The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SiON(4624hit)

1021-1040hit(4624hit)

  • Minimization of the Fabrication Cost for a Bridged-Bus-Based TDMA System under Hard Real-Time Constraints

    Makoto SUGIHARA  

     
    PAPER-Network

      Vol:
    E97-D No:12
      Page(s):
    3041-3051

    Industrial applications such as automotive ones require a cheap communication mechanism to send out communication messages from node to node by their deadline time. This paper presents a design paradigm in which we optimize both assignment of a network node to a bus and slot multiplexing of a FlexRay network system under hard real-time constraints so that we can minimize the cost of wire harness for the FlexRay network system. We present a cost minimization problem as a non-linear model. We developed a network synthesis tool which was based on simulated annealing. Our experimental results show that our design paradigm achieved a 50.0% less cost than a previously proposed approach for a virtual cost model.

  • Hierarchical Architecture for Peer-to-Peer Video on Demand Systems with the Notion of Dynamic Swarms

    Yasuaki YUJI  Satoshi FUJITA  

     
    PAPER-Network

      Vol:
    E97-D No:12
      Page(s):
    3025-3032

    This paper proposes a method to reduce the playback suspension in a Video-on-Demand system based on the Peer-to-Peer technology (P2P VoD). Our main contribution is twofold. The first is the proposal of a hierarchical P2P architecture with the notion of dynamic swarms. Swarm is a group of peers to have similar playback position and those swarms are connected with an overlay so that requested pieces are forwarded from a swarm to another swarm in a bucket brigade manner, where the forward of pieces is regulated by the super-peer (SP) of each swarm. The second contribution is the proposal of a match making scheme between requests and uploaders. The simulation result indicates that the proposed scheme reduces the total waiting time of a randomized scheme by 24% and the load of the media server by 76%.

  • A Friendly Image Sharing Method

    Tsung-Ming LO  

     
    LETTER-Image

      Vol:
    E97-A No:12
      Page(s):
    2684-2687

    This image sharing method is a secure way of protecting the security of the secret images. In 2011, Wang et al. proposed an image sharing method with verification. The idea of the method is to embed the secret and the watermark images into two shares by two equations to achieve the goal of the secret sharing. However, the constructed shares are meaningless images which are difficult to manage. Authors utilize the algorithm of the torus automorphism to increase the security of the shares. However, the algorithm of the torus automorphism must take much time to encrypt and decrypt an image. This paper proposes a friendly image sharing method to improve the above problem. Experimental results show the significant efficiency of the proposed method.

  • Transmitting and Receiving Power-Control Architecture with Beam-Forming Technique for 2D Wireless Power Transmission Systems

    Takahide TERADA  Hiroshi SHINODA  

     
    PAPER-Systems and Control

      Vol:
    E97-A No:12
      Page(s):
    2618-2624

    A two-dimensional (2D) wireless power transmission (WPT) system that handles a wide range of transmitted and received power is proposed and evaluated. A transmitter outputs the power to an arbitrary position on a 2D waveguide sheet by using a beam-forming technique. The 2D waveguide sheet does not require an absorber on its edge. The minimum propagation power on the sheet is increased 18 times by using the beam-forming technique. Power amplifier (PA) efficiency was improved from 19% to 46% when the output power was 10dB smaller than peak power due to the use of a PA supply-voltage and input power control method. Peak PA efficiency was 60%. A receiver inputs a wide range of power levels and drives various load impedances with a parallel rectifier. This rectifier enables a number of rectifying units to be tuned dynamically. The rectifier efficiency was improved 1.5 times while input power range was expanded by 6dB and the load-impedance range was expanded fourfold. The rectifier efficiency was 66-73% over an input power range of 18-36dBm at load impedances of 100 and 400Ω.

  • KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol

    You Sung KANG  Dong-Jo PARK  Daniel W. ENGELS  Dooho CHOI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:12
      Page(s):
    2662-2666

    We present a dynamic key generation method, KeyQ, for establishing shared secret keys in EPCglobal Generation 2 (Gen2) compliant systems. Widespread adoption of Gen2 technologies has increased the need for protecting communications in these systems. The highly constrained resources on Gen2 tags limit the usability of traditional key distribution techniques. Dynamic key generation provides a secure method to protect communications with limited key distribution requirements. Our KeyQ method dynamically generates fresh secret keys based on the Gen2 adaptive Q algorithm. We show that the KeyQ method generates fresh and unique secret keys that cannot be predicted with probability greater than 10-250 when the number of tags exceeds 100.

