The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SC(4570hit)

981-1000hit(4570hit)

  • A Hybrid Approach for Radar Beam Scheduling Using Rules and Stochastic Search by Simulated Annealing

    Ji-Eun ROH  Chang-Soo AHN  Seon-Joo KIM  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E97-D No:9
      Page(s):
    2346-2355

    Recently, radar resource management of multifunction radar is a challenging issue in electronically scanned array radar technology. This paper deals with radar beam scheduling, which is a core issue of radar resource management. This paper proposed stochastic scheduler algorithm using Simulated Annealing (SA) and Hybrid scheduler algorithm which automatically selects two different types of schedulers according to the radar load: Rule based scheduler using modified Butler algorithm for underload situations and SA based scheduler for overload situations. The proposed algorithms are evaluated in terms of scheduling latency, the number of scheduled tasks, and time complexity. The simulation results show that the performance of rule based scheduler is seriously degraded in overload situation. However, SA based scheduler and Hybrid scheduler have graceful performance degradation in overload situation. Compared with rule based scheduler, SA based scheduler and Hybrid scheduler can schedule many more tasks on time for the same operation duration in the overload situation. Even though their time complex is relatively high, it can be applied to real applications if the parameters are properly controlled. Especially, Hybrid scheduler has an advantage of low time complexity with good performance.

  • Combining LBP and SIFT in Sparse Coding for Categorizing Scene Images

    Shuang BAI  Jianjun HOU  Noboru OHNISHI  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E97-D No:9
      Page(s):
    2563-2566

    Local descriptors, Local Binary Pattern (LBP) and Scale Invariant Feature Transform (SIFT) are widely used in various computer applications. They emphasize different aspects of image contents. In this letter, we propose to combine them in sparse coding for categorizing scene images. First, we regularly extract LBP and SIFT features from training images. Then, corresponding to each feature, a visual word codebook is constructed. The obtained LBP and SIFT codebooks are used to create a two-dimensional table, in which each entry corresponds to an LBP visual word and a SIFT visual word. Given an input image, LBP and SIFT features extracted from the same positions of this image are encoded together based on sparse coding. After that, spatial max pooling is adopted to determine the image representation. Obtained image representations are converted into one-dimensional features and classified by utilizing SVM classifiers. Finally, we conduct extensive experiments on datasets of Scene Categories 8 and MIT 67 Indoor Scene to evaluate the proposed method. Obtained results demonstrate that combining features in the proposed manner is effective for scene categorization.

  • Implementation and Feasibility Study of Co-channel Operation System of Microwave Power Transmissions to IEEE 802.11-Based Batteryless Sensor

    Shota YAMASHITA  Norikatsu IMOTO  Takuya ICHIHARA  Koji YAMAMOTO  Takayuki NISHIO  Masahiro MORIKURA  Naoki SHINOHARA  

     
    PAPER

      Vol:
    E97-B No:9
      Page(s):
    1843-1852

    In this paper, we study the feasibility of a batteryless wireless sensor supplied with energy by using microwave power transmission (MPT). If we perform co-channel operation of MPT and wireless local area networks (WLANs) for the sake of spectral efficiency, a time division method for MPT and WLAN communications is required to avoid serious interference from MPT to WLAN data transmissions. In addition, to reduce the power consumption of a sensor, the use of power-save operation of the sensor is desirable. We proposed a scheduling scheme that allocates time for MPT and WLAN communications. Specifically, in the proposed scheduling system, an energy source transmits microwave power to a sensor station except when the sensor station transmits data frames or receives beacon frames. In addition, in the proposed scheduling system, we force the remaining energy of the sensor station to converge to a maximum value by adjusting the time interval of data transmission from the sensor station such that the power consumption of the sensor station is reduced. On the basis of the proposition, we implemented a scheduling system and then confirmed that it performed successfully in the conducted experiments. Finally, we discussed the feasibility of the proposed scheduling scheme by evaluating the coverage and then showed that the scheduling scheme can be applied to closed space or room.

