The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

5761-5780hit(21534hit)

  • A Robust Speech Communication into Smart Info-Media System

    Yoshikazu MIYANAGA  Wataru TAKAHASHI  Shingo YOSHIZAWA  

     
    INVITED PAPER

      Vol:
    E96-A No:11
      Page(s):
    2074-2080

    This paper introduces our developed noise robust speech communication techniques and describes its implementation to a smart info-media system, i.e., a small robot. Our designed speech communication system consists of automatic speech detection, recognition, and rejection. By using automatic speech detection and recognition, an observed speech waveform can be recognized without a manual trigger. In addition, using speech rejection, this system only accepts registered speech phrases and rejects any other words. In other words, although an arbitrary input speech waveform can be fed into this system and recognized, the system responds only to the registered speech phrases. The developed noise robust speech processing can reduce various noises in many environments. In addition to the design of noise robust speech recognition, the LSI design of this system has been introduced. By using the design of speech recognition application specific IC (ASIC), we can simultaneously realize low power consumption and real-time processing. This paper describes the LSI architecture of this system and its performances in some field experiments. In terms of current speech recognition accuracy, the system can realize 85-99% under 0-20dB SNR and echo environments.

  • Robust Bilateral Filter Using Switching Median Filter

    Tadahiro AZETSU  Noriaki SUETAKE  Eiji UCHINO  

     
    LETTER-Digital Signal Processing

      Vol:
    E96-A No:11
      Page(s):
    2185-2186

    This paper proposes a robust bilateral filter which can handle mixed Gaussian and impulsive noise by hybridizing the conventional bilateral filter and the switching median filter. The effectiveness of the proposed method is verified in comparison with other conventional methods by some experiments using the natural digital images.

  • New Perfect Gaussian Integer Sequences of Period pq

    Xiuwen MA  Qiaoyan WEN  Jie ZHANG  Huijuan ZUO  

     
    LETTER-Information Theory

      Vol:
    E96-A No:11
      Page(s):
    2290-2293

    In this letter, by using Whiteman's generalized cyclotomy of order 2 over Zpq, where p, q are twin primes, we construct new perfect Gaussian integer sequences of period pq.

  • On Reducing Rollback Propagation Effect of Optimistic Message Logging for Group-Based Distributed Systems

    Jinho AHN  

     
    LETTER-Dependable Computing

      Vol:
    E96-D No:11
      Page(s):
    2473-2477

    This paper presents a new scalable method to considerably reduce the rollback propagation effect of the conventional optimistic message logging by utilizing positive features of reliable FIFO group communication links. To satisfy this goal, the proposed method forces group members to replicate different receive sequence numbers (RSNs), which they assigned for each identical message to their group respectively, into their volatile memories. As the degree of redundancy of RSNs increases, the possibility of local recovery for each crashed process may significantly be higher. Experimental results show that our method can outperform the previous one in terms of the rollback distance of non-faulty processes with a little normal time overhead.

  • Scalability Analysis of Source Routing Multicast for Huge Numbers of Groups

    Yohei KATAYAMA  Takeru INOUE  Noriyuki TAKAHASHI  Ryutaro KAWAMURA  

     
    PAPER

      Vol:
    E96-B No:11
      Page(s):
    2784-2794

    Source routing multicast has been gathering much more attention rather than traditional IP multicast, since it is thought to be more scalable in terms of the number of groups at the cost of higher traffic loads. This paper introduces a mathematical framework to analyze the scalability of source routing multicast and IP multicast by leveraging previous multicast studies. We first analyze the amount of data traffic based on the small-world nature of networks, and show that source routing multicast can be as efficient as IP multicast if a simple header fragmentation technique (subgrouping) is utilized. We also analyze scalability in terms of group numbers, which are derived under the equal budget assumption. Our analysis shows that source routing multicast is competitive for low bit-rate streams, like those in the publish/subscribe service, but we find some factors that offset the advantage. This is the first work to analytically investigate the scalability of source routing multicast.

