The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

1441-1460hit(2923hit)

  • An Efficient Bottom-up Filtering of XML Messages by Exploiting the Postfix Commonality of XPath Queries

    Jaehoon KIM  Youngsoo KIM  Seog PARK  

     
    PAPER-Contents Technology and Web Information Systems

      Vol:
    E91-D No:8
      Page(s):
    2124-2133

    Recently, for more efficient filtering of XML data, YFilter system has been suggested to exploit the prefix commonalities that exist among path expressions. Sharing the prefix commonality gives the benefit of improving filtering performance through the tremendous reduction in filtering machine size. However, exploiting the postfix commonality can also be useful for an XML filtering situation. For example, when a stream of XML messages does not have any defined schema, or users cannot remember the defined schema exactly, users often use the partial matching path queries which begins with the descendant axis ("//"), e.g., '//science/article/title', '//entertainment/article/title', and '//title'. If so, the registered XPath queries are most likely to have the postfix commonality, e.g., the sample queries share the partial path expressions 'article/title' and 'title'. Therefore, in this paper, we introduce a bottom-up filtering approach exploiting the postfix commonality against the top-down approach of YFilter exploiting the prefix commonality. Some experimental results show that our method has better filtering performance when registered XPath queries mainly consist of the partial matching path queries with the postfix commonality.

  • Simple Detection Ordering in Successive Interference Cancellation for OFDM Systems in Doubly Selective Channels

    Dongmin LIM  Jinhwan KOH  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:8
      Page(s):
    2744-2747

    In this letter, we propose a simple detection ordering which can be applied to successive interference cancellation in low-complexity equalization of OFDM in doubly selective channels. Since the detection ordering can be determined solely on the basis of pilot symbol arrangement, the proposed scheme can lead to a significant performance improvement without additional complexity on the premise that pilot symbols are employed primarily for channel estimation.

  • 3D Precise Inspection of Terminal Lead for Electronic Devices by Single Camera Stereo Vision

    Takashi WATANABE  Akira KUSANO  Takayuki FUJIWARA  Hiroyasu KOSHIMIZU  

     
    PAPER

      Vol:
    E91-D No:7
      Page(s):
    1885-1892

    It is very important to guarantee the quality of the industrial products by means of visual inspection. In order to reduce the soldering defect with terminal deformation and terminal burr in the manufacturing process, this paper proposes a 3D visual inspection system based on a stereo vision with single camera. It is technically noted that the base line of this single camera stereo was precisely calibrated by the image processing procedure. Also to extract the measuring point coordinates for computing disparity; the error is reduced with original algorithm. Comparing its performance with that of human inspection using industrial microscope, the proposed 3D inspection could be an alternative in precision and in processing cost. Since the practical specification in 3D precision is less than 1 pixel and the experimental performance was around the same, it was demonstrated by the proposed system that the soldering defect with terminal deformation and terminal burr in inspection, especially in 3D inspection, was decreased. In order to realize the inline inspection, this paper will suggest how the human inspection of the products could be modeled and be implemented by the computer system especially in manufacturing process.

  • Fabrication and Characterization of Active and Sequential Circuits Utilizing Schottky-Wrap-Gate-Controlled GaAs Hexagonal Nanowire Network Structures

    Hong-Quan ZHAO  Seiya KASAI  Tamotsu HASHIZUME  Nan-Jian WU  

     
    PAPER-Emerging Devices

      Vol:
    E91-C No:7
      Page(s):
    1063-1069

    For realization of hexagonal BDD-based digital systems, active and sequential circuits including inverters, flip flops and ring oscillators are designed and fabricated on GaAs-based hexagonal nanowire networks controlled by Schottky wrap gates (WPGs), and their operations are characterized. Fabricated inverters show comparatively high transfer gain of more than 10. Clear and correct operation of hexagonal set-reset flip flops (SR-FFs) is obtained at room temperature. Fabricated hexagonal D-type flip flop (D-FF) circuits integrating twelve WPG field effect transistors (FETs) show capturing input signal by triggering although the output swing is small. Oscillatory output is successfully obtained in a fabricated 7-stage hexagonal ring oscillator. Obtained results confirm that a good possibility to realize practical digital systems can be implemented by the present circuit approach.

