The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

1401-1420hit(2923hit)

  • Hybrid Fault Tolerant Peer to Peer Video Streaming Architecture

    Kasm ÖZTOPRAK  Gözde Bozdai AKAR  

     
    PAPER-Network

      Vol:
    E91-B No:11
      Page(s):
    3627-3638

    In this paper, we propose a fault tolerant hybrid p2p-CDN video streaming arhitecture to overcome the problems caused by peer behavior in peer-to-peer (P2P) video streaming systems. Although there are several studies modeling and analytically investigating peer behaviors in P2P video streaming systems, they do not come up with a solution to guarantee the required Quality of the Services (QoS). Therefore, in this study a hybrid geographical location-time and interest based clustering algorithm is proposed to improve the success ratio and reduce the delivery time of required content. A Hybrid Fault Tolerant Video Streaming System (HFTS) over P2P networks conforming the required QoS and Fault Tolerance is also offered. The simulations indicate that the required QoS can be achieved in streaming video applications using the proposed hybrid approach.

  • Utterance Verification Using Word Voiceprint Models Based on Probabilistic Distributions of Phone-Level Log-Likelihood Ratio and Phone Duration

    Suk-Bong KWON  HoiRin KIM  

     
    LETTER-Speech and Hearing

      Vol:
    E91-D No:11
      Page(s):
    2746-2750

    This paper suggests word voiceprint models to verify the recognition results obtained from a speech recognition system. Word voiceprint models have word-dependent information based on the distributions of phone-level log-likelihood ratio and duration. Thus, we can obtain a more reliable confidence score for a recognized word by using its word voiceprint models that represent the more proper characteristics of utterance verification for the word. Additionally, when obtaining a log-likelihood ratio-based word voiceprint score, this paper proposes a new log-scale normalization function using the distribution of the phone-level log-likelihood ratio, instead of the sigmoid function widely used in obtaining a phone-level log-likelihood ratio. This function plays a role of emphasizing a mis-recognized phone in a word. This individual information of a word is used to help achieve a more discriminative score against out-of-vocabulary words. The proposed method requires additional memory, but it shows that the relative reduction in equal error rate is 16.9% compared to the baseline system using simple phone log-likelihood ratios.

  • Fuzzy Logic-Based Quantized Event Filter for RFID Data Processing

    Sung Ho JANG  Hi Sung CHOUN  Heung Seok CHAE  Jong Sik LEE  

     
    PAPER

      Vol:
    E91-B No:11
      Page(s):
    3560-3568

    RFID event filtering is an important issue of RFID data management. Tag read events from readers have some problems like unreliability, redundancy, and disordering of tag readings. Duplicated events lead to performance degradation of RFID systems with a flood of similar tag information. Therefore, this paper proposes a fuzzy logic-based quantized event filter. In order to reduce duplicated tag readings and solve disordering of tag readings, the filter applies a fuzzy logic system to control a filtering threshold by the change in circumstances of readers. Continuous tag readings are converted into discrete values for event generation by the filtering threshold. And, the filter generates as many events as the discrete values at a point of event generation time. Experimental results comparing the proposed filter with existing RFID event filters, such as the primitive event filter and the smoothing event filter, verify effectiveness and efficiency of the fuzzy logic-based quantized event filter.

  • Routing Autonomous Vehicles in the Improving Initial Task Assignment and Avoiding Deadlock Method

    Yusuke MORIHIRO  Toshiyuki MIYAMOTO  Sadatoshi KUMAGAI  

     
    PAPER

      Vol:
    E91-A No:11
      Page(s):
    3229-3236

    This paper discusses an on-line Tasks Assignment and Routing Problem (TARP) for Autonomous Transportation Systems (ATSs) in manufacturing systems. The TARP is a constrained version of the Pickup and Delivery Problem with Time Windows (PDPTW). In our former study, a cooperative algorithm, called the triple loop method, with autonomous distributed agents has been proposed. The Improving initial Task Assignment and Avoiding Deadlock method (ITAAD) is a faster algorithm than the triple loop method. In this paper, we propose a new vehicle routing method for the ITAAD. Results of computational experiments show effectiveness of the proposed routing method.

  • Observation of Blue-Light Emission from Tantalum Oxide Films Deposited by Radio-Frequency Magnetron Sputtering

    Kenta MIURA  Hiroki MIYAZAKI  Osamu HANAIZUMI  

     
    PAPER

      Vol:
    E91-C No:10
      Page(s):
    1669-1672

    We obtained blue photoluminescence from tantalum oxide films deposited by radio-frequency magnetron sputtering after annealing. The maximum peak intensity of the photoluminescence was observed from a sample annealed at 600 for 20 min, and the peak wavelength was approximately 430 nm. Tantalum oxide films that emit blue light may be useful materials for novel active optical devices utilizing Ta2O5/SiO2 multilayered photonic crystals.