  • Contracted Webgraphs — Scale-Freeness and Structure Mining —

    Yushi UNO  Fumiya OGURI  

     
    PAPER

      Vol:
    E96-B No:11
      Page(s):
    2766-2773

    The link structure of the Web is generally viewed as a webgraph. One of the main objectives of web structure mining is to find hidden communities on the Web based on the webgraph, and one of its approaches tries to enumerate substructures, each of which corresponds to a set of web pages of a community or its core. Research has shown that certain substructures can find sets of pages that are inherently irrelevant to communities. In this paper, we propose a model, which we call contracted webgraphs, where such substructures are contracted into single nodes to hide useless information. We then try structure mining iteratively on those contracted webgraphs since we can expect to find further hidden information once irrelevant information is eliminated. We also explore the structural properties of contracted webgraphs from the viewpoint of scale-freeness, and we observe that they exhibit novel and extreme self-similarities.

  • Discriminative Approach to Build Hybrid Vocabulary for Conversational Telephone Speech Recognition of Agglutinative Languages

    Xin LI  Jielin PAN  Qingwei ZHAO  Yonghong YAN  

     
    LETTER-Speech and Hearing

      Vol:
    E96-D No:11
      Page(s):
    2478-2482

    Morphemes, which are obtained from morphological parsing, and statistical sub-words, which are derived from data-driven splitting, are commonly used as the recognition units for speech recognition of agglutinative languages. In this letter, we propose a discriminative approach to select the splitting result, which is more likely to improve the recognizer's performance, for each distinct word type. An objective function which involves the unigram language model (LM) probability and the count of misrecognized phones on the acoustic training data is defined and minimized. After determining the splitting result for each word in the text corpus, we select the frequent units to build a hybrid vocabulary including morphemes and statistical sub-words. Compared to a statistical sub-word based system, the hybrid system achieves 0.8% letter error rates (LERs) reduction on the test set.

  • Single Parameter Logarithmic Image Processing for Edge Detection

    Fuji REN  Bo LI  Qimei CHEN  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E96-D No:11
      Page(s):
    2437-2449

    Considering the non-linear properties of the human visual system, many non-linear operators and models have been developed, particularly the logarithmic image processing (LIP) model proposed by Jourlin and Pinoli, which has been proved to be physically justified in several laws of the human visual system and has been successfully applied in image processing areas. Recently, several modifications based on this logarithmic mathematical framework have been presented, such as parameterized logarithmic image processing (PLIP), pseudo-logarithmic image processing, homomorphic logarithmic image processing. In this paper, a new single parameter logarithmic model for image processing with an adaptive parameter-based Sobel edge detection algorithm is presented. On the basis of analyzing the distributive law, the subtractive law, and the isomorphic property of the PLIP model, the five parameters in PLIP are replaced by a single parameter to ensure the completeness of the model and physical constancy with the nature of an image, and then an adaptive parameter-based Sobel edge detection algorithm is proposed. By using an image noise estimation method to evaluate the noise level of image, the adaptive parameter in the single parameter LIP model is calculated based on the noise level and grayscale value of a corresponding image area, followed by the single-parameter LIP-based Sobel operation to overcome the noise-sensitive problem of classical LIP-based Sobel edge detection methods, especially in the dark area of an image, while retaining edge sensitivity. Compared with the classical LIP and PLIP model, the given single parameter LIP achieves satisfactory results in noise suppression and edge accuracy.

  • Generalized Pyramid is NP-Complete

    Chuzo IWAMOTO  Yuta MATSUI  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E96-D No:11
      Page(s):
    2462-2465

    Pyramid is a solitaire game, where the object is to remove all cards from both a pyramidal layout and a stock of cards. Two exposed cards can be matched and removed if their values total 13. Any exposed card of value 13 and the top card of the stock can be discarded immediately. We prove that the generalized version of Pyramid is NP-complete.

