The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

5521-5540hit(21534hit)

  • Pose-Free Face Swapping Based on a Deformable 3D Shape Morphable Model

    Yuan LIN  Shengjin WANG  

     
    PAPER-Computer Graphics

      Vol:
    E97-D No:2
      Page(s):
    305-314

    Traditional face swapping technologies require that the faces of source images and target images have similar pose and appearance (usually frontal). For overcoming this limit in applications this paper presents a pose-free face swapping method based on personalized 3D face modeling. By using a deformable 3D shape morphable model, a photo-realistic 3D face is reconstructed from a single frontal view image. With the aid of the generated 3D face, a virtual source image of the person with the same pose as the target face can be rendered, which is used as a source image for face swapping. To solve the problem of illumination difference between the target face and the source face, a color transfer merging method is proposed. It outperforms the original color transfer method in dealing with the illumination gap problem. An experiment shows that the proposed face reconstruction method is fast and efficient. In addition, we have conducted experiments of face swapping in a variety of scenarios such as children's story book, role play, and face de-identification stripping facial information used for identification, and promising results have been obtained.

  • Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data

    Youwen ZHU  Tsuyoshi TAKAGI  Rong HU  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E97-D No:2
      Page(s):
    326-330

    Recently, Yuan et al. (IEEE Infocom'13, pp.2652-2660) proposed an efficient secure nearest neighbor (SNN) search scheme on encrypted cloud database. Their scheme is claimed to be secure against the collusion attack of query clients and cloud server, because the colluding attackers cannot infer the encryption/decryption key. In this letter, we observe that the encrypted dataset in Yuan's scheme can be broken by the collusion attack without deducing the key, and present a simple but powerful attack to their scheme. Experiment results validate the high efficiency of our attacking approach. Additionally, we also indicate an upper bound of collusion-resistant ability of any accurate SNN query scheme.

  • A New Family of Optimal Ternary Cyclic Codes

    Shuxia MA  Hongling ZHANG  Weidong JIN  Xianhua NIU  

     
    LETTER-Coding Theory

      Vol:
    E97-A No:2
      Page(s):
    690-693

    Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms compared with the linear block codes. The objective of this letter is to present a new family of ternary cyclic codes with parameters [3m-1,3m-1-2m,4], where m is an odd integer. The proposed cyclic codes are optimal in the sense that their parameters meet the Sphere Packing bound.

  • Efficient Pedestrian Detection Using Multi-Scale HOG Features with Low Computational Complexity

    Soojin KIM  Kyeongsoon CHO  

     
    LETTER-Pattern Recognition

      Vol:
    E97-D No:2
      Page(s):
    366-369

    In this paper, an efficient method to reduce computational complexity for pedestrian detection is presented. Since trilinear interpolation is not used, the amount of required operations for histogram of oriented gradient (HOG) feature calculation is significantly reduced. By calculating multi-scale HOG features with integral HOG in a two-stage approach, both high detection rate and speed are achieved in the proposed method.

  • A Comparative Study among Three Automatic Gait Generation Methods for Quadruped Robots

    Kisung SEO  Soohwan HYUN  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E97-D No:2
      Page(s):
    353-356

    This paper introduces a comparison of three automatic gait generation methods for quadruped robots: GA (Genetic Algorithm), GP (genetic programming) and CPG (Central Pattern Generator). It aims to provide a useful guideline for the selection of gait generation methods. GA-based approaches seek to optimize paw locus in Cartesian space. GP-based techniques generate joint trajectories using regression polynomials. The CPGs are neural circuits that generate oscillatory output from an input coming from the brain. Optimizations for the three proposed methods are executed and analyzed using a Webots simulation of the quadruped robot built by Bioloid. The experimental comparisons and analyses provided herein will be an informative guidance for research of gait generation method.

  • Feasibility of Guard Band Utilization for Cognitive Radio Using TV White Space

    Noriyuki YAGINUMA  Masahiro UMEHIRA  Hiroshi HARADA  

     
    PAPER

      Vol:
    E97-B No:2
      Page(s):
    343-349

    In cognitive radio systems using TV white space, it is desirable to secure a control channel to exchange the wireless network control information and to secure minimum frequency resource for secondary user communications if TV white space is unavailable. In order to satisfy these requirements, this paper proposes guard band utilization, which aggregates the multiple guard bands between digital TV signals and uses them for a control channel and/or a communication channel. To investigate the feasibility of the proposed scheme, this paper evaluates the performance degradation of the digital TV signals when the guard band is used. Furthermore, it discusses the permissible transmitting power and occupied bandwidth of the guard band signals to avoid the harmful interference to the digital TV signals.

