The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

6981-7000hit(16314hit)

  • Recursive Frequency Offset Estimation for MIMO System in Flat-Fading Channels

    Xiaoxu CHEN  Tao LIU  Yaohuan GONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E92-A No:8
      Page(s):
    2124-2128

    This letter presents recursive frequency offset estimation for MIMO (Multiple Input Multiple Output) system in flat-fading channels. With the recursive estimation, the frequency offset range in MIMO system can be extended compared with normal estimation. Simulation results show that the recursive frequency offset estimation is valid for large frequency offset.

  • Unconditionally Secure Group Signatures

    Takenobu SEITO  Yuki HARA  Junji SHIKATA  Tsutomu MATSUMOTO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E92-A No:8
      Page(s):
    2067-2085

    A group signature scheme introduced by Chaum and Van Heyst allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signer of a group signature can be revealed only by a privileged entity, called a group manager. The group signature scheme has mainly been studied from the viewpoint of computational security setting so far. The main contribution of this paper is to study group signature schemes in unconditional security. More specifically, we newly introduce strong security notions of unconditionally secure group signatures (USGS for short) based on the idea of those of computationally secure group signatures proposed by Bellare, Micciancio and Warinschi. We also provide a generic method to construct USGS that is provably secure in our security definition. More precisely, we construct USGS by combining an encryption scheme with a signature, and show that the constructed scheme is unconditionally secure if the encryption and the signature used in the construction are unconditionally secure. Finally, we provide an instantiation of the one-time secure group signature scheme based on the generic construction.

  • Illumination-Robust Face Recognition from a Single Image per Person Using Matrix Polar Decomposition

    Mehdi EZOJI  Karim FAEZ  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E92-D No:8
      Page(s):
    1561-1569

    In this paper, a novel illumination invariant face recognition algorithm is proposed for face recognition. This algorithm is composed of two phases. In the first phase, we reduce the effect of illumination changes using a nonlinear mapping of image intensities. Then, we modify the distribution of the coefficients of wavelet transform in certain sub-bands. In this step, the recognition performance is more important than image quality. In the second phase, we used the unitary factor of polar decomposition of enhanced image as a feature vector. In the recognition phase, the correlation-based nearest neighbor rule is applied for the matching. We have performed some experiments on several databases and have evaluated the proposed method in different aspects. Experimental results in recognition show that this approach provides a suitable representation for overcoming illumination effects.

  • Physical Layer Network Coding for Wireless Cooperative Multicast Flows

    Jun LI  Wen CHEN  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:8
      Page(s):
    2559-2567

    It has been proved that wireless network coding can increase the throughput of multi-access system [2] and bi-directional system [5] by taking the advantage of the broadcast nature of electromagnetic waves. In this paper, we introduce the wireless network coding to cooperative multicast system. We establish a basic 2-source and 2-destination cooperative system model with arbitrary number of relays (2-N-2 system). Then two regenerative network coding (RNC) protocols are designed to execute the basic idea of network coding in complex field (RCNC) and Galois field (RGNC) respectively. We illuminate how network coding can enhance the throughput distinctly in cooperative multicast system. Power allocation schemes as well as precoder design are also carefully studied to improve the system performance in terms of system frame error probability (SFEP).

  • Bucket Sieving

    Kazumaro AOKI  Hiroki UEDA  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1845-1850

    This paper proposes a new sieving algorithm that employs a bucket sort as a part of a factoring algorithm such as the number field sieve. The sieving step requires an enormous number of memory updates; however, these updates usually cause cache hit misses. The proposed algorithm significantly reduces the number of cache hit misses when the size of the sieving region is roughly less than the square of the cache size, and the memory updates are several times faster than the straightforward implementation according to the PC experiments.