  • Scheduling Algorithm with Multiple Feedbacks for Supporting Coordinated Multipoint Operation for LTE-Advanced Systems

    Masayuki HOSHINO  Yasuaki YUDA  Tomohumi TAKATA  Akihiko NISHIO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:11
      Page(s):
    2906-2912

    In this study, we investigate the use of scheduling algorithms to support coordinated multipoint (CoMP) operation for Long Term Evolution (LTE)-Advanced systems studied in the 3rd Generation Partnership Project (3GPP). CoMP, which improves cooperative transmission among network nodes (transmission points: TPs) and reduces or eliminates interTP interference, enabling performance improvements in cell edge throughputs. Although scheduling algorithms in LTE systems have been extensively investigated from the single cell operation perspective, those extension to CoMP where each user equipment (UE) has multiple channel state information (CSI) feedbacks require further consideration on proportional fairness (PF) metric calculation while maintaining PF criteria. To this end, we propose to apply a scaling factor in accordance with the number of CSI feedbacks demanded for the UE. To evaluate the benefits of this scaling factor, multicell system-level simulations that take account of channel estimation errors are performed, and the results confirmed that our improved algorithm enables fairness to be maintained.

  • Peer-to-Peer Content Multicast Using Off-Peak Periods in Wireless Access Links

    Nagao OGINO  Shigehiro ANO  

     
    PAPER-Network System

      Vol:
    E96-B No:11
      Page(s):
    2845-2855

    Recently, many kinds of content are being circulated within a great many service-specific overlay networks. When the content is not extremely delay-sensitive, content circulation between wireless terminals can be realized without additional resources by using off-peak periods in wireless access links. In such content circulation, peer-to-peer content multicast is a promising approach to reduce the load on the centralized server. However, to minimize battery drain, each wireless terminal can only forward content to a restricted number of neighboring terminals once it has received the content. This paper proposes an efficient forwarding scheme for peer-to-peer content multicast between the wireless terminals intermittently connected with the backhaul network. In the proposed scheme, a restricted number of terminals with an earlier start time of off-peak periods are selected to forward the content when the number of forwarding hops from the source terminal is less than or equal to a predetermined threshold. In contrast, a restricted number of terminals are selected randomly when the number of forwarding hops exceeds the threshold. This paper clarifies that the proposed hybrid forwarding scheme can multicast the content to many terminals within an arbitrarily restricted period. A guideline to determine the optimum threshold for switching the terminal selection method in the proposed hybrid scheme is derived from simulation results.

  • A Jointly Optimized Predictive-Adaptive Partitioned Block Transform for Video Coding

    Di WU  Xiaohai HE  

     
    PAPER-Image Processing

      Vol:
    E96-A No:11
      Page(s):
    2161-2168

    In this paper, we propose a jointly optimized predictive-adaptive partitioned block transform to exploit the spatial characteristics of intra residuals and improve video coding performance. Under the assumptions of traditional Markov representations, the asymmetric discrete sine transform (ADST) can be combined with a discrete cosine transform (DCT) for video coding. In comparison, the interpolative Markov representation has a lower mean-square error for images or regions that have relatively high contrast, and is insensitive to changes in image statistics. Hence, we derive an even discrete sine transform (EDST) from the interpolative Markov model, and use a coding scheme to switch between EDST and DCT, depending on the prediction direction and boundary information. To obtain an implementation independent of multipliers, we also propose an orthogonal 4-point integer EDST, which consists solely of adds and bit-shifts. We implement our hybrid transform coding scheme within the H.264/AVC intra-mode framework. Experimental results show that the proposed scheme significantly outperforms standard DCT and ADST. It also greatly reduces the blocking artifacts typically observed around block edges, because the new transform is more adaptable to the characteristics of intra-prediction residuals.

