The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

801-820hit(2923hit)

  • Multimode Image Clustering Using Optimal Image Descriptor Open Access

    Nasir AHMED  Abdul JALIL  

     
    PAPER

      Vol:
    E97-D No:4
      Page(s):
    743-751

    Manifold learning based image clustering models are usually employed at local level to deal with images sampled from nonlinear manifold. Multimode patterns in image data matrices can vary from nominal to significant due to images with different expressions, pose, illumination, or occlusion variations. We show that manifold learning based image clustering models are unable to achieve well separated images at local level for image datasets with significant multimode data patterns. Because gray level image features used in these clustering models are not able to capture the local neighborhood structure effectively for multimode image datasets. In this study, we use nearest neighborhood quality (NNQ) measure based criterion to improve local neighborhood structure in terms of correct nearest neighbors of images locally. We found Gist as the optimal image descriptor among HOG, Gist, SUN, SURF, and TED image descriptors based on an overall maximum NNQ measure on 10 benchmark image datasets. We observed significant performance improvement for recently reported clustering models such as Spectral Embedded Clustering (SEC) and Nonnegative Spectral Clustering with Discriminative Regularization (NSDR) using proposed approach. Experimentally, significant overall performance improvement of 10.5% (clustering accuracy) and 9.2% (normalized mutual information) on 13 benchmark image datasets is observed for SEC and NSDR clustering models. Further, overall computational cost of SEC model is reduced to 19% and clustering performance for challenging outdoor natural image databases is significantly improved by using proposed NNQ measure based optimal image representations.

  • Spectrum Sharing in MIMO Cognitive Radio Systems with Imperfect Channel State Information

    Samuli TIIRO  Kenta UMEBAYASHI  Janne LEHTOMÄKI  Yasuo SUZUKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:4
      Page(s):
    867-874

    Cognitive radio (CR) systems aim for more efficient spectrum utilization by having so called secondary users (SUs) transmit on a frequency band reserved for licensed primary users (PUs). The secondary transmissions are allowed provided that no harmful interference will be caused to the PUs. SU terminals with multiple antennas can employ transmit power control with transmit precoding in order to control the interference levels. In most of the existing works, perfect channel state information (CSI) is assumed to be available for the SUs. However, in practical systems where perfect CSI is not available, the SUs are not able to guarantee that the interference constraints are sufficiently satisfied. In this paper, we investigate the problem of spectrum sharing for multiantenna CR systems using estimated CSI. Due to the random nature of the estimation error, we set a probabilistic interference constraint and, in order to satisfy it, provide a density function for the interference power. In addition, we present a power control framework for the SU to meet the probabilistic interference constraint.

  • On the Complexity of Computing Discrete Logarithms over Algebraic Tori

    Shuji ISOBE  Eisuke KOIZUMI  Yuji NISHIGAKI  Hiroki SHIZUYA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E97-D No:3
      Page(s):
    442-447

    This paper studies the complexity of computing discrete logarithms over algebraic tori. We show that the order certified version of the discrete logarithm problem over general finite fields (OCDL, in symbols) reduces to the discrete logarithm problem over algebraic tori (TDL, in symbols) with respect to the polynomial-time Turing reducibility. This reduction means that if the prime factorization can be computed in polynomial time, then TDL is equivalent to the discrete logarithm problem over general finite fields with respect to the Turing reducibility.

  • A New Evolutionary Approach to Recommender Systems

    Hyun-Tae KIM  Jinung AN  Chang Wook AHN  

     
    LETTER-Biocybernetics, Neurocomputing

      Vol:
    E97-D No:3
      Page(s):
    622-625

    In this paper, a new evolutionary approach to recommender systems is presented. The aim of this work is to develop a new recommendation method that effectively adapts and immediately responds to the user's preference. To this end, content-based filtering is judiciously utilized in conjunction with interactive evolutionary computation (IEC). Specifically, a fitness-based truncation selection and a feature-wise crossover are devised to make full use of desirable properties of promising items within the IEC framework. Moreover, to efficiently search for proper items, the content-based filtering is modified in cooperation with data grouping. The experimental results demonstrate the effectiveness of the proposed approach, compared with existing methods.

