The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SiON(4624hit)

961-980hit(4624hit)

  • Digital Spatial Modulation Using Dual Scatterers Embedded with Switches for Wireless Power Transmission Applications

    Kohei HASEGAWA  Ryo ISHIKAWA  Akira SAITOU  Kazuhiko HONJO  

     
    PAPER-Scattering and Diffraction

      Vol:
    E98-C No:7
      Page(s):
    709-715

    A digital spatial modulation method has been demonstrated for a wireless power transmission system at 5.8 GHz. Interference of electromagnetic waves, which are radiated from the dual scatterers, successfully realizes the spatial modulation. The spatial modulation is performed with a digital modulation manner by controlling capacitances embedded in one of the dual scatterers so that the interference of the scattered waves is appropriately changed. Switch MMICs based on p-HEMT technology was newly developed for the spatial modulation. Measured insertion losses of the switch MMIC are 1.0 dB and 14 dB for on and off states at 5.8 GHz, respectively. The isolation is more than 20 dB. With the switch MMIC, digital spatial modulation characteristics were experimentally demonstrated at 5.8 GHz. One-bit amplitude shift keying (ASK) for 1 MHz signal was realized at 5.8 GHz, and two levels were clearly discriminated. The modulation factor is 36%. In addition, 2-bit ASK signal was detected at 7.1 GHz.

  • Intra Prediction Using an Advanced Most Probable Mode in H.264/AVC

    Yeon-Kyeong JEONG  Woon-Young YEO  Jong-Ki HAN  

     
    LETTER-Image

      Vol:
    E98-A No:7
      Page(s):
    1588-1591

    The mode of intra prediction in H.264/AVC is encoded based on the most probable mode (MPM). To increase coding efficiency, the probability of the case that MPM is equal to coding mode of the current block should increase. In this paper we propose an efficient scheme to make MPM which is matched for the spatial direction property of pixels in the current block. Simulation results show that the proposed scheme gives significant coding gains when compared with the conventional techniques.

  • Equation-Based Transmission Power Control for Wearable Sensor Systems

    Namgi KIM  Jin-a HONG  Byoung-Dai LEE  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:7
      Page(s):
    1558-1561

    In emerging wearable sensor systems, it is crucial to save energy because these systems are severely energy-constrained. For making the sensors in these systems energy efficient, transmission power control (TPC) is widely used, and thus far, many TPC algorithms have been proposed in the literature. However, these TPC algorithms do not always work well in all wireless body channel conditions, which are capriciously varied due to diverse sensor environments such as sensor placements, body movements, and body locations. In this paper, we propose a simple TPC algorithm that quickly and stably approaches the optimal transmission power level and works well in all wearable sensor environments. We experimentally evaluated the proposed TPC algorithm and proved that it works well under all wireless body channel conditions.

  • Model-Based Contract Testing of Graphical User Interfaces

    Tugkan TUGLULAR  Arda MUFTUOGLU  Fevzi BELLI  Michael LINSCHULTE  

     
    PAPER-Software Engineering

      Pubricized:
    2015/03/19
      Vol:
    E98-D No:7
      Page(s):
    1297-1305

    Graphical User Interfaces (GUIs) are critical for the security, safety and reliability of software systems. Injection attacks, for instance via SQL, succeed due to insufficient input validation and can be avoided if contract-based approaches, such as Design by Contract, are followed in the software development lifecycle of GUIs. This paper proposes a model-based testing approach for detecting GUI data contract violations, which may result in serious failures such as system crash. A contract-based model of GUI data specifications is used to develop test scenarios and to serve as test oracle. The technique introduced uses multi terminal binary decision diagrams, which are designed as an integral part of decision table-augmented event sequence graphs, to implement a GUI testing process. A case study, which validates the presented approach on a port scanner written in Java programming language, is presented.