  • On NoC Bandwidth Sharing for the Optimization of Area Cost and Test Application Time

    Fawnizu Azmadi HUSSIN  Tomokazu YONEDA  Hideo FUJIWARA  

     
    PAPER-Dependable Computing

      Vol:
    E91-D No:7
      Page(s):
    1999-2007

    Current NoC test scheduling methodologies in the literature are based on a dedicated path approach; a physical path through the NoC routers and interconnects are allocated for the transportation of test data from an external tester to a single core during the whole duration of the core test. This approach unnecessarily limits test concurrency of the embedded cores because a physical channel bandwidth is typically larger than the scan rate of any core-under-test. We are proposing a bandwidth sharing approach that divides the physical channel bandwidth into multiple smaller virtual channel bandwidths. The test scheduling is performed under the objective of co-optimizing the wrapper area cost and the resulting test application time using two complementary NoC wrappers. Experimental results showed that the area overhead can be optimized (to an extent) without compromising the test application time. Compared to other NoC scheduling approaches based on dedicated paths, our bandwidth sharing approach can reduce the test application time by up to 75.4%.

  • A Single Camera Motion Capture System for Human-Computer Interaction

    Ryuzo OKADA  Bjorn STENGER  

     
    PAPER

      Vol:
    E91-D No:7
      Page(s):
    1855-1862

    This paper presents a method for markerless human motion capture using a single camera. It uses tree-based filtering to efficiently propagate a probability distribution over poses of a 3D body model. The pose vectors and associated shapes are arranged in a tree, which is constructed by hierarchical pairwise clustering, in order to efficiently evaluate the likelihood in each frame. A new likelihood function based on silhouette matching is proposed that improves the pose estimation of thinner body parts, i.e. the limbs. The dynamic model takes self-occlusion into account by increasing the variance of occluded body-parts, thus allowing for recovery when the body part reappears. We present two applications of our method that work in real-time on a Cell Broadband EngineTM: a computer game and a virtual clothing application.

  • Enhanced Link-Status Detection for High Speed Link Aggregation in Cognitive Radio Networks

    Stefan AUST  Peter DAVIS  Akira YAMAGUCHI  Sadao OBANA  

     
    PAPER

      Vol:
    E91-A No:7
      Page(s):
    1609-1615

    The aggregation of Wi-Fi links has been identified as one way of taking advantage of available channels to achieve higher speed data transmission in future cognitive radio networks. However variations in link quality make it difficult to achieve stable performance from aggregated Wi-Fi links. In this paper we present a method for controlling aggregation of Wi-Fi links based on monitoring of link status. We first discuss the requirements for detecting bad-links which degrade the performance of aggregated Wi-Fi links. We then describe the implementation of an enhanced link-status detection algorithm based on monitoring of signal strength and number of retransmissions. In particular, we address the problems of monitoring and recovering links after they have been dropped from use, and adjusting decision thresholds to adapt to changing wireless conditions. Finally, we report the results of tests which demonstrate the effectiveness for attaining efficient aggregation of Wi-Fi links for high throughput under varying wireless conditions.

  • Low Complexity Dual-Mode Pulse Generator Designs

    Jin-Fa LIN  Yin-Tsung HWANG  Ming-Hwa SHEU  

     
    LETTER-Circuit Theory

      Vol:
    E91-A No:7
      Page(s):
    1812-1815

    Two novel low complexity dual-mode pulse generator designs suitable for FFs with triggering mode control are presented. The proposed designs successfully integrate XOR/OR (AND/XNOR) functions into a unified pass transistor logic (PTL) module to provide control on single- or double-edge operations. The designs use as few as 8 transistors each and ingeniously avoid the signal degradation problem inherent in most PTL circuits. As the only dual-mode designs so far, the proposed designs also outperform rival single-mode designs in both aspects of circuit complexity and power consumption.

  • Estimating Anomality of the Video Sequences for Surveillance Using 1-Class SVM

    Kyoko SUDO  Tatsuya OSAWA  Kaoru WAKABAYASHI  Hideki KOIKE  Kenichi ARAKAWA  

     
    PAPER

      Vol:
    E91-D No:7
      Page(s):
    1929-1936

    We have proposed a method to detect and quantitatively extract anomalies from surveillance videos. Using our method, anomalies are detected as patterns based on spatio-temporal features that are outliers in new feature space. Conventional anomaly detection methods use features such as tracks or local spatio-temporal features, both of which provide insufficient timing information. Using our method, the principal components of spatio-temporal features of change are extracted from the frames of video sequences of several seconds duration. This enables anomalies based on movement irregularity, both position and speed, to be determined and thus permits the automatic detection of anomal events in sequences of constant length without regard to their start and end. We used a 1-class SVM, which is a non-supervised outlier detection method. The output from the SVM indicates the distance between the outlier and the concentrated base pattern. We demonstrated that the anomalies extracted using our method subjectively matched perceived irregularities in the pattern of movements. Our method is useful in surveillance services because the captured images can be shown in the order of anomality, which significantly reduces the time needed.