  • An Oscillation-Based On-Chip Temperature-Aware Dynamic Voltage and Frequency Scaling Scheme in System-on-a-Chip

    Katherine Shu-Min LI  Yingchieh HO  Yu-Wei YANG  Liang-Bi CHEN  

     
    PAPER-Circuit Implementations

      Vol:
    E97-D No:9
      Page(s):
    2320-2329

    The excessively high temperature in a chip may cause circuit malfunction and performance degradation, and thus should be avoided to improve system reliability. In this paper, a novel oscillation-based on-chip thermal sensing architecture for dynamically adjusting supply voltage and clock frequency in System-on-a-Chip (SoC) is proposed. It is shown that the oscillation frequency of a ring oscillator reduces linearly as the temperature rises, and thus provides a good on-chip temperature sensing mechanism. An efficient Dynamic Voltage-to-Frequency Scaling (DF2VS) algorithm is proposed to dynamically adjust supply voltage according to the oscillation frequencies of the ring oscillators distributed in SoC so that thermal sensing can be carried at all potential hot spots. An on-chip Dynamic Voltage Scaling or Dynamic Voltage and Frequency Scaling (DVS or DVFS) monitor selects the supply voltage level and clock frequency according to the outputs of all thermal sensors. Experimental results on SoC benchmark circuits show the effectiveness of the algorithm that a 10% reduction in supply voltage alone can achieve about 20% power reduction (DVS scheme), and nearly 50% reduction in power is achievable if the clock frequency is also scaled down (DVFS scheme). The chip temperature will be significant lower due to the reduced power consumption.

  • Learning a Two-Dimensional Fuzzy Discriminant Locality Preserving Subspace for Visual Recognition

    Ruicong ZHI  Lei ZHAO  Bolin SHI  Yi JIN  

     
    PAPER-Pattern Recognition

      Vol:
    E97-D No:9
      Page(s):
    2434-2442

    A novel Two-dimensional Fuzzy Discriminant Locality Preserving Projections (2D-FDLPP) algorithm is proposed for learning effective subspace of two-dimensional images. The 2D-FDLPP algorithm is derived from the Two-dimensional Locality Preserving Projections (2D-LPP) by exploiting both fuzzy and discriminant properties. 2D-FDLPP algorithm preserves the relationship degree of each sample belonging to given classes with fuzzy k-nearest neighbor classifier. Also, it introduces between-class scatter constrain and label information into 2D-LPP algorithm. 2D-FDLPP algorithm finds the subspace which can best discriminate different pattern classes and weakens the environment factors according to soft assignment method. Therefore, 2D-FDLPP algorithm has more discriminant power than 2D-LPP, and is more suitable for recognition tasks. Experiments are conducted on the MNIST database for handwritten image classification, the JAFFE database and Cohn-Kanade database for facial expression recognition and the ORL database for face recognition. Experimental results reported the effectiveness of our proposed algorithm.

  • Scalable Connection-Based Time Division Multiple Access Architecture for Wireless Network-on-Chip

    Shijun LIN  Zhaoshan LIU  Jianghong SHI  Xiaofang WU  

     
    BRIEF PAPER-Integrated Electronics

      Vol:
    E97-C No:9
      Page(s):
    918-921

    In this paper, we propose a scalable connection-based time division multiple access architecture for wireless NoC. In this architecture, only one-hop transmission is needed when a packet is transmitted from one wired subnet to another wired subnet, which improves the communication performance and cuts down the energy consumption. Furthermore, by carefully designing the central arbiter, the bandwidth of the wireless channel can be fully used. Simulation results show that compared with the traditional WCube wireless NoC architecture, the proposed architecture can greatly improve the network throughput, and cut down the transmission latency and energy consumption with a reasonable area overhead.

  • A Resource Analysis of Radio Space Distribution for the Wide-Area Virtualization of Wireless Transceivers

    Yuusuke KAWAKITA  Haruhisa ICHIKAWA  

     
    PAPER

      Vol:
    E97-B No:9
      Page(s):
    1800-1807

    Wide area virtualization of wireless transceivers by centrally managed software radio systems is a way to efficiently share the resources for supporting a variety of wireless protocols. In order to enable wide-area virtualization of wireless transceivers, the authors have developed a mechanism to deliver the radio space information which is quantized broadband radio wave information including the radio signals to the transceivers. Delivery mechanism consists of a distribution server which distributes radio space corresponding to the request of the client such as the center frequency and the bandwidth and a client which uses the radio space information. Accumulation of the distribution servers which deliver radio space information simultaneously to a large number of clients will contribute to build an infrastructure for any clients ubiquitously distributed over the globe. In this paper, scale-out architecture of a distribution server is proposed to deliver unlimitedly broadband radio space information to unlimited number of clients. Experimental implementation indicates the architecture to be a scale-out solution, while the number of clients is restricted by the computer resources of the distribution server. The band pass filter processing for individual client in the distribution server consumes the dominant part of the processing power, and the number of CPU cores is the upper limit of clients supportable for the distribution server in the current operating system implementation. The logical increase of the number of CPU cores by hardware multithreading does not contribute to relax this limit. We also discuss the guidance architecture or building server derived from these conclusions.

