The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SiON(4624hit)

3061-3080hit(4624hit)

  • Adaptive Terminal Middleware for Seamless Session Mobility

    Ken OHTA  Takashi YOSHIKAWA  Tomohiro NAKAGAWA  Shoji KURAKAKE  

     
    PAPER

      Vol:
    E86-D No:11
      Page(s):
    2343-2351

    Various network resources, including wireless access services and multimedia appliances (device) are expected to be available in ubiquitous computing environments. Since resource availability can change when a user migrates from one place to another, functions to monitor the availability of resources in use and, if necessary, switch from obsolete resources to new ones are necessary for continuous service provision. This paper proposes adaptive terminal middleware called AMID that performs policy-based dynamic resource selection and host-based session management to ease network administrative tasks, and hide session failures and resource changes from applications and a user. AMID supports two kinds of mobility; session maintenance on vertical handoff and device handoff (service mobility). By AMID, a mobile host keeps entire handoff control and session state to eliminate the need for network-layer or intermediate-node mobility support, and mitigate responsibility of devices for session management. AMID realizes a Reliable Virtual Socket (RVS), on top of real sockets, which employs a seamless session handoff mechanism for resource changes, and a reliable session resume mechanism against unplanned disconnection of a wireless link. It achieves seamless session handoff through a proactive soft handoff method; to conceal setup and signaling latency, it initiates setup procedures with neighbor resources in advance of actual handoff and utilizes multiple wireless interfaces and devices redundantly. We implemented AMID and a follow-me audio application on top of it to evaluate the performance. Redirection of audio streams from built-in speakers to external ones, and handoff between 802.11b and Cellular are autonomously performed when a user migrates in the house. We confirmed that AMID achieved reliable session maintenance against wireless link failure, concealed latency of handoff management, and prevented packet loss during handoff.

  • Parametric Design for Resin Self-Alignment Capability

    Jong-Min KIM  Kozo FUJIMOTO  

     
    PAPER-Electronic Components

      Vol:
    E86-C No:10
      Page(s):
    2129-2136

    We have developed a novel self-alignment process using the surface tension of the liquid resin for assembly of electronic and optoelectronic devices. Due to their characteristics of low surface tension, however, the parametric design guidelines are necessary for resin self-alignment capability. In this paper, a shape prediction mathematical model and a numerical method are developed. The developed system is capable of achieving the liquid joint geometry and the parametric design for self-alignment capability. The influences of geometric parameters such as liquid volume, component weight, pad radius, liquid surface tension on the shape of liquid joint are investigated. Furthermore, the parametric design guidelines considered the process-related practical matters of misalignment level, distribution of the supplied liquid volumes and coplanarity deviation includes difference of the height between the pads are provided.

  • Two Algorithms for Random Number Generation Implemented by Using Arithmetic of Limited Precision

    Tomohiko UYEMATSU  Yuan LI  

     
    PAPER-Information Security

      Vol:
    E86-A No:10
      Page(s):
    2542-2551

    This paper presents two different algorithms for random number generation. One algorithm generates a random sequence with an arbitrary distribution from a sequence of pure random numbers, i.e. a sequence with uniform distribution. The other algorithm generates a sequence of pure random numbers from a sequence of a given i.i.d. source. Both algorithms can be regarded as an implementation of the interval algorithm by using the integer arithmetic with limited precision. We analyze the approximation error measured by the variational distance between probability distributions of the desired random sequence and the output sequence generated by the algorithms. Further, we give bounds on the expected length of input sequence per one output symbol, and compare it with that of the original interval algorithm.

  • Stability and Adaptability of Autonomous Decentralized Flow Control in High-Speed Networks

    Chisa TAKANO  Masaki AIDA  

     
    PAPER-Network Control and Management

      Vol:
    E86-B No:10
      Page(s):
    2882-2890

    This paper focuses on flow control in high-speed networks. Each node in a network handles its local traffic flow on the basis of only the information it is aware of, but it is preferable that the decision-making of each node leads to high performance of the whole network. To this end, we investigate the relationship between the flow control mechanism of each node and network performance. We consider the situation in which the capacity of a link in the network is changed but individual nodes are not aware of this. Then we investigate the stability and adaptability of the network performance, and discuss an appropriate flow control model on the basis of simulation results.