  • Achievements and Challenges in the Design and Production of High Quality Optical Coatings

    Alexander TIKHONRAVOV  Michael TRUBETSKOV  Ichiro KASAHARA  

     
    INVITED PAPER

      Vol:
    E91-C No:10
      Page(s):
    1622-1629

    A new paradigm in the design of optical coatings connected with an outstanding computational efficiency of modern design techniques is discussed. Several other topics including pre-production error analysis, monitoring of coating production, and computational manufacturing of optical coatings are considered.

  • All Pairings Are in a Group

    Chang-An ZHAO  Fangguo ZHANG  Jiwu HUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    3084-3087

    In this paper, we suggest that all pairings are in a group from an abstract angle. Based on the results, some new pairings with the short Miller loop are constructed for great efficiency. It is possible that our observation can be applied into other aspects of pairing-based cryptosystems.

  • A Strip Line Broadside Hybrid Coupler Tolerant to Displacement Error and Thickness Variation in Multi-Layered LTCC Substrate

    Takeshi YUASA  Yukihiro TAHARA  Hideyuki OH-HASHI  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E91-C No:10
      Page(s):
    1684-1689

    A strip line broadside hybrid coupler which is tolerant to manufacturing errors in a multi-layered LTCC substrate has been developed. The tolerance to a displacement error and a thickness variation in the multi-layered LTCC substrate can be achieved by using the tandem arrangement of diagonally shifted coupled lines with adjacent ground walls. It has been demonstrated that the coupling deviation from designed characteristics in our proposed hybrid coupler is very small.

  • An Energy-Aware Multipath Routing Algorithm in Wireless Sensor Networks

    Moonseong KIM  Euihoon JEONG  Young-Cheol BANG  Soyoung HWANG  Changsub SHIN  Gwang-Ja JIN  Bongsoo KIM  

     
    PAPER-Networks

      Vol:
    E91-D No:10
      Page(s):
    2419-2427

    One of the major challenges facing the design of a routing protocol for Wireless Sensor Networks (WSNs) is to find the most reliable path between the source and sink node. Furthermore, a routing protocol for WSN should be well aware of sensor limitations. In this paper, we present an energy efficient, scalable, and distributed node disjoint multipath routing algorithm. The proposed algorithm, the Energy-aware Multipath Routing Algorithm (EMRA), adjusts traffic flows via a novel load balancing scheme. EMRA has a higher average node energy efficiency, lower control overhead, and a shorter average delay than those of well-known previous works. Moreover, since EMRA takes into consideration network reliability, it is useful for delivering data in unreliable environments.

  • Some Results on Primitive Words, Square-Free Words, and Disjunctive Languages

    Tetsuo MORIYA  

     
    LETTER-Automata and Formal Language Theory

      Vol:
    E91-D No:10
      Page(s):
    2514-2516

    In this paper, we give some resuts on primitive words, square-free words and disjunctive languages. We show that for a word u ∈Σ+, every element of λ(cp(u)) is d-primitive iff it is square-free, where cp(u) is the set of all cyclic-permutations of u, and λ(cp(u)) is the set of all primitive roots of it. Next we show that pmqn is a primitive word for every n, m ≥1 and primitive words p, q, under the condition that |p| = |q| and (m, n) ≠ (1, 1). We also give a condition of disjunctiveness for a language.

  • Fabrication of Rugate Optical Filters Using a-SiOx:H Thin Films

    Hidehiko YODA  Koichi MURO  Kazuo SHIRAISHI  

     
    PAPER

      Vol:
    E91-C No:10
      Page(s):
    1639-1643

    Rugate thin film optical filters are useful for designing arbitrary-shaped spectra, such as multistep or triangular spectra. A technique for synthesizing the refractive index distribution of rugate filters was used to suppress unwanted ripples on the spectrum. The refractive index of an amorphous hydrogenated silicon oxide (a-SiOx:H) rugate thin film was minutely controlled with a resolution of 0.001 using radio-frequency (RF) magnetron sputtering. The fabricated rugate filters had multistep bands over a wavelength range of 1260-1670 nm or good linearity over 1290-1650 nm.