  • Alternative Intra Prediction for Screen Content Coding in HEVC

    Yangbin LIM  Si-Woong LEE  Haechul CHOI  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E97-D No:9
      Page(s):
    2537-2540

    Screen content generally consists of text, images, and videos variously generated or captured by computers and other electronic devices. For the purpose of coding such screen content, we introduce alternative intra prediction (AIP) modes based on the emerging high efficiency video coding (HEVC) standard. With text and graphics, edges are much sharper and a large number of corners exist. These properties make it difficult to predict blocks using a one-directional intra prediction mode. The proposed method provides two-directional prediction by combining the existing vertical and horizontal prediction modes. Experiments show that our AIP modes provide an average BD-rate reduction of 2.8% relative to HEVC for general screen contents, and a 0.04% reduction for natural contents.

  • An Adaptive High Gain Observer Design for Nonlinear Systems

    Sungryul LEE  

     
    LETTER-Systems and Control

      Vol:
    E97-A No:9
      Page(s):
    1966-1970

    This paper studies an adaptive high gain observer design for nonlinear systems which have lower triangular nonlinearity with Lipschitz coefficient, depending on the control input. Because the gain of the proposed observer is tuned automatically by a simple update law, our design approach doesn't need any information about the Lipschitz constant. Also, it is shown that under some assumptions, the dynamic gain of the proposed observer is bounded and its estimation error converges to zero asymptotically. Finally, a numerical example is given to verify the effectiveness of our design approach.

  • Block Utilization-Aware Buffer Replacement Scheme for Mobile NAND Flash Storage

    Dong Hyun KANG  Changwoo MIN  Young Ik EOM  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E97-D No:9
      Page(s):
    2510-2513

    NAND flash storage devices, such as eMMCs and microSD cards, are now widely used in mobile devices. In this paper, we propose a novel buffer replacement scheme for mobile NAND flash storages. It efficiently improves write performance by evicting pages flash-friendly and maintains high cache hit ratios by managing pages in order of recency. Our experimental results show that the proposed scheme outperforms the best performing scheme in the recent literature, Sp.Clock, by 48%.

  • Efficient Screen Space Anisotropic Blurred Soft Shadows

    Zhongxiang ZHENG  Suguru SAITO  

     
    PAPER-Rendering

      Vol:
    E97-D No:8
      Page(s):
    2038-2045

    Shadow mapping is an efficient method to generate shadows in real time computer graphics and has broad variations from hard to soft shadow synthesis. Soft shadowing based on shadow mapping is a blurring technique on a shadow map or on screen space. Blurring on screen space has an advantage for efficient sampling on a shadow map, since the blurred target array has exactly the same coordinates as the screen. However, a previous blurring method on screen space has a drawback: the generated shadow is not correct when a view direction has a large angle to the normal of the shadowed plane. In this paper, we introduce a new screen space based method for soft shadowing that is fast and generates soft shadows more accurately than the previous screen space soft shadow mapping method. The resultant images show shadows produced by our method just stand in the same place, while shadows by the previous method change in terms of penumbra while the view moves. Surprisingly, although our method is more complex than the previous method, the measurement results of the calculation time show our method is almost the same performance. This is because it controls the blurring area more accurately and thus successfully reduces multiplications for blurring.

  • Performance Analysis of Multiuser Relay Networks with Feedback Delay

    Jie YANG  Xiaofei ZHANG  Kai YANG  

     
    PAPER-Communication Theory and Signals

      Vol:
    E97-A No:8
      Page(s):
    1770-1779

    In this paper, we analyze the performance of a dual-hop multiuser amplify-and-forward (AF) relay network with the effect of the feedback delay, where the source and each of the K destinations are equipped with Nt and Nr antennas respectively, and the relay is equipped with a single antenna. In the relay network, multi-antenna and multiuser diversities are guaranteed via beamforming and opportunistic scheduling, respectively. To examine the impact of delayed feedback, the new exact analytical expressions for the outage probability (OP) and symbol error rate (SER) are derived in closed-form over Rayleigh fading channel, which are useful for a large number of modulation schemes. In addition, we present the asymptotic expressions for OP and SER in the high signal-to-noise ratio (SNR) regime, from which we gain an insight into the system performance with deriving the diversity order and array gain. Moreover, based on the asymptotic expressions, we determine power allocation among the network nodes such that the OP is minimized. The analytical expressions are validated by Monte-Carlo simulations.