  • Joint Power and Rate Allocation in Cognitive Radio Multicast Networks for Outage Probability Minimization

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:3
      Page(s):
    904-906

    The problem of resource allocation to minimize the outage probability for the secondary user (SU) groups in a cognitive radio (CR) multicast network is investigated. We propose a joint power and rate allocation scheme that provides significant improvement over the conventional scheme in terms of outage probability.

  • Digital Background Calibration for a 14-bit 100-MS/s Pipelined ADC Using Signal-Dependent Dithering

    Zhao-xin XIONG  Min CAI  Xiao-Yong HE  Yun YANG  

     
    PAPER-Electronic Circuits

      Vol:
    E97-C No:3
      Page(s):
    207-214

    A digital background calibration technique using signal-dependent dithering is proposed, to correct the nonlinear errors which results from capacitor mismatches and finite opamp gain in pipelined analog-to-digital converter (ADC). Large magnitude dithers are used to measure and correct both errors simultaneously in background. In the proposed calibration system, the 2.5-bit capacitor-flip-over multiplying digital-to-analog converter (MDAC) stage is modified for the injection of large magnitude dithering by adding six additional comparators, and thus only three correction parameters in every stage subjected to correction were measured and extracted by a simple calibration algorithm with multibit first stage. Behavioral simulation results show that, using the proposed calibration technique, the signal-to-noise-and-distortion ratio improves from 63.3 to 79.3dB and the spurious-free dynamic range is increased from 63.9 to 96.4dB after calibrating the first two stages, in a 14-bit 100-MS/s pipelined ADC with σ=0.2% capacitor mismatches and 60dB nonideal opamp gain. The time of calibrating the first two stages is around 1.34 seconds for the modeled ADC.

  • Wireless Self-Powered Urinary Incontinence Sensor for Disposable Diapers

    Ami TANAKA  Takakuni DOUSEKI  

     
    PAPER

      Vol:
    E97-B No:3
      Page(s):
    587-593

    A self-powered urinary-incontinence sensor with a flexible wire-type urine-activated battery has been developed as an application for wireless biosensor networks. It is disposable and can be embedded in a diaper. The battery consists of two long film-type line electrodes printed on a flexible plastic sheet that abuts the absorbent material of the diaper. It conforms to the shape of the diaper when the diaper is worn. The stress produced by the curvature of the diaper presses the electrodes firmly against the diaper material, providing greater contact with any urine present. Thus, the battery generates more power than when it is flat, as in an unworn diaper. To verify the effectiveness of the battery, we fabricated a battery and a prototype sensor, which consists of an intermittent-power-supply circuit and a wireless transmitter, and embedded the battery in a diaper. The anode of the battery also acts as a wide ground plane for the antenna of the wireless transmitter, which radiates a large amount of power. When 80cc of urine is poured onto the diaper, the battery outputs a voltage of around 1V, which allows the sensor to transmit an ID signal over a distance of 5m every 40 seconds or so.

  • An Efficient Compression of Amplitude-Only Images for the Image Trading System

    Shenchuan LIU  Wannida SAE-TANG  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E97-D No:2
      Page(s):
    378-379

    This letter proposes an efficient compression scheme for the copyright- and privacy-protected image trading system. The proposed scheme multiplies pseudo random signs to amplitude components of discrete cosine transformed coefficients before the inverse transformation is applied. The proposed scheme efficiently compresses amplitude-only image which is the inversely transformed amplitude components, and the scheme simultaneously improves the compression efficiency of phase-only image which is the inversely transformed phase components, in comparison with the conventional systems.

