The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

9761-9780hit(21534hit)

  • Handling Dynamic Weights in Weighted Frequent Pattern Mining

    Chowdhury Farhan AHMED  Syed Khairuzzaman TANBEER  Byeong-Soo JEONG  Young-Koo LEE  

     
    PAPER-Knowledge Discovery and Data Mining

      Vol:
    E91-D No:11
      Page(s):
    2578-2588

    Even though weighted frequent pattern (WFP) mining is more effective than traditional frequent pattern mining because it can consider different semantic significances (weights) of items, existing WFP algorithms assume that each item has a fixed weight. But in real world scenarios, the weight (price or significance) of an item can vary with time. Reflecting these changes in item weight is necessary in several mining applications, such as retail market data analysis and web click stream analysis. In this paper, we introduce the concept of a dynamic weight for each item, and propose an algorithm, DWFPM (dynamic weighted frequent pattern mining), that makes use of this concept. Our algorithm can address situations where the weight (price or significance) of an item varies dynamically. It exploits a pattern growth mining technique to avoid the level-wise candidate set generation-and-test methodology. Furthermore, it requires only one database scan, so it is eligible for use in stream data mining. An extensive performance analysis shows that our algorithm is efficient and scalable for WFP mining using dynamic weights.

  • Counter-Based Broadcasting with Hop Count Aware Random Assessment Delay Extension for Wireless Sensor Networks

    Shintaro IZUMI  Takashi TAKEUCHI  Takashi MATSUDA  Hiroshi KAWAGUCHI  Chikara OHTA  Masahiko YOSHIMOTO  

     
    PAPER

      Vol:
    E91-B No:11
      Page(s):
    3489-3498

    Broadcasting is an elementary operation in wireless multi-hop networks. Flooding is a simple broadcast protocol but it frequently causes serious redundancy, contention and collisions. Probability based methods are promising because they can reduce broadcast messages without additional hardware and control packets. In this paper, the counter-based scheme which is one of the probability based methods is focused on as a broadcast protocol, and the RAD (Random Assessment Delay) Extension is proposed to improve the original counter-based scheme. The RAD Extension can be implemented without additional hardware, so that the strength of the counter-based scheme can be preserved. In addition, we propose the additional algorithm called Hop Count Aware RAD Extension to establish shorter path from the source node. Simulation results show that both of the RAD Extension and the Hop Count Aware RAD Extension reduce the number of retransmitting nodes by about 10% compared with the original scheme. Furthermore, the Hop Count Aware RAD Extension can establish almost the same path length as the counter-based scheme.

  • Improvement of Vehicle Positioning Using Car-to-Car Communications in Consideration of Communication Delay

    Hidekata HONTANI  Yuya HIGUCHI  

     
    PAPER

      Vol:
    E91-B No:11
      Page(s):
    3461-3468

    In this article, we propose a vehicle positioning method that can estimate positions of cars even in areas where the GPS is not available. For the estimation, each car measures the relative distance to a car running in front, communicates the measurements with other cars, and uses the received measurements for estimating its position. In order to estimate the position even if the measurements are received with time-delay, we employed the time-delay tolerant Kalman filtering. For sharing the measurements, it is assumed that a car-to-car communication system is used. Then, the measurements sent from farther cars are received with larger time-delay. It follows that the accuracy of the estimates of farther cars become worse. Hence, the proposed method manages only the states of nearby cars to reduce computing effort. The authors simulated the proposed filtering method and found that the proposed method estimates the positions of nearby cars as accurate as the distributed Kalman filtering.

