The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

661-680hit(2923hit)

  • Discovery of Regular and Irregular Spatio-Temporal Patterns from Location-Based SNS by Diffusion-Type Estimation

    Yoshitatsu MATSUDA  Kazunori YAMAGUCHI  Ken-ichiro NISHIOKA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/06/10
      Vol:
    E98-D No:9
      Page(s):
    1675-1682

    In this paper, a new approach is proposed for extracting the spatio-temporal patterns from a location-based social networking system (SNS) such as Foursquare. The proposed approach consists of the following procedures. First, the spatio-temporal behaviors of users in SNS are approximated as a probabilistic distribution by using a diffusion-type formula. Since the SNS datasets generally consist of sparse check-in's of users at some time points and locations, it is difficult to investigate the spatio-temporal patterns on a wide range of time and space scales. The proposed method can estimate such wide range patterns by smoothing the sparse datasets by a diffusion-type formula. It is crucial in this method to estimate robustly the scale parameter by giving a prior generative model on check-in's of users. The robust estimation enables the method to extract appropriate patterns even in small local areas. Next, the covariance matrix among the time points is calculated from the estimated distribution. Then, the principal eigenfunctions are approximately extracted as the spatio-temporal patterns by principal component analysis (PCA). The distribution is a mixture of various patterns, some of which are regular ones with a periodic cycle and some of which are irregular ones corresponding to transient events. Though it is generally difficult to separate such complicated mixtures, the experiments on an actual Foursquare dataset showed that the proposed method can extract many plausible and interesting spatio-temporal patterns.

  • Target Scattering Coefficients Estimation in Cognitive Radar under Temporally Correlated Target and Multiple Receive Antennas Scenario

    Peng CHEN  Lenan WU  

     
    PAPER-Sensing

      Vol:
    E98-B No:9
      Page(s):
    1914-1923

    In cognitive radar systems (CRSs), target scattering coefficients (TSC) can be utilized to improve the performance of target identification and classification. This work considers the problem of TSC estimation for temporally correlated target. Multiple receive antennas are adopted to receive the echo waveforms, which are interfered by the signal-dependent clutter. Unlike existing estimation methods in time domain, a novel estimation method based on Kalman filtering (KF) is proposed in frequency domain to exploit the temporal TSC correlation, and reduce the complexity of subsequent waveform optimization. Additionally, to minimize the mean square error of estimated TSC at each KF iteration, in contrary to existing works, we directly model the design process as an optimization problem, which is non-convex and cannot be solved efficiently. Therefore, we propose a novel method, similar in some way to semi-definite programming (SDP), to convert the non-convex problem into a convex one. Simulation results demonstrate that the estimation performance can be significantly improved by the KF estimation with optimized waveform.

  • An Inter-Domain Routing Protocol Based on Autonomous Clustering for Heterogeneous Mobile Ad Hoc Networks

    Keisei OKANO  Yuto AOKI  Tomoyuki OHTA  Yoshiaki KAKUDA  

     
    PAPER

      Vol:
    E98-B No:9
      Page(s):
    1768-1776

    A mobile ad hoc network (MANET) consists of mobile wireless terminals without using base stations. MANETs are expected to be utilized for various purposes such as traffic jam information announcements for vehicles and safety confirmation systems in disaster. Each MANET uses unique routing protocols that have been adapted for particular applications. Therefore, utilizing a common routing protocol for multiple MANETs is difficult. In this paper, we propose an Autonomous Clustering-based Inter-Domain Routing protocol to communicate between MANETs. Using the autonomous clustering, the proposed inter-domain routing scheme can change the network gateways between MANETs adaptively according to the network topology changes.

