this paper, we attempt to fill in this gap. As the shortest paths are always preferred in routing problems, we evaluate several k shortest path algorithms from the viewpoint of bandwidth use efficiency and the number of the found paths. Extensive simulations have been performed in different kinds of topologies to factor out effects of network characteristics on these algorithms' path calculation performances. It is found out that the performances of the evaluated algorithms are limited in some cases and the design of new algorithms for the path calculation problem is worth studying in the future.

  • Circuit Partition and Reordering Technique for Low Power IP Design

    Kun-Lin TSAI  Shanq-Jang RUAN  Chun-Ming HUANG  Edwin NAROSKA  Feipei LAI  

     
    PAPER

      Vol:
    E87-C No:4
      Page(s):
    613-620

    Circuit partition, retiming and state reordering techniques are effective in reducing power consumption of circuits. In this paper, we propose a partition architecture and a methodology to reduce power consumption when designing low power IP, named PRC (Partition and Reordering Circuit). The circuit reordering synthesis flow consists of three phases: first, evenly partition the circuit based on the Shannon expansion; secondly encode the output vectors of each partition to build an equivalent functional logic. Finally, apply reordering algorithm to reorganize the logic function to reduce power consumption and decrease area cost. The validity of our architecture is proven by applying it to MCNC benchmark with simulation environment.

  • Adaptive Beamforming to Overcome Coherent Interferences and Steering Errors

    Jin-Hee JO  Sung-Hoon MOON  Dong-Seog HAN  Myeong-Je CHO  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:4
      Page(s):
    873-879

    A sequentially and linearly constrained minimum variance beamformer (SLCMV), based on a split polarity transformation (SPT) and, called an SPT-SLCMV beamformer, is proposed to minimize the degree of freedom loss, steering error, and a desired signal elimination phenomenon under coherent interferences. The SPT-SLCMV beamformer reduces the degree of freedom loss, which is inevitable in the conventional SPT-LCMV beamformer, by successively applying sub-constraint matrices. Sub-constraint matrices are derived from a complete constraint matrix to remove the correlation between the desired signal and interferences. In addition, the SPT-SLCMV beamformer is combined with the iterative steering error correction method to reduce the steering error between the look direction of the beamformer and the incident angle of the desired signal. As a result, the proposed beamformer reduces the number of array elements while maintaining the performance of an exactly steered SPT-LCMV beamformer having sufficient array elements under coherent interferences.

  • Flexible Resource Allocation with Partial Resource Sharing and Minimum Overflow for Integrated Services

    Felipe A. CRUZ-PEREZ  Lauro ORTIGOZA-GUERRERO  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:4
      Page(s):
    826-837

    Flexible Resource Allocation (FRA) strategies selectively control the transmission rates of users allowing them to specify maximum and minimum bandwidth requirements for the service type requested ensuring a minimum quality of service (QoS) is met. Complete, Partial, and Non Resource Sharing are the three types of resource sharing policies that can be used in systems with integrated services (voice, video and data) with different QoS and elasticities requirements. In this paper, an FRA strategy with Partial Resource Sharing, called Primary Unavailable Secondary Minimum (PUSMin), is presented. An analytical method is developed to assess its performance in an environment where several service types (with different bandwidth and elasticities requirements) exist. Results show that PUSMin decreases the resource reassignment rate as the offered traffic increases. This decreases the signalling overhead and computational complexity in the Base Station Controller (BSC) or Base Transceiver Station (BTS).

  • Independent Component Analysis for Color Indexing

    Xiang-Yan ZENG  Yen-Wei CHEN  Zensho NAKAO  Jian CHENG  Hanqing LU  

     
    PAPER-Pattern Recognition

      Vol:
    E87-D No:4
      Page(s):
    997-1003

    Color histograms are effective for representing color visual features. However, the high dimensionality of feature vectors results in high computational cost. Several transformations, including singular value decomposition (SVD) and principal component analysis (PCA), have been proposed to reduce the dimensionality. In PCA, the dimensionality reduction is achieved by projecting the data to a subspace which contains most of the variance. As a common observation, the PCA basis function with the lowest frquency accounts for the highest variance. Therefore, the PCA subspace may not be the optimal one to represent the intrinsic features of data. In this paper, we apply independent component analysis (ICA) to extract the features in color histograms. PCA is applied to reduce the dimensionality and then ICA is performed on the low-dimensional PCA subspace. The experimental results show that the proposed method (1) significantly reduces the feature dimensions compared with the original color histograms and (2) outperforms other dimension reduction techniques, namely the method based on SVD of quadratic matrix and PCA, in terms of retrieval accuracy.

