The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RP(993hit)

421-440hit(993hit)

  • Comparative Analysis of Automatic Exudate Detection between Machine Learning and Traditional Approaches

    Akara SOPHARAK  Bunyarit UYYANONVARA  Sarah BARMAN  Thomas WILLIAMSON  

     
    PAPER-Biological Engineering

      Vol:
    E92-D No:11
      Page(s):
    2264-2271

    To prevent blindness from diabetic retinopathy, periodic screening and early diagnosis are neccessary. Due to lack of expert ophthalmologists in rural area, automated early exudate (one of visible sign of diabetic retinopathy) detection could help to reduce the number of blindness in diabetic patients. Traditional automatic exudate detection methods are based on specific parameter configuration, while the machine learning approaches which seems more flexible may be computationally high cost. A comparative analysis of traditional and machine learning of exudates detection, namely, mathematical morphology, fuzzy c-means clustering, naive Bayesian classifier, Support Vector Machine and Nearest Neighbor classifier are presented. Detected exudates are validated with expert ophthalmologists' hand-drawn ground-truths. The sensitivity, specificity, precision, accuracy and time complexity of each method are also compared.

  • Development of an Interference Canceller in Satellite Communications Using a Multi-Level Modulation with Superposed Transmission

    Shoko KURODA  Sho TANAKA  Shigeo NAOI  Yozo TAKEDA  Ryusuke MIYAMOTO  Takao HARA  Minoru OKADA  

     
    PAPER

      Vol:
    E92-B No:11
      Page(s):
    3354-3364

    This paper proposes an architecture of an interference canceller for satellite communications with super-posed transmission, which is applicable not only to QPSK but also to 16QAM transmission to get higher satellite capacity. We implement it as an FPGA-based prototype and verify its performance. We propose here to use a new method to measure the satellite round-trip delay using an extended matched filter (EMF), which can work in low C/N conditions such as 0 dB and under. Given this performance, our canceller can work in a network in which forward and reverse links have the same power level. The results of the laboratory tests for QPSK show that interference can be suppressed by about 30 dB and that the BER degradation due to the canceller was small enough for operation.

  • Video Frame Interpolation by Image Morphing Including Fully Automatic Correspondence Setting

    Miki HASEYAMA  Makoto TAKIZAWA  Takashi YAMAMOTO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E92-D No:10
      Page(s):
    2163-2166

    In this paper, a new video frame interpolation method based on image morphing for frame rate up-conversion is proposed. In this method, image features are extracted by Scale-Invariant Feature Transform in each frame, and their correspondence in two contiguous frames is then computed separately in foreground and background regions. By using the above two functions, the proposed method accurately generates interpolation frames and thus achieves frame rate up-conversion.

  • Dependency Parsing with Lattice Structures for Resource-Poor Languages

    Sutee SUDPRASERT  Asanee KAWTRAKUL  Christian BOITET  Vincent BERMENT  

     
    PAPER-Natural Language Processing

      Vol:
    E92-D No:10
      Page(s):
    2122-2136

    In this paper, we present a new dependency parsing method for languages which have very small annotated corpus and for which methods of segmentation and morphological analysis producing a unique (automatically disambiguated) result are very unreliable. Our method works on a morphosyntactic lattice factorizing all possible segmentation and part-of-speech tagging results. The quality of the input to syntactic analysis is hence much better than that of an unreliable unique sequence of lemmatized and tagged words. We propose an adaptation of Eisner's algorithm for finding the k-best dependency trees in a morphosyntactic lattice structure encoding multiple results of morphosyntactic analysis. Moreover, we present how to use Dependency Insertion Grammar in order to adjust the scores and filter out invalid trees, the use of language model to rescore the parse trees and the k-best extension of our parsing model. The highest parsing accuracy reported in this paper is 74.32% which represents a 6.31% improvement compared to the model taking the input from the unreliable morphosyntactic analysis tools.