  • Real-Time Refinement Method for Foreground Objects Detectors Using Super Fast Resolution-Free Tracking System

    Axel BEAUGENDRE  Satoshi GOTO  

     
    PAPER

      Vol:
    E97-A No:2
      Page(s):
    520-529

    Moving objects or more generally foreground objects are the simplest objects in the field of computer vision after the pixel. Indeed, a moving object can be defined by 4 integers only, either two pairs of coordinates or a pair of coordinates and the size. In fixed camera scenes, moving objects (or blobs) can be extracted quite easily but the methods to produce them are not able to tell if a blob corresponds to remaining background noise, a single target or if there is an occlusion between many target which are too close together thus creating a single blob resulting from the fusion of all targets. In this paper we propose an novel method to refine moving object detection results in order to get as many blobs as targets on the scene by using a tracking system for additional information. Knowing if a blob is at proximity of a tracker allows us to remove noise blobs, keep the rest and handle occlusions when there are more than one tracker on a blob. The results show that the refinement is an efficient tool to sort good blobs from noise blobs and accurate enough to perform a tracking based on moving objects. The tracking process is a resolution free system able to reach speed such as 20 000fps even for UHDTV sequences. The refinement process itself is in real time, running at more than 2000fps in difficult situations. Different tests are presented to show the efficiency of the noise removal and the reality of the independence of the refinement tracking system from the resolution of the videos.

  • Stochastic Analysis of Route Request Packet Propagation in Reactive Ad Hoc Sensor Network and Its Application to Optimizing the Number of Rebroadcasting Nodes

    Mitsuru ISHII  Daisuke TAKAGO  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E97-A No:2
      Page(s):
    708-712

    We analyze the effect of the propagation of route request packets in ad hoc network routing protocols such as DSR and AODV. So far it has not been clear how the number density of route request packets depends on propagation and hop counts. By stochastic analysis, it is found that the collisions of route request packets can be avoided efficiently by adjusting the number of the relevant nodes in the early stages of propagation.

  • A Symbol Based Distributed Video Coding System Using Multiple Hypotheses

    Daniel Johannes LOUW  Haruhiko KANEKO  

     
    PAPER-Coding Theory

      Vol:
    E97-A No:2
      Page(s):
    632-641

    Single view distributed video coding (DVC) is a coding method that allows for the computational complexity of the system to be shifted from the encoder to the decoder. This property promotes the use of DVC in systems where processing power or energy use at the encoder is constrained. Examples include wireless devices and surveillance. This paper proposes a multi-hypothesis transform domain single-view DVC system that performs symbol level coding with a non-binary low-density parity-check code. The main contributions of the system relate to the methods used for combining multiple side information hypotheses at the decoder. The system also combines interpolation and extrapolation in the side information creation process to improve the performance of the system over larger group-of-picture sizes.

  • Common Quadratic Lyapunov Function for Two Classes of Special Switched Linear Systems

    Chaoqing WANG  Tielong SHEN  Haibo JI  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E97-D No:2
      Page(s):
    175-183

    This paper presents sufficient conditions for the existence of a common quadratic Lyapunov functions for two classes of switched linear systems which possess negative row strictly diagonally dominant and diagonalizable stable state matrices, respectively. Numerical examples will be given to verify the correctness of the proposed theorems.

  • Electromagnetic Compatibility of Resonance Coupling Wireless Power Transfer in On-Line Electric Vehicle System

    Yangbae CHUN  Seongwook PARK  Jonghoon KIM  Jiseong KIM  Hongseok KIM  Joungho KIM  Nam KIM  Seungyoung AHN  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E97-B No:2
      Page(s):
    416-423

    We present the concept of an on-line electric vehicle (OLEV) and its wireless power transfer mechanism and analyze the electromagnetic compatibility characteristics. As magnetic fields transfer 100kW of power to the vehicle, reduction of electromagnetic field (EMF) noise is a critical issue for protection of the human body. Also, with respect to electromagnetic interference (EMI) noise, a proper measurement method has not yet been established for this low frequency high power system. In this paper, low frequency magnetic field shielding methods and application of the shields to the OLEV system are presented. Furthermore, a standard low frequency magnetic field measurement is suggested as an EMI test.

  • Iterative Method for Inverse Nonlinear Image Processing

    Zihan YU  Kiichi URAHAMA  

     
    LETTER-Image

      Vol:
    E97-A No:2
      Page(s):
    719-721

    We present an iterative method for inverse transform of nonlinear image processing. Its convergence is verified for image enhancement by an online software. We also show its application to amplification of the opacity in foggy or underwater images.

