The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

1281-1300hit(2307hit)

  • Opinion Model Using Psychological Factors for Interactive Multimodal Services

    Kazuhisa YAMAGISHI  Takanori HAYASHI  

     
    PAPER

      Vol:
    E89-B No:2
      Page(s):
    281-288

    We propose the concept of an opinion model for interactive multimodal services and apply it to an audiovisual communication service. First, psychological factors of an audiovisual communication service were extracted by using the semantic differential (SD) technique and factor analysis. Forty subjects participated in subjective tests and performed point-to-point conversational tasks on a PC-based video phone that exhibited various network qualities. The subjects assessed those qualities on the basis of 25 pairs of adjectives. Two psychological factors, i.e., an aesthetic feeling and a feeling of activity, were extracted from the results. Then, quality impairment factors affecting these two psychological factors were analyzed. We found that the aesthetic feeling was affected by IP packet loss and video coding bit rate, and the feeling of activity depended on delay time, video packet loss, video coding bit rate, and video frame rate. Using this result, we formulated an opinion model derived from the relationships among quality impairment factors, psychological factors, and overall quality. The validation test results indicated that the estimation error of our model was almost equivalent to the statistical reliability of the subjective score.

  • QoS Provisioning in the EPON Systems with Traffic-Class Burst-Polling Based Delta DBA

    Yeon-Mo YANG  Ji-Myong NHO  Nitaigour Premchand MAHALIK  Kiseon KIM  Byung-Ha AHN  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E89-B No:2
      Page(s):
    419-426

    As an alternative solution to provide the quality of services (QoS) for broadband access over Ethernet Passive Optical Network (EPON), we present the usage of MAC control message for plural class queues and a traffic-class burst-polling based delta dynamic bandwidth allocation (DBA), referred to as TCBP-DDBA, scheme. For better QoS support, the TCBP-DDBA minimizes packet delays and delay variations for expedited forwarding packet and maximizes throughput for assured forwarding and best effort packets. The network resources are efficiently utilized and adaptively allocated to the three traffic classes for the given unbalanced traffic conditions by guaranteeing the requested QoS. Simulation results using OPNET show that the TCBP-DDBA scheme performs well in comparison to the conventional unit-based allocation scheme over the measurement parameters such as: packet delay, packet delay variation, and channel utilization.

  • An Enhanced BSA for Floorplanning

    Jyh Perng FANG  Yang-Shan TONG  Sao Jie CHEN  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E89-A No:2
      Page(s):
    528-534

    In the floorplan design of System-on-Chip (SOC), Buffer Site Approach (BSA) has been used to relax the buffer congestion problem. However, for a floorplan with dominant wide bus, BSA may instead worsen the congestion. Our proposed Enhanced Buffer Site Approach (EBSA) extends existing BSA in a way that buffers of dominant wide bus can be distributed more evenly while reserving the same fast operation speed as BSA does. Experiments have been performed to integrate our model into an iterative floorplanning algorithm, and the results reveal that buffer congestion in a floorplan with dominant wide bus can be much abated.

  • Design of a Mobile Application Framework with Context Sensitivities

    Hyung-Min YOON  Woo-Shik KANG  Oh-Young KWON  Seong-Hun JEONG  Bum-Seok KANG  Tack-Don HAN  

     
    PAPER-Mobile Computing

      Vol:
    E89-D No:2
      Page(s):
    508-515

    New service concepts involving mobile devices with a diverse range of embedded sensors are emerging that share contexts supporting communication on a wireless network infrastructure. To promote these services in mobile devices, we propose a method that can efficiently detect a context provider by partitioning the location, time, speed, and discovery sensitivities.

  • Japanese Dependency Structure Analysis Using Information about Multiple Pauses and F0

    Meirong LU  Kazuyuki TAKAGI  Kazuhiko OZEKI  

     
    PAPER-Speech and Hearing

      Vol:
    E89-D No:1
      Page(s):
    298-304

    Syntax and prosody are closely related to each other. This paper is concerned with the problem of exploiting pause information for recovering dependency structures of read Japanese sentences. Our parser can handle both symbolic information such as dependency rule and numerical information such as the probability of dependency distance of a phrase in a unified way as linguistic information. In our past work, post-phrase pause that immediately succeeds a phrase in question was employed as prosodic information. In this paper, we employed two kinds of pauses in addition to the post-phrase pause: post-post-phrase pause that immediately succeeds the phrase that follows a phrase in question, and pre-phrase pause that immediately precedes a phrase in question. By combining the three kinds of pause information linearly with the optimal combination weights that were determined experimentally, the parsing accuracy was improved compared to the case where only the post-phrase pause was used as in our previous work. Linear combination of pause and fundamental frequency information yielded further improvement of parsing accuracy.