  • FreeNA: A Multi-Platform Framework for Inserting Upper-Layer Network Services

    Ryota KAWASHIMA  Yusheng JI  Katsumi MARUYAMA  

     
    PAPER-QoS and Quality Management

      Vol:
    E92-D No:10
      Page(s):
    1923-1933

    Networking technologies have recently been evolving and network applications are now expected to support flexible composition of upper-layer network services, such as security, QoS, or personal firewall. We propose a multi-platform framework called FreeNA* that extends existing applications by incorporating the services based on user definitions. This extension does not require users to modify their systems at all. Therefore, FreeNA is valuable for experimental system usage. We implemented FreeNA on both Linux and Microsoft Windows operating systems, and evaluated their functionality and performance. In this paper, we describe the design and implementation of FreeNA including details on how to insert network services into existing applications and how to create services in a multi-platform environment. We also give an example implementation of a service with SSL, a functionality comparison with relevant systems, and our performance evaluation results. The results show that FreeNA offers finer configurability, composability, and usability than other similar systems. We also show that the throughput degradation of transparent service insertion is 2% at most compared with a method of directly inserting such services into applications.

  • A Novel Bandelet-Based Image Inpainting

    Kuo-Ming HUNG  Yen-Liang CHEN  Ching-Tang HSIEH  

     
    PAPER-Image Coding and Processing

      Vol:
    E92-A No:10
      Page(s):
    2471-2478

    This paper proposes a novel image inpainting method based on bandelet transform. This technique is based on a multi-resolution layer to perform image restoration, and mainly utilizes the geometrical flow of the neighboring texture of the damaged regions as the basis of restoration. By performing the warp transform with geometrical flows, it transforms the textural variation into the nearing domain axis utilizing the bandelet decomposition method to decompose the non-relative textures into different bands, and then combines them with the affine search method to perform image restoration. The experimental results show that the proposed method can simplify the complexity of the repair decision method and improve the quality of HVS, and thus, repaired results to contain the image of contour of high change, and in addition, offer a texture image of high-frequency variation. These repair results can lead to state-of-the-art results.

  • VLSI Floorplanning with Boundary Constraints Based on Single-Sequence Representation

    Kang LI  Juebang YU  Jian LI  

     
    LETTER-VLSI Design Technology and CAD

      Vol:
    E92-A No:9
      Page(s):
    2369-2375

    In modern VLSI physical design, huge integration scale necessitates hierarchical design and IP reuse to cope with design complexity. Besides, interconnect delay becomes dominant to overall circuit performance. These critical factors require some modules to be placed along designated boundaries to effectively facilitate hierarchical design and interconnection optimization related problems. In this paper, boundary constraints of general floorplan are solved smoothly based on the novel representation Single-Sequence (SS). Necessary and sufficient conditions of rooms along specified boundaries of a floorplan are proposed and proved. By assigning constrained modules to proper boundary rooms, our proposed algorithm always guarantees a feasible SS code with appropriate boundary constraints in each perturbation. Time complexity of the proposed algorithm is O(n). Experimental results on MCNC benchmarks show effectiveness and efficiency of the proposed method.

  • Using Large-Scale FDTD Method to Obtain Precise Numerical Estimation of Indoor Wireless Local Area Network Office Environment

    Louis-Ray HARRIS  Takashi HIKAGE  Toshio NOJIMA  

     
    PAPER-Wireless LAN System

      Vol:
    E92-A No:9
      Page(s):
    2177-2183

    The Finite-Difference Time-Domain (FDTD) technique is presented in this paper as an estimation method for radio propagation prediction in large and complex wireless local area network (WLAN) environments. Its validity is shown by comparing measurements and Ray-trace method with FDTD data. The 2 GHz (802.11b/g) and 5 GHz (802.11a) frequency bands are used in both the calculations and experiments. The electric field (E-field) strength distribution has been illustrated in the form of histograms and cumulative ratio graphs. By using the FDTD method to vary the number of human bodies in the environment, the effects on E-field distribution due to human body absorption are also observed for 5 GHz WLAN design.

  • Ranking Multiple Dialogue States by Corpus Statistics to Improve Discourse Understanding in Spoken Dialogue Systems

    Ryuichiro HIGASHINAKA  Mikio NAKANO  

     
    PAPER-Natural Language Processing

      Vol:
    E92-D No:9
      Page(s):
    1771-1782

    This paper discusses the discourse understanding process in spoken dialogue systems. This process enables a system to understand user utterances from the context of a dialogue. Ambiguity in user utterances caused by multiple speech recognition hypotheses and parsing results sometimes makes it difficult for a system to decide on a single interpretation of a user intention. As a solution, the idea of retaining possible interpretations as multiple dialogue states and resolving the ambiguity using succeeding user utterances has been proposed. Although this approach has proven to improve discourse understanding accuracy, carefully created hand-crafted rules are necessary in order to accurately rank the dialogue states. This paper proposes automatically ranking multiple dialogue states using statistical information obtained from dialogue corpora. The experimental results in the train ticket reservation and weather information service domains show that the statistical information can significantly improve the ranking accuracy of dialogue states as well as the slot accuracy and the concept error rate of the top-ranked dialogue states.