  • Accurate Permittivity Estimation Method for 3-Dimensional Dielectric Object with FDTD-Based Waveform Correction

    Ryunosuke SOUMA  Shouhei KIDERA  Tetsuo KIRIMOTO  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E97-C No:2
      Page(s):
    123-127

    Ultra-wideband pulse radar exhibits high range resolution, and excellent capability in penetrating dielectric media. With that, it has great potential as an innovative non-destructive inspection technique for objects such as human body or concrete walls. For suitability in such applications, we have already proposed an accurate permittivity estimation method for a 2-dimensional dielectric object of arbitrarily shape and clear boundary. In this method, the propagation path estimation inside the dielectric object is calculated, based on the geometrical optics (GO) approximation, where the dielectric boundary points and its normal vectors are directly reproduced by the range point migration (RPM) method. In addition, to compensate for the estimation error incurred using the GO approximation, a waveform compensation scheme employing the finite-difference time domain (FDTD) method was incorporated, where an initial guess of the relative permittivity and dielectric boundary are employed for data regeneration. This study introduces the 3-dimensional extension of the above permittivity estimation method, aimed at practical uses, where only the transmissive data are effectively extracted, based on quantitative criteria that considers the spatial relationship between antenna locations and the dielectric object position. Results from a numerical simulation verify that our proposed method accomplishes accurate permittivity estimations even for 3-dimensional dielectric medium of wavelength size.

  • Experimental Evaluation of Bistatic Ocean Wave Remote Sensing System by GPS

    Jian CUI  Nobuyoshi KOUGUCHI  

     
    PAPER-Sensing

      Vol:
    E97-B No:2
      Page(s):
    519-527

    This paper presents an experimental evaluation of an ocean wave remote sensing system that uses bistatic GPS signal reflection to estimate wave characteristics. In our previous paper, a bistatic ocean wave remote sensing system by GPS was proposed to estimate the characteristics of sea swell near a harbor, and was also evaluated by numerical simulations. In the next phase, a prototype system has been developed and some basic experiments have been carried out in a coastal area in order to evaluate the system experimentally. In this paper, we will outline the prototype system. The system mainly consists of an array antenna, a front-end, and an estimator for ocean wave characteristics. Next, we explain that the estimator for ocean wave characteristics can identify each signal reflected from the ocean waves. Finally, the experiments show that the prototype system can receive the reflected signals from the sea-surface near the coast, and estimate the wave period and wavelength in the direction of the array antenna.

  • D-DB and D-RRDB Relaying with D-DQE Relay Network

    Yaser FAEDFAR  Mohd Fadzli Mohd SALLEH  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:2
      Page(s):
    495-503

    In this study, a new method for Decode-Distributed Beamforming (D-DB) relaying is proposed. Each relay node decodes the source symbol by maximum likelihood detection. The detected symbol is entered into the stored Quantized Equal-gain (QE) codebook, where the label of the phase region is provided by a feedback link from the destination node. Therefore, the proposed relay network forms a Decode-Distributed QE (D-DQE) relay network. The performances of the D-DQE codebooks are examined by Monte-Carlo simulations, in which the feedback links and channel estimations are assumed to be error-free. The simulation results reveal that the symbol error rates of the D-DQE relay system improve the error performance of the QE codebooks when relay nodes are close to the source node. When error-free feedback bits are provided, the performance of the proposed D-DQE is better than that of Alamouti's Decode-Distributed Space-Time Coding (D-DSTC) relay network. The weakest relays are rejected to improve the performance of the D-DQE codebooks and reduce the number of feedback bits. This relay network is called Decode-Relay Rejection for Distributed Beamforming (D-RRDB) relay networks.

  • NASCOR: Network Assisted Spectrum Coordination Service for Coexistence between Heterogeneous Radio Systems Open Access

    Dipankar RAYCHAUDHURI  Akash BAID  

     
    INVITED PAPER

      Vol:
    E97-B No:2
      Page(s):
    251-260

    This paper presents the design and proof-of-concept validation of a novel network-assisted spectrum coordination (NASCOR) service for improved radio coexistence in future shared spectrum bands. The basic idea is to create an overlay network service for dissemination of spectrum usage information between otherwise independent radio devices and systems, enabling them to implement decentralized spectrum coexistence policies that reduce interference and improve spectrum packing efficiency. The proposed method is applicable to unlicensed band and shared spectrum systems in general (including femtocells), but is particularly relevant to emerging TV white spaces and cognitive radio systems which are still in need of scalable and accurate solutions for both primary-to-secondary and secondary-to-secondary coordination. Key challenges in enabling a network layer spectrum coordination service are discussed along with the description of our system architecture and a detailed case-study for a specific example of spectrum coordination: client-AP association optimization in dense networks. Performance gains are evaluated through large-scale simulations with multiple overlapping networks, each consisting of 15-35 access points and 50-250 clients in a 0.5×0.5 sq.km. urban setting. Results show an average of 150% improvement in random deployments and upto 7× improvements in clustered deployments for the least-performing client throughputs with modest reductions in the mean client throughputs.