  • Contract Specification in Java: Classification, Characterization, and a New Marker Method

    Chien-Tsun CHEN  Yu Chin CHENG  Chin-Yun HSIEH  

     
    PAPER-Fundamentals of Software and Theory of Programs

      Vol:
    E91-D No:11
      Page(s):
    2685-2692

    Design by Contract (DBC), originated in the Eiffel programming language, is generally accepted as a practical method for building reliable software. Currently, however, few languages have built-in support for it. In recent years, several methods have been proposed to support DBC in Java. We compare eleven DBC tools for Java by analyzing their impact on the developer's programming activities, which are characterized by seven quality attributes identified in this paper. It is shown that each of the existing tools fails to achieve some of the quality attributes. This motivates us to develop ezContract, an open source DBC tool for Java that achieves all of the seven quality attributes. ezContract achieves streamlined integration with the working environment. Notably, standard Java language is used and advanced IDE features that work for standard Java programs can also work for the contract-enabled programs. Such features include incremental compilation, automatic refactoring, and code assist.

  • 3D Triangular Mesh Parameterization with Semantic Features Based on Competitive Learning Methods

    Shun MATSUI  Kota AOKI  Hiroshi NAGAHASHI  

     
    PAPER-Computer Graphics

      Vol:
    E91-D No:11
      Page(s):
    2718-2726

    In 3D computer graphics, mesh parameterization is a key technique for digital geometry processings such as morphing, shape blending, texture mapping, re-meshing and so on. Most of the previous approaches made use of an identical primitive domain to parameterize a mesh model. In recent works of mesh parameterization, more flexible and attractive methods that can create direct mappings between two meshes have been reported. These mappings are called "cross-parameterization" and typically preserve semantic feature correspondences between target meshes. This paper proposes a novel approach for parameterizing a mesh into another one directly. The main idea of our method is to combine a competitive learning and a least-square mesh techniques. It is enough to give some semantic feature correspondences between target meshes, even if they are in different shapes or in different poses.

  • Power and Skew Aware Point Diffusion Clock Network

    Gunok JUNG  Chunghee KIM  Kyoungkuk CHAE  Giho PARK  Sung Bae PARK  

     
    LETTER-Integrated Electronics

      Vol:
    E91-C No:11
      Page(s):
    1832-1834

    This letter presents point diffusion clock network (PDCN) with local clock tree synthesis (CTS) scheme. The clock network is implemented with ten times wider metal line space than typical mesh networks for low power and utilized to nine times smaller area CTS execution for minimized clock skew amount. The measurement results show that skew amount of PDCN with local CTS is reduced to 36% and latency is shrunk to 45% of the amount in a 4.81 mm2 CortexA-8 core with 65 nm Samsung process.

  • A Retargetable Compiler Based on Graph Representation for Dynamically Reconfigurable Processor Arrays

    Vasutan TUNBUNHENG  Hideharu AMANO  

     
    PAPER-VLSI Systems

      Vol:
    E91-D No:11
      Page(s):
    2655-2665

    For developing design environment of various Dynamically Reconfigurable Processor Arrays (DRPAs), the Graph with Configuration Information (GCI) is proposed to represent configurable resource in the target dynamically reconfigurable architecture. The functional unit, constant unit, register, and routing resource can be represented in the graph as well as the configuration information. The restriction in the hardware is also added in the graph by limiting the possible configuration at a node controlled by the other node. A prototype compiler called Black-Diamond with GCI is now available for three different DRPAs. It translates data-flow graph from C-like front-end description, applies placement and routing by using the GCI, and generates configuration data for each element of the DRPA. Evaluation results of simple applications show that Black-Diamond can generate reasonable designs for all three different architectures. Other target architectures can be easily treated by representing many aspects of architectural property into a GCI.

  • On the Performance Analysis of Distributed Space-Time Code over Nakagami-m Multipath Channels

    Zhimeng ZHONG  Shihua ZHU  Gangming LV  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:11
      Page(s):
    3740-3744

    In this letter, we analyze the pairwise error probability (PEP) behaviour of distributed space-time code (DSTC) with amplify-and-forward relaying over Nakagami-m multipath channels. An upper bound of PEP for DSTC is derived. From our analysis, it is seen that of the paths from the source to relays and from relays to the destination, those with smaller diversity order result in an overall system performance bottleneck. Numerical examples are provided to corroborate our theoretical analysis.