  • Computation of Grobner Basis for Systematic Encoding of Generalized Quasi-Cyclic Codes

    Vo TAM VAN  Hajime MATSUI  Seiichi MITA  

     
    PAPER-Coding Theory

      Vol:
    E92-A No:9
      Page(s):
    2345-2359

    Generalized quasi-cyclic (GQC) codes form a wide and useful class of linear codes that includes thoroughly quasi-cyclic codes, finite geometry (FG) low density parity check (LDPC) codes, and Hermitian codes. Although it is known that the systematic encoding of GQC codes is equivalent to the division algorithm in the theory of Grobner basis of modules, there has been no algorithm that computes Grobner basis for all types of GQC codes. In this paper, we propose two algorithms to compute Grobner basis for GQC codes from their parity check matrices; we call them echelon canonical form algorithm and transpose algorithm. Both algorithms require sufficiently small number of finite-field operations with the order of the third power of code-length. Each algorithm has its own characteristic. The first algorithm is composed of elementary methods and is appropriate for low-rate codes. The second algorithm is based on a novel formula and has smaller computational complexity than the first one for high-rate codes with the number of orbits (cyclic parts) less than half of the code length. Moreover, we show that a serial-in serial-out encoder architecture for FG LDPC codes is composed of linear feedback shift registers with the size of the linear order of code-length; to encode a binary codeword of length n, it takes less than 2n adder and 2n memory elements.

  • Signal Subspace Interpolation from Discrete Measurement Samples in Constructing a Database for Location Fingerprint Technique

    Panarat CHERNTANOMWONG  Jun-ichi TAKADA  Hiroyuki TSUJI  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:9
      Page(s):
    2922-2930

    In this paper, a method of the signal subspace interpolation to constructing a continuous fingerprint database for radio localization is proposed. When using the fingerprint technique, enhancing the accuracy of location estimation requires very fine spatial resolution of the database, which entails much time in collecting the data to build up the database. Interpolated signal subspace is presented to achieve a fine spatial resolution of the fingerprint database. The angle of arrival (AOA) and the measured signal subspace at known locations are needed to obtain the interpolated signal subspaces. The effectiveness of this method is verified by an outdoor experiment and the estimated location using this method was compared with those using the geometrically calculated fingerprint and the measured signal subspace fingerprint techniques.

  • Content-Based Retrieval of Motion Capture Data Using Short-Term Feature Extraction

    Jianfeng XU  Haruhisa KATO  Akio YONEYAMA  

     
    PAPER-Contents Technology and Web Information Systems

      Vol:
    E92-D No:9
      Page(s):
    1657-1667

    This paper presents a content-based retrieval algorithm for motion capture data, which is required to re-use a large-scale database that has many variations in the same category of motions. The most challenging problem is that logically similar motions may not be numerically similar due to the motion variations in a category. Our algorithm can effectively retrieve logically similar motions to a query, where a distance metric between our novel short-term features is defined properly as a fundamental component in our system. We extract the features based on short-term analysis of joint velocities after dividing an entire motion capture sequence into many small overlapped clips. In each clip, we select not only the magnitude but also the dynamic pattern of the joint velocities as our features, which can discard the motion variations while keeping the significant motion information in a category. Simultaneously, the amount of data is reduced, alleviating the computational cost. Using the extracted features, we define a novel distance metric between two motion clips. By dynamic time warping, a motion dissimilarity measure is calculated between two motion capture sequences. Then, given a query, we rank all the motions in our dataset according to their motion dissimilarity measures. Our experiments, which are performed on a test dataset consisting of more than 190 motions, demonstrate that our algorithm greatly improves the performance compared to two conventional methods according to a popular evaluation measure P(NR).

