The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

10221-10240hit(21534hit)

  • On Distorted Constellations of 16-Ary Modulation Schemes

    Sangtae KIM  Wonjin SUNG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1632-1635

    In this letter, the effect of distorted constellation shapes of 16-ary modulation due to the power saturation channel is analyzed. In particular, error bounds for 16-QAM and 16-APSK with distorted constellations are derived, and optimal operating points in terms of Es/N0 are presented. The result can be used to accurately predict the performance of these modulation schemes with a given level of the constellation distortion, as well as to determine the amount of input power to the saturation channel which minimizes the probability of modulation symbol error.

  • Efficient Fingercode Classification

    Hong-Wei SUN  Kwok-Yan LAM  Dieter GOLLMANN  Siu-Leung CHUNG  Jian-Bin LI  Jia-Guang SUN  

     
    INVITED PAPER

      Vol:
    E91-D No:5
      Page(s):
    1252-1260

    In this paper, we present an efficient fingerprint classification algorithm which is an essential component in many critical security application systems e.g. systems in the e-government and e-finance domains. Fingerprint identification is one of the most important security requirements in homeland security systems such as personnel screening and anti-money laundering. The problem of fingerprint identification involves searching (matching) the fingerprint of a person against each of the fingerprints of all registered persons. To enhance performance and reliability, a common approach is to reduce the search space by firstly classifying the fingerprints and then performing the search in the respective class. Jain et al. proposed a fingerprint classification algorithm based on a two-stage classifier, which uses a K-nearest neighbor classifier in its first stage. The fingerprint classification algorithm is based on the fingercode representation which is an encoding of fingerprints that has been demonstrated to be an effective fingerprint biometric scheme because of its ability to capture both local and global details in a fingerprint image. We enhance this approach by improving the efficiency of the K-nearest neighbor classifier for fingercode-based fingerprint classification. Our research firstly investigates the various fast search algorithms in vector quantization (VQ) and the potential application in fingerprint classification, and then proposes two efficient algorithms based on the pyramid-based search algorithms in VQ. Experimental results on DB1 of FVC 2004 demonstrate that our algorithms can outperform the full search algorithm and the original pyramid-based search algorithms in terms of computational efficiency without sacrificing accuracy.

  • Power Reduction during Scan Testing Based on Multiple Capture Technique

    Lung-Jen LEE  Wang-Dauh TSENG  Rung-Bin LIN  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E91-C No:5
      Page(s):
    798-805

    In this paper, we present a multiple capture approach to reducing the peak power as well as average power consumption during testing. The basic idea behind is to divide a scan chain into two sub-scan chains, and only one sub-scan chain will be enabled at a time during the scan shift or capture operations. We develop a pattern insertion technique to efficiently deal with the capture violation problem during the capture cycle. In order to alleviate the timing cost due to the insertion of redundant patterns, a scan chain partitioning method incorporated with test pattern reordering is developed to reduce the testing time. Experimental results for large ISCAS'89 benchmark circuits show that the proposed approach can efficiently reduce peak and average power with little timing overhead.

  • Multiuser Detection for Asynchronous Multicarrier CDMA Using Particle Swarm Optimization

    Muhammad ZUBAIR  Muhammad A.S. CHOUDHRY  Aqdas NAVEED  Ijaz Mansoor QURESHI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1636-1639

    Due to the computational complexity of the optimum maximum likelihood detector (OMD) growing exponentially with the number of users, suboptimum techniques have received significant attention. We have proposed the particle swarm optimization (PSO) for the multiuser detection (MUD) in asynchronous multicarrier code division multiple access (MC-CDMA) system. The performance of PSO based MUD is near optimum, while its computational complexity is far less than OMD. Performance of PSO-MUD has also been shown to be better than that of genetic algorithm based MUD (GA-MUD) at practical SNR.

  • A Specification Translation from Behavioral Specifications to Rewrite Specifications

    Masaki NAKAMURA  Weiqiang KONG  Kazuhiro OGATA  Kokichi FUTATSUGI  

     
    PAPER-Fundamentals of Software and Theory of Programs

      Vol:
    E91-D No:5
      Page(s):
    1492-1503

    There are two ways to describe a state machine as an algebraic specification: a behavioral specification and a rewrite specification. In this study, we propose a translation system from behavioral specifications to rewrite specifications to obtain a verification system which has the strong points of verification techniques for both specifications. Since our translation system is complete with respect to invariant properties, it helps us to obtain a counter-example for an invariant property through automatic exhaustive searching for a rewrite specification.

