Periodic interference frequently affects the measurement of small signals and causes problems in clinical diagnostics. Adaptive filters can be used as potential tools for cancelling such interference. However, when the interference has a frequency fluctuation, the ideal adaptive-filter coefficients for cancelling the interference also fluctuate. When the adaptation property of the algorithm is slow compared with the frequency fluctuation, the interference-cancelling performance is degraded. However, if the adaptation is too quick, the performance is degraded owing to the target signal. To overcome this problem, we propose an adaptive filter that suppresses the fluctuation of the ideal coefficients by utilizing a $rac{pi}{2}$ phase-delay device. This method assumes a frequency response that characterizes the transmission path from the interference source to the main input signal to be sufficiently smooth. In the numerical examples, the proposed method exhibits good performance in the presence of a frequency fluctuation when the forgetting factor is large. Moreover, we show that the proposed method reduces the calculation cost.
Enhancing the performance of low-temperature (LT) polycrystalline-silicon (poly-Si) thin-film transistors (TFTs) requires high-quality poly-Si films. One of the authors (A.H.) has already demonstrated a continuous-wave (CW) laser lateral crystallization (CLC) method to improve the crystalline quality of thin poly-Si films, using a diode-pumped solid-state CW laser. Another candidate method to increase the on-current and decrease the subthreshold swing (s.s.) is the use of a high-k gate stack. In this paper, we discuss the performance of top-gate CLC LT poly-Si TFTs with sputtering metal/hafnium oxide (HfO2) gate stacks on nonalkaline glass substrates. A mobility of 180 cm2/Vs is obtained for n-ch TFTs, which is considerably higher than those of previously reported n-ch LT poly-Si TFTs with high-k gate stacks; it is, however, lower than the one obtained with a plasma enhanced chemical vapor deposited SiO2 gate stack. For p-ch TFTs, a mobility of 92 cm2/Vs and an s.s. of 98 mV/dec were obtained. This s.s. value is smaller than the ones of the previously reported p-ch LT poly-Si TFTs with high-k gate stacks. The evaluation of a fabricated complementary metal-oxide-semiconductor inverter showed a switching threshold voltage of 0.8 V and a gain of 38 at an input voltage of 2.0 V; moreover, full swing inverter operation was successfully confirmed at the low input voltage of 1.0 V. This shows the feasibility of CLC LT poly-Si TFTs with a sputtered HfO2 gate dielectric on nonalkaline glass substrates.
Ryo YAMAMOTO Satoshi OHZAHATA Toshihiko KATO
The self-organizing nature of ad hoc networks is a good aspect in that terminals are not dependent on any infrastructure, that is, networks can be formed with decentralized and autonomous manner according to communication demand. However, this characteristic might affect the performance in terms of stability, reliability and so forth. Moreover, ad hoc networks face a scalability problem, which arise when the number of terminals in a network increases or a physical network domain expands, due to the network capacity limitation caused by the decentralized and the autonomous manner. Regarding this problem, some hierarchical and cluster-based routings have been proposed to effectively manage the networks. In this paper, we apply the concept of hierarchical routing and clustering to opportunistic routing, which can forward packets without using any pre-established path to achieve a path diversity gain with greater reachability. The simulation results show that the proposed method can achieve 11% higher reliability with a reasonable end-to-end delay in dense environments and 30% higher in large-scale networks.
Hideki KAWAGUCHI Thomas WEILAND
The Time Domain Boundary Element Method (TDBEM) has its advantages in the analysis of transient electromagnetic fields (wake fields) induced by a charged particle beam with curved trajectory in a particle accelerator. On the other hand, the TDBEM has disadvantages of huge required memory and computation time compared with those of the Finite Difference Time Domain (FDTD) method or the Finite Integration Technique (FIT). This paper presents a comparison of the FDTD method and 4-D domain decomposition method of the TDBEM based on an initial value problem formulation for the curved trajectory electron beam, and application to a full model simulation of the bunch compressor section of the high-energy particle accelerators.
Theoretical maximum radiation efficiency of electrically small spherical surface antennas has been derived in this study. The current on the antenna surface is described in terms of vector spherical harmonics, and the radiated and the dissipated powers are calculated to obtain the radiation efficiency. It has been found that non-resonant TM1m mode shows the best radiation efficiency, and a proper combination of TM10 and TE10 modes establishes a resonant spherical surface antenna whose radiation efficiency is bounded by those values of non-resonant TM10 and TE10 modes. As a practical example of the spherical surface antennas, the radiation efficiency of the spherical helix antennas has also been computed to check the validity of our formulation.