  • Design and Fabrication of Three-Bit Reconfigurable Bandpass Filter Using Branch-Line Type Variable Resonator

    Ryosuke KOBAYASHI  Takumi KATO  Kazuhiro AZUMA  Yasushi YAMAO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E98-C No:7
      Page(s):
    636-643

    Current mobile communication terminals are equipped with multiple RF circuits that cover all frequency bands assigned for the communication. In order to make efficient use of frequency spectrum and to reduce circuits in a terminal, a low-loss reconfigurable RF filter is necessary to flexibly change RF frequencies. In this paper, a new reconfigurable bandpass filter (BPF) having eight-frequency (three-bit) selection capability is proposed. It employs branch-line switched type variable resonators that provide low insertion loss. One of the design issues is how to control pass bandwidths among selectable frequencies. In order to analyze the bandwidth variation of the reconfigurable BPF, we calculate the changes of external Q and coupling coefficients. It is shown that the inductive coupling design can achieve less variation of bandwidth for the reconfigurable BPF, compared with commonly used capacitive coupling design. A prototype BPF on a printed circuit board with high dielectric constant substrate has been fabricated and evaluated in 2 GHz bands. It presents performance very close to the design results with respect to insertion loss, center frequency and passband bandwidth. Low insertion loss of less than 1 dB is achieved among the eight frequencies.

  • Suppression of Mode Conversion by Using Tightly Coupled Asymmetrically Tapered Bend in Differential Lines

    Yoshitaka TOYOTA  Shohei KAN  Kengo IOKIBE  

     
    PAPER

      Vol:
    E98-B No:7
      Page(s):
    1188-1195

    In this paper, we propose a tightly coupled asymmetrically tapered bend to suppress differential-to-common mode conversion caused by bend discontinuity in a pair of differential lines. Tightly coupled symmetrically tapered bends have been so far proposed to suppress the mode conversion by decreasing the path difference in the bend. This approach makes the path difference shorter so that the differential lines are coupled more tightly but the path difference of twice the sum of the line width and the line separation still remains. To suppress the remaining path difference, this paper introduces the use of asymmetric tapers. In addition, two-section tapers are applied to reduce differential-mode reflection increased by the tapers and hence improve differential-mode propagation. A full-wave simulation of a right-angled bend demonstrates that the forward differential-to-common mode conversion is decreased by almost 30 dB compared to the symmetrically tapered bend and that the differential-mode reflection coefficient is reduced to the same amount as that of the classic bend. Also, the generality of the proposed bend structure is discussed.

  • Method of Spread Spectrum Watermarking Using Quantization Index Modulation for Cropped Images

    Takahiro YAMAMOTO  Masaki KAWAMURA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2015/04/16
      Vol:
    E98-D No:7
      Page(s):
    1306-1315

    We propose a method of spread spectrum digital watermarking with quantization index modulation (QIM) and evaluate the method on the basis of IHC evaluation criteria. The spread spectrum technique can make watermarks robust by using spread codes. Since watermarks can have redundancy, messages can be decoded from a degraded stego-image. Under IHC evaluation criteria, it is necessary to decode the messages without the original image. To do so, we propose a method in which watermarks are generated by using the spread spectrum technique and are embedded by QIM. QIM is an embedding method that can decode without an original image. The IHC evaluation criteria include JPEG compression and cropping as attacks. JPEG compression is lossy compression. Therefore, errors occur in watermarks. Since watermarks in stego-images are out of synchronization due to cropping, the position of embedded watermarks may be unclear. Detecting this position is needed while decoding. Therefore, both error correction and synchronization are required for digital watermarking methods. As countermeasures against cropping, the original image is divided into segments to embed watermarks. Moreover, each segment is divided into 8×8 pixel blocks. A watermark is embedded into a DCT coefficient in a block by QIM. To synchronize in decoding, the proposed method uses the correlation between watermarks and spread codes. After synchronization, watermarks are extracted by QIM, and then, messages are estimated from the watermarks. The proposed method was evaluated on the basis of the IHC evaluation criteria. The PSNR had to be higher than 30 dB. Ten 1920×1080 rectangular regions were cropped from each stego-image, and 200-bit messages were decoded from these regions. Their BERs were calculated to assess the tolerance. As a result, the BERs were less than 1.0%, and the average PSNR was 46.70 dB. Therefore, our method achieved a high image quality when using the IHC evaluation criteria. In addition, the proposed method was also evaluated by using StirMark 4.0. As a result, we found that our method has robustness for not only JPEG compression and cropping but also additional noise and Gaussian filtering. Moreover, the method has an advantage in that detection time is small since the synchronization is processed in 8×8 pixel blocks.