  • Using Nearest Neighbor Rule to Improve Performance of Multi-Class SVMs for Face Recognition

    Sung-Wook PARK  Jong-Wook PARK  

     
    LETTER-Multimedia Systems

      Vol:
    E87-B No:4
      Page(s):
    1053-1057

    The classification time required by conventional multi-class SVMs greatly increases as the number of pattern classes increases. This is due to the fact that the needed set of binary class SVMs gets quite large. In this paper, we propose a method to reduce the number of classes by using nearest neighbor rule (NNR) in the principle component analysis and linear discriminant analysis (PCA+LDA) feature subspace. The proposed method reduces the number of face classes by selecting a few classes closest to the test data projected in the PCA+LDA feature subspace. Results of experiment show that our proposed method has a lower error rate than nearest neighbor classification (NNC) method. Though our error rate is comparable to the conventional multi-class SVMs, the classification process of our method is much faster.

  • Experimental Study of Non-specular Wave Scattering from Building Surface Roughness for the Mobile Propagation Modeling

    Hary BUDIARTO  Kenshi HORIHATA  Katsuyuki HANEDA  Jun-ichi TAKADA  

     
    PAPER-Antenna and Propagation

      Vol:
    E87-B No:4
      Page(s):
    958-966

    In the urban area, buildings are the main scatterer which dominate the mobile propagation characteristics. However, reflection, diffraction, and scattering on the building surfaces in the radio environment induce undesirable multipath propagation. Multipath prediction with respect to a building surface has been conventionally based on an assumption that reflection from the surface has a substantial specular direction. However non-specular scattering from the building surface can affect the channel characteristics as well as specular scattering. This paper presents multipath characteristics of non-specular wave scattering from building surface roughness based on the experimental results. Superresolution method was applied as an approach to handle the signal parameters (DoA, ToA) of the individual incoming waves reflected from building surface roughness. The results show that the multipaths can be detected at many scatterers, such as ground, window's glass, window's frames and bricks surface, as well as directly from the transmitter. Most of the scattered waves are arriving closely from specular directions. The measured reflection coefficients were well bounded by reflection coefficients of the theoretically smooth and random rough surface. The Fresnel reflection coefficient formula, considering the finite thickness of the building surface and Gaussian scattering correction, give better prediction for glass and bricks reflection coefficient measurement.

  • Formalizing Refactoring by Using Graph Transformation

    Hiroshi KAZATO  Minoru TAKAISHI  Takashi KOBAYASHI  Motoshi SAEKI  

     
    PAPER-Metrics, Test, and Maintenance

      Vol:
    E87-D No:4
      Page(s):
    855-867

    Refactoring is one of the promising techniques for improving software design by means of behavior-preserving structural transformation, and is widely taken into practice. In particular, it is frequently applied to design models represented with UML such as class diagrams. However, since UML design models includes multiple diagrams which are closely related from various views, to get behavior-preserving property, we should get the other types of design information and should handle with the propagation of the change on a diagram to the other diagrams. For example, to refactor a class diagram, we need behavioral information of methods included in the class and should also refactor diagrams which represent the behavior, such as state diagrams, activity diagrams. In this paper, we introduce refactoring on design models as transformations of a graph described by UML class diagram and action semantics. First, we define basic transformations of design models that preserve the behavior of designed software, and compose them into refactoring operations. We use Object Constraint Language (OCL) to specify when we can apply a refactoring operation. Furthermore we implement our technique on a graph transformation system AGG to support the automation of refactoring, together with evaluation mechanism of OCL expressions. Some illustrations are presented to show its effectiveness. The work is the first step to handle with refactoring on UML design models in integrated way.

  • Transformation between Scenarios from Different Viewpoints

    HongHui ZHANG  Atsushi OHNISHI  

     
    PAPER-Requirement Engineering

      Vol:
    E87-D No:4
      Page(s):
    801-810

    Scenarios that describe concrete situations of software operation play an important role in software development and especially in requirements engineering. Scenario details should vary in content when described from different viewpoints, but this presents a difficulty, because an informal scenario from one viewpoint can not easily be transformed into a scenario from another viewpoint with consistency and assurance. This paper describes (1) a language for describing scenarios in which simple action traces are embellished to include typed frames based on a simple case grammar of actions, and (2) a method to accomplish the transformation between scenarios from different viewpoints based on the scenario description language.

1981-2000hit(2923hit)