  • A Statistics-Based Data Fusion for Ad-Hoc Sensor Networks

    Fang WANG  Zhe WEI  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E97-A No:12
      Page(s):
    2675-2679

    Misbehaving nodes intrinsic to the physical vulnerabilities of ad-hoc sensor networks pose a challenging constraint on the designing of data fusion. To address this issue, a statistics-based reputation method for reliable data fusion is proposed in this study. Different from traditional reputation methods that only compute the general reputation of a node, the proposed method modeled by negative binomial reputation consists of two separated reputation metrics: fusion reputation and sensing reputation. Fusion reputation aims to select data fusion points and sensing reputation is used to weigh the data reported by sensor nodes to the fusion point. So, this method can prevent a compromised node from covering its misbehavior in the process of sensing or fusion by behaving well in the fusion or sensing. To tackle the unexpected facts such as packet loss, a discounting factor is introduced into the proposed method. Additionally, Local Outlier Factor (LOF) based outlier detection is applied to evaluate the behavior result of sensor nodes. Simulations show that the proposed method can enhance the reliability of data fusion and is more accurate than the general reputation method when applied in reputation evaluation.

  • Channel Prediction Techniques for a Multi-User MIMO System in Time-Varying Environments

    Kanako YAMAGUCHI  Huu Phu BUI  Yasutaka OGAWA  Toshihiko NISHIMURA  Takeo OHGANE  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:12
      Page(s):
    2747-2755

    Although multi-user multiple-input multiple-output (MI-MO) systems provide high data rate transmission, they may suffer from interference. Block diagonalization and eigenbeam-space division multiplexing (E-SDM) can suppress interference. The transmitter needs to determine beamforming weights from channel state information (CSI) to use these techniques. However, MIMO channels change in time-varying environments during the time intervals between when transmission parameters are determined and actual MIMO transmission occurs. The outdated CSI causes interference and seriously degrades the quality of transmission. Channel prediction schemes have been developed to mitigate the effects of outdated CSI. We evaluated the accuracy of prediction of autoregressive (AR)-model-based prediction and Lagrange extrapolation in the presence of channel estimation error. We found that Lagrange extrapolation was easy to implement and that it provided performance comparable to that obtained with the AR-model-based technique.

  • An Efficient Two-Scan Labeling Algorithm for Binary Hexagonal Images

    Lifeng HE  Xiao ZHAO  Bin YAO  Yun YANG  Yuyan CHAO  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2014/08/27
      Vol:
    E97-D No:12
      Page(s):
    3244-3247

    This paper proposes an efficient two-scan labeling algorithm for binary hexagonal images. Unlike conventional labeling algorithms, which process pixels one by one in the first scan, our algorithm processes pixels two by two. We show that using our algorithm, we can check a smaller number of pixels. Experimental results demonstrated that our method is more efficient than the algorithm extended straightly from the corresponding labeling algorithm for rectangle binary images.

  • Optimal Threshold Configuration Methods for Flow Admission Control with Cooperative Users

    Sumiko MIYATA  Katsunori YAMAOKA  Hirotsugu KINOSHITA  

     
    PAPER-Network

      Vol:
    E97-B No:12
      Page(s):
    2706-2719

    We have proposed a novel call admission control (CAC) method for maximizing total user satisfaction in a heterogeneous traffic network and showed their effectiveness by using the optimal threshold from numerical analysis [1],[2]. With these CAC methods, it is assumed that only selfish users exist in a network. However, we need to consider the possibility that some cooperative users exist who would agree to reduce their requested bandwidth to improve another user's Quality of Service (QoS). Under this assumption, conventional CAC may not be optimal. If there are cooperative users in the network, we need control methods that encourage such user cooperation. However, such “encourage” control methods have not yet been proposed. Therefore, in this paper, we propose novel CAC methods for cooperative users by using queueing theory. Numerical analyses show their effectiveness. We also analyze the characteristics of the optimal control parameter of the threshold.

  • A Tenant Network Provisioning Platform with Provisioning Template for Multi-Tenancy Data Centers

    Yoji OZAWA  Yoshiko YASUDA  Yosuke HIMURA  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2658-2667

    Tenant network provisioning in multi-tenancy data centers is time-consuming and error-prone due to the need to configure network devices with hundreds of parameter values (e.g., VLAN ID, IP address) determined according to complicated operational rules. Past works have aimed to automate such operational rule-based provisioning processes by implementing data center-specific provisioning programs, but a crucial problem is the high cost of adapting the programs to suit multiple data centers. In this paper, we aim to solve this problem by enabling to describe the provisioning processing, which has been hard-coded programs in conventional approaches, in easy-to-edit “provisioning template” files. The key component of the provisioning template is the parameter decision rule, which is a declarative abstract representation of parameter dependency and parameter assignment. We design the provisioning template so that it can handle various configuration items while preserving its editability for tenant provisioning. We design and implement the provisioning platform, and the evaluation based on a production data center shows that the provisioning platform can adopt multiple data centers with a single program, leading to less development cost compared to past approaches (i.e., program development for each data center).