  • Online High-Quality Topic Detection for Bulletin Board Systems

    Jungang XU  Hui LI  Yan ZHAO  Ben HE  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E97-D No:2
      Page(s):
    255-265

    Even with the recent development of new types of social networking services such as microblogs, Bulletin Board Systems (BBS) remains popular for local communities and vertical discussions. These BBS sites have high volume of traffic everyday with user discussions on a variety of topics. Therefore it is difficult for BBS visitors to find the posts that they are interested in from the large amount of discussion threads. We attempt to explore several main characteristics of BBS, including organizational flexibility of BBS texts, high data volume and aging characteristic of BBS topics. Based on these characteristics, we propose a novel method of Online Topic Detection (OTD) on BBS, which mainly includes a representative post selection procedure based on Markov chain model and an efficient topic clustering algorithm with candidate topic set generation based on Aging Theory. Experimental results show that our method improves the performance of OTD in BBS environment in both detection accuracy and time efficiency. In addition, analysis on the aging characteristic of discussion topics shows that the generation and aging of topics on BBS is very fast, so it is wise to introduce candidate topic set generation strategy based on Aging Theory into the topic clustering algorithm.

  • Medium Access Control Design for Cognitive Radio Networks: A Survey

    Nhan NGUYEN-THANH  Anh T. PHAM  Van-Tam NGUYEN  

     
    PAPER

      Vol:
    E97-B No:2
      Page(s):
    359-374

    Designing a medium access control (MAC) protocol is a key for implementing any practical wireless network. In general, a MAC protocol is responsible for coordinating users in accessing spectrum resources. Given that a user in cognitive radio(CR) networks do not have priority in accessing spectrum resources, MAC protocols have to perform dynamic spectrum access (DSA) functions, including spectrum sensing, spectrum access, spectrum allocation, spectrum sharing and spectrum mobility, beside conventional control procedure. As a result, designing MAC protocols for CR networks requires more complicated consideration than that needed for conventional/primary wireless network. In this paper, we focus on two major perspectives related to the design of a CR-MAC protocol: dynamic spectrum access functions and network infrastructure. Five DSA functions are reviewed from the point of view of MAC protocol design. In addition, some important factors related to the infrastructure of a CR network including network architecture, control channel management, the number of radios in the CR device and the number of transmission data channels are also discussed. The remaining challenges and open research issues are addressed for future research to aim at obtaining practical CR-MAC protocols.

  • Cell Clustering Algorithm in Uplink Network MIMO Systems with Individual SINR Constraints

    Sang-Uk PARK  Jung-Hyun PARK  Dong-Jo PARK  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:2
      Page(s):
    698-703

    This letter deals with a new cell clustering problem subject to signal-to-interference-plus-noise-ratio (SINR) constraints in uplink network MIMO systems, where multiple base stations (BSs) cooperate for joint processing as forming a cluster. We first prove that the SINRs of users in a certain cluster always increase monotonically as the cluster size increases when the receiver filter that maximizes the SINR is used. Using this result, we propose an efficient clustering algorithm to minimize the maximum number of cooperative BSs in a cluster. Simulation results show that the maximum number of cooperative BSs minimized by the proposed method is close to that minimized by the exhaustive search and the proposed scheme outperforms the conventional one in terms of the outage probability.

  • Online Learned Player Recognition Model Based Soccer Player Tracking and Labeling for Long-Shot Scenes

    Weicun XU  Qingjie ZHAO  Yuxia WANG  Xuanya LI  

     
    PAPER-Pattern Recognition

      Vol:
    E97-D No:1
      Page(s):
    119-129

    Soccer player tracking and labeling suffer from the similar appearance of the players in the same team, especially in long-shot scenes where the faces and the numbers of the players are too blurry to identify. In this paper, we propose an efficient multi-player tracking system. The tracking system takes the detection responses of a human detector as inputs. To realize real-time player detection, we generate a spatial proposal to minimize the scanning scope of the detector. The tracking system utilizes the discriminative appearance models trained using the online Boosting method to reduce data-association ambiguity caused by the appearance similarity of the players. We also propose to build an online learned player recognition model which can be embedded in the tracking system to approach online player recognition and labeling in tracking applications for long-shot scenes by two stages. At the first stage, to build the model, we utilize the fast k-means clustering method instead of classic k-means clustering to build and update a visual word vocabulary in an efficient online manner, using the informative descriptors extracted from the training samples drawn at each time step of multi-player tracking. The first stage finishes when the vocabulary is ready. At the second stage, given the obtained visual word vocabulary, an incremental vector quantization strategy is used to recognize and label each tracked player. We also perform importance recognition validation to avoid mistakenly recognizing an outlier, namely, people we do not need to recognize, as a player. Both quantitative and qualitative experimental results on the long-shot video clips of a real soccer game video demonstrate that, the proposed player recognition model performs much better than some state-of-the-art online learned models, and our tracking system also performs quite effectively even under very complicated situations.