  • Energy Efficient Online Routing Algorithm for QoS-Sensitive Sensor Networks

    Sungwook KIM  Sungyong PARK  Sooyong PARK  Sungchun KIM  

     
    LETTER-Network

      Vol:
    E91-B No:7
      Page(s):
    2401-2404

    In this letter, we propose a new energy efficient online routing algorithm for QoS-sensitive sensor networks. An important design principle underlying our algorithm is online decision making based on real time network estimation. This on-line approach gives adaptability and flexibility to solve a wide range of control tasks for efficient network performance. In addition, our distributed control paradigm is practical for real sensor network management. Simulation results indicate the superior performance of our algorithm between energy efficiency and QoS provisioning.

  • Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme

    Fagen LI  Shijie ZHOU  Rong SUN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:7
      Page(s):
    1820-1823

    In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. Recently, Wang and Cao proposed an identity based proxy multi-signature scheme along with a security model. Although they proved that their scheme is secure under this model, we disprove their claim and show that their scheme is not secure.

  • Security Analysis of a Variant of Self-Shrinking Generator

    Dong Hoon LEE  Je Hong PARK  Jae Woo HAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:7
      Page(s):
    1824-1827

    A variant of the self-shrinking generator (SSG) proposed at ICISC 2006, which we call SSG-XOR, was claimed to have better cryptographic properties than SSG in a practical setting. It was also claimed that SSG-XOR will be more secure than SSG. But we show that SSG-XOR has no advantage over SSG from the viewpoint of practical cryptanalysis, especially the guess-and-determine attack.

  • Fuzzy Adaptive Partitioning Method for the Statistical Filtering

    Sang Ryul KIM  Hae Young LEE  Tae Ho CHO  

     
    LETTER-Networks

      Vol:
    E91-D No:7
      Page(s):
    2065-2067

    This paper presents a fuzzy partitioning method that adaptively divides a global key pool into multiple partitions by a fuzzy logic in the statistical filtering-based sensor networks. Compared to the original statistical filtering scheme, the proposed method is more resilient against node compromise.

  • 55-mW, 1.2-V, 12-bit, 100-MSPS Pipeline ADCs for Wireless Receivers

    Tomohiko ITO  Daisuke KUROSE  Takeshi UENO  Takafumi YAMAJI  Tetsuro ITAKURA  

     
    PAPER

      Vol:
    E91-C No:6
      Page(s):
    887-893

    For wireless receivers, low-power 1.2-V 12-bit 100-MSPS pipeline ADCs are fabricated in 90-nm CMOS technology. To achieve low-power dissipation at 1.2 V without the degradation of SNR, the configuration of 2.5 bit/stage is employed with an I/Q amplifier sharing technique. Furthermore, single-stage pseudo-differential amplifiers are used in a Sample-and-Hold (S/H) circuit and a 1st Multiplying Digital-to-Analog Converter (MDAC). The pseudo-differential amplifier with two-gain-stage transimpedance gain-boosting amplifiers realizes high DC gain of more than 90 dB with low power. The measured SNR of the 100-MSPS ADC is 66.7 dB at 1.2-V supply. Under that condition, each ADC dissipates only 55 mW.

  • Low-Complexity Parallel Systolic Montgomery Multipliers over GF(2m) Using Toeplitz Matrix-Vector Representation

    Chiou-Yng LEE  

     
    PAPER-Circuit Theory

      Vol:
    E91-A No:6
      Page(s):
    1470-1477

    In this paper, a generalized Montgomery multiplication algorithm in GF(2m) using the Toeplitz matrix-vector representation is presented. The hardware architectures derived from this algorithm provide low-complexity bit-parallel systolic multipliers with trinomials and pentanomials. The results reveal that our proposed multipliers reduce the space complexity of approximately 15% compared with an existing systolic Montgomery multiplier for trinomials. Moreover, the proposed architectures have the features of regularity, modularity, and local interconnection. Accordingly, they are well suited to VLSI implementation.