  • ZNA: A Six-Layer Network Architecture for New Generation Networks —— Focusing on the Session Layer, the Network Layer, and Cross-Layer Cooperation —— Open Access

    Fumio TERAOKA  Sho KANEMARU  Kazuma YONEMURA  Motoki IDE  Shinji KAWAGUCHI  Kunitake KANEKO  

     
    INVITED PAPER

      Vol:
    E97-B No:12
      Page(s):
    2583-2595

    Using “clean-slate approach” to redesign the Internet has attracted considerable attention. ZNA (Z Network Architecture) is one of clean-slate network architectures based on the layered model. The major features of ZNA are as follows: (1) introducing the session layer to provide the applications with sophisticated communication services, (2) employing inter-node cross-layer cooperation to adapt to the dynamically changing network conditions, (3) splitting the node identifier and the node locator for mobility, multi-homing, and heterogeneity of network layer protocols, (4) splitting the data plane and the control plane for high manageability, and (5) introducing a recursive layered model to support network virtualization. This paper focuses on the first three topics as well as the basic design of ZNA.

  • 3-Dimensional Imaging and Motion Estimation Method of Multiple Moving Targets for Multi-Static UWB Radar Using Target Point and Its Normal Vector

    Ryo YAMAGUCHI  Shouhei KIDERA  Tetsuo KIRIMOTO  

     
    PAPER-Sensing

      Vol:
    E97-B No:12
      Page(s):
    2819-2829

    Radar systems using ultra-wideband (UWB) signals have definitive advantages in high range resolution. These are suitable for accurate 3-dimensional (3-D) sensing by rescue robots operating in disaster zone settings, where optical sensing is not applicable because of thick smog or high-density gas. For such applications, where no a priori information of target shape and position is given, an accurate method for 3-D imaging and motion estimation is strongly required for effective target recognition. In addressing this issue, we have already proposed a non-parametric 2-dimensional (2-D) imaging method for a target with arbitrary target shape and motion including rotation and translation being tracked using a multi-static radar system. This is based on matching target boundary points obtained using the range points migration (RPM) method extended to the multi-static radar system. Whereas this method accomplishes accurate imaging and motion estimation for single targets, accuracy is degraded severely for multiple targets, due to interference effects. For a solution of this difficulty, this paper proposes a method based on a novel matching scheme using not only target points but also normal vectors on the target boundary estimated by the Envelope method; interference effects are effectively suppressed when incorporating the RPM approach. Results from numerical simulations for both 2-D and 3-D models show that the proposed method simultaneously achieves accurate target imaging and motion tracking, even for multiple moving targets.

  • Edge-over-Erosion Error Prediction Method Based on Multi-Level Machine Learning Algorithm

    Daisuke FUKUDA  Kenichi WATANABE  Naoki IDANI  Yuji KANAZAWA  Masanori HASHIMOTO  

     
    PAPER-Device and Circuit Modeling and Analysis

      Vol:
    E97-A No:12
      Page(s):
    2373-2382

    As VLSI process node continue to shrink, chemical mechanical planarization (CMP) process for copper interconnect has become an essential technique for enabling many-layer interconnection. Recently, Edge-over-Erosion error (EoE-error), which originates from overpolishing and could cause yield loss, is observed in various CMP processes, while its mechanism is still unclear. To predict these errors, we propose an EoE-error prediction method that exploits machine learning algorithms. The proposed method consists of (1) error analysis stage, (2) layout parameter extraction stage, (3) model construction stage and (4) prediction stage. In the error analysis and parameter extraction stages, we analyze test chips and identify layout parameters which have an impact on EoE phenomenon. In the model construction stage, we construct a prediction model using the proposed multi-level machine learning method, and do predictions for designed layouts in the prediction stage. Experimental results show that the proposed method attained 2.7∼19.2% accuracy improvement of EoE-error prediction and 0.8∼10.1% improvement of non-EoE-error prediction compared with general machine learning methods. The proposed method makes it possible to prevent unexpected yield loss by recognizing EoE-errors before manufacturing.