  • Analysis of Low Grazing Scattering by Dielectric Gratings in Conical Mounting Using Scattering Factors

    Hideaki WAKABAYASHI  Masamitsu ASAI  Keiji MATSUMOTO  Jiro YAMAKITA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E97-C No:1
      Page(s):
    50-57

    In the shadow theory, a new description and a physical mean at a low grazing limit of incidence on gratings in the two dimensional scattering problem have been discussed. In this paper, by applying the shadow theory to the three dimensional problem of multilayered dielectric periodic gratings, we formulate the oblique primary excitation and introduce the scattering factors through our analytical method, by use of the matrix eigenvalues. In terms of the scattering factors, the diffraction efficiencies are defined for propagating and evanescent waves with linearly and circularly polarized incident waves. Numerical examples show that when an incident angle becomes low grazing, only specular reflection occurs with the reflection coefficient -1, regardless of the incident polarization. It is newly found that in a circularly polarized incidence case, the same circularly polarized wave as the incident wave is specularly reflected at a low grazing limit.

  • Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites

    Takeshi YAGI  Junichi MURAYAMA  Takeo HARIU  Sho TSUGAWA  Hiroyuki OHSAKI  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E97-B No:1
      Page(s):
    76-86

    We proposes a method for determining the frequency for monitoring the activities of a malware download site used for malware attacks on websites. In recent years, there has been an increase in attacks exploiting vulnerabilities in web applications for infecting websites with malware and maliciously using those websites as attack platforms. One scheme for countering such attacks is to blacklist malware download sites and filter out access to them from user websites. However, a malware download site is often constructed through the use of an ordinary website that has been maliciously manipulated by an attacker. Once the malware has been deleted from the malware download site, this scheme must be able to unblacklist that site to prevent normal user websites from being falsely detected as malware download sites. However, if a malware download site is frequently monitored for the presence of malware, the attacker may sense this monitoring and relocate that malware on a different site. This means that an attack will not be detected until the newly generated malware download site is discovered. In response to these problems, we clarify the change in attack-detection accuracy caused by attacker behavior. This is done by modeling attacker behavior, specifying a state-transition model with respect to the blacklisting of a malware download site, and analyzing these models with synthetically generated attack patterns and measured attack patterns in an operation network. From this analysis, we derive the optimal monitoring frequency that maximizes the true detection rate while minimizing the false detection rate.

  • Bit-Parallel Cubing Computation over GF(3m) for Irreducible Trinomials

    Sun-Mi PARK  Ku-Young CHANG  Dowon HONG  Changho SEO  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E97-A No:1
      Page(s):
    347-353

    We propose a parallel pth powering method over an arbitrary finite field GF(pm). Using the proposed method, we present the explicit formulae for the computation of cubing over a ternary field GF(3m) which is defined by irreducible trinomials. We show that the field cubing computation for irreducible trinomials, which plays an important role in calculating pairing, can be implemented very efficiently.

  • Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)

    Naoyuki SHINOHARA  Takeshi SHIMOYAMA  Takuya HAYASHI  Tsuyoshi TAKAGI  

     
    PAPER-Foundations

      Vol:
    E97-A No:1
      Page(s):
    236-244

    The security of pairing-based cryptosystems is determined by the difficulty of solving the discrete logarithm problem (DLP) over certain types of finite fields. One of the most efficient algorithms for computing a pairing is the ηT pairing over supersingular curves on finite fields of characteristic 3. Indeed many high-speed implementations of this pairing have been reported, and it is an attractive candidate for practical deployment of pairing-based cryptosystems. Since the embedding degree of the ηT pairing is 6, we deal with the difficulty of solving a DLP over the finite field GF(36n), where the function field sieve (FFS) is known as the asymptotically fastest algorithm of solving it. Moreover, several efficient algorithms are employed for implementation of the FFS, such as the large prime variation. In this paper, we estimate the time complexity of solving the DLP for the extension degrees n=97, 163, 193, 239, 313, 353, and 509, when we use the improved FFS. To accomplish our aim, we present several new computable estimation formulas to compute the explicit number of special polynomials used in the improved FFS. Our estimation contributes to the evaluation for the key length of pairing-based cryptosystems using the ηT pairing.