  • A Cell-Based Hybrid Indexing Scheme for Energy Conserving k Nearest Neighbor Search on Air

    SeokJin IM  Hee Yong YOUN  

     
    LETTER-Broadcast Systems

      Vol:
    E91-B No:11
      Page(s):
    3799-3802

    This letter proposes a Cell-based Hybrid Index (CHI) for energy conserving k Nearest Neighbor search on air. The proposed CHI provides global knowledge on data distribution for fast decision of the search space and local knowledge for efficient pruning of data items. Simulations show that CHI outperforms the existing indexing schemes in terms of tuning time and energy efficiency. With respect to access time, it outperforms them except the distributed indexing scheme optimized for access time.

  • Fuzzy Logic-Based Quantized Event Filter for RFID Data Processing

    Sung Ho JANG  Hi Sung CHOUN  Heung Seok CHAE  Jong Sik LEE  

     
    PAPER

      Vol:
    E91-B No:11
      Page(s):
    3560-3568

    RFID event filtering is an important issue of RFID data management. Tag read events from readers have some problems like unreliability, redundancy, and disordering of tag readings. Duplicated events lead to performance degradation of RFID systems with a flood of similar tag information. Therefore, this paper proposes a fuzzy logic-based quantized event filter. In order to reduce duplicated tag readings and solve disordering of tag readings, the filter applies a fuzzy logic system to control a filtering threshold by the change in circumstances of readers. Continuous tag readings are converted into discrete values for event generation by the filtering threshold. And, the filter generates as many events as the discrete values at a point of event generation time. Experimental results comparing the proposed filter with existing RFID event filters, such as the primitive event filter and the smoothing event filter, verify effectiveness and efficiency of the fuzzy logic-based quantized event filter.

  • Utterance Verification Using Word Voiceprint Models Based on Probabilistic Distributions of Phone-Level Log-Likelihood Ratio and Phone Duration

    Suk-Bong KWON  HoiRin KIM  

     
    LETTER-Speech and Hearing

      Vol:
    E91-D No:11
      Page(s):
    2746-2750

    This paper suggests word voiceprint models to verify the recognition results obtained from a speech recognition system. Word voiceprint models have word-dependent information based on the distributions of phone-level log-likelihood ratio and duration. Thus, we can obtain a more reliable confidence score for a recognized word by using its word voiceprint models that represent the more proper characteristics of utterance verification for the word. Additionally, when obtaining a log-likelihood ratio-based word voiceprint score, this paper proposes a new log-scale normalization function using the distribution of the phone-level log-likelihood ratio, instead of the sigmoid function widely used in obtaining a phone-level log-likelihood ratio. This function plays a role of emphasizing a mis-recognized phone in a word. This individual information of a word is used to help achieve a more discriminative score against out-of-vocabulary words. The proposed method requires additional memory, but it shows that the relative reduction in equal error rate is 16.9% compared to the baseline system using simple phone log-likelihood ratios.

  • New Minimum Decoding Complexity Quasi-Orthogonal Space-Time Block Code for 8 Transmit Antennas

    Changhyeon CHAE  Daewon CHOI  Taejin JUNG  

     
    PAPER-MIMO

      Vol:
    E91-A No:10
      Page(s):
    2990-2994

    In this paper, a new full-rate space-time block code (STBC) possessing a quasi-orthogonal (QO) property is proposed for QAM and 8 transmit antennas. This code is designed by serially concatenating a real constellation-rotating precoder with the Alamouti scheme. The QO property enables ML decoding to be done with joint detection of only four real symbols like the conventional minimum decoding complexity QO-STBC (MDC-QO-STBC). However, the proposed code is guaranteed to achieve full spatial diversity for general QAM unlike the MDC-QO-STBC which is specifically presented for only 4-QAM. By computer simulation results, we show that the proposed code exhibits the identical and slightly degraded error performance with the MDC-QO-STBC for 4-QAM and the Sharma's QO-STBC for 4 and 16-QAM, respectively. Finally, we present a new modified scheme of the original code so that there is no any discontinuity of transmission at each transmit antenna, without any loss of error performance.