  • The Correlation Deduction Method for Intrusion Decision Based on Heterogeneous Sensors

    Minsoo KIM  Bong-Nam NOH  

     
    PAPER-Applications of Information Security Techniques

      Vol:
    E86-D No:10
      Page(s):
    2209-2217

    An Anomaly detection sensor, to detect an abnormal use of system resources or an abnormal behavior of authorized users, uses various measures and decides on the basis of threshold value. However, it has high false alarm rate, and it make it hard to merchandise. Also, it is not easy to have a threshold which is suitable for installation environment. In this paper, we propose a method to automatic generation of proper threshold of each sensor, and the threshold is applied for an integrated decision. Also, we propose a computing method for a correlation of heterogeneous detection sensors. As we use the correlation to integrate and decide the opinions of each sensor, false positive can be greatly reduced.

  • A Decision-Directed Receiver for Alamouti Coded OFDM Systems

    Jaekwon KIM  Robert W. HEATH, Jr.  Edward J. POWERS  

     
    LETTER-Wireless Communication Technology

      Vol:
    E86-B No:10
      Page(s):
    3141-3143

    When the Alamouti code is applied (as a space-time block code) to an OFDM system with transmit diversity, the simple Alamouti decoding requires that each subchannel is flat-fading and constant over two symbol periods (Alamouti codeword period). The second requirement makes the Alamouti decoding scheme not suitable for time varying channels. In this Letter, we propose a new decision directed receiver to better accommodate time varying channels.

  • A Low Power Baseband Processor for a Portable Dual Mode DECT/GSM Terminal

    Christos DROSOS  Chrissavgi DRE  Spyridon BLIONAS  Dimitrios SOUDRIS  

     
    PAPER

      Vol:
    E86-D No:10
      Page(s):
    1976-1986

    The architecture and implementation of a novel processor suitable wireless terminal applications, is introduced. The wireless terminal is based on the novel dual-mode baseband processor for DECT and GSM, which supports both heterodyne and direct conversion terminal architectures and is capable to undertake all baseband signal processing, and an innovative direct conversion low power modulator/demodulator for DECT and GSM. The state of the art design methodologies for embedded applications and innovative low-power design steps followed for a single chip solution. The performance of the implemented dual mode direct conversion wireless terminal was tested and measured for compliance to the standards. The developed innovative terminal fulfils all the requirements and specifications imposed by the DECT and GSM standards.

  • Selection Method of Test Patterns in Soft-Decision Iterative Bounded Distance Decoding Algorithms

    Hitoshi TOKUSHIGE  Takuya KOUMOTO  Marc P.C. FOSSORIER  Tadao KASAMI  

     
    PAPER-Coding Theory

      Vol:
    E86-A No:10
      Page(s):
    2445-2451

    We consider a soft-decision iterative bounded distance decoding algorithm for binary linear block codes. In the decoding algorithm, bounded distance decodings are carried out with respect to successive input words, called the search centers. A search center is the sum of the hard-decision sequence of a received sequence and a sequence in a set of test patterns which are generated beforehand. This set of test patterns has influence on the error performance of the decoding algorithms as simulation results show. In this paper, we propose a construction method of a set of candidate test patterns and a selection method of test patterns based on an introduced measure of effectiveness of test patterns. For several BCH codes of lengths 127, 255 and 511, we show the effectiveness of the proposed method by simulation.

  • Iterative Decoding of High Dimensionality Parity Code

    Toshio FUKUTA  Yuuichi HAMASUNA  Ichi TAKUMI  Masayasu HATA  Takahiro NAKANISHI  

     
    PAPER-Coding Theory

      Vol:
    E86-A No:10
      Page(s):
    2473-2482

    Given the importance of the traffic on modern communication networks, advanced error correction methods are needed to overcome the changes expected in channel quality. Conventional countermeasures that use high dimensionality parity codes often fail to provide sufficient error correction capability. We propose a parity code with high dimensionality that is iteratively decoded. It provides better error correcting capability than conventional decoding methods. The proposal uses the steepest descent method to increase code bit reliability and the coherency between parities and code bits gradually. Furthermore, the quantization of the decoding algorithm is discussed. It is found that decoding with quantization can keep the error correcting capability high.