  • Analytical Model of Melting Phenomena for Breaking Relay Contacts

    Noboru WAKATSUKI  Nobuo TAKATSU  Toshiteru MAEDA  Takayuki KUDO  

     
    PAPER-Arc Discharge & Contact Phenomena

      Vol:
    E92-C No:8
      Page(s):
    1003-1007

    Using the transient current switch circuit in parallel with the energizing contacts, the slow decay of the contact current due to thermal fusion of metal was observed just after the contact voltage exceeded the melting contact voltage Um. At that time, the contact voltage was higher than the boiling contact voltage Ub. These results contradict Holm's θ theory. A new melting model of breaking mechanical contact is proposed. The area surrounding a cluster of contacting a-spots melts, the melt metal diffuses, and the contact spot thermally shrinks. Including the metal phase transition from solid to liquid, the increase of contact resistance is introduced to the electric circuit analysis. The numerical analysis agrees qualitatively with measured V-I characteristics.

  • Improving Performance of SC-UWB Systems with the Optimum SRAKE Based RAKE-DFE Receiver

    Zhenyu XIAO  Li SU  Depeng JIN  Lieguang ZENG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:8
      Page(s):
    2751-2754

    Single-carrier ultra-wideband (SC-UWB) is weak due to the problem of serious inter-symbol interference (ISI), which is generated in dense multipath with a long root-mean-square (RMS) delay spread. The selective RAKE (SRAKE) based RAKE-decision feedback equalizer (RAKE-DFE) receiver is usually employed to combat ISI in practical SC-UWB systems. Considering the system complexity, however, the number of RAKE fingers is usually small. In this case, conventional RAKE-DFE receivers can hardly collect enough energy to achieve a good performance. In this paper, the optimum SRAKE based RAKE-DFE receiver was proposed as a solution. Theoretical analysis and simulations are presented. Results and conclusions show that the proposed SRAKE scheme is optimum to collect energy of multipath. Moreover, the proposed RAKE-DFE receiver outperforms conventional RAKE-DFE receiver by about 1 dB, but the complexity for them both is almost the same.

  • Sender Authenticated Key Agreements without Random Oracles

    Chifumi SATO  Takeshi OKAMOTO  Eiji OKAMOTO  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1787-1794

    The purpose of this paper is to study sender authenticated key agreements by a third party, which uses the received parameters to verify the fact that a sender of a message knows his long-term private key. In particular, we propose a standard model for the protocol among three entities for the first time. The security of this protocol depends on the difficulty of solving two new problems related to one-way isomorphisms and the decision co-bilinear Diffie-Hellman problem on multiplicative cyclic groups. It is the first time that the security of a key agreement has been formally proven by using negligible probability. We believe that our contribution gives many applications in the cryptographic community.

  • Area Concentric Beacons Localization for Wireless Sensor Networks

    Qing ZHOU  Depeng JIN  Li SU  Lieguang ZENG  

     
    LETTER-Measurement Technology

      Vol:
    E92-A No:8
      Page(s):
    2151-2154

    Localization is one of the fundamental problems in many wireless sensor networks applications, but most of them require the node to equip special range-determining or angle-determining hardware in order to obtain the position related information. In this paper, we propose a concentric beacons localization algorithm which is a range-free approach. Four anchors are set in the four corners of the square target region, and emit localizing beacons at different power levels, with the information of their position and the estimated range of the beacon. The nodes in this region receive these beacons and compute their positions correspondingly. In region of different scale, we propose two alternative schemes. The one for small scale has lower calculation complexity, and the other has better stability on large scale applications. Simulation results show the estimation error is less than 0.4 times the beacon interval.