  • Radar HRRP Target Recognition Based on the Improved Kernel Distance Fuzzy C-Means Clustering Method

    Kun CHEN  Yuehua LI  Xingjian XU  

     
    PAPER-Pattern Recognition

      Pubricized:
    2015/06/08
      Vol:
    E98-D No:9
      Page(s):
    1683-1690

    To overcome the target-aspect sensitivity in radar high resolution range profile (HRRP) recognition, a novel method called Improved Kernel Distance Fuzzy C-means Clustering Method (IKDFCM) is proposed in this paper, which introduces kernel function into fuzzy c-means clustering and relaxes the constraint in the membership matrix. The new method finds the underlying geometric structure information hiding in HRRP target and uses it to overcome the HRRP target-aspect sensitivity. The relaxing of constraint in the membership matrix improves anti-noise performance and robustness of the algorithm. Finally, experiments on three kinds of ground HRRP target under different SNRs and four UCI datasets demonstrate the proposed method not only has better recognition accuracy but also more robust than the other three comparison methods.

  • Impact of Mode Filtering on the Performance of Femtosecond Pulse Amplification in a Large Mode Area Fiber

    Junichi HAMAZAKI  Housei MOGI  Norihiko SEKINE  Satoshi ASHIHARA  Akifumi KASAMATSU  Iwao HOSAKO  

     
    PAPER-Optoelectronics

      Vol:
    E98-C No:9
      Page(s):
    928-933

    We experimentally investigated the impact of the mode filtering technique on the performances of pulse amplification in a fiber with a large core diameter. The technique was applied to a femtosecond pulse amplifier, and was based on a large area double-clad Yb-doped fiber. The mode filtering enabled selective excitation of the lowest transverse mode with minimal contamination of higher order modes. The output pulses with 110 fs duration, > 30 nJ pulse energy (> 3 W average power), and clean spatial/temporal profiles were successfully generated. Benefits of this technique are also discussed.

  • Information Centric Networking for Disaster Information Sharing Services

    Zheng WEN  Di ZHANG  Keping YU  Takuro SATO  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1610-1617

    Information Centric Networking (ICN) had merits in terms of mobility, security, power consumption and network traffic. When a large-scale disaster occurred, the current communication system might be fragile and the server based network service might be unavailable due to the damages, network congestions, and power failure, etc. In this paper, we proposed an ICN based Disaster Information Sharing Service (DISS) [1], [2] system. DISS could provide robust information sharing service. Users could publish disaster information as a content message with the help of our DISS. In addition, by utilizing DISS's message naming strategy, users could retrieve disaster information even without a server connection. The ICN based DISS could reduce the probability of network congestion when a large number of simultaneous connections occurring. It could provide server-less service in poor network condition. DISS allows users retrieve disaster information from terminals or ICN nodes. During disasters, sharing information timely and effective could protect people from disaster, ensure people's safety.

  • Constrained Weighted Least Square Filter for Chrominance Recovery of High Resolution Compressed Image

    Takamichi MIYATA  Tomonobu YOSHINO  Sei NAITO  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1718-1726

    Ultra high definition (UHD) imaging systems have attracted much attention as a next generation television (TV) broadcasting service and video streaming service. However, the state of the art video coding standards including H.265/HEVC has not enough compression rate for streaming, broadcasting and storing UHD. Existing coding standard such as H.265/HEVC normaly use RGB-YCbCr color transform before compressing RGB color image since that procedure can decorrelate color components well. However, there is room for improvement on the coding efficiency for color image based on an observation that the luminance and chrominance components changes in same locations. This observation inspired us to propose a new post-processing method for compressed images by using weighted least square (WLS) filter with coded luminance component as a guide image, for refining the edges of chrominance components. Since the computational cost of WLS tends to superlinearly increase with increasing image size, it is difficult to apply it to UHD images. To overcome this problem, we propose slightly overlapped block partitioning and a new variant of WLS (constrained WLS, CWLS). Experimental results of objective quality comparison and subjective assessment test using 4K images show that our proposed method can outperform the conventional method and reduce the bit amount for chrominance component drastically with preserving the subjective quality.