  • Tangible Media Control System for Intuitive Interactions with Multimedia Contents

    Sejin OH  Woontack WOO  

     
    PAPER

      Vol:
    E89-D No:1
      Page(s):
    53-61

    In this paper, we present the Tangible Media Control System (TMCS), which allows users to manipulate media contents through physical objects in an intuitive way. Currently, most people access digital media contents by exploiting GUI. However, it only provides limited manipulation of the contents. The proposed system, instead of a mouse and a keyboard, adopts two types of tangible objects, i.e. a RFID-enabled object and a tracker-embedded object. The TMCS enables users to easily access and control digital media contents through tangible objects. In addition, it supports an interactive media controller which can be used to synthesize media contents according to users' taste. It also offers personalized contents, which suits users' preferences, by exploiting context such as the users' profile and situational information. Accordingly, the TMCS demonstrates that tangible interfaces with context can provide more effective interfaces to satisfy users' demands. Therefore, the proposed system can be applied to various interactive applications such as multimedia education, entertainment, multimedia editor, etc.

  • Resource Adaptation Scheme for QoS Provisioning in Pervasive Computing Environments: A Welfare Economic Approach

    Wonjun LEE  Eunkyo KIM  Dongshin KIM  Choonhwa LEE  

     
    PAPER-Networks

      Vol:
    E89-D No:1
      Page(s):
    248-255

    Management of applications in the new world of pervasive computing requires new mechanisms to be developed for admission control, QoS negotiation, allocation and scheduling. To solve such resource-allocation and QoS provisioning problems within pervasive and ubiquitous computational environments, distribution and decomposition of the computation are important. In this paper we present a QoS-based welfare economic resource management model that models the actual price-formation process of an economy. We compare our economy-based approach with a mathematical approach we previously proposed. We use the constructs of application benefit functions and resource demand functions to represent the system configuration and to solve the resource allocation problems. Finally empirical studies are conducted to evaluate the performance of our proposed pricing model and to compare it with other approaches such as priority-based scheme and greedy method.

  • Two-Phased Bulk Insertion by Seeded Clustering for R-Trees

    Taewon LEE  Sukho LEE  

     
    PAPER-Database

      Vol:
    E89-D No:1
      Page(s):
    228-236

    With great advances in the mobile technology and wireless communications, users expect to be online anytime anywhere. However, due to the high cost of being online, applications are still implemented as partially connected to the server. In many data-intensive mobile client/server frameworks, it is a daunting task to archive and index such a mass volume of complex data that are continuously added to the server when each mobile client gets online. In this paper, we propose a scalable technique called Seeded Clustering that allows us to maintain R-tree indexes by bulk insertion while keeping pace with high data arrival rates. Our approach uses a seed tree, which is copied from the top k levels of a target R-tree, to classify input data objects into clusters. We then build an R-tree for each of the clusters and insert the input R-trees into the target R-tree in bulk one at a time. We present detailed algorithms for the seeded clustering and bulk insertion as well as the results from our extensive experimental study. The experimental results show that the bulk insertion by seeded clustering outperforms the previously known methods in terms of insertion cost and the quality of target R-trees measured by their query performance.

  • A Reliable New 2-Stage Distributed Interactive TGS System Based on GIS Database and Augmented Reality

    Seungjun KIM  Hojung KIM  Seongeun EOM  Nitaigour P. MAHALIK  Byungha AHN  

     
    LETTER

      Vol:
    E89-D No:1
      Page(s):
    98-105

    Most of the traveller guidance services (TGS) are based on GPS technology and generally concerned with the position data mapping on the simplified 2D electronic map in order to provide macro level service facility such as drive direction notifications. Digital GIS based GPS entails in situ intuitive visualization. The visually enhanced TGS can improve the global and local awareness of unknown areas. In this paper, we propose a reliable new TGS system that provides 3D street as well as pin-pointed destination information in two stages of its interactive services; web-based and AR-based. The web server generates a guiding path on 2D digital map and displays 3D car-driving animation along the path. And, the AR-based service is embedded so that users can interactively obtain the detailed micro-level information of a specific section in the area with their fingertips. The implementation is based on autoformation of on-line GIS data structures from the available priori. For the verification, a 54 road network is selected as a test area. In the service demonstration, we show the effective awareness of street environments and the usefulness of this new TGS system.

  • Multi-User Detection Scheme Based on Hidden Training Sequence for DS-UWB Systems

    Sung-Yoon JUNG  Dong-Jo PARK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:1
      Page(s):
    239-242

    In this letter, we propose a multi-user detection scheme based on a hidden training sequence for DS-UWB systems. The hidden training sequence, which uses a fraction of the informative sequence's transmitting power as training information, is utilized for the receiver filter adaptation and channel estimation. By using this, the proposed scheme offers increased bandwidth efficiency (no period dedicated for training) and also shows reasonably good performance and near-far resistance in single and multiple-access UWB indoor multipath channel environment.