  • A Novel Capacity Analysis for Wireless Backhaul Mesh Networks

    Tein-Yaw CHUNG  Kuan-Chun LEE  Hsiao-Chih LEE  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E91-B No:10
      Page(s):
    3395-3398

    This paper derived a closed-form expression for inter-flow capacity of a backhaul wireless mesh network (WMN) with centralized scheduling by employing a ring-based approach. Through the definition of an interference area, we are able to accurately describe a bottleneck collision area for a WMN and calculate the upper bound of inter-flow capacity. The closed-form expression shows that the upper bound is a function of the ratio between transmission range and network radius. Simulations and numerical analysis show that our analytic solution can better estimate the inter-flow capacity of WMNs than that of previous approach.

  • Investigation of Low-Damage Sputter-Deposition of ITO Films on Organic Emission Layer

    Hao LEI  Keisuke ICHIKAWA  Meihan WANG  Yoichi HOSHI  Takayuki UCHIDA  Yutaka SAWADA  

     
    PAPER

      Vol:
    E91-C No:10
      Page(s):
    1658-1662

    The damage to the organic layer of aluminum (III) bis(2-methyl-8-quninolinato)-4-phenylphenolate (BAlq) film was investigated on the basis of the change in photoluminescence (PL) intensity. To suppress the bombardment of the substrate with high-energy particles such as γ-electrons and negative oxygen ions, we used a facing-target sputtering (FTS) system. A marked reduction, however, of the PL intensity of the organic layer was still observed upon the deposition of an indium tin oxide (ITO) film on the organic film. To reduce this reduction, we proposed the insertion of a sector-shaped metal shield near the target electrode, and we showed its effectiveness in reducing the damage. This reduction of the damage is thought to be caused by the elimination of γ-electrons incident to the organic film surface escaping from the target area near the substrate side. We confirmed that high-energy electron bombardment leads to a significant reduction of PL intensity of the organic layer. This indicates that high-energy electrons incident to the organic film surface play a key role in the damage of the organic layer during the sputtering process.

  • Dependability Improvement for PPM Compressed Data by Using Compression Pattern Matching

    Masato KITAKAMI  Toshihiro OKURA  

     
    PAPER-Dependable Computing

      Vol:
    E91-D No:10
      Page(s):
    2435-2439

    Data compression is popularly applied to computer systems and communication systems in order to reduce storage size and communication time, respectively. Since large data are used frequently, string matching for such data takes a long time. If the data are compressed, the time gets much longer because decompression is necessary. Long string matching time makes computer virus scan time longer and gives serious influence to the security of data. From this, CPM (Compression Pattern Matching) methods for several compression methods have been proposed. This paper proposes CPM method for PPM which achieves fast virus scan and improves dependability of the compressed data, where PPM is based on a Markov model, uses a context information, and achieves a better compression ratio than BW transform and Ziv-Lempel coding. The proposed method encodes the context information, which is generated in the compression process, and appends the encoded data at the beginning of the compressed data as a header. The proposed method uses only the header information. Computer simulation says that augmentation of the compression ratio is less than 5 percent if the order of the PPM is less than 5 and the source file size is more than 1 M bytes, where order is the maximum length of the context used in PPM compression. String matching time is independent of the source file size and is very short, less than 0.3 micro seconds in the PC used for the simulation.

  • Indirectly Reactive Sputtering Coater for High Quality Optical Coatings

    Kei-ichi C. NAMIKI  Xinbin CHENG  Haruo TAKAHASHI  

     
    LETTER

      Vol:
    E91-C No:10
      Page(s):
    1673-1674

    An indirectly reactive sputtering coater has been developed to deposit various high quality metallic and metal oxide films at high deposition rate. In this letter, several kinds of filters such as antireflection (AR) coating, IR-cut filter, and Rugate filter were deposited for the benchmark test of implemental capabilities. Our coater was established to be a powerful tool for both discrete multilayer and Rugate filters due to high stability and reproducibility of the refractive index and the deposition rate.

  • Minimum Kullback-Leibler-Based Turbo Multiuser Detector over Decomposition CDMA Signal

    Tuchsanai PLOYSUWAN  Sawat TANTIPHANWADI  Prasit TEEKAPUT  

     
    PAPER-DS-CDMA

      Vol:
    E91-A No:10
      Page(s):
    2963-2972

    In this paper, we develop a new iterative turbo multiuser detector for direct sequence code-division multiple access (DS-CDMA) systems over unknown frequency-selective channels by decomposing the observation signal into a number of signal components. Virtual trellis model representing the ISI channel for each separating signal user is designed to generate extrinsic probability in term of BCJR algorithm for exchange with a single channel decoder as priori information. Minimum kullback-leibler (MKL) framework is derived to calculate numerical channel estimation and extrinsic probability. In comparison with other similar receiver, simulation results demonstrate that the proposed solution achieves the desirable performance.