Akihiko HIRATA Jun TAKEUCHI Keisuke HASHIMOTO Jiro HIROKAWA
An alignment control system using beam-tilting 1-D arrays for a 120-GHz-band corporate-feed 2-D waveguide-slot array antenna is presented. The 2-D waveguide-slot array antenna transmits data, and the 1-D arrays are used to determine array alignment. We design two types of 1-D array antenna and fabricate a corporate-feed 2-D waveguide-slot array antenna surrounded by four beam-tilting 1-D arrays. We then construct an alignment control system and evaluate the performance of the control. We find that the angular accuracy of the antenna alignment control was within ±1deg.
Hirofumi YAMAZAKI Konomi MOCHIZUKI Shunsuke HOMMA Koji SUGISONO Masaaki OMOTANI
Service chaining (SC) is a method for realizing a service by transferring flows among several service functions (SFs) that process packets. A route among SFs is called a service path (SP). Service chaining is being developed to reduce costs, increase flexibility, and shorten time-to-market. SC technologies are expected to be applied to carrier networks so that large communication carriers benefit from them. We assume that SPs process the traffic of services that treat all users in the same way such as an Internet access service for home users. An SP processes flows from several users. We do not assume that each SP is assigned to a user. Because a carrier network accommodates many users, each service will be heavily utilized. Therefore, it is assumed that the amount of traffic of a service is larger than the resource of an SF apparatus. Several SPs are required to process the traffic. SPs are supposed to meet two requirements. One is guaranteeing minimum bandwidth. The other is reducing the number of SF apparatuses, i.e., high resource utilization. Resource utilization depends on the combination of the resource quantities of SF apparatuses. Network operators have to determine the bandwidth of each SP within the range from the minimum bandwidth to the resource quantities of SF apparatuses to maximize resource utilization. Methods for determining the bandwidth of each SP have not been proposed for meeting the two requirements. Therefore, we propose a resource allocation method for this purpose. The proposed method determines the bandwidth of each SP on the basis of the combination of the resource quantities of SF apparatuses for guaranteeing the minimum bandwidth and maximizing resource utilization and allocates necessary resources to each SP. We also evaluate the proposed method and confirm that it can guarantee the minimum bandwidth of SPs and achieve high resource utilization regardless of the combination of the resource quantities of SF apparatuses. Although SF apparatuses are generally produced without considering the combinations of resource quantities of SF apparatuses in SPs, the proposed method can provide more options for selecting SF apparatuses.
Junichi NAKAYAMA Yasuhiko TAMURA
This paper deals with the diffraction of a monochromatic plane wave by a periodic grating. We discuss a problem how to obtain a numerical diffraction efficiency (NDE) satisfying the reciprocity theorem for diffraction efficiencies, because diffraction efficiencies are the subject of the diffraction theories. First, this paper introduces a new formula that decomposes an NDE into two components: the even component and the odd one. The former satisfies the reciprocity theorem for diffraction efficiencies, but the latter does not. Therefore, the even component of an NDE becomes an answer to our problem. On the other hand, the odd component of an NDE represents an unwanted error. Using such the decomposition formula, we then obtain another new formula that decomposes the conventional energy error into two components. One is the energy error made by even components of NDE's. The other is the energy error constructed by unwanted odd ones and it may be used as a reciprocity criterion of a numerical solution. This decomposition formula shows a drawback of the conventional energy balance. The total energy error is newly introduced as a more strict condition for a desirable solution. We point out theoretically that the reciprocal wave solution, an approximate solution satisfying the reciprocity for wave fields, gives another solution to our problem. Numerical examples are given for the diffraction of a TM plane wave by a very rough periodic surface with perfect conductivity. In the case of a numerical solution by the image integral equation of the second kind, we found that the energy error is much reduced by use of the even component of an NDE as an approximate diffraction efficiency or by use of a reciprocal wave solution.
Keiichi IWAMURA Masaki KAWAMURA Minoru KURIBAYASHI Motoi IWATA Hyunho KANG Seiichi GOHSHI Akira NISHIMURA
Within information hiding technology, digital watermarking is one of the most important technologies for copyright protection of digital content. Many digital watermarking schemes have been proposed in academia. However, these schemes are not used, because they are not practical; one reason for this is that the evaluation criteria are loosely defined. To make the evaluation more concrete and improve the practicality of digital watermarking, watermarking schemes must use common evaluation criteria. To realize such criteria, we organized the Information Hiding and its Criteria for Evaluation (IHC) Committee to create useful, globally accepted evaluation criteria for information hiding technology. The IHC Committee improves their evaluation criteria every year, and holds a competition for digital watermarking based on state-of-the-art evaluation criteria. In this paper, we describe the activities of the IHC Committee and its evaluation criteria for digital watermarking of still images, videos, and audio.