  • A Framework for Virtual Reality with Tangible Augmented Reality-Based User Interface

    Dongpyo HONG  Woontack WOO  

     
    PAPER

      Vol:
    E89-D No:1
      Page(s):
    45-52

    In this paper, we propose a framework for virtual reality, I2-NEXT, which enables users to interact with virtual objects by tangible objects in immersive networked virtual environment. The primary goal of this framework is to support rapid development of immersive and interactive virtual reality systems as well as various types of user interfaces. The proposed framework consists of user interface for interactions, immersive virtual environment, and networking interface. In this framework, we adopt several design patterns to guarantee that either developers or users (artists) can easily implement their VR applications without strong knowledge of VR techniques such as programming, libraries etc. One of the key features of this framework is the presence of the device module which supports a natural user interaction in a virtual environment. For example, the proposed framework provides users with tangible objects so that the users are able to manipulate virtual objects by touching real objects. The proposed framework also supports large scale stereoscopic display through clustering technique. To realize the effectiveness of the proposed framework, we have been developing an application for digital heritage reconstruction. Having been through development of the system, we believe that virtual reality technology is one of the promising technologies which enable users to experience realities in a digital space. Detailed explanations of each component and system architecture are presented.

  • Audio Narrowcasting and Privacy for Multipresent Avatars on Workstations and Mobile Phones

    Owen Noel Newton FERNANDO  Kazuya ADACHI  Uresh DUMINDUWARDENA  Makoto KAWAGUCHI  Michael COHEN  

     
    PAPER

      Vol:
    E89-D No:1
      Page(s):
    73-87

    Our group is exploring interactive multi- and hypermedia, especially applied to virtual and mixed reality multimodal groupware systems. We are researching user interfaces to control source→sink transmissions in synchronous groupware (like teleconferences, chatspaces, virtual concerts, etc.). We have developed two interfaces for privacy visualization of narrowcasting (selection) functions in collaborative virtual environments (CVES): for a workstation WIMP (windows/icon/menu/pointer) GUI (graphical user interface), and for networked mobile devices, 2.5- and 3rd-generation mobile phones. The interfaces are integrated with other CVE clients, interoperating with a heterogeneous multimodal groupware suite, including stereographic panoramic browsers and spatial audio backends & speaker arrays. The narrowcasting operations comprise an idiom for selective attention, presence, and privacy-- an infrastructure for rich conferencing capability.

  • Rejuvenating Communication Network System under Burst Arrival Circumstances

    Hiroyuki OKAMURA  Satoshi MIYAHARA  Tadashi DOHI  

     
    PAPER-Traffic Issues

      Vol:
    E88-B No:12
      Page(s):
    4498-4506

    Long running software systems are known to experience an aging phenomenon called software aging, one in which the accumulation of errors during the execution of software leads to performance degradation and eventually results in failure. To counteract this phenomenon a proactive fault management approach, called software rejuvenation, is particularly useful. It essentially involves gracefully terminating an application or a system and restarting it in a clean internal state. In this paper, we evaluate dependability performance of a communication network system with the software rejuvenation under the assumption that the requests arrive according to a Markov modulated Poisson process (MMPP). Three dependability measures, steady-state availability, loss probability of requests and mean response time on tasks, are derived through the hidden Markovian analysis based on the time-based software rejuvenation scheme. In numerical examples, we investigate the sensitivity of some model parameters to the dependability measures.

  • Blind Multiuser Detection Based on Power Estimation

    Guanghui XU  Guangrui HU  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:12
      Page(s):
    4647-4650

    Although the multiuser detection scheme based on Kalman filtering (K-MUD) proposed by Zhang and Wei, is referred to as a "blind" algorithm, in fact it is not really blind because it is conditioned on perfect knowledge of system parameter, power of the desired user. This paper derives an algorithm to estimate the power of the user of interest, and proposes a completely blind multiuser detection. Computer simulations show that the proposed parameter estimation scheme obtains excellent effect, and that the new detection scheme has nearly the same performance as the K-MUD, there is only slight degradation at very low input signal-to-interference ratios (SIR).