  • Face Image Recognition by 2-Dimensional Discrete Walsh Transform and Multi-Layer Neural Network

    Masahiro YOSHIDA  Takeshi KAMIO  Hideki ASAI  

     
    LETTER-Source Coding/Image Processing

      Vol:
    E86-A No:10
      Page(s):
    2623-2627

    This report describes face image recognition by 2-dimensional discrete Walsh transform and multi-layer neural networks. Neural network (NN) is one of the powerful tools for pattern recognition. In the previous researches of face image recognition by NN, the gray levels on each pixel of the face image have been used for input data to NN. However, because the face image has usually too many pixels, a variety of approaches have been required to reduce the number of the input data. In this research, 2-dimensional discrete Walsh transform is used for reduction of input data and the recognition is done by multi-layer neural networks. Finally, the validity of our method is varified.

  • A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized c-Secure CRT Code

    Hajime WATANABE  Takashi KITAGAWA  

     
    PAPER-Information Security

      Vol:
    E86-A No:10
      Page(s):
    2589-2595

    In digital content distribution systems, digital watermarking (fingerprinting) technique provides a good solution to avoid illegal copying and has been studied very actively. c-Secure CRT Code is one of the most practical ID coding schemes for such fingerprinting since it is secure against collusion attacks and also secure even though random errors are furthermore added. But its usefulness is decreased in the case that random errors are added because the code length will be longer. In this paper, a new collusion attack with addition of random errors is introduced and show that c-Secure CRT Code is not sufficiently secure against the attack at first. Next, we analyze the problem and propose a new ID coding scheme, Randomized c-Secure CRT Code which overcomes the problem. As a result, this new scheme improves the error tracing probabilities against the proposed attack drastically. This new scheme has the same code length, so this is one of the most responsible fingerprinting codes for content distribution systems.

  • An FTP Proxy System to Assure Providing the Latest Version of Replicated Files

    Junichi FUNASAKA  Masato BITO  Kenji ISHIDA  Kitsutaro AMANO  

     
    PAPER-Network Systems and Applications

      Vol:
    E86-B No:10
      Page(s):
    2948-2956

    As so many software titles are now being distributed via the Internet, the number of accesses to file servers, such as FTP servers, is rapidly increasing. To prevent the concentration of accesses to the original file server, mirror servers are being introduced that contain the same directories and files as held by the original server. However, inconsistency among the mirror servers and the original server is often observed because of delivery latency, traffic congestion on the network, and management policies of the mirror servers. This inconsistency degrades the value of the mirror servers. Accordingly, we have developed an intermediate FTP proxy server system that guarantees the freshness of the files as well as preventing access concentration on the original FTP server. The system adopts per-file selection of the replicated files; most existing methods are based on per-host or per-directory selection. Therefore it can assure users of a quick, stable, and up-to-date FTP mirroring service even in the face of frequent content updates, which tend to degrade the homogeneity of services. Moreover, it can forward the retrieved files with little overhead. Tests confirmed that our system is comparable to existing systems from the viewpoint of actual retrieval time, required traffic, and load endurance. This technology can assure clients that they will receive the latest version of the file(s) desired. It well supports heterogeneous network environments such as the Internet.

  • Automated Edge Detection by a Fuzzy Morphological Gradient

    Sathit INTAJAG  Kitti PAITHOONWATANAKIJ  

     
    PAPER-Image

      Vol:
    E86-A No:10
      Page(s):
    2678-2689

    Edge detection has been an essential step in image processing, and there has been much work undertaken to date. This paper inspects a fuzzy mathematical morphology in order to reach a higher-level of edge-image processing. The proposed scheme uses a fuzzy morphological gradient to detect object boundaries, when the boundaries are roughly defined as a curve or a surface separating homogeneous regions. The automatic edge detection algorithm consists of two major steps. First, a new version of anisotropic diffusion is proposed for edge detection and image restoration. All improvements of the new version use fuzzy mathematical morphology to preserve the edge accuracy and to restore the images to homogeneity. Second, the fuzzy morphological gradient operation detects the step edges between the homogeneous regions as object boundaries. This operation uses geometrical characteristics contained in the structuring element in order to extract the edge features in the set of edgeness, a set consisting of the quality values of the edge pixels. This set is prepared with fuzzy logic for decision and selection of authentic edge pixels. For experimental results, the proposed method has been tested successfully with both synthetic and real pictures.