  • Security of Multivariate Signature Scheme Using Non-commutative Rings

    Takanori YASUDA  Tsuyoshi TAKAGI  Kouichi SAKURAI  

     
    PAPER-Foundations

      Vol:
    E97-A No:1
      Page(s):
    245-252

    Multivariate Public Key Cryptosystems (MPKC) are candidates for post-quantum cryptography. Rainbow is a digital signature scheme in MPKC, whose signature generation and verification are relatively efficient. However, the security of MPKC depends on the difficulty in solving a system of multivariate polynomials, and the key length of MPKC becomes substantially large compared with that of RSA cryptosystems for the same level of security. The size of the secret and public keys in MPKC has been reduced in previous research. The NC-Rainbow is a signature scheme in MPKC, which was proposed in order to reduce the size of secret key of Rainbow. So far, several attacks against NC-Rainbow have been proposed. In this paper, we summarize attacks against NC-Rainbow, containing attacks against the original Rainbow, and analyze the total security of NC-Rainbow. Based on the cryptanalysis, we estimate the security parameter of NC-Rainbow at the several security level.

  • Invariance and Periodic Oversampling in Principal Shift-Invariant Spaces

    Kil Hyun KWON  Dae Gwan LEE  

     
    PAPER-Digital Signal Processing

      Vol:
    E97-A No:1
      Page(s):
    313-321

    We first find simple characterizations of $ rac{1}{N} mathbb{Z}$-invariance of arbitrary principal shift-invariant space $V(phi)$. Then we find several equivalent conditions for $V(phi)$ to admit periodic oversampling for a class of continuous frame generators $phi$. In particular, when $phi$ is band-limited and $hat{phi}$ is piecewise continuous, we find very simple and general sufficient conditions for $V(phi)$ to admit periodic oversampling, which involve the extra invariance of $V(phi)$, together with an illustrating example.

  • Semi-Analytical Method for Performance Analysis of Code-Aided Soft-Information Based Iterative Carrier Phase Recovery

    Nan WU  Hua WANG  Hongjie ZHAO  Jingming KUANG  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E96-B No:12
      Page(s):
    3062-3069

    This paper studies the performance of code-aided (CA) soft-information based carrier phase recovery, which iteratively exploits the extrinsic information from channel decoder to improve the accuracy of phase synchronization. To tackle the problem of strong coupling between phase recovery and decoding, a semi-analytical model is proposed to express the distribution of extrinsic information as a function of phase offset. Piecewise approximation of the hyperbolic tangent function is employed to linearize the expression of soft symbol decision. Building on this model, open-loop characteristic and closed-loop performance of CA iterative soft decision-directed (ISDD) carrier phase synchronizer are derived in closed-form. Monte Carlo simulation results corroborate that the proposed expressions are able to characterize the performance of CA ISDD carrier phase recovery for systems with different channel codes.

  • An Interference-Aware Clustering Based on Genetic Algorithm for Cell Broadcasting Service

    Kyungho JUN  Sekchin CHANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:12
      Page(s):
    2740-2744

    In this letter, we present a novel interference-aware clustering scheme for cell broadcasting service. The proposed approach is based on a genetic algorithm for re-clustering. Using the genetic algorithm, the suggested method efficiently re-clusters the user nodes when the relays fail in receiving the cell broadcasting message from the base station. The simulation results exhibit that the proposed clustering scheme can maintain much higher capacity than the conventional clustering scheme in the cases of relay outage. The re-clustering method based on genetic algorithm also shows lower complexity than the re-clustering approach based on exhaustive search.

801-820hit(2923hit)