  • Fusion on the Wavelet Coefficients Scale-Related for Double Encryption Holographic Halftone Watermark Hidden Technology

    Zifen HE  Yinhui ZHANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/03/27
      Vol:
    E98-D No:7
      Page(s):
    1391-1395

    We present a new framework for embedding holographic halftone watermarking data into images by fusion of scale-related wavelet coefficients. The halftone watermarking image is obtained by using error-diffusion method and converted into Fresnel hologram, which is considered to be the initial password. After encryption, a scrambled watermarking image through Arnold transform is embedded into the host image during the halftoning process. We characterize the multi-scale representation of the original image using the discrete wavelet transform. The boundary information of the target image is fused by correlation of wavelet coefficients across wavelet transform layers to increase the pixel resolution scale. We apply the inter-scale fusion method to gain fusion coefficient of the fine-scale, which takes into account both the detail of the image and approximate information. Using the proposed method, the watermarking information can be embedded into the host image with recovery against the halftoning operation. The experimental results show that the proposed approach provides security and robustness against JPEG compression and different attacks compared to previous alternatives.

  • Design and Characterization of a Secondary Side Smart-Power Integrated Active Asynchronous Voltage Clamp

    Jindrich WINDELS  Ann MONTÉ  Jan DOUTRELOIGNE  

     
    PAPER-Electronic Circuits

      Vol:
    E98-C No:6
      Page(s):
    518-527

    As is well known in the design of transformer isolated converters, the transformer leakage inductance causes a large voltage overshoot on the secondary side switching nodes at every switch transition, unless measures are taken to limit the peak voltage stress. Since the peak voltage stress in smart-power integrated converters, where the power devices are integrated on the same die as the controlling logic and supporting circuits, is the major determining factor for the required silicon area for the implementation, this is a major roadblock for the affordable integration of this type of converter. Therefore, any cost-effective smart-power synchronous rectifier requires a voltage clamping circuit that minimizes the voltage stress, while still maintaining the potential advantages of smart-power converters, i.e. minimizing the number and size of the discrete components in the converter. We present an integrated asynchronous active clamping circuit, that can clamp the overshoot voltage to arbitrary voltages while optimizing the efficiency by only being active when required. Because of the asynchronous operation, the size of the required external components is minimized. Measurements on the smart-power IC implementation of the asynchronous active clamp circuit combined with a secondary side synchronous rectifier for a 1 MHz full bridge converter confirm the reduction in voltage stress and the optimization of the efficiency.

  • Blind Interference Suppression Scheme by Eigenvector Beamspace CMA Adaptive Array with Subcarrier Transmission Power Assignment for Spectrum Superposing

    Kazuki MARUTA  Jun MASHINO  Takatoshi SUGIYAMA  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:6
      Page(s):
    1050-1057

    This paper proposes a novel blind adaptive array scheme with subcarrier transmission power assignment (STPA) for spectrum superposing in cognitive radio networks. The Eigenvector Beamspace Adaptive Array (EBAA) is known to be one of the blind adaptive array algorithms that can suppress inter-system interference without any channel state information (CSI). However, EBAA has difficulty in suppressing interference signals whose Signal to Interference power Ratio (SIR) values at the receiver are around 0dB. With the proposed scheme, the ST intentionally provides a level difference between subcarriers. At the receiver side, the 1st eigenvector of EBAA is applied to the received signals of the subcarrier assigned higher power and the 2nd eigenvector is applied to those assigned lower power. In order to improve interference suppression performance, we incorporate Beamspace Constant Modulus Algorithm (BSCMA) into EBAA (E-BSCMA). Additionally, STPA is effective in reducing the interference experienced by the primary system. Computer simulation results show that the proposed scheme can suppress interference signals received with SIR values of around 0dB while improving operational SIR for the primary system. It can enhance the co-existing region of 2 systems that share a spectrum.

  • Run-Based Trie Involving the Structure of Arbitrary Bitmask Rules

    Kenji MIKAWA  Ken TANAKA  

     
    PAPER-Information Network

      Vol:
    E98-D No:6
      Page(s):
    1206-1212

    Packet classification is a fundamental task in the control of network traffic, protection from cyber threats. Most layer 3 and higher network devices have a packet classification capability that determines whether to permit or discard incoming packets by comparing their headers with a set of rules. Although linear search is an intuitive implementation of packet classification, it is very inefficient. Srinivasan et al. proposed a novel lookup scheme using a hierarchical trie instead of linear search, which realizes faster packet classification with time complexity proportional to rule length rather than the number of rules. However, the hierarchical trie and its various improved algorithms allow only single prefix rules to be processed. Since it is necessary for layer 4 and higher packet classifications to deal with arbitrary bitmask rules in the hierarchical trie, we propose a run-based trie based on the hierarchical trie, but extended to deal with arbitrary bitmask rules. Our proposed algorithm achieves O((dW)2) query time and O(NdW) space complexity with N rules of length dW. The query time of our novel alrorithm doesn't depend on the number of rules. It solves the latency problem caused by increase of the rules in firewalls.