  • A New 64-QAM Space-Time Code Based on a Trace Criterion

    Tatsumi KONISHI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:2
      Page(s):
    694-697

    We propose a 2 × 2 space-time block code based on a trace criterion for 64-quadrature amplitude modulation (QAM). We introduce a method to easily calculate the trace norm of a space-time code for 64-QAM, and propose a new space-time code searched by this method. The error rate performance of the proposed code is compared with that of the Alamouti code. By comparison of the theoretical upper bounds, the proposed space-time code is better than the Alamouti code, when the number of receiving antennas is more than one. Moreover, bit error rate performance of the proposed code is compared with maximum likelihood decoding on perfect channel state information Rayleigh fading channels by computer simulations. These results show the proposed code almost outperforms the Alamouti code when the number of receive antennas is more than one, and the increased number of receiving antennas with our code is a decided advantage.

  • A Framework of Centroid-Based Methods for Text Categorization

    Dandan WANG  Qingcai CHEN  Xiaolong WANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E97-D No:2
      Page(s):
    245-254

    Text Categorization (TC) is a task of classifying a set of documents into one or more predefined categories. Centroid-based method, a very popular TC method, aims to make classifiers simple and efficient by constructing one prototype vector for each class. It classifies a document into the class that owns the prototype vector nearest to the document. Many studies have been done on constructing prototype vectors. However, the basic philosophies of these methods are quite different from each other. It makes the comparison and selection of centroid-based TC methods very difficult. It also makes the further development of centroid-based TC methods more challenging. In this paper, based on the observation of its general procedure, the centroid-based text classification is treated as a kind of ranking task, and a unified framework for centroid-based TC methods is proposed. The goal of this unified framework is to classify a text via ranking all possible classes by document-class similarities. Prototype vectors are constructed based on various loss functions for ranking classes. Under this framework, three popular centroid-based methods: Rocchio, Hypothesis Margin Centroid and DragPushing are unified and their details are discussed. A novel centroid-based TC method called SLRCM that uses a smoothing ranking loss function is further proposed. Experiments conducted on several standard databases show that the proposed SLRCM method outperforms the compared centroid-based methods and reaches the same performance as the state-of-the-art TC methods.

  • Implementation and Performance Evaluation of a Distributed TV White Space Sensing System

    Ha-Nguyen TRAN  Yohannes D. ALEMSEGED  Hiroshi HARADA  

     
    PAPER

      Vol:
    E97-B No:2
      Page(s):
    305-313

    Spectrum sensing is one of the methods to identify available white spaces for secondary usage which was specified by the regulators. However, signal quality to be sensed can plunge to a very low signal-to-noise-ratio due to signal propagation and hence readings from individual sensors will be unreliable. Distributed sensing by the cooperation of multiple sensors is one way to cope with this problem because the diversity gain due to the combining effect of data captured at different position will assist in detecting signals that might otherwise not be detected by a single sensor. In effect, the probability of detection can be improved. We have implemented a distributed sensing system to evaluate the performance of different cooperative sensing algorithms. In this paper we describe our implementation and measurement experience which include the system design, specification of the system, measurement method, the issues and solutions. This paper also confirms the performance enhancement offered by distributed sensing algorithms, and describes several ideas for further enhancement of the sensing quality.

  • Covariance-Based Barrage Jammer Nulling Filter for Surveillance Radar

    Gang LU  Hai-Yan JIN  

     
    PAPER-Sensing

      Vol:
    E97-B No:2
      Page(s):
    512-518

    A covariance-based algorithm is proposed to find a barrage jammer suppression filter for surveillance radar with an adaptive array. The conventional adaptive beamformer (ABF) or adaptive sidelobe canceller (ASLC) with auxiliary antennas can be used successfully in sidelobe jammer rejection. When a jammer shares the same bearing with the target of interest, however, those methods inherently cancel the target in their attempt to null the jammer. By exploiting the jammer multipath scattered returns incident from other angles, the proposed algorithm uses only the auto-covariance matrix of the sample data produced by stacking range cell returns in a pulse repetition interval (PRI). It does not require estimation of direction of arrival (DOA) or time difference of arrival (TDOA) of multipath propagation, thus making it applicable to electronic countermeasure (ECM) environments with high power barrage jammers and it provides the victim radar with the ability to null both the sidelobe (sidebeam) and mainlobe (mainbeam) jammers simultaneously. Numeric simulations are provided to evaluate the performance of this filter in the presence of an intensive barrage jammer with jammer-to-signal ratio (JSR) greater than 30dB, and the achieved signal-to-jammer-plus-noise ratio (SJNR) improvement factor (IF) exceeds 46dB.

5521-5540hit(21534hit)