  • On-Line Writer Recognition for Thai Numeral

    Pitak THUMWARIN  Takenobu MATSUURA  

     
    PAPER-Source Coding/Image Processing

      Vol:
    E86-A No:10
      Page(s):
    2535-2541

    In this paper, we propose an on-line writer recognition method for Thai numeral. A handwriting process is characterized by a change of numeral's shape, which is represented by two features, a displacement of pen-point position and an area of triangle determined from the two adjacent points of pen-point position and the origin. First, the above two features are expanded into Fourier series. Secondly, in order to describe feature of handwriting, FIR (Finite impulse response) system having the above Fourier coefficients as input and output of the system is introduced. The impulse response of the FIR system is used as the feature of handwriting. Furthermore, K-L expansion of the obtained impulse response is used to recognize writer. Writer recognition experiments are performed by using 3,770 data collected by 54 Thai writers for one year. The average of Type I (false rejection) error rate and Type II (false acceptance) error rate were 2.16% and 1.12%, respectively.

  • Calculation of Sommerfeld Integrals for Modeling Vertical Dipole Array Antenna for Borehole Radar

    Satoshi EBIHARA  Weng Cho CHEW  

     
    PAPER-Electromagnetic Theory

      Vol:
    E86-C No:10
      Page(s):
    2085-2096

    This paper describes a method for the fast evaluation of the Sommerfeld integrals for modeling a vertical dipole antenna array in a borehole. When we analyze the antenna inside a medium modeled by multiple cylindrical layers with the Method of Moment (MoM), we need a Green's function including the scattered field from the cylindrical boundaries. We focus on the calculation of Green's functions under the condition that both the detector and the source are situated in the innermost layer, since the Green's functions are used to form the impedance matrix of the antenna. Considering bounds on the location of singularities on a complex wave number plane, a fast convergent integration path where pole tracking is unnecessary is considered for numerical integration. Furthermore, as an approximation of the Sommerfeld integral, we describe an asymptotic expansion of the integrals along the branch cuts. The pole contribution of TM01 and HE11 modes are considered in the asymptotic expansion. To obtain numerical results, we use a fast convergent integration path that always proves to be accurate and efficient. The asymptotic expansion works well under specific conditions. The Sommerfeld integral values calculated with the fast evaluation method is used to model the array antenna in a borehole with the MoM. We compare the MoM data with experimental data, and we show the validity of the fast evaluation method.

  • A Hybrid Learning Approach to Self-Organizing Neural Network for Vector Quantization

    Shinya FUKUMOTO  Noritaka SHIGEI  Michiharu MAEDA  Hiromi MIYAJIMA  

     
    PAPER-Neuro, Fuzzy, GA

      Vol:
    E86-A No:9
      Page(s):
    2280-2286

    Neural networks for Vector Quantization (VQ) such as K-means, Neural-Gas (NG) network and Kohonen's Self-Organizing Map (SOM) have been proposed. K-means, which is a "hard-max" approach, converges very fast. The method, however, devotes itself to local search, and it easily falls into local minima. On the other hand, the NG and SOM methods, which are "soft-max" approaches, are good at the global search ability. Though NG and SOM exhibit better performance in coming close to the optimum than that of K-means, the methods converge slower than K-means. In order to the disadvantages that exist when K-means, NG and SOM are used individually, this paper proposes hybrid methods such as NG-K, SOM-K and SOM-NG. NG-K performs NG adaptation during short period of time early in the learning process, and then the method performs K-means adaptation in the rest of the process. SOM-K and SOM-NG are similar as NG-K. From numerical simulations including an image compression problem, NG-K and SOM-K exhibit better performance than other methods.