  • Primitive Power Roots of Unity and Its Application to Encryption

    Takato HIRANO  Koichiro WADA  Keisuke TANAKA  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1836-1844

    We first consider a variant of the Schmidt-Samoa-Takagi encryption scheme without losing additively homomorphic properties. We show that this variant is secure in the sense of IND-CPA under the decisional composite residuosity assumption, and of OW-CPA under the assumption on the hardness of factoring n=p2q. Second, we introduce new algebraic properties "affine" and "pre-image restriction," which are closely related to homomorphicity. Intuitively, "affine" is a tuple of functions which have a special homomorphic property, and "pre-image restriction" is a function which can restrict the receiver to having information on the encrypted message. Then, we propose an encryption scheme with primitive power roots of unity in (Z/ns+1). We show that our scheme has, in addition to the additively homomorphic property, the above algebraic properties. In addition to the properties, we also show that the encryption scheme is secure in the sense of OW-CPA and IND-CPA under new number theoretic assumptions.

  • Low Power 10-b 250 Msample/s CMOS Cascaded Folding and Interpolating A/D Converter

    Zhi-Yuan CUI  Yong-Gao JIN  Nam-Soo KIM  Ho-Yong CHOI  

     
    PAPER-Electronic Circuits

      Vol:
    E92-C No:8
      Page(s):
    1073-1079

    This paper introduces a new folding amplifier in a folding and interpolating 10-b ADC. The amplifier consists of current mirrors and differential stages. Only one current source is exploited in cascaded differential pairs, which reduces the power consumption significantly. In the folding circuit, the interpolation is implemented with a current division technique. An experiment of the amplifier in 10-b folding signal has been integrated in a single-poly four-metal 0.35 µm CMOS process. The simulation in 10-b folding ADC shows that power consumption is 225 mW at the sampling speed of 250 Msample/s and the power supply of 3.3 V. The preliminary experiment indicates the current steering folder and digital bits operate as expected.

  • High-Speed EA-DFB Laser for 40-G and 100-Gbps Open Access

    Shigeki MAKINO  Kazunori SHINODA  Takeshi KITATANI  Hiroaki HAYASHI  Takashi SHIOTA  Shigehisa TANAKA  Masahiro AOKI  Noriko SASADA  Kazuhiko NAOE  

     
    INVITED PAPER

      Vol:
    E92-C No:7
      Page(s):
    937-941

    We have developed a high-speed electroabsorption modulator integrated distributed feedback (EA/DFB) lasers. Transmission performance over 10 km was investigated under 25 Gbps and 43 Gbps modulation. In addition, the feasibility of wide temperature range operation was also investigated. An uncooled EA/DFB laser can contribute to the realization of low-power-consumption, small-footprint and cost-effective transceiver module. In this study, we used the temperature-tolerant InGaAlAs materials in an EA modulator. A wide temperature ranged 12 km transmission with over 9.6 dB dynamic extinction ratio was demonstrated under 25 Gbps modulation. A 43 Gbps 10 km transmission was also demonstrated. The laser achieved a clear, opened eye diagram with a dynamic extinction ratio over 7 dB from 25 to 85. The modulated output power was more than +2.9 dBm even at 85. These devices are suitable for next-generation, high-speed network systems, such as 40 Gbps and 100 Gbps Ethernet.

  • Analytical Solution for Two Parallel Traces on PCB in the Time Domain with Application to Hairpin Delay Lines

    Fengchao XIAO  Kimitoshi MURANO  Yoshio KAMI  

     
    PAPER

      Vol:
    E92-B No:6
      Page(s):
    1953-1959

    In this paper the time-domain analysis of two parallel traces is investigated. First, the telegrapher's equations for transmission line are applied to the parallel traces on printed circuit board (PCB), and are solved by using the mode decomposition technique. The time-domain solutions are then obtained by using the inverse Laplace transform. Although the Fourier-transform technique is also applicable for this problem, the solution is given numerically. Contrarily, the inverse Laplace transform successfully leads to an analytical expression for the transmission characteristics. The analytical expression is represented by series, which clearly explains the coupling mechanism. The analytical expression for the fundamental section of a meander delay line is investigated in detail. The analytical solution is validated by measurements, and the characteristics of the distortions in the output waveforms of meander delay lines due to the crosstalk are also investigated.