  • An Interference Mitigation Technique for Dynamic TDD Based Frequency-Separated Small Cell Network in LTE-Advanced Based Future Wireless Access

    Hiroki TAKAHASHI  Kazunari YOKOMAKURA  Kimihiko IMAMURA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1436-1446

    This paper investigates an interference mitigation technique for dynamic time division duplex (TDD) based frequency-separated small cell networks in future long term evolution advanced (LTE-A) based wireless access systems. In dynamic TDD, cross-link interference, i.e. evolved node B (eNB)-eNB interference and user equipment (UE)-UE interference, also occur, and eNB-eNB interference in particular significantly degrades the uplink (UL) transmission performance. In order to alleviate the impacts of eNB-eNB interference and to obtain high traffic adaptation gain, we investigate a transmit power control (TPC) based interference mitigation (IM) scheme. In TPC-IM, time-domain subframes are divided into two subframe sets according to whether the cross-link interference can occur or not, and different TPC parameters are applied depending on the type of subframe. To improve of UL signal to interference plus noise power ratio (SINR) in the subframe set with the potential to occur eNB-eNB interference, there are two approaches of UL power boosting and downlink (DL) power reduction. We investigate the adequate combination of these two approaches to avoid an impact of DL performance degradation and increase of UE power consumption. Moreover, we further investigate a combined scheme of the TPC-IM and a cell clustering interference mitigation (CCIM) to avoid the significantly strong cross-link interference from the neighbouring cells. Computer simulation confirms that the proposed TPC-IM scheme can achieve 4.4% and 26.2% gain in the average DL and UL throughputs, respectively, compared to the case without any IM schemes on dynamic TDD. Moreover, when the CCIM is applied to the TPC-IM scheme, 11.6% and 40.3% gain can be achieved in the average DL and UL throughputs, respectively.

  • Locally Important Pattern Clustering Code for Pedestrian Classification

    Young Chul LIM  Minsung KANG  

     
    LETTER-Vision

      Vol:
    E98-A No:8
      Page(s):
    1875-1878

    In this letter, a local pattern coding scheme is proposed to reduce the dimensionality of feature vectors in the local ternary pattern. The proposed method encodes the ternary patterns into a binary pattern by clustering similar ternary patterns. The experimental results show that the proposed method outperforms the previous methods.

  • SURE-LET Poisson Denoising with Multiple Directional LOTs

    Zhiyu CHEN  Shogo MURAMATSU  

     
    PAPER-Image

      Vol:
    E98-A No:8
      Page(s):
    1820-1828

    This paper proposes a Poisson denoising method with a union of directional lapped orthogonal transforms (DirLOTs). DirLOTs are 2-D non-separable lapped orthogonal transforms with directional characteristics under the fixed-critically-subsampling, overlapping, orthonormal, symmetric, real-valued and compact-support property. In this work, DirLOTs are used to generate symmetric orthogonal discrete wavelet transforms and then a redundant dictionary as a union of unitary transforms. The multiple directional property is suitable for representing natural images which contain diagonal textures and edges. Multiple DirLOTs can overcome a disadvantage of separable wavelets in representing diagonal components. In addition to this feature, multiple DirLOTs make transform-based denoising performance better through the redundant representation. Experimental results show that the combination of the variance stabilizing transformation (VST), Stein's unbiased risk estimator-linear expansion of threshold (SURE-LET) approach and multiple DirLOTs is able to significantly improve the denoising performance.

  • Perceptually Optimized Missing Texture Reconstruction via Neighboring Embedding

    Takahiro OGAWA  Miki HASEYAMA  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1709-1717

    Perceptually optimized missing texture reconstruction via neighboring embedding (NE) is presented in this paper. The proposed method adopts the structural similarity (SSIM) index as a measure for representing texture reconstruction performance of missing areas. This provides a solution to the problem of previously reported methods not being able to perform perceptually optimized reconstruction. Furthermore, in the proposed method, a new scheme for selection of the known nearest neighbor patches for reconstruction of target patches including missing areas is introduced. Specifically, by monitoring the SSIM index observed by the proposed NE-based reconstruction algorithm, selection of known patches optimal for the reconstruction becomes feasible even if target patches include missing pixels. The above novel approaches enable successful reconstruction of missing areas. Experimental results show improvement of the proposed method over previously reported methods.