  • Revocable Identity-Based Encryption with Rejoin Functionality

    Jae Hong SEO  Keita EMURA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:8
      Page(s):
    1806-1809

    In the Identity-Based Encryption (IBE) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of RIBE with the rejoin functionality, and also show that the Seo-Emura RIBE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.

  • A Novel Integration of Intensity Order and Texture for Effective Feature Description

    Thao-Ngoc NGUYEN  Bac LE  Kazunori MIYATA  

     
    PAPER-Computer Vision

      Vol:
    E97-D No:8
      Page(s):
    2021-2029

    This paper introduces a novel approach of feature description by integrating the intensity order and textures in different support regions into a compact vector. We first propose the Intensity Order Local Binary Pattern (IO-LBP) operator, which simultaneously encodes the gradient and texture information in the local neighborhood of a pixel. We divide each region of interest into segments according to the order of pixel intensities, build one histogram of IO-LBP patterns for each segment, and then concatenate all histograms to obtain a feature descriptor. Furthermore, multi support regions are adopted to enhance the distinctiveness. The proposed descriptor effectively describes a region at both local and global levels, and thus high performance is expected. Experimental results on the Oxford benchmark and images of cast shadows show that our approach is invariant to common photometric and geometric transformations, such as illumination change and image rotation, and robust to complex lighting effects caused by shadows. It achieves a comparable accuracy to that of state-of-art methods while performs considerably faster.

  • EDISON Science Gateway: A Cyber-Environment for Domain-Neutral Scientific Computing

    Hoon RYU  Jung-Lok YU  Duseok JIN  Jun-Hyung LEE  Dukyun NAM  Jongsuk LEE  Kumwon CHO  Hee-Jung BYUN  Okhwan BYEON  

     
    PAPER-Scientific Application

      Vol:
    E97-D No:8
      Page(s):
    1953-1964

    We discuss a new high performance computing service (HPCS) platform that has been developed to provide domain-neutral computing service under the governmental support from “EDucation-research Integration through Simulation On the Net” (EDISON) project. With a first focus on technical features, we not only present in-depth explanations of the implementation details, but also describe the strengths of the EDISON platform against the successful nanoHUB.org gateway. To validate the performance and utility of the platform, we provide benchmarking results for the resource virtualization framework, and prove the stability and promptness of the EDISON platform in processing simulation requests by analyzing several statistical datasets obtained from a three-month trial service in the initiative area of computational nanoelectronics. We firmly believe that this work provides a good opportunity for understanding the science gateway project ongoing for the first time in Republic of Korea, and that the technical details presented here can be served as an useful guideline for any potential designs of HPCS platforms.

  • Token-Scheduled High Throughput Data Collection with Topology Adaptability in Wireless Sensor Network

    Jinzhi LIU  Makoto SUZUKI  Doohwan LEE  Hiroyuki MORIKAWA  

     
    PAPER-Network

      Vol:
    E97-B No:8
      Page(s):
    1656-1666

    This paper presents a data gathering protocol for wireless sensor network applications that require high throughput and topology adaptability under the premises of uniform traffic and energy-rich environments. Insofar as high throughput is concerned, TDMA is more suitable than CSMA. However, traditional TDMA protocols require complex scheduling of transmission time slots. The scheduling burden is the primary barrier to topology adaptability. Under the premises of uniform traffic and energy-rich environments, this paper proposes a token-scheduled multi-channel TDMA protocol named TKN-TWN to ease the scheduling burden while exploiting the advantages of TDMA. TKN-TWN uses multiple tokens to arbitrate data transmission. Due to the simplified scheduling based on tokens, TKN-TWN is able to provide adaptability for topology changes. The contention-free TDMA and multi-channel communication afford TKN-TWN the leverage to sustain high throughput based on pipelined packet forwarding. TKN-TWN further associates the ownership of tokens with transmission slot assignment toward throughput optimization. We implement TKN-TWN on Tmote Sky with TinyOS 2.1.1 operating system. Experimental results in a deployed network consisting of 32 sensor nodes show that TKN-TWN is robust to network changes caused by occasional node failures. Evaluation also shows that TKN-TWN is able to provide throughput of 9.7KByte/s.