  • Ka-Band Triangular Patch Antenna on Micromachined High-k Substrate

    Preeti SHARMA  Shiban K. KOUL  Sudhir CHANDRA  

     
    LETTER-Antennas and Propagation

      Vol:
    E91-B No:6
      Page(s):
    2073-2076

    This letter reports a high-performance Ka-band equilateral triangular microstrip patch (ETMP) antenna suspended on a thin dielectric membrane. The membrane is released using a silicon bulk-micromachining technique. A set of closed-form expressions to calculate the resonant frequency of the proposed antenna on the micromachined substrate is also presented. The measured performance of the antenna structure is verified using the finite element method (FEM) based Agilent High Frequency Structure Simulator (version 5.5). The fabricated antenna exhibited a wide -10 dB return loss bandwidth of 1.2 GHz at 35.4 GHz. The measured antenna cross-polarization level is less than -15 dB in both the E- and H-planes.

  • Electromagnetic Waves on Partially Finite Periodic Arrays of Lossless or Lossy Penetrable Spheres

    Robert A. SHORE  Arthur D. YAGHJIAN  

     
    PAPER-Electromagnetics

      Vol:
    E91-B No:6
      Page(s):
    1819-1824

    An exact computable expression is obtained for the electromagnetic field of a three-dimensional partially finite periodic array of lossless or lossy magnetodielectric spheres illuminated by a plane wave propagating parallel to the array axis. The array is finite in the direction of the array axis and is of infinite extent in the directions transverse to the array axis. Illustrative numerical examples are presented.

  • Interactive Cosmetic Makeup of a 3D Point-Based Face Model

    Jeong-Sik KIM  Soo-Mi CHOI  

     
    PAPER-Interface Design

      Vol:
    E91-D No:6
      Page(s):
    1673-1680

    We present an interactive system for cosmetic makeup of a point-based face model acquired by 3D scanners. We first enhance the texture of a face model in 3D space using low-pass Gaussian filtering, median filtering, and histogram equalization. The user is provided with a stereoscopic display and haptic feedback, and can perform simulated makeup tasks including the application of foundation, color makeup, and lip gloss. Fast rendering is achieved by processing surfels using the GPU, and we use a BSP tree data structure and a dynamic local refinement of the facial surface to provide interactive haptics. We have implemented a prototype system and evaluated its performance.

  • Suppression of Undesired Reflection Using a Spatial Filtering on Bistatic Radar Cross Section Measurements within a Near Zone

    Hiroyoshi YAMAZAKI  Kohji KOSHIJI  

     
    LETTER-Sensing

      Vol:
    E91-B No:6
      Page(s):
    2077-2080

    Spatial filtering is a useful method to suppress undesired reflection from unwanted scatters in Radar Cross Section (RCS) measurements. Actually, it is difficult to prepare an ideal field which satisfies the far-field criterion for RCS measurements of large targets. We applied the filtering method to a bistatic RCS measurement in a near field and investigated the validity of that method by varying the scanning angular span. Electromagnetic simulations show that predicted RCS profiles from near-field data with unwanted scatters closely matched far-field reference data of the test target. In conclusion, the results show that the method is effective for bistatic RCS measurements in practical field enviroments.

  • Tone Recognition of Continuous Mandarin Speech Based on Tone Nucleus Model and Neural Network

    Xiao-Dong WANG  Keikichi HIROSE  Jin-Song ZHANG  Nobuaki MINEMATSU  

     
    PAPER-Pattern Recognition

      Vol:
    E91-D No:6
      Page(s):
    1748-1755

    A method was developed for automatic recognition of syllable tone types in continuous speech of Mandarin by integrating two techniques, tone nucleus modeling and neural network classifier. The tone nucleus modeling considers a syllable F0 contour as consisting of three parts: onset course, tone nucleus, and offset course. Two courses are transitions from/to neighboring syllable F0 contours, while the tone nucleus is intrinsic part of the F0 contour. By viewing only the tone nucleus, acoustic features less affected by neighboring syllables are obtained. When using the tone nucleus modeling, automatic detection of tone nucleus comes crucial. An improvement was added to the original detection method. Distinctive acoustic features for tone types are not limited to F0 contours. Other prosodic features, such as waveform power and syllable duration, are also useful for tone recognition. Their heterogeneous features are rather difficult to be handled simultaneously in hidden Markov models (HMM), but are easy in neural networks. We adopted multi-layer perceptron (MLP) as a neural network. Tone recognition experiments were conducted for speaker dependent and independent cases. In order to show the effect of integration, experiments were conducted also for two baselines: HMM classifier with tone nucleus modeling, and MLP classifier viewing entire syllable instead of tone nucleus. The integrated method showed 87.1% of tone recognition rate in speaker dependent case, and 80.9% in speaker independent case, which was about 10% relative error reduction as compared to the baselines.

1441-1460hit(2923hit)