  • Note on Some Recent Cheater Identifiable Secret Sharing Schemes

    Rui XU  Kirill MOROZOV  Tsuyoshi TAKAGI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:8
      Page(s):
    1814-1819

    Harn and Lin proposed an algorithm to detect and identify cheaters in Shamir's secret sharing scheme in the journal Designs, Codes and Cryptography, 2009. In particular, their algorithm for cheater identification is inefficient. We point out that some of their conditions for cheater detection and identification essentially follow from those on error detection/correction of Reed-Solomon codes, which have efficient decoding algorithms, while some other presented conditions turn out to be incorrect. The extended and improved version of the above mentioned scheme was recently presented at the conference International Computer Symposium 2012 (and the journal version appeared in the journal IET Information Security). The new scheme, which is ideal (i.e. the share size is equal to that of the secret), attempts to identify cheaters from minimal number of shares (i.e. the threshold of them). We show that the proposed cheater identification is impossible using the arguments from coding theory.

  • Predicting User Attitude by Using GPS Location Clustering

    Rajashree S. SOKASANE  Kyungbaek KIM  

     
    LETTER-Office Information Systems, e-Business Modeling

      Pubricized:
    2015/05/18
      Vol:
    E98-D No:8
      Page(s):
    1600-1603

    In these days, recognizing a user personality is an important issue in order to support various personalized services. Besides the conventional phone usage such as call logs, SMS logs and application usages, smart phones can gather the behavior of users by polling various embedded sensors such as GPS sensors. In this paper, we focus on how to predict user attitude based on GPS log data by applying location clustering techniques and extracting features from the location clusters. Through the evaluation with one month-long GPS log data, it is observed that the location-based features, such as number of clusters and coverage of clusters, are correlated with user attitude to some extent. Especially, when SVM is used as a classifier for predicting the dichotomy of user attitudes of MBTI, over 90% F-measure is achieved.

  • Securing SOS Messages in Uncommunicable Areas via Information Sharing Cluster

    Louie ZAMORA  Noriyuki SUZUKI  Hiroaki TAKEMOTO  Shigeru KASHIHARA  Suguru YAMAGUCHI  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1618-1626

    A prompt rescue is a serious operation when a catastrophic disaster occurs. In an uncommunicable area where the existing communication systems are damaged, it is, however, difficult to collect SOS messages of victims. So far, we have proposed a smartphone application named SOSCast to collect SOS messages via device-to-device transmission in such an area. However, with the limitation of coverage area and battery consumption, it decreases the possibility of finding the victim due to the risk of losing the SOS messages. In this paper, thus, we propose an information-sharing cluster to virtually extend the communication coverage area and to secure the SOS messages by reducing the battery consumption. In the performance evaluation, compared with the original SOSCast, we showed that the proposed method can reduce battery consumption to secure the message through a prototype system and simulation experiments.

  • White Balancing by Using Multiple Images via Intrinsic Image Decomposition

    Ryo MATSUOKA  Tatsuya BABA  Mia RIZKINIA  Masahiro OKUDA  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2015/05/14
      Vol:
    E98-D No:8
      Page(s):
    1562-1570

    Using a flash/no-flash image pair, we propose a novel white-balancing technique that can effectively correct the color balance of a complex scene under multiple light sources. In the proposed method, by using multiple images of the same scene taken under different lighting conditions, we estimate the reflectance component of the scene and the multiple shading components of each image. The reflectance component is a specific object color which does not depend on scene illumination and the shading component is a shading effect caused by the illumination lights. Then, we achieve white balancing by appropriately correcting the estimated shading components. The proposed method achieves better performance than conventional methods, especially under colored illumination and mixed lighting conditions.