  • Feature Interaction Verification Using Unbounded Model Checking with Interpolation

    Takafumi MATSUO  Tatsuhiro TSUCHIYA  Tohru KIKUNO  

     
    PAPER-Dependable Computing

      Vol:
    E92-D No:6
      Page(s):
    1250-1259

    In this paper, we propose an unbounded model checking method for feature interaction verification for telecommunication systems. Unbounded model checking is a SAT-based verification method and has attracted recent attention as a powerful approach. The interpolation-based approach is one of the most promising unbounded model checking methods and has been proven to be effective for hardware verification. However, the application of unbounded model checking to asynchronous systems, such as telecommunication systems, has rarely been practiced. This is because, with the conventional encoding, the behavior of an asynchronous system can only be represented as a large propositional formula, thus resulting in large computational cost. To overcome this problem we propose to use a new scheme for encoding the behavior of the system and adapt the unbounded model checking algorithm to this encoding. By exploiting the concurrency of an asynchronous system, this encoding scheme allows a very concise formula to represent system's behavior. To demonstrate the effectiveness of our approach, we conduct experiments where 21 pairs of telecommunication services are verified using several methods including ours. The results show that our approach exhibits significant speed-up over unbounded model checking using the traditional encoding.

  • Tracking Analysis of Complex Adaptive IIR Notch Filter for a Linear Chirp Signal

    Aloys MVUMA  Shotaro NISHIMURA  Takao HINAMOTO  

     
    LETTER-Digital Signal Processing

      Vol:
    E92-A No:6
      Page(s):
    1526-1529

    This paper analyzes frequency tracking characteristics of a complex-coefficient adaptive infinite impulse response (IIR) notch filter with a simplified gradient-based algorithm. The input signal to the complex notch filter is a complex linear chirp embedded in a complex zero-mean white Gaussian noise. The analysis starts with derivation of a first-order real-coefficient difference equation with respect to steady-state instantaneous frequency tracking error. Closed-form expression for frequency tracking mean square error (MSE) is then derived from the difference equation. Lastly, closed-form expressions for optimum notch bandwidth coefficient and step size constant that minimize the frequency tracking MSE are derived. Computer simulations are presented to validate the analysis.

  • Ultrahigh-Sensitivity Pickup Tube Using 35-µm-Thick HARP Photoconductive Film

    Yuji OHKAWA  Kazunori MIYAKAWA  Tomoki MATSUBARA  Kenji KIKUCHI  Shirou SUZUKI  Misao KUBOTA  Norifumi EGAMI  Akira KOBAYASHI  

     
    LETTER-Semiconductor Materials and Devices

      Vol:
    E92-C No:6
      Page(s):
    894-897

    A high-sensitivity pickup tube using HARP (high-gain avalanche rushing amorphous photoconductor) photoconductive film, which makes use of the avalanche multiplication phenomenon, has been studied for making a high-sensitivity television camera. The avalanche multiplication factor, i.e., sensitivity, was increased by thickening the film. A 35-µm-thick HARP film, which was more sensitive than the previous 25-µm-thick film with an avalanche multiplication factor of about 600, and a 2/3rd-inch pickup tube using the film were developed. Measurements on the pickup tube demonstrated that it had an avalanche multiplication factor of about 1000, low lag, and high resolution. Moreover, image defects caused by shooting of intense spot lights were investigated, and it was found that exposing the film to UV light before operation and controlling the temperature of the film during operation could suppress the defects.

  • Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs

    Shuhui HOU  Tetsutaro UEHARA  Takashi SATOH  Yoshitaka MORIMURA  Michihiko MINOH  

     
    PAPER-Contents Protection

      Vol:
    E92-D No:5
      Page(s):
    876-887

    In recent years, with the rapid growth of the Internet as well as the increasing demand for broadband services, live pay-television broadcasting via the Internet has become a promising business. To get this implemented, it is necessary to protect distributed contents from illegal copying and redistributing after they are accessed. Fingerprinting system is a useful tool for it. This paper shows that the anti-collusion code has advantages over other existing fingerprinting codes in terms of efficiency and effectivity for live pay-television broadcasting. Next, this paper presents how to achieve efficient and effective anti-collusion codes based on unital and affine plane, which are two known examples of balanced incomplete block design (BIBD). Meanwhile, performance evaluations of anti-collusion codes generated from unital and affine plane are conducted. Their practical explicit constructions are given last.

421-440hit(993hit)