Hatsuhiro KATO Masakazu KIRYU Yutaka SUZUKI Osamu SAKATA Mizuya FUKASAWA
Many hemodialysis patients undergo plasitc surgery to form the arterio-venous fistula (AVF) in their forearm to improve the vascular access by shunting blood flows. The issue of AVF is the stenosis caused by the disturbance of blood flows; therefore the auscultation system to assist the stenosis diagnosis has been developed. Although the system is intended to be used as a steady monitoring for stenosis assessment, its efficiency was not always high because it cannot estimate where the stenosis locates. In this study, for extracting and estimating the stenosis signal, the shunt murmurs captured by many microphones were decomposed by the principal component analysis (PCA). Furthermore, applying the hierarchical categorization of the recursive subdivision self-organizing map (rs-SOM), the modelling of the stenosis signal was proposed to realise the effective stenosis assessment. The false-positive rate of the stenosis assessment was significantly reduced by using the improved auscultation system.
All the existing sender-based message logging (SBML) protocols share a well-known limitation that they cannot tolerate concurrent failures. In this paper, we analyze the cause for this limitation in a unicast network environment, and present an enhanced SBML protocol to overcome this shortcoming while preserving the strengths of SBML. When the processes on different nodes execute a distributed application together in a broadcast network, this new protocol replicates the log information of each message to volatile storages of other processes within the same broadcast network. It may reduce the communication overhead for the log replication by taking advantage of the broadcast nature of the network. Simulation results show our protocol performs better than the traditional one modified to tolerate concurrent failures in terms of failure-free execution time regardless of distributed application communication pattern.
Leilei KONG Zhimao LU Zhongyuan HAN Haoliang QI
This paper addresses the issue of source retrieval in plagiarism detection. The task of source retrieval is retrieving all plagiarized sources of a suspicious document from a source document corpus whilst minimizing retrieval costs. The classification-based methods achieved the best performance in the current researches of source retrieval. This paper points out that it is more important to cast the problem as ranking and employ learning to rank methods to perform source retrieval. Specially, it employs RankBoost and Ranking SVM to obtain the candidate plagiarism source documents. Experimental results on the dataset of PAN@CLEF 2013 Source Retrieval show that the ranking based methods significantly outperforms the baseline methods based on classification. We argue that considering the source retrieval as a ranking problem is better than a classification problem.
Daeha LEE Jaehong KIM Ho-Hee KIM Soon-Ja KIM
Object detection is the first step in the object recognition. According to the detection results, its following works are affected. However, object detection has a heavy resource requirement in terms of, computing power and memory. If an image is enlarged, the computational load required for object detection is also increased. An-integral-image-based method guarantees fast object detection. Once an integral image is generated, the speed of the object detection procedure remains fixed, regardless of the pattern region size. However, this becomes an even greater issue if the image is enlarged. In this paper, we propose the use of directional integral image based object detection. A directional integral image gives direction to an integral image, which can then be calculated from various directions. Furthermore, many unnecessary calculations, which typically occur when a partial integral image is used for object detection, can be avoided. Therefore, the amount of computation is reduced, compared with methods using integral images. In experiments comparing methods, the proposed method required 40% fewer computations.
Kenta KURIHARA Shoko IMAIZUMI Sayaka SHIOTA Hitoshi KIYA
In many multimedia applications, image encryption has to be conducted prior to image compression. This letter proposes an Encryption-then-Compression system using JPEG XR/JPEG-LS friendly perceptual encryption method, which enables to be conducted prior to the JPEG XR/JPEG-LS standard used as an international standard lossless compression method. The proposed encryption scheme can provides approximately the same compression performance as that of the lossless compression without any encryption. It is also shown that the proposed system consists of four block-based encryption steps, and provides a reasonably high level of security. Existing conventional encryption methods have not been designed for international lossless compression standards, but for the first time this letter focuses on applying the standards.
Keisuke ISHIBASHI Kazumichi SATO
We introduce the notion of hierarchical aggregate entropy and apply it to identify DNS client hosts that wastefully consume server resources. Entropy of DNS query traffic can capture client query patterns, e.g., the concentration of queries to a specific domain or dispersion to a large domain name space. However, entropy alone cannot capture the spatial structure of the traffic. That is, even if queries disperse to various domains but concentrate in the same upper domain, entropy among domain names provides no information on the upper domain structure, which is an important characteristic of DNS traffic. On the other hand, entropies of aggregated upper domains do not have detailed information on individual domains. To overcome this difficulty, we introduce the notion of hierarchical aggregate entropy, where queries are recursively aggregated into upper domains along the DNS domain tree, and their entropies are calculated. Thus, this method enables us to analyze the spatial characteristics of DNS traffic in a multi-resolution manner. We calculate the hierarchical aggregate entropies for actual DNS heavy-hitters and observed that the entropies of normal heavy-hitters were concentrated in a specific range. On the basis of this observation, we adopt the support vector machine method to identify the range and to classify DNS heavy-hitters as anomalous or normal. It is shown that with hierarchical aggregate entropy can halve the classification error compared to non-hierarchical entropies.