  • Performance of Coded π/2 NS-8QAM Modulation

    Changqing LIU  Yu ZHANG  Jian SONG  Changyong PAN  Zhixing YANG  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E91-B No:5
      Page(s):
    1612-1614

    Spectrum and Bit Error Rate (BER) performance of a coded π/2 phase shift Non-Square (NS) 8 Quadrature Amplitude Modulation (QAM) system are studied in this letter. The modulation process of this scheme removes all 180 phase shift between adjacent constellation points and contains inherent memory which can be treated as a type of inner coding in coded system. Simulation results show that this modulation scheme has much lower spectrum regrowth and better BER performance when passing through nonlinear channel compared with conventional mode.

  • A Sieving ANN for Emotion-Based Movie Clip Classification

    Saowaluk C. WATANAPA  Bundit THIPAKORN  Nipon CHAROENKITKARN  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E91-D No:5
      Page(s):
    1562-1572

    Effective classification and analysis of semantic contents are very important for the content-based indexing and retrieval of video database. Our research attempts to classify movie clips into three groups of commonly elicited emotions, namely excitement, joy and sadness, based on a set of abstract-level semantic features extracted from the film sequence. In particular, these features consist of six visual and audio measures grounded on the artistic film theories. A unique sieving-structured neural network is proposed to be the classifying model due to its robustness. The performance of the proposed model is tested with 101 movie clips excerpted from 24 award-winning and well-known Hollywood feature films. The experimental result of 97.8% correct classification rate, measured against the collected human-judges, indicates the great potential of using abstract-level semantic features as an engineered tool for the application of video-content retrieval/indexing.

  • Automatic Facial Skin Segmentation Based on EM Algorithm under Varying Illumination

    Mousa SHAMSI  Reza Aghaiezadeh ZOROOFI  Caro LUCAS  Mohammad Sadeghi HASANABADI  Mohammad Reza ALSHARIF  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E91-D No:5
      Page(s):
    1543-1551

    Facial skin detection is an important step in facial surgical planning like as many other applications. There are many problems in facial skin detection. One of them is that the image features can be severely corrupted due to illumination, noise, and occlusion, where, shadows can cause numerous strong edges. Hence, in this paper, we present an automatic Expectation-Maximization (EM) algorithm for facial skin color segmentation that uses knowledge of chromatic space and varying illumination conditions to correct and segment frontal and lateral facial color images, simultaneously. The proposed EM algorithm leads to a method that allows for more robust and accurate segmentation of facial images. The initialization of the model parameters is very important in convergence of algorithm. For this purpose, we use a method for robust parameter estimation of Gaussian mixture components. Also, we use an additional class, which includes all pixels not modeled explicitly by Gaussian with small variance, by a uniform probability density, and amending the EM algorithm appropriately, in order to obtain significantly better results. Experimental results on facial color images show that accurate estimates of the Gaussian mixture parameters are computed. Also, other results on images presenting a wide range of variations in lighting conditions, demonstrate the efficiency of the proposed color skin segmentation algorithm compared to conventional EM algorithm.

  • Characterization of 2-bit Recessed Channel Memory with Lifted-Charge Trapping Node (L-CTN) Scheme

    Jang Gn YUN  Il Han PARK  Seongjae CHO  Jung Hoon LEE  Doo-Hyun KIM  Gil Sung LEE  Yoon KIM  Jong Duk LEE  Byung-Gook PARK  

     
    PAPER

      Vol:
    E91-C No:5
      Page(s):
    742-746

    In this paper, characteristics of the 2-bit recessed channel memory with lifted-charge trapping nodes are investigated. The length between the charge trapping nodes through channel, which is defined as the effective memory node length (Meff), is extended by lifting up them. The dependence of VTH window and short channel effect (SCE) on the recessed depth is analyzed. Improvement of short channel effect is achieved because the recessed channel structure increases the effective channel length (Leff). Moreover, this device shows highly scalable memory characteristics without suffering from the bottom-side effect (BSE).

  • Pilot Periodicity Based OFDM Signal Detection Method for Cognitive Radio System

    Sung Hwan SOHN  Ning HAN  Guanbo ZHENG  Jae Moung KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1644-1647

    Cognitive Radio is an advanced enabling technology for efficient utilization of vacant spectrum due to its ability to sense the spectrum environment. Various detection methods have been proposed for spectrum sensing, which is the key function in implementing cognitive radio. However most of the existing methods put their interests in detecting TV signal and wireless microphone signals. In this paper, we explore the periodicity of the equally spaced pilot subcarriers in OFDM signal. Simulations in various fading environments show that the proposed cyclostationarity based detection method works well for OFDM signal.