  • Handover Control Method Using Resource Reservation in Mobile Multimedia Networks

    Dong Chun LEE  Jong Chan LEE  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E92-B No:8
      Page(s):
    2684-2697

    When handover events occur during the transmission of multimedia traffic, efficient handover control procedures and radio resource allocation are necessary to maintain the same QoS of transmitted multimedia traffic because the QoS may be degraded by additional delay and information loss. In this paper we propose a new handover control method for the next generation mobile multimedia networks, in which the handover setup process is done in advance of a handover request by predicting the handover cell from mobile terminal's current position. The handover procedures for real-time sessions are performed based on the handover cell information and the resource reservation condition. The radio resources in the estimated adjacent cells should be reserved and allocated to guarantee the continuity of the real-time sessions. We conduct a simulation model that is focused on the handover failure rate and packet loss rate. The simulation results show that our proposed method provides better performance than the previous methods.

  • Adaptive Sense Current Control for DC-DC Boost Converters to Get Accurate Voltage

    Robert Chen-Hao CHANG  Hou-Ming CHEN  Wang-Chuan CHENG  Chu-Hsiang CHIA  Pui-Sun LEI  Zong-Yui LIN  

     
    PAPER-Electronic Circuits

      Vol:
    E92-C No:8
      Page(s):
    1066-1072

    This study utilizes a new adaptive sense current controller to get an accurate power supply. The proposed controller effectively reduces output ripple voltage of converters operated over the load current range. This reduction is realized using an adaptive sense current circuit that automatically adjusts the inductor current according to operational conditions. The proposed boost converter is designed and fabricated with a standard TSMC 3.3/5 V 0.35-µm 2P4M CMOS technology. The experimental results show that the power-conversion efficiency of the proposed boost converter is 2-5% higher than that of the conventional converter with a current-limited circuit. The proposed circuit greatly reduces (i.e. by 76%) output ripple voltage compared with the conventional circuit at a 10 mA loading current.

  • Performance Evaluation of MIMO-UWB Systems Using Measured Propagation Data and Proposal of Timing Control Scheme in LOS Environments

    Masaki TAKANASHI  Toshihiko NISHIMURA  Yasutaka OGAWA  Takeo OHGANE  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:8
      Page(s):
    2698-2707

    Ultrawide-band impulse radio (UWB-IR) technology and multiple-input multiple-output (MIMO) systems have attracted interest regarding their use in next-generation high-speed radio communication. We have studied the use of MIMO ultrawide-band (MIMO-UWB) systems to enable higher-speed radio communication. We used frequency-domain equalization based on the minimum mean square error criterion (MMSE-FDE) to reduce intersymbol interference (ISI) and co-channel interference (CCI) in MIMO-UWB systems. Because UWB systems are expected to be used for short-range wireless communication, MIMO-UWB systems will usually operate in line-of-sight (LOS) environments and direct waves will be received at the receiver side. Direct waves have high power and cause high correlations between antennas in such environments. Thus, it is thought that direct waves will adversely affect the performance of spatial filtering and equalization techniques used to enhance signal detection. To examine the feasibility of MIMO-UWB systems, we conducted MIMO-UWB system propagation measurements in LOS environments. From the measurements, we found that the arrival time of direct waves from different transmitting antennas depends on the MIMO configuration. Because we can obtain high power from the direct waves, direct wave reception is critical for maximizing transmission performance. In this paper, we present our measurement results, and propose a way to improve performance using a method of transmit (Tx) and receive (Rx) timing control. We evaluate the bit error rate (BER) performance for this form of timing control using measured channel data.

  • An Efficient Motion Vector Coding Scheme Based on Prioritized Reference Decision