  • Characteristcs of Ga-Doped ZnO Films Prepared by RF Magnetron Sputtering in Ar+H2 Ambience

    Koichi MUTO  Satoru ODASHIMA  Norimitsu NASU  Osamu MICHIKAMI  

     
    PAPER

      Vol:
    E91-C No:10
      Page(s):
    1649-1652

    Ga-doped ZnO thin films were prepared by RF magnetron sputtering. The effects of adding H2 to pure Ar sputtering gas were investigated. In the case of pure Ar at 2 Pa, the resistivity is 7.4510-3 Ωcm, whereas for Ar+1%H2 at 0.3 Pa, it markedly decreases to 2.5210-4 Ωcm. In this case, the carrier density and Hall mobility are 1.121021 cm-3 and 23.4 cm2/Vs, respectively. This conductive film also exhibits a transmittance of 90% within the visible-wavelength range. The addition of H2 and the decrease in the pressure results in the fabrication of a significantly more transparent and conductive film.

  • Dynamic Bandwidth Allocation Performance for Dual QoS Classes in Resilient Packet Ring

    Yasuyuki OKUMURA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3226-3231

    This paper proposes an improved dynamic bandwidth allocation algorithm for dual Quality of Service (QoS) classes to maximize the utilization rate of the Resilient Packet Ring (RPR). To achieve dynamic bandwidth allocation for the two QoS classes in the RPR, each node measures the high priority traffic flow and assigns the appropriate bandwidth; the remaining bandwidth is used for low priority traffic. It passes a control frame containing the measured bandwidth of the high priority traffic to the other nodes. Based on the advertised high priority traffic bandwidth, any node that is congested transmits, to the other nodes, a fairness message to fairly allocate the remaining low priority bandwidth. Simulations demonstrate that the proposed algorithm enhances the utilization rate and reduces the delay of high priority frames.

  • Strongly Secure Linear Network Coding

    Kunihiko HARADA  Hirosuke YAMAMOTO  

     
    PAPER-Information Theory

      Vol:
    E91-A No:10
      Page(s):
    2720-2728

    In a network with capacity h for multicast, information Xh=(X1, X2, , Xh) can be transmitted from a source node to sink nodes without error by a linear network code. Furthermore, secret information Sr=(S1, S2, , Sr) can be transmitted securely against wiretappers by k-secure network coding for k h-r. In this case, no information of the secret leaks out even if an adversary wiretaps k edges, i.e. channels. However, if an adversary wiretaps k+1 edges, some Si may leak out explicitly. In this paper, we propose strongly k-secure network coding based on strongly secure ramp secret sharing schemes. In this coding, no information leaks out for every (Si1, Si2, ,Sir-j) even if an adversary wiretaps k+j channels. We also give an algorithm to construct a strongly k-secure network code directly and a transform to convert a nonsecure network code to a strongly k-secure network code. Furthermore, some sufficient conditions of alphabet size to realize the strongly k-secure network coding are derived for the case of k < h-r.

  • High-Rate Oblique Deposition of SiO2 Films Using Two Sputtering Sources

    Yoichi HOSHI  Kensuke YAGI  Eisuke SUZUKI  Hao LEI  Akira SAKAI  

     
    PAPER

      Vol:
    E91-C No:10
      Page(s):
    1644-1648

    In this paper, we proposed a new high-rate oblique deposition method using two sputtering sources to obtain SiO2 films for a liquid crystal alignment layer. One sputtering source that operates in a metal mode supplies Si atoms to a substrate, and the other source that operates in an oxide mode supplies oxygen radicals to a substrate. To reduce the gas pressure of a deposition chamber and make the two sputtering sources operate in different modes, the sputtering sources were separated from the deposition chamber with stainless meshes, and Ar and oxygen gases were introduced separately through the two sputtering sources, i.e., Ar gas was introduced through the Si supply source and oxygen gas was introduced through the oxygen radical source. When Ar gas of 30 sccm and oxygen gas of 4 sccm were introduced into the system, the gas pressure of the deposition chamber was maintained below 1.7 mTorr and the films deposited at an incidence angle of more than 70 showed an elongated inclined columnar structure. Under this condition, a deposition rate of 30 nm/min was realized even at an incidence angle above 70, where most of the Si atoms incident to the substrate were supplied by the Si supply source and the oxygen radical source supplied oxygen radicals and promoted the oxidation of the film.

1401-1420hit(2923hit)