  • Cheating Detectable Secret Sharing Schemes for Random Bit Strings

    Wakaha OGATA  Toshinori ARAKI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E96-A No:11
      Page(s):
    2230-2234

    In secret sharing scheme, Tompa and Woll considered a problem of cheaters who try to make another participant reconstruct an invalid secret. Later, some models of such cheating were formalized and lower bounds of the size of shares were shown in the situation of fixing the minimum successful cheating probability. Under the assumption that cheaters do not know the distributed secret, no efficient scheme is known which can distribute bit strings. In this paper, we propose an efficient scheme for distributing bit strings with an arbitrary access structure. When distributing a random bit string with threshold access structures, the bit length of shares in the proposed scheme is only a few bits longer than the lower bound.

  • Output Feedback Control of a Chain of Integrators under Uncertain AC and DC Sensor Noise

    Ho-Lim CHOI  

     
    LETTER-Systems and Control

      Vol:
    E96-A No:11
      Page(s):
    2275-2278

    We consider an output feedback control problem of a chain of integrators under sensor noise. The sensor noise enters the output feedback channel in an additive form. A similar problem has been addressed most recently in [9], but their result has been developed only under AC sensor noise. We generalize the result of [9] by allowing the sensor noise to include both AC and DC components. With our new output feedback controller, we show that the ultimate bounds of all states can be made arbitrarily small. We show the generality of our result over [9] via an example.

  • Mathematical Analysis of Call Admission Control in Mobile Hotspots

    Jae Young CHOI  Bong Dae CHOI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E96-B No:11
      Page(s):
    2816-2827

    A mobile hotspot is a moving vehicle that hosts an Access Point (AP) such as train, bus and subway where users in these vehicles connect to external cellular network through AP to access their internet services. To meet Quality of Service (QoS) requirements, typically throughput and/or delay, a Call Admission Control (CAC) is needed to restrict the number of users accepted by the AP. In this paper, we analyze a modified guard channel scheme as CAC for mobile hotspot as follows: During a mobile hotspot is in the stop-state, we adopt a guard channel scheme where the optimal number of resource units is reserved for vertical handoff users from cellular network to WLAN. During a mobile hotspot is in the move-state, there are no handoff calls and so no resources for handoff calls are reserved in order to maximize the utility of the WLAN capacity. We model call's arrival and departure processes by Markov Modulated Poisson Process (MMPP) and then we model our CAC by 2-dimensional continuous time Markov chain (CTMC) for single traffic and 3-dimensional CTMC for two types of traffic. We solve steady-state probabilities by the Quasi-Birth and Death (QBD) method and we get various performance measures such as the new call blocking probabilities, the handoff call dropping probabilities and the channel utilizations. We compare our CAC with the conventional guard channel scheme which the number of guard resources is fixed all the time regardless of states of the mobile hotspot. Finally, we find the optimal threshold value on the amount of resources to be reserved for the handoff call subject to a strict constraint on the handoff call dropping probability.

  • BER Performance of Cooperative DF Relaying with Piecewise-Linear Receiver over Correlated Nakagami-m Fading Channels

    Yaping ZHU  Kai YANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:11
      Page(s):
    2311-2314

    In this letter, we investigate the performance of cooperative decode-and-forward multiple-input multiple-output relaying system using orthogonal space-time block codes with piecewise-linear (PL) receiver over correlated Nakagami-m fading channels for integer values of m. We derive the closed-form expression for the exact bit error rates of binary phase shift keying signals. The analytical expression is validated through numerical results. It is shown that the performance of PL receiver outperforms that of conventional maximal ratio combining receiver.

  • A Practical Antenna Selection Technique in Multiuser Massive MIMO Networks

    Tae-Won BAN  Bang Chul JUNG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:11
      Page(s):
    2901-2905