  • New Address Method for Reducing the Address Power Consumption in AC-PDP

    Beong-Ha LIM  Gun-Su KIM  Dong-Ho LEE  Heung-Sik TAE  Seok-Hyun LEE  

     
    PAPER-Electronic Displays

      Vol:
    E97-C No:8
      Page(s):
    820-827

    This paper proposes a new address method to reduce the address power consumption in an AC plasma panel display (AC-PDP). We apply an overlap scan method, in which the scan pulse overlaps with those of the previous scan time and the next scan time. The overlap scan method decreases the address voltage and consequently reduces the address power consumption. However, the drawback of this method is the narrow address voltage margin. This occurs because the maximum address voltage decreases much more than the minimum address voltage does. In order to increase the address voltage margin, we apply a two-step address voltage waveform, in the overlap scan method. In this case, the maximum address voltage increases; however, the minimum address voltage is almost the same. This leads to a wide address voltage margin. Moreover, the two-step address voltage waveform reduces the address power consumption, because the address voltage rises and falls in two steps using an energy recovery capacitor. Consequently, the experimental results show that the new address method reduces the address power consumption by 19.6,Wh (58%) when compared with the conventional method.

  • Smoothing Method for Improved Minimum Phone Error Linear Regression

    Yaohui QI  Fuping PAN  Fengpei GE  Qingwei ZHAO  Yonghong YAN  

     
    PAPER-Speech and Hearing

      Vol:
    E97-D No:8
      Page(s):
    2105-2113

    A smoothing method for minimum phone error linear regression (MPELR) is proposed in this paper. We show that the objective function for minimum phone error (MPE) can be combined with a prior mean distribution. When the prior mean distribution is based on maximum likelihood (ML) estimates, the proposed method is the same as the previous smoothing technique for MPELR. Instead of ML estimates, maximum a posteriori (MAP) parameter estimate is used to define the mode of prior mean distribution to improve the performance of MPELR. Experiments on a large vocabulary speech recognition task show that the proposed method can obtain 8.4% relative reduction in word error rate when the amount of data is limited, while retaining the same asymptotic performance as conventional MPELR. When compared with discriminative maximum a posteriori linear regression (DMAPLR), the proposed method shows improvement except for the case of limited adaptation data for supervised adaptation.

  • Weak-Form Discretization, Waveguide Boundary Conditions and Extraction of Quasi-Localized Waves Causing Fano Resonance

    Hatsuhiro KATO  Hatsuyoshi KATO  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E97-A No:8
      Page(s):
    1720-1727

    Recently, we proposed a weak-form discretization scheme to derive second-order difference equations from the governing equation of the scattering problem. In this paper, under the scope of the proposed scheme, numerical expressions for the waveguide boundary conditions are derived as perfectly absorbing conditions for input and output ports. The waveguide boundary conditions play an important role in extracting the quasi-localized wave as an eigenstate with a complex eigenvalue. The wave-number dependence of the resonance curve in Fano resonance is reproduced by using a semi-analytic model that is developed on the basis of the phase change relevant to the S-matrix. The reproduction confirms that the eigenstate with a complex eigenvalue does cause the observed Fano resonance.

  • Practice and Evaluation of Pagelet-Based Client-Side Rendering Mechanism

    Hao HAN  Yinxing XUE  Keizo OYAMA  Yang LIU  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:8
      Page(s):
    2067-2083

    The rendering mechanism plays an indispensable role in browser-based Web application. It generates active webpages dynamically and provides human-readable layout through template engines, which are used as a standard programming model to separate the business logic and data computations from the webpage presentation. The client-side rendering mechanism, owing to the advances of rich application technologies, has been widely adopted. The adoption of client side rendering brings not only various merits but also new problems. In this paper, we propose and construct “pagelet”, a segment-based template engine for developing flexible and extensible Web applications. By presenting principles, practice and usage experience of pagelet, we conduct a comprehensive analysis of possible advantages and disadvantages brought by client-side rendering mechanism from the viewpoints of both developers and end-users.

981-1000hit(4570hit)