  • Channel Allocation Algorithms for Coexistence of LR-WPAN with WLAN

    Sangjin HAN  Sungjin LEE  Sanghoon LEE  Yeonsoo KIM  

     
    LETTER-Network

      Vol:
    E91-B No:5
      Page(s):
    1627-1631

    This paper presents a coexistence model of IEEE 802.15.4 with IEEE 802.11b interference in fading channels and proposes two adaptive channel allocation schemes. The first avoids the IEEE 802.15.4 interference only and the second avoids both of the IEEE 802.15.4 and IEEE 802.11b interferences. Numerical results show that the proposed algorithms are effective for avoiding interferences and for maximizing network capacity since they select a channel which gives the maximum signal to noise ratio to the system.

  • A Design of HEMT Comparators for Ultrahigh-Speed A/D Conversion

    Hiroshi WATANABE  Shunsuke NAKAMURA  Takao WAHO  

     
    PAPER

      Vol:
    E91-C No:5
      Page(s):
    688-692

    HEMT comparators for ultrahigh-speed A/D converters have been investigated. In particular, the transition times of the D-latch used in the comparator have been analyzed by assuming a 0.1-µm HEMT technology. It is found that for small input signals (<0.1 V), the transition time from the track to latch phase dominates the comparator operation speed. As the input signal increases, this time decreases due to the positive feedback in the latch, and the comparator speed is limited by the transition time from the latch to track phase. The transition times of 20 ps have been estimated for the present comparator.

  • Drouting Architecture: Improvement of Failure Avoidance Capability Using Multipath Routing

    Yasuhiro OHARA  Hiroyuki KUSUMOTO  Osamu NAKAMURA  Jun MURAI  

     
    PAPER-Network

      Vol:
    E91-B No:5
      Page(s):
    1403-1415

    Failure avoidance capability is a desired feature for telecommunication networks, such as the Internet. However, not all failures can be promptly bypassed on the Internet because routing systems that are responsible for detecting and avoiding failures cannot detect all failures. Consequently, failures can interrupt internet communications for a long time, such as a few hours. This paper proposes a novel routing architecture called Drouting that enables flexible failure avoidance. In Drouting, routers calculate multipaths from a source to a destination by constructing Directed Acyclic Graphs (DAGs) that include all links in the intra-domain network graph. IP packets carry packet tags that are set by the end host. The packet tags are used to select a network path from the multipath routes. In this paper, the failure avoidance property of Drouting architecture is evaluated through comparison with another proposal, Deflection, using simulations. Simulations were performed on inferred and synthetic topologies. Drouting exhibits similar performance with Deflection in terms of the number of nexthops, the number of paths and the length of paths, while Drouting outperforms Deflection in the probability of success of failure avoidance.

  • A Generalizable Methodology for Quantifying User Satisfaction Open Access

    Te-Yuan HUANG  Kuan-Ta CHEN  Polly HUANG  Chin-Laung LEI  

     
    INVITED PAPER

      Vol:
    E91-B No:5
      Page(s):
    1260-1268

    Quantifying user satisfaction is essential, because the results can help service providers deliver better services. In this work, we propose a generalizable methodology, based on survival analysis, to quantify user satisfaction in terms of session times, i.e., the length of time users stay with an application. Unlike subjective human surveys, our methodology is based solely on passive measurement, which is more cost-efficient and better able to capture subconscious reactions. Furthermore, by using session times, rather than a specific performance indicator, such as the level of distortion of voice signals, the effects of other factors like loudness and sidetone, can also be captured by the developed models. Like survival analysis, our methodology is characterized by low complexity and a simple model-developing process. The feasibility of our methodology is demonstrated through case studies of ShenZhou Online, a commercial MMORPG in Taiwan, and the most prevalent VoIP application in the world, namely Skype. Through the model development process, we can also identify the most significant performance factors and their impacts on user satisfaction and discuss how they can be exploited to improve user experience and optimize resource allocation.