  • A Method for Recognizing Noisy Romanized Japanese Words in Learner English

    Ryo NAGATA  Jun-ichi KAKEGAWA  Hiromi SUGIMOTO  Yukiko YABUTA  

     
    PAPER-Educational Technology

      Vol:
    E91-D No:10
      Page(s):
    2458-2466

    This paper describes a method for recognizing romanized Japanese words in learner English. They become noise and problematic in a variety of systems and tools for language learning and teaching including text analysis, spell checking, and grammatical error detection because they are Japanese words and thus mostly unknown to such systems and tools. A problem one encounters when recognizing romanized Japanese words in learner English is that the spelling rules of romanized Japanese words are often violated. To address this problem, the described method uses a clustering algorithm reinforced by a small set of rules. Experiments show that it achieves an F-measure of 0.879 and outperforms other methods. They also show that it only requires the target text and an English word list of reasonable size.

  • Implementation of Multi-Agent Object Attention System Based on Biologically Inspired Attractor Selection

    Ryoji HASHIMOTO  Tomoya MATSUMURA  Yoshihiro NOZATO  Kenji WATANABE  Takao ONOYE  

     
    PAPER-Video Processing Systems

      Vol:
    E91-A No:10
      Page(s):
    2909-2917

    A multi-agent object attention system is proposed, which is based on biologically inspired attractor selection model. Object attention is facilitated by using a video sequence and a depth map obtained through a compound-eye image sensor TOMBO. Robustness of the multi-agent system over environmental changes is enhanced by utilizing the biological model of adaptive response by attractor selection. To implement the proposed system, an efficient VLSI architecture is employed with reducing enormous computational costs and memory accesses required for depth map processing and multi-agent attractor selection process. According to the FPGA implementation result of the proposed object attention system, which is accomplished by using 7,063 slices, 640512 pixel input images can be processed in real-time with three agents at a rate of 9 fps in 48 MHz operation.

  • Back- and Front-Interface Trap Densities Evaluation and Stress Effect of Poly-Si TFT

    Kenichi TAKATORI  Hideki ASADA  Setsuo KANEKO  

     
    INVITED PAPER

      Vol:
    E91-C No:10
      Page(s):
    1564-1569

    The polycrystalline silicon (poly-Si) TFT has two insulator interfaces between the polycrystalline silicon and front and back insulators. These interfaces have trap states, which affect the characteristics of poly-Si TFT. In the silicon-on-insulator (SOI) technology area, using the dual-gated, fully-depleted SOI MOSFET under the depleted back-channel condition, the back-interface trap density can be calculated through the front-channel threshold voltage and film thicknesses. The front-interface trap density is also evaluated changing the roles of both gates. This evaluation method for front- and back- interface trap densities is called the threshold-voltage method. To apply this threshold-voltage method to the "medium-thickness" poly-Si TFT, of which the channel is not fully depleted in normal single gate bias operation, the biases for both front and back gates are controlled to realize full depletion. Under the fully-depleted condition, the front- or back- threshold voltage of poly-Si TFT is carefully extracted by the second-derivative method changing back- and front- gate biases. We evaluated the front- and back- interface trap densities not only for normal operation but also under stress. To evaluate the bias and temperature stress effect, we used two types of samples, which are made by different processes. The evaluated front- and back- interface trap densities for both samples in initial state are around 51011 to 1.31012 cm-2eV-1, which are almost the same as the reported values. Applying bias and temperature stress shows the variation of these interface-trap densities. Samples with large shifts of the front-channel threshold voltage show large trap density variation. On the other hand, samples with small threshold voltage shifts show small trap density variation. The variation of the back-interface trap density during the stress application showed a correlation to the front-channel threshold voltage shift.