  • Multicell Distributed Beamforming Based on Gradient Iteration and Local CSIs

    Zijia HUANG  Xiaoxiang WANG  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:6
      Page(s):
    1058-1064

    In this paper, the multicell distributed beamforming (MDBF) design problem of suppressing intra-cell interference (InCI) and inter-cell interference (ICI) is studied. To start with, in order to decrease the InCI and ICI caused by a user, we propose a gradient-iteration altruistic algorithm to derive the beamforming vectors. The convergence of the proposed iterative algorithm is proved. Second, a metric function is established to restrict the ICI and maximize cell rate. This function depends on only local channel state information (CSI) and does not need additional CSIs. Moreover, an MDBF algorithm with the metric function is proposed. This proposed algorithm utilizes gradient iteration to maximize the metric function to improve sum rate of the cell. Finally, simulation results demonstrate that the proposed algorithm can achieve higher cell rates while offering more advantages to suppress InCI and ICI than the traditional ones.

  • Timing Performance Assessment and Improvement of Forward Collision Warning

    Peachanika THAMMAKAROON  Poj TANGAMCHIT  

     
    PAPER-Intelligent Transport System

      Vol:
    E98-A No:5
      Page(s):
    1105-1113

    We propose a systematic method for improving the response time of forward collision warning (FCW) on vehicles. First, a performance metric, called the warning lag time, is introduced. We use the warning lag time because its measurement is practical in real driving situations. Next, we discuss two ideas to improve this warning lag time, vertical and horizontal methods. The vertical method gives an additional warning, derived from the cause of a car crash, to a normal FCW system. The experiment showed that it can improve the warning lag time by an average of 0.31sec. compared with a traditional FCW system. The horizontal method uses distributed sensing among vehicles, which helps the vehicle see farther. It can also improve the warning lag time by an average of 1.08sec. compared with a single vehicle FCW.

  • Robust Visual Tracking via Coupled Randomness

    Chao ZHANG  Yo YAMAGATA  Takuya AKASHI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2015/02/04
      Vol:
    E98-D No:5
      Page(s):
    1080-1088

    Tracking algorithms for arbitrary objects are widely researched in the field of computer vision. At the beginning, an initialized bounding box is given as the input. After that, the algorithms are required to track the objective in the later frames on-the-fly. Tracking-by-detection is one of the main research branches of online tracking. However, there still exist two issues in order to improve the performance. 1) The limited processing time requires the model to extract low-dimensional and discriminative features from the training samples. 2) The model is required to be able to balance both the prior and new objectives' appearance information in order to maintain the relocation ability and avoid the drifting problem. In this paper, we propose a real-time tracking algorithm called coupled randomness tracking (CRT) which focuses on dealing with these two issues. One randomness represents random projection, and the other randomness represents online random forests (ORFs). In CRT, the gray-scale feature is compressed by a sparse measurement matrix, and ORFs are used to train the sample sequence online. During the training procedure, we introduce a tree discarding strategy which helps the ORFs to adapt fast appearance changes caused by illumination, occlusion, etc. Our method can constantly adapt to the objective's latest appearance changes while keeping the prior appearance information. The experimental results show that our algorithm performs robustly with many publicly available benchmark videos and outperforms several state-of-the-art algorithms. Additionally, our algorithm can be easily utilized into a parallel program.

  • Face Verification Based on the Age Progression Rules

    Kai FANG  Shuoyan LIU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2015/01/26
      Vol:
    E98-D No:5
      Page(s):
    1112-1115

    Appearance changes conform to certain rules for a same person,while for different individuals the changes are uncontrolled. Hence, this paper studies the age progression rules to tackle face verification task. The age progression rules are discovered in the difference space of facial image pairs. For this, we first represent an image pair as a matrix whose elements are the difference of a set of visual words. Thereafter, the age progression rules are trained using Support Vector Machine (SVM) based on this matrix representation. Finally, we use these rules to accomplish the face verification tasks. The proposed approach is tested on the FGnet dataset and a collection of real-world images from identification card. The experimental results demonstrate the effectiveness of the proposed method for verification of identity.