  • Dirty Paper Coded Cooperation Utilizing Superposition Modulation

    Koji ISHII  Koji ISHIBASHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1540-1547

    In this paper, we design a new coded cooperation protocol utilizing superposition modulation together with iterative decoding/detection algorithms. The aim of the proposed system is to apply "dirty paper coding" theory in the context of half-duplex relay systems. In the proposed system, the node transmits a superposed signal which consists of its own coded information and other node's re-coded information. The destination node detects and decodes the signal using the received signals at two continuous time-slots with iterative decoding algorithm. Moreover, the destination node detects the received signal using the results of decoding, iteratively. This paper provides the outage probability of the proposed system under the assumption that the proposed system can ideally perform dirty paper coding, and it is shown from the comparison between outage probabilities and simulated results that the proposed system can get close to the dirty paper coding theory.

  • Performance Evaluation of Transmission Technique Utilizing Linear Combination Diversity in MIMO Spatial Multiplexing Systems

    Yutaka MURAKAMI  Takashi MATSUOKA  Kazuaki TAKAHASHI  Masayuki ORIHASHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1511-1520

    In this paper, we evaluate BER (bit error rate) performance and diversity gain when employing a transmission technique utilizing LC (Linear Combination) diversity using 2 time slots with QPSK channels in 2 2 MIMO (Multiple-Input Multiple-Output) spatial multiplexing systems by comparing it with the upper and lower bound on BER. This evaluation shows that this transmission technique realizes high diversity gain and high transmission rate in LOS (line-of-sight) and NLOS (non line-of-sight) environments.

  • A DOA-Based Adaptive Smart Antenna Processor for Cellular Mobile Systems

    Hyung-Rae PARK  Young-Ho YUN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1657-1660

    In this letter we propose an adaptive beamforming algorithm that efficiently suppresses interferences using a structured interference covariance matrix. The proposed algorithm provides high performance by exploiting angle diversity, especially in cellular mobile environments where the angular spread of a received signal is relatively small. We verify the superiority of the proposed algorithm to the well known linearly constrained minimum variance (LCMV) and reference signal-based algorithms.

  • Generalized Combinatoric Accumulator

    Dae Hyun YUM  Jae Woo SEO  Pil Joong LEE  

     
    LETTER-Cryptographic Techniques

      Vol:
    E91-D No:5
      Page(s):
    1489-1491

    The accumulator was introduced as a decentralized alternative to digital signatures. While most of accumulators are based on number theoretic assumptions and require time-consuming modulo exponentiations, Nyberg's combinatoric accumulator dose not depend on any computational assumption and requires only bit operations and hash function evaluations. In this article, we present a generalization of Nyberg's combinatoric accumulator, which allows a lower false positive rate with the same output length. Our generalization also shows that the Bloom filter can be used as a cryptographic accumulator and moreover excels the Nyberg's accumulator.

  • A Versatile Step-Up/Step-Down Switched-Capacitor-Based DC-DC Converter

    Chia-Ling WEI  Lu-Yao WU  Hsiu-Hui YANG  Chien-Hung TSAI  Bin-Da LIU  Soon-Jyh CHANG  

     
    LETTER-Electronic Circuits

      Vol:
    E91-C No:5
      Page(s):
    809-812

    For battery-powered electronic products, one way to extend battery life is to use a versatile step-up/step-down DC-DC converter. A new versatile step-up/step-down switched-capacitor-based converter structure is proposed, and its efficiency is analyzed. In the step-down case, the efficiency is the same as, or even better than the efficiency of linear regulators.

  • MIMO-OFDM Precoding Technique for Minimizing BER Upper Bound of MLD under Imperfect CSI

    Boonsarn PITAKDUMRONGKIJA  Kazuhiko FUKAWA  Hiroshi SUZUKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1490-1501

    This paper proposes a new minimum BER (MBER) criterion precoding method that is robust to imperfect channel state information (CSI) for MIMO-OFDM mobile communications. The proposed MBER precoding aims to minimize BER of the maximum likelihood detection (MLD), on the condition that the transmitter can obtain only imperfect CSI owing to channel estimation and quantization errors of the feedback CSI. The proposed scheme controls its precoding parameters under a transmit power constraint by minimizing an upper bound of BER which is derived from the pairwise error probability and averaged with respect to the CSI error. In contrast with a conventional power allocation MBER precoding method that is also robust to the CSI error, the proposed scheme does not make any assumption on the precoding parameters so as to reduce complexity. Thus, it is expected to outperform the conventional scheme at the cost of higher complexity. Computer simulations demonstrate that the proposed precoding method outperforms a conventional nonrobust MBER precoder and the conventional robust power allocation MBER precoding method when the amount of the CSI error is not considerable.

10221-10240hit(21534hit)