  • Maximizing Total QoS-Provisioning of Image Streams with Limited Energy Budget

    Wan Yeon LEE  Kyong Hoon KIM  Young Woong KO  

     
    PAPER

      Vol:
    E91-B No:10
      Page(s):
    3060-3068

    To fully utilize the limited battery energy of mobile electronic devices, we propose an adaptive adjustment method of processing quality for multiple image stream tasks running with widely varying execution times. This adjustment method completes the worst-case executions of the tasks with a given budget of energy, and maximizes the total reward value of processing quality obtained during their executions by exploiting the probability distribution of task execution times. The proposed method derives the maximum reward value for the tasks being executable with arbitrary processing quality, and near maximum value for the tasks being executable with a finite number of processing qualities. Our evaluation on a prototype system shows that the proposed method achieves larger reward values, by up to 57%, than the previous method.

  • Precoder for Chip-Interleaved CDMA Using Space-Time Block-Coding

    Yuji KIMURA  Koji SHIBATA  Takakazu SAKAI  

     
    LETTER-Spectrum Technologies

      Vol:
    E91-A No:10
      Page(s):
    2885-2888

    We study the performances of a synchronous chip-interleaved, block spread (CIBS) code division multiple access (CDMA) with space-time block-coding (STBC) in the presence of frequency-selective fading. For providing the space diversity gain due to STBC, we introduce the optimum precoding for the STBC. Zero-forcing and minimum mean square error equalizers for CIBS-CDMA are derived. Simulation results confirm that the proposed precoder is valid under the frequency selective fading.

  • Design Methodology of a Sensor Network Architecture Supporting Urgent Information and Its Evaluation

    Tetsuya KAWAI  Naoki WAKAMIYA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3232-3240

    Wireless sensor networks are expected to become an important social infrastructure which helps our life to be safe, secure, and comfortable. In this paper, we propose design methodology of an architecture for fast and reliable transmission of urgent information in wireless sensor networks. In this methodology, instead of establishing single complicated monolithic mechanism, several simple and fully-distributed control mechanisms which function in different spatial and temporal levels are incorporated on each node. These mechanisms work autonomously and independently responding to the surrounding situation. We also show an example of a network architecture designed following the methodology. We evaluated the performance of the architecture by extensive simulation and practical experiments and our claim was supported by the results of these experiments.

  • Observation of Blue-Light Emission from Tantalum Oxide Films Deposited by Radio-Frequency Magnetron Sputtering

    Kenta MIURA  Hiroki MIYAZAKI  Osamu HANAIZUMI  

     
    PAPER

      Vol:
    E91-C No:10
      Page(s):
    1669-1672

    We obtained blue photoluminescence from tantalum oxide films deposited by radio-frequency magnetron sputtering after annealing. The maximum peak intensity of the photoluminescence was observed from a sample annealed at 600 for 20 min, and the peak wavelength was approximately 430 nm. Tantalum oxide films that emit blue light may be useful materials for novel active optical devices utilizing Ta2O5/SiO2 multilayered photonic crystals.

  • Inter-Domain Redundancy Path Computation Methods Based on PCE

    Rie HAYASHI  Eiji OKI  Kohei SHIOMOTO  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3185-3193

    This paper evaluates three inter-domain redundancy path computation methods based on PCE (Path Computation Element). Some inter-domain paths carry traffic that must be assured of high quality and high reliability transfer such as telephony over IP and premium virtual private networks (VPNs). It is, therefore, important to set inter-domain redundancy paths, i.e. primary and secondary paths. The first scheme utilizes an existing protocol and the basic PCE implementation. It does not need any extension or modification. In the second scheme, PCEs make a virtual shortest path tree (VSPT) considering the candidates of primary paths that have corresponding secondary paths. The goal is to reduce blocking probability; corresponding secondary paths may be found more often after a primary path is decided; no protocol extension is necessary. In the third scheme, PCEs make a VSPT considering all candidates of primary and secondary paths. Blocking probability is further decreased since all possible candidates are located, and the sum of primary and secondary path cost is reduced by choosing the pair with minimum cost among all path pairs. Numerical evaluations show that the second and third schemes offer only a few percent reduction in blocking probability and path pair total cost, while the overheads imposed by protocol revision and increase of the amount of calculation and information to be exchanged are large. This suggests that the first scheme, the most basic and simple one, is the best choice.

9761-9780hit(21534hit)