  • Analysis of Electromagnetic Fields in Inhomogeneous Media by Fourier Series Expansion Methods--The Case of a Dielectric Constant Mixed a Positive and Negative Regions--

    Tsuneki YAMASAKI  Katsuji ISONO  Takashi HINATA  

     
    PAPER-EM Analysis

      Vol:
    E88-C No:12
      Page(s):
    2216-2222

    In this paper, we propose a new method for the electromagnetic fields with inhomogeneous media mixed a positive and negative regions by the combination of improved Fourier series expansion method using the extrapolation method which obtains the correct value of the eigenvalue and eigenvectors for the case of TM wave. Numerical results are given for the power reflection and transmission coefficient, the energy absorption, the electromagnetic fields, and the power flow in the inhomogeneous medium mixed the positive and negative regions including the case when the permittivity profiles touches zero for the TM wave. The results of our method are in good agreement with exact solution which is obtained the modified multilayer approximation method.

  • A Step-by-Step Implementation Method of the Bit-Serial Reed-Solomon Encoder

    Jinsoo BAE  Hiroyuki MORIKAWA  

     
    LETTER-Coding Theory

      Vol:
    E88-A No:12
      Page(s):
    3672-3674

    The Reed-Solomon code is a versatile channel code pervasively used for communication and storage systems. The bit-serial Reed-Solomon encoder has a simple structure, although it is somewhat difficult to understand the algorithm without considerable theoretical background. Some professionals and students, not able to understand the algorithm thoroughly, might need to implement the bit-serial encoder for themselves. In this letter, a step-by-step method is presented for the implementation of the bit-serial encoder even without understanding the internal algorithm, which would be helpful for VHDL, DSP, and simulation programming.

  • Swiss Cheese Test Case Generation for Web Services Testing

    Wei-Tek TSAI  Xiao WEI  Yinong CHEN  Ray PAUL  Bingnan XIAO  

     
    PAPER

      Vol:
    E88-D No:12
      Page(s):
    2691-2698

    Current Web services testing techniques are unable to assure the desired level of trustworthiness, which presents a barrier to WS applications in mission and business critical environments. This paper presents a framework that assures the trustworthiness of Web services. New assurance techniques are developed within the framework, including specification verification via completeness and consistency checking, test case generation, and automated Web services testing. Traditional test case generation methods only generate positive test cases that verify the functionality of software. The proposed Swiss Cheese test case generation method is designed to generate both positive and negative test cases that also reveal the vulnerability of Web services. This integrated development process is implemented in a case study. The experimental evaluation demonstrates the effectiveness of this approach. It also reveals that the Swiss Cheese negative testing detects even more faults than positive testing and thus significantly reduces the vulnerability of Web services.

  • Autonomic Peer-to-Peer Service Directory

    Tim Hsin-ting HU  Aruna SENEVIRATNE  

     
    PAPER

      Vol:
    E88-D No:12
      Page(s):
    2630-2639

    Service registration and discovery are functionalities central to any service-oriented architecture, and they are often provided by centralized entities in today's systems. However, there are advantages of scalability, robustness, as well as distribution of control and cost by further decentralization of these functionalities to all the participants in the system. Peer-to-peer networks are great enablers toward this goal as they are designed to be scalable and autonomic; redundancy and automatic reconfiguarion are built into these systems, enabling peers to form and maintain the network autonomously. This article describes a fully decentralized service directory infrastructure built on top of the peer-to-peer protocol Chord. Service registration is performed implicitly by embedding semantic information into the peer identifiers, grouping peers by service categories and forming islands on the ring topology. Service discovery is performed by sending queries and anycast messages to peers registered in the appropriate islands. The routing protocol is further modified to take advantage of the island topology, with reputation mechanism and multi-path routing implemented to avoid the threat of misbehaving peers dropping transit messages in the system. Simulations were performed to assess the efficacy of both the new routing scheme and misbehavior avoidance.

  • Cryptanalysis of a Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards

    Wei-Chi KU  Hsiu-Mei CHUANG  Min-Hung CHIANG  

     
    LETTER-Information Security

      Vol:
    E88-A No:11
      Page(s):
    3235-3238

    Recently, Juang proposed an efficient password authenticated key agreement scheme using smart cards for the multi-server architecture. Juang's scheme was intended to provide mutual authentication and session key agreement. Herein, we show that Juang's scheme is vulnerable to a privileged insider's attack and is not easily reparable. Furthermore, it does not provide forward secrecy and the user eviction mechanism.

  • Timing-Driven Global Routing with Efficient Buffer Insertion

    Jingyu XU  Xianlong HONG  Tong JING  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E88-A No:11
      Page(s):
    3188-3195

    Timing optimization is an important goal of global routing in deep submicron era. To guarantee the timing performance of the circuit, merely adopting topology optimization becomes inadequate. In this paper, we present an efficient timing-driven global routing algorithm with buffer insertion. Our approach is capable of applying topological-based timing optimization and buffer insertion simultaneously with routablity considerations. Compared with previous works, we efficiently solve the timing issues under a limited buffer usage. The experimental results have demonstrated significant delay improvement within short runtime with very small number of buffers inserted.

1281-1300hit(2307hit)