  • Interactive Evolutionary System for Synthesizing Facial Caricature with Non-planar Expression

    Tatsuya UGAI  Keita SATO  Kaoru ARAKAWA  Hiroshi HARASHIMA  

     
    PAPER

      Vol:
    E97-A No:11
      Page(s):
    2154-2160

    A method to synthesize facial caricatures with non-planar expression is proposed. Several methods have been already proposed to synthesize facial caricatures automatically, but they mainly synthesize plane facial caricatures which look somewhat monotonous. In order to generate expressive facial caricature, the image should be expressed in non-planar style, expressing the depth of the face by shading and highlighting. In this paper, a new method to express such non-planar effect in facial caricatures is proposed by blending the grayscale information of the real face image into the plane caricature. Some methods also have been proposed to generate non-planar facial caricature, but the proposed method can adjust the degree of non-planar expression by interactive evolutionary computing, so that the obtained expression is satisfied by the user based on his/her subjective criteria. Since the color of the face looks changed, when the grayscale information of the natural face image is mixed, the color information of the skin area are also set by interactive evolutionary computing. Experimental results show the high performance of the proposed method.

  • A High Quality Autostereoscopy System Based on Time-Division Quadplexing Parallax Barrier Open Access

    Qu ZHANG  Hideki KAKEYA  

     
    INVITED PAPER

      Vol:
    E97-C No:11
      Page(s):
    1074-1080

    In this paper, we introduce a parallax barrier system that shows high definition autostereoscopy and holds wide viewing zone. The proposed method creates a 4-view parallax barrier system with full display resolution per view by setting aperture ratio to one quarter and using time-division quadplexing, then applies obtained 4-view to 2-view, so that the viewing zone for each eye becomes wider than that from the conventional methods. We build a prototype with two 120,Hz LCD panels and manage to achieve continuous viewing zone with common head-tracking device involved. However, moire patterns and flickers stand out, which are respectively caused by the identical alignments of the color filters on the overlaid LCD panels and a lack of refresh rate of 240,Hz. We successfully remove the moire patterns by changing the structure of the system and inserting a diffuser. We also reduce the flickers by proposing 1-pixel aperture, while stripe shaped noise due to the lack of refresh rate occurs during a blink or a saccade. The stripe noise can be effectively weakened by applying green and magenta anaglyph to the proposed system, where extra crosstalk takes place since the default RGB color filters on LCD panels share certain ranges of wavelength with each other. Although a trade-off turns out to exist between stripe noise and crosstalk from our comparison experiment, results from different settings all hold acceptable quality and show high practicability of our method. Furthermore, we propose a solution that shows possibility to satisfy both claims, where extra color filters with narrow bandwidths are required.

  • Spatial Division Transmission without Signal Processing for MIMO Detection Utilizing Two-Ray Fading

    Ken HIRAGA  Kazumitsu SAKAMOTO  Maki ARAI  Tomohiro SEKI  Tadao NAKAGAWA  Kazuhiro UEHARA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:11
      Page(s):
    2491-2501

    This paper presents a spatial division (SD) transmission method based on two-ray fading that dispenses with the high signal processing cost of multiple-input and multiple-output (MIMO) detection and antennas with narrow beamwidth. We show the optimum array geometries as functions of the transmission distance for providing a concrete array design method. Moreover, we clarify achievable channel capacity considering reflection coefficients that depend on the polarization, incident angle, and dielectric constant. When the ground surface is conductive, for two- and three-element arrays, channel capacity is doubled and tripled, respectively, over that of free space propagation. We also clarify the application limit of this method for a dielectric ground by analyzing the channel capacity's dependency on the dielectric constant. With this method, increased channel capacity by SD transmission can be obtained merely by placing antennas of wireless transceiver sets that have only SISO (single-input and single-output) capability in a two-ray propagation environment. By using formulations presented in this paper for the first time and adding discussions on the adoption of polarization multiplexing, we clarify antenna geometries of SD transmission systems using polarization multiplexing for up to six streams.