Junil AHN Jaewon CHANG Chiho LEE
The integer least-squares (ILS) problem frequently arises in wireless communication systems. Sphere decoding (SD) is a systematic search scheme for solving ILS problem. The enumeration of candidates is a key part of SD for selecting a lattice point, which will be searched by the algorithm. Herein, the authors present a computationally efficient Schnorr-Euchner enumeration (SEE) algorithm to solve the constrained ILS problems, where the solution is limited into the finite integer lattice. To trace only valid lattice points within the underlying finite lattice, the authors devise an adaptive computation of the enumeration step and counting the valid points enumerated. In contrast to previous SEE methods based on a zig-zag manner, the proposed method completely avoids enumerating invalid points outside the finite lattice, and it further reduces real arithmetic and logical operations.
Kota IWANAGA Keiji JIMI Isamu MATSUNAMI
Case studies have reported that pedestrian detection methods using vehicle radar are not complete systems because each system has specific limitations at the cost of the calculating amounts, the system complexity or the range resolution. In this letter, we proposed a novel pedestrian detection method by template matching using Gabor filter bank, which was evaluated based on the data observed by 24GHz UWB radar.
Takashi MARUYAMA Takashi UESAKA Satoshi YAMAGUCHI Masataka OTSUKA Hiroaki MIYASHITA
We propose a new configuration for phased array antennas. The proposal uses radiation pattern reconfigurable antennas as the antenna element to improve the gain on the scanning angle and to suppress the grating lobes of sparse phased array antennas. This configuration can reduce the element number because the desired gain of the total array can be achieved by using fewer elements. We demonstrate the concept by designing a radiation pattern reconfigurable Yagi-Uda antenna. PIN diode switches are added to the parasitic elements to change director and reflector. The switches of multiple array elements are concurrently controlled by just a single one-pair line. This control structure is simple and can be applied to large-scale arrays. The proposed antenna yields an element gain that almost matches the theoretical limit across about half the coverage, even if the element spacing is enlarged to 1λ. If the switch states are interchanged, the gain in the mirror direction can be increased. We design a 48-element array and compare its gain against those of normal dipole antennas. We also fabricate the proposed antenna and demonstrate radiation pattern switching.
Yoshitaka SHIBATA Noriki UCHIDA
After the East Japan great earthquake on March 11, 2011, many Japanese coastal resident areas were isolated from other because of destruction of information infrastructure, disconnection of communication network and excessive traffic congestion. The undelivered disaster information influenced the speed of evacuation, rescue of injured residents, and sending life-support materials to evacuation shelters. From the experience of such disaster, more robust and resilient networks are strongly required, particularly for preparation of large scale disasters. In this paper, in order to respond to those problems, we introduce Delay Tolerant Network (DTN) for disaster information transmission application in challenged network environment. Message delivery by transport vehicles such as cars between disaster-response headquarter and evacuation shelters in challenged network environment is considered. A improved message delivery method combined with DTN protocols and cognitive wireless network is explained. The computer simulation for the actual rural area in Japan is made to evaluate the performance and effectiveness of proposed method.
One of the major subjects for marine resources development and information processing is how to realize underwater short-range and large-capacity data transmissions. The acoustic wave is an effective carrier and has been used for underwater data transmissions because it has lower attenuation in seawater than the radio wave, and has average propagation distance of about 10km or more. However, along with the imaging of transmission data, the inherent low speed of the acoustic wave makes it cannot and become an ideal carrier for high-speed and large-capacity communications. On the other hand, visible-light wave with wavelength of 400nm-650nm is an ideal carrier, which has received much attention. Its attractive features are high transparency and low attenuation rate in underwater, easily control the propagation direction and range by the visibility, and high data rate and capacity, making it excellent for application in underwater wireless communications. However, visible-light waves in the seawater have the spectral attenuation characteristics due to different marine environment. Therefore, in this paper an underwater optical wireless communication method with adaptation seawater function is considered for seawater turbidity of the spatio-temporal change. Two crucial components in the underwater optical wireless communication system, the light wavelength and the modulation method are controlled using wavelength- and modulation-adaptation techniques, respectively. The effectiveness of the method of the adaptation wavelength is demonstrated in underwater optical image transmissions.