  • All-to-All Broadcast in Broadcast-and-Select WDM Networks with Tunable Devices of Limited Tuning Ranges

    Hongsik CHOI  

     
    PAPER-Fiber-Optic Transmission

      Vol:
    E86-B No:9
      Page(s):
    2575-2582

    In this paper, we consider the all-to-all broadcast problem in optical broadcast star networks using Wavelength Division Multiplexing. Our network model assumes that receivers are fixed-tuned and transmitters are tunable such that optical lasers assigned to transmitters have limited access to the network bandwidth; hence, each node must be equipped with multiple optical lasers and/or multiple optical filters in order to maintain a single-hop network. This paper is primarily concerned with single-hop networks, in which each node is assigned a single optical filter. Lower bounds are first established on the number of lasers per each node and the minimum schedule length, and a schedule achieving the minimum schedule length is presented. The results are applicable to arbitrary tuning delays, arbitrary numbers of wavelength channels, and optical lasers' arbitrary tuning ranges. Network models with optical devices having limited tuning ranges have not yet been considered in connection with transmission schedules, and this is the first work in this new direction.

  • Uplink Packet Transmission Control for Asymmetric Traffic in CDMA/Shared-TDD Cellular Packet Communications

    Kazuo MORI  Tomotaka NAGAOSA  Hideo KOBAYASHI  

     
    PAPER-Wireless Communication Technology

      Vol:
    E86-B No:9
      Page(s):
    2620-2627

    A shared-TDD scheme has been proposed for accommodation of asymmetric communications between uplink and downlink traffic. The application of shared-TDD scheme to CDMA cellular systems causes inter-link interference because CDMA cellular systems use the same frequency band for all cells. This paper proposes a transmission control scheme for uplink packets to relieve the effect of inter-link interference in CDMA/shared-TDD cellular packet systems. In the proposed scheme, mobile stations select transmission slots based on their location and the status of slot allocations in own and the adjacent cells. Computer simulations show that the proposed scheme relieves the effect of inter-link interference, and thus improves the downlink transmission efficiency.

  • Measuring Errors on 3D Meshes Using Pixel Based Search

    Kohji INAGAKI  Masahiro OKUDA  Masaaki IKEHARA  Shin-ichi TAKAHASHI  

     
    PAPER-Computer Graphics

      Vol:
    E86-D No:9
      Page(s):
    1903-1908

    Due to the explosive growth of the network technologies, 3D models and animations have led to a great interest in various media. Especially 3D mesh models (3D meshes), which approximate surfaces by polygonal meshes are widely used to model 3D objects. In 1D and 2D signals such as speech, audio, images, video, etc., the signal values are located on "grids", for example the signals of images are defined on pixels. Thus, the errors of such signals can be explicitly defined by differences of the values on the "grids". However since in the 3D meshes, vertices are located on arbitrary positions in a 3D space and are triangulated in arbitrary ways, the grids cannot be defined. This makes it difficult to measure error on the 3D meshes. In this paper, we propose a new numerical method to measure the errors between two different 3D meshes.

  • Digital Watermarking Based on Guided Scrambling and Its Robustness Evaluation to JPEG Compression

    Akiomi KUNISA  

     
    PAPER-Information Security

      Vol:
    E86-A No:9
      Page(s):
    2366-2375

    Digital watermarking systems are required to embed as much information as possible in a digital media without the perceptual distortion as well as to extract it correctly with high probabilities, even though the media is subjected to many kinds of operations. To this end, guided scrambling (GS) techniques, usually used for a recording channel, are applied to digital watermarking systems. A simple GS scheme can make the power of a watermark signal larger against the power of media noise under the condition of preserving the perceptual fidelity, resulting in smaller error probabilities of the retrieved watermark bits. In addition, watermarking systems based on the GS can have more robustness to some specified operations if the prior information on the operations is given to the embedder. JPEG compression is a good example of such an operation when still images are transmitted over the Internet. In order for watermark signals to be more tolerable to the known JPEG attack, the GS-based watermark embedder is informed of advance knowledge of the JPEG compression. Further, a configuration of the GS concatenated with turbo coding is introduced to lower the bit error rate more.

3061-3080hit(4624hit)