  • Nonlinear Acoustic Echo Suppression Based on Spectrum Selection Using the Amount of Linear Echo Cancellation

    Takashi SUDO  Hirokazu TANAKA  Chika SUGIMOTO  Ryuji KOHNO  

     
    PAPER

      Vol:
    E97-A No:11
      Page(s):
    2139-2146

    Hands-free communications between cellular phones must be robust enough to withstand echo-path variation, and highly nonlinear echoes must be suppressed at low cost, when acoustic echo cancellation or suppression is applied to them. This paper proposes a spectrum-selective nonlinear echo suppression (SS-ES) approach as a solution to these issues. SS-ES is characterized by the selection of either a spectrum of the residual signal from an adaptive filter or a spectrum of the sending input signal depending on the amount of linear echo cancellation in an adaptive filter. Compared to conventional methods, the objective evaluation results of the SS-ES approach show an improvement of approximately 0.8-2.2dB, 0.23-2.39dB, and 0.26-0.50 in average echo return loss enhancement (ERLE), average root-mean-square log-spectral distortion (RMS-LSD), and the perceptual evaluation of speech quality (PESQ) value, respectively, under echo-path variation and double-talk conditions.

  • Fast Mode and Depth Decision for HEVC Intra Prediction Based on Edge Detection and Partition Reconfiguration

    Gaoxing CHEN  Lei SUN  Zhenyu LIU  Takeshi IKENAGA  

     
    PAPER

      Vol:
    E97-A No:11
      Page(s):
    2130-2138

    High efficiency video coding (HEVC) is a video compression standard that outperforms the predecessor H.264/AVC by doubling the compression efficiency. To enhance the intra prediction accuracy, 35 intra prediction modes were used in the prediction units (PUs), with partition sizes ranging from 4 × 4 to 64 × 64 in HEVC. However, the manifold prediction modes dramatically increase the encoding complexity. This paper proposes a fast mode- and depth-decision algorithm based on edge detection and reconfiguration to alleviate the large computational complexity in intra prediction with trivial degradation in accuracy. For mode decision, we propose pixel gradient statistics (PGS) and mode refinement (MR). PGS uses pixel gradient information to assist in selecting the prediction mode after rough mode decision (RMD). MR uses the neighboring mode information to select the best PU mode (BPM). For depth decision, we propose a partition reconfiguration algorithm to replace the original partitioning order with a more reasonable structure, by using the smoothness of the coding unit as a criterion in deciding the prediction depth. Smoothness detection is based on the PGS result. Experiment results show that the proposed method saves about 41.50% of the original processing time with little degradation (BD bitrate increased by 0.66% and BDPSNR decreased by 0.060dB) in the coding gain.

  • Maximum Likelihood Demodulators and Their Evaluations on Amplify-and-Forward Cooperative OFDM-Based Wireless LAN Systems

    Hayato FUKUZONO  Yusuke ASAI  Riichi KUDO  Koichi ISHIHARA  Masato MIZOGUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:11
      Page(s):
    2435-2448

    In this paper, we propose demodulators for the Golden and Alamouti codes in amplify-and-forward (AF) cooperative communication with one relay. The proposed demodulators output exact log likelihood ratios (LLRs) with recursion based on the Jacobian logarithm. The cooperative system with the proposed demodulator for the Golden code has the benefit of efficient data transmission, while the system for the Alamouti code has low demodulation complexity. Quantitative analyses of computational complexity of the proposed demodulators are conducted. The transmission performance for various relay location and power settings is evaluated on cooperative orthogonal frequency division multiplexing (OFDM)-based wireless local area network (LAN) systems. In evaluations, the optimal relay location and power settings are found. The cooperative system with the proposed demodulators for the Golden and Alamouti codes offers 1.5 and 1.9 times larger areas where 10.8 and 5.4Mbit/s can be obtained than a non-cooperative (direct) system in a typical office environment, respectively.

  • Self-Tuning Approach to Stabilizing Unknown and Unstable Periodic Orbits

    Takumi HASEGAWA  Tadashi TSUBONE  

     
    PAPER-Nonlinear Problems

      Vol:
    E97-A No:11
      Page(s):
    2212-2217

    We consider an improved control method based on the Stability Transformation Method. Stability Transformation Method detects unknown and unstable periodic orbits of chaotic dynamical systems. Based on the approach to realize the Stability Transformation Method in real systems, we have proposed a control method which can stabilize unknown and unstable periodic orbits embedded in chaotic attractors. However, setting of the control parameters of the control system has remained as unsolved issue. When the dynamics of a target system are unknown, the control parameters have to be set by trial and error. In this paper, we improve the control method with the automatic adjustment function of the control parameters. We show an example of stabilizing unstable periodic orbits of the 3-dimensional hysteresis chaos generator by using the proposed control method. Some results are confirmed by laboratory measurements. The results imply that any unknown and unstable periodic orbits can be stabilized by using the proposed method, if the target chaos system is reduced to 1-dimensional return map.

1021-1040hit(4624hit)