  • Expose Spliced Photographic Basing on Boundary and Noise Features

    Jun HOU  Yan CHENG  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2015/04/01
      Vol:
    E98-D No:7
      Page(s):
    1426-1429

    The paper proposes an algorithm to expose spliced photographs. Firstly, a graph-based segmentation, which defines a predictor to measure boundary evidence between two neighbor regions, is used to make greedy decision. Then the algorithm gets prediction error image using non-negative linear least-square prediction. For each pair of segmented neighbor regions, the proposed algorithm gathers their statistic features and calculates features of gray level co-occurrence matrix. K-means clustering is applied to create a dictionary, and the vector quantization histogram is taken as the result vector with fixed length. For a tampered image, its noise satisfies Gaussian distribution with zero mean. The proposed method checks the similarity between noise distribution and a zero-mean Gaussian distribution, and follows with the local flatness and texture measurement. Finally, all features are fed to a support vector machine classifier. The algorithm has low computational cost. Experiments show its effectiveness in exposing forgery.

  • End-to-End Delay Analysis for IEEE 802.11 String-Topology Multi-Hop Networks

    Kosuke SANADA  Jin SHI  Nobuyoshi KOMURO  Hiroo SEKIYA  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:7
      Page(s):
    1284-1293

    String-topology multi-hop network is often selected as an analysis object because it is one of the fundamental network topologies. The purpose of this paper is to establish expression for end-to-end delay for IEEE 802.11 string-topology multi-hop networks. For obtaining the analytical expression, the effects of frame collisions and carrier-sensing effect from other nodes under the non-saturated condition are obtained for each node in the network. For expressing the properties in non-saturated condition, a new parameter, which is frame-existence probability, is defined. The end-to-end delay of a string-topology multi-hop network can be derived as the sum of the transmission delays in the network flow. The analytical predictions agree with simulation results well, which show validity of the obtained analytical expressions.

  • A Robust Interference Covariance Matrix Reconstruction Algorithm against Arbitrary Interference Steering Vector Mismatch

    Xiao Lei YUAN  Lu GAN  Hong Shu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:7
      Page(s):
    1553-1557

    We address a robust algorithm for the interference-plus-noise covariance matrix reconstruction (RA-INCMR) against random arbitrary steering vector mismatches (RASVMs) of the interferences, which lead to substantial degradation of the original INCMR beamformer performance. Firstly, using the worst-case performance optimization (WCPO) criteria, we model these RASVMs as uncertainty sets and then propose the RA-INCMR to obtain the robust INCM (RINCM) based on the Robust Capon Beamforming (RCB) algorithm. Finally, we substitute the RINCM back into the original WCPO beamformer problem for the sample covariance matrix to formulate the new RA-INCM-WCPO beamformer problem. Simulation results demonstrate that the performance of the proposed beamformer is much better than the original INCMR beamformer when there exist RASVMs, especially at low signal-to-noise ratio (SNR).

  • Strong Security of the Strongly Multiplicative Ramp Secret Sharing Based on Algebraic Curves

    Ryutaroh MATSUMOTO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:7
      Page(s):
    1576-1578

    We introduce a coding theoretic criterion for Yamamoto's strong security of the ramp secret sharing scheme. After that, by using it, we show the strong security of the strongly multiplicative ramp secret sharing proposed by Chen et al. in 2008.

  • Novel Implementation Method of Multiple-Way Asynchronous Arbiters

    Masashi IMAI  Tomohiro YONEDA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E98-A No:7
      Page(s):
    1519-1528

    Multiple-way (N-way) asynchronous arbitration is an important issue in asynchronous system design. In this paper, novel implementation methods of N-way asynchronous arbiters are presented. We first present N-way rectangle mesh arbiters using 2-way mutual exclusion elements. Then, N-way token-ring arbiters based on the non-return-to-zero signaling is also presented. The former can issue grant signals with the same percentage for all the arriving request signals while the latency is proportional to the number of inputs. The latter can achieve low latency and low energy arbitration for a heavy workload environment and a large number of inputs. In this paper, we compare their performances using the 28nm FD-SOI process technologies qualitatively and quantitatively.

661-680hit(2923hit)