  • A Deduplication-Enabled P2P Protocol for VM Image Distribution

    Choonhwa LEE  Sungho KIM  Eunsam KIM  

     
    LETTER-Information Network

      Pubricized:
    2015/02/19
      Vol:
    E98-D No:5
      Page(s):
    1108-1111

    This paper presents a novel peer-to-peer protocol to efficiently distribute virtual machine images in a datacenter. A primary idea of it is to improve the performance of peer-to-peer content delivery by employing deduplication to take advantage of similarity both among and within VM images in cloud datacenters. The efficacy of the proposed scheme is validated through an evaluation that demonstrates substantial performance gains.

  • The KDM-CCA Security of the Kurosawa-Desmedt Scheme

    Jinyong CHANG  Rui XUE  Anling ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:4
      Page(s):
    1032-1037

    In this letter, we prove that the Kurosawa-Desmedt (KD) scheme [10], which belongs to the hybrid framework, is KDM-CCA secure w.r.t. an ensemble proposed by Qin et al. in [12] under the decisional Diffie-Hellman assumption. Since our proof does not rely on the random oracle model, we partially answer the question presented by Davies and Stam in [7], where they hope to achieve the KDM-CCA security for hybrid encryption scheme in the standard model (i.e. not random oracle model). Moreover, our result may also make sense in practice since KD-scheme is (almost) the most efficient CCA secure scheme.

  • Perfect Arrays over the 8-QAM+ Constellation

    Fanxin ZENG  Linjie QIAN  Zhenyu ZHANG  

     
    LETTER-Information Theory

      Vol:
    E98-A No:4
      Page(s):
    1038-1043

    Perfect arrays are widely applied to high-dimensional communications, time-frequency-coding, spatial correlation or map matching, built-in tests of VLSI-circuits, radar, and so on. The letter investigates perfect arrays over the 8-QAM+ constellation, and two constructions for yielding such arrays are presented. Furthermore, the family size of the proposed arrays is determined as well.

  • OBDD Representation of Intersection Graphs

    Asahi TAKAOKA  Satoshi TAYU  Shuichi UENO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2015/01/16
      Vol:
    E98-D No:4
      Page(s):
    824-834

    Ordered Binary Decision Diagrams (OBDDs for short) are popular dynamic data structures for Boolean functions. In some modern applications, we have to handle such huge graphs that the usual explicit representations by adjacency lists or adjacency matrices are infeasible. To deal with such huge graphs, OBDD-based graph representations and algorithms have been investigated. Although the size of OBDD representations may be large in general, it is known to be small for some special classes of graphs. In this paper, we show upper bounds and lower bounds of the size of OBDDs representing some intersection graphs such as bipartite permutation graphs, biconvex graphs, convex graphs, (2-directional) orthogonal ray graphs, and permutation graphs.

  • Transponder Array System with Universal On-Sheet Reference Scheme for Wireless Mobile Sensor Networks without Battery or Oscillator

    Takahide TERADA  Haruki FUKUDA  Tadahiro KURODA  

     
    PAPER-Analog Signal Processing

      Vol:
    E98-A No:4
      Page(s):
    932-941

    A rotating shaft with attached sensors is wrapped in a two-dimensional waveguide sheet through which the data and power are wirelessly transmitted. A retrodirective transponder array affixed to the sheet beamforms power to the moving sensor to eliminate the need for a battery. A universal on-sheet reference scheme is proposed for calibrating the transponder circuit delay variation and eliminating a crystal oscillator from the sensor. A base signal transmitted from the on-sheet reference device is used for generating the pilot signal transmitted from the sensor and the power signal transmitted from the transponder. A 0.18-µm CMOS transponder chip and the sheet with couplers were fabricated. The coupler has three resonant frequencies used for the proposed system. The measured propagation gain of the electric field changes to less than ±1.5dB within a 2.0-mm distance between the coupler and the sheet. The measured power transmission efficiency with beamforming is 23 times higher than that without it. Each transponder outputs 1W or less for providing 3mW to the sensor.

961-980hit(4624hit)