    In this paper, a practical antenna selection (AS) scheme is investigated for downlink multiuser massive multiple input multiple output (MIMO) networks where a base station (BS) is equipped with many antennas (N) and communicates with K mobile stations (MSs) simultaneously. In the proposed antenna selection technique, S antennas (S≤N) are selected for transmission based on the knowledge of channel coefficients of each MS for reducing the number of RF chains which mainly induce cost increase in terms of size, hardware, and power. In the proposed AS technique, a BS first ranks antenna elements according to the sum of their channel gains to all MSs. Then, the BS computes the downlink sum-rate with S consecutive antenna elements in the ordered set, where the subset consisting of S consecutive antennas is called a window. The BS selects the window resulting in the highest sum-rate. The selected S antenna elements are used for transmitting signals to multiple users, while the remaining (N-S) antenna elements are turned off for the time slot. Therefore, the proposed AS technique requires only (N-S+1) sum-rate computations, while the optimal AS technique involves $inom{N}{S}$ computations. We analyze downlink sum-rate with the proposed AS technique and compare it with that of a reference system with the same number of antenna elements without AS. Our results show that the proposed AS technique significantly outperforms the reference scheme.

  • Data Spoofing Attacks by IPv6 Tunnels

    Yu CUI  Zhi-Hong TIAN  Bin-Xing FANG  Hong-Li ZHANG  Wei-Zhe ZHANG  

     
    PAPER-Internet

      Vol:
    E96-B No:11
      Page(s):
    2875-2882

    Tunneling is one of the main methods for the transition from IPv4 to IPv6 networks. By encapsulating IPv6 packets in IPv4 or UDP packets, tunnels like 6to4, Isatap and Teredo provide a feasible way for IPv4 hosts to establish IPv6 connections to hosts in IPv6 internet or IPv6 islands. For IPv4 internet, the use of tunnels varies the traffic and increases the type of packets, making the network environment more complex. In addition to common tunnels, various types of tunnels with more layers are tested in this paper. The results of successful connections prove the usefulness of multi-layer packets with diverse layer-count and type on the internet. To ensure the security of internal networks, the influence on traffic analysis in dual-stack IDS devices caused by the diversity is studied. Three spoofing attacks of “data insertion”, “data evasion” and “attacks using UDP” are proposed to show the influence on IDS caused by tunnels. Compared to the attacks without tunnels, some constraining factors are eliminated, which may increase the security risk of IDS and decrease the attacker's difficulties. To summarize this kind of problem, the concept of “Tunnel Interference” is revealed. And as solutions to this problem, two methods, RA (Record All) and HEH (Hash for Each Header), are presented in this paper which theoretically solve these problems to a great extent. RA records all headers and compares from the outermost to innermost layer. HEH is hash-based and accumulates hash values of each header. Both of them have linear time and space complexity. Experimental results show that RA and HEH will lead to minor space increase and up to 1.2% time increment in each layer compared to the original dual-stack.

  • Resonances and Field Enhancement in Cylindrical Electromagnetic Bandgap Structures

    Vakhtang JANDIERI  Kiyotoshi YASUMOTO  Young-Ki CHO  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E96-C No:11
      Page(s):
    1436-1439

    Electromagnetic scattering and radiation in cylindrical electromagnetic bandgap (EBG) structure is analyzed. The radiated field from a line source placed inside the eccentric configuration of the cylindrical EBG structure and plane wave incident on the cylindrical EBG structure is numerically studied based on the method proposed by the authors in their early papers. Using the developed formulation, it is shown first time that when the cylindrical EBG is illuminated by plane wave of particular resonance frequencies, the field are strongly enhanced or shaded inside the cylindrical EBG structure and this effect depends on the angle of incidence of the plane waves. We give a deep physical insight into explanation of this phenomenon based on the Lorentz reciprocity relation for cylindrical structures.

  • In-Cell Projected Capacitive Touch Panel Technology Open Access

    Yasuhiro SUGITA  Kazutoshi KIDA  Shinji YAMAGISHI  

     
    INVITED PAPER

      Vol:
    E96-C No:11
      Page(s):
    1384-1390

    We describe an In-Cell Projected Capacitive Touch Panel in a display using IGZO TFT technology. The prototype demonstrates high signal-to-noise ratio (SNR) and pen input operation. The possibility of enlarging the display size beyond current limits makes this a highly promising approach for In-Cell Capacitive touch panels.

5761-5780hit(21534hit)