    Dajiang ZHOU  Jinjia ZHOU  Satoshi GOTO  

     
    PAPER-Realization

      Vol:
    E92-A No:8
      Page(s):
    1978-1985

    In the latest video coding frameworks, efficiency of motion vector (MV) coding is becoming increasingly important because of the growing bit rate portion of motion information. However, neither the conventional median predictor, nor the newer schemes such as the minimum bit rate prediction scheme and the hybrid scheme, can effectively eliminate the local redundancy of motion vectors. In this paper, we present the prioritized reference decision scheme for efficient motion vector coding, based on the H.264/AVC framework. This scheme makes use of a boolean indicator to specify whether the median predictor is to be used for the current MV or not. If not, the median prediction is considered not suitable for the current MV, and this information is used for refining the possible space of a group of reference MVs including 4 neighboring MVs and the zero MV. This group of MVs is organized to be a prioritized list so that the reference MV with highest priority is to be selected as the prediction value. Furthermore, the boolean indicators are coded into the modified code words of mb_type and sub_mb_type, so as to reduce the overhead. By applying the proposed scheme, the structure and the applicability problems with the state-of-the-art MBP scheme have been overcome. Experimental result shows that the proposed scheme achieves a considerable reduction of bits for MVDs, compared with the conventional median prediction algorithm. It also achieves a better and much stabler performance than MBP-based MV coding.

  • Automatic Singing Performance Evaluation for Untrained Singers

    Chuan CAO  Ming LI  Xiao WU  Hongbin SUO  Jian LIU  Yonghong YAN  

     
    LETTER-Music Information Processing

      Vol:
    E92-D No:8
      Page(s):
    1596-1600

    In this letter, we present an automatic approach of objective singing performance evaluation for untrained singers by relating acoustic measurements to perceptual ratings of singing voice quality. Several acoustic parameters and their combination features are investigated to find objective correspondences of the perceptual evaluation criteria. Experimental results show relative strong correlation between perceptual ratings and the combined features and the reliability of the proposed evaluation system is tested to be comparable to human judges.

  • Contact Area Analysis by FEM with Plating Layer for Electrical Contact

    Kaori SHIMIZU  Shigeki SHIMADA  Shigeru SAWADA  Yasuhiro HATTORI  

     
    PAPER-Arc Discharge & Contact Phenomena

      Vol:
    E92-C No:8
      Page(s):
    1013-1019

    Electrical contacts are the most important parts of electrical circuits, and many reliability problems of the circuits are related to contact failure. The contact resistance is one of the important factors for assessing connector reliability, and thus the prediction of contact resistance is essential to designing electrical terminals. In this study, embossments, each 1 mm to 3 mm in radius, were brought into contact with flat planes to simulate the point of contact on a terminal, and the contact resistance was measured using a four-probe method under a load up to 40 N. Copper alloy samples, each plated with tin or silver and having an embossment of 1 mm to 3 mm in radius, were used and the visually clear indentations resulting from the embossment to plane contact were measured to determine their areas. Since the contact resistance is dependent on the contact area, an FEM analysis must be carried out to determine the contact areas correctly. In this paper, an elasto-plastic FEM analysis was performed taking the plating layers into account, and a method was established to make precise determination of the contact areas for different shapes of contacts and loads. The resultant contact areas were used to calculate the contact resistance, which showed a good agreement with experimental results. It was established that the load-resistance curves can be predicted on the basis of the shapes of the contacts as well as plating.

  • Frequency-Domain Equalization with Iterative Block Noise-Prediction for Single-Carrier Systems

    Ang FENG  Qinye YIN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:8
      Page(s):
    2747-2750

    In this letter, we propose a novel frequency-domain equalizer (FDE) for single-carrier systems characterized by severe inter-symbol interference (ISI) channels; it consists of a linear FDE and an iterative block noise-predictor (IBNP). Unlike the FDE with time-domain noise predictor (FDE-NP), the proposed scheme allows the feedback equalizer being an uncausal filter, and performs the noise prediction in an iterative manner. For this reason, FDE-IBNP can remove both precursor and postcursor ISI, and alleviate the impact of error-propagation. Besides, our scheme has lower computational complexity than the present iterative block equalizers.

  • Search Control Algorithm Based on Random Step Size Hill-Climbing Method for Adaptive PMD Compensation

    Ken TANIZAWA  Akira HIROSE  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E92-B No:8
      Page(s):
    2584-2590

    Adaptive polarization mode dispersion (PMD) compensation is required for the speed-up and advancement of the present optical communications. The combination of a tunable PMD compensator and its adaptive control method achieves adaptive PMD compensation. In this paper, we report an effective search control algorithm for the feedback control of the PMD compensator. The algorithm is based on the hill-climbing method. However, the step size changes randomly to prevent the convergence from being trapped at a local maximum or a flat, unlike the conventional hill-climbing method. The randomness depends on the Gaussian probability density functions. We conducted transmission simulations at 160 Gb/s and the results show that the proposed method provides more optimal compensator control than the conventional hill-climbing method.

  • An Accurate Scene Segmentation Method Based on Graph Analysis Using Object Matching and Audio Feature

    Makoto YAMAMOTO  Miki HASEYAMA  

     
    PAPER-Speech/Audio

      Vol:
    E92-A No:8
      Page(s):
    1883-1891

    A method for accurate scene segmentation using two kinds of directed graph obtained by object matching and audio features is proposed. Generally, in audiovisual materials, such as broadcast programs and movies, there are repeated appearances of similar shots that include frames of the same background, object or place, and such shots are included in a single scene. Many scene segmentation methods based on this idea have been proposed; however, since they use color information as visual features, they cannot provide accurate scene segmentation results if the color features change in different shots for which frames include the same object due to camera operations such as zooming and panning. In order to solve this problem, scene segmentation by the proposed method is realized by using two novel approaches. In the first approach, object matching is performed between two frames that are each included in different shots. By using these matching results, repeated appearances of shots for which frames include the same object can be successfully found and represented as a directed graph. The proposed method also generates another directed graph that represents the repeated appearances of shots with similar audio features in the second approach. By combined use of these two directed graphs, degradation of scene segmentation accuracy, which results from using only one kind of graph, can be avoided in the proposed method and thereby accurate scene segmentation can be realized. Experimental results performed by applying the proposed method to actual broadcast programs are shown to verify the effectiveness of the proposed method.

  • New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model

    Le Trieu PHONG  Wakaha OGATA  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1822-1835

    We explicitly describe and analyse blind hierachical identity-based encryption (blind HIBE) schemes, which are natural generalizations of blind IBE schemes [20]. We then uses the blind HIBE schemes to construct: (1) An identity-based blind signature scheme secure in the standard model, under the computational Diffie-Hellman (CDH) assumption, and with much shorter signature size and lesser communication cost, compared to existing proposals. (2) A new mechanism supporting a user to buy digital information over the Internet without revealing what he/she has bought, while protecting the providers from cheating users.

  • Performance Enhancement of IEEE 802.11 WLAN with a Cognitive Radio Technique

    Tomoya TANDAI  Masahiro TAKAGI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:8
      Page(s):
    2649-2666

    Cognitive Radio (CR) is expected to bring about a more flexible wireless communication environment by the efficient utilization of spectrum resources. In this paper, a CR coexisting with IEEE 802.11 Wireless Local Area Networks (WLANs) is proposed. In the Distributed Coordination Function (DCF) access scheme in IEEE 802.11 WLAN, a station (STA) transmits a data frame by executing a random backoff procedure after Distributed Inter Frame Space (DIFS) period, and the destination STA of the data frame responds with Ack frame to the source STA after Short Inter Frame Space (SIFS) period. After the Ack frame is transmitted, the same procedures are repeated. The proposed CR terminal recognizes the DIFS period and the SIFS period, and then it transmits CR signals during these periods with the transmission power that does not affect the IEEE 802.11 WLAN protocol. Thus, the proposed CR terminals recognize the periods during which IEEE 802.11 STAs do not transmit any frames and they use the periods to transmit CR signals. In this paper, IEEE 802.11 WLAN STA that has the capability for the proposed CR technique in addition to the normal 802.11 WLAN capability is considered and the improved average throughputs by the CR communications are evaluated in the computer simulation, and then the effectiveness of the proposed method is clarified.

6981-7000hit(16314hit)