The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

18341-18360hit(22683hit)

  • Some Observations on 1-Inkdot Alternating Multi-Counter Automata with Sublinear Space

    Tsunehiro YOSHINAGA  Jianliang XU  Katsushi INOUE  

     
    LETTER-Theory of Automata, Formal Language Theory

      Vol:
    E83-D No:2
      Page(s):
    285-290

    This paper investigates some fundamental properties of 2-way alternating multi-counter automata (2amca's) with only existential (universal) states which have sublinear space and 1 inkdot. It is shown that for any function s(n) log n such that log s(n)=o(log n), s(n) space-bounded 1-inkdot 2amca's with only existential states are incomparable with the ones with only universal states, and the ones with only existential (universal) states are not closed under complementation.

  • Preprocessing and Efficient Volume Rendering of 3-D Ultrasound Image

    CheolAn KIM  HyunWook PARK  

     
    PAPER-Computer Graphics

      Vol:
    E83-D No:2
      Page(s):
    259-264

    Visualization of 3-D ultrasound images is a challenging task due to the noisy and fuzzy nature of ultrasound imaging. This paper presents an efficient volume rendering technique for 3-D ultrasound image. A preprocessing technique of 2-D truncated-median filtering is proposed to reduce speckle noise of the ultrasound image. This paper also introduces an adaptive boundary detection method to reduce the computation time for volume rendering of ultrasound image. The proposed technique is compared to the conventional volume rendering methods with respect to the computation time and the subjective image quality. According to the comparison study, the proposed volume rendering method shows good performance for visualization of 3-D ultrasound image.

  • A Temporal Data Maintenance Method in an ATMS

    MinSuk LEE  YeungGyu PARK  ChoongShik PARK  Jaihie KIM  

     
    LETTER-Artificial Intelligence, Cognitive Science

      Vol:
    E83-D No:2
      Page(s):
    295-298

    An ATMS (Assumption-based Truth Maintenance System) has been widely used for maintaining the truth of an information by detecting and solving the contradictions in rule-based systems. However, the ATMS cannot correctly maintain the truth of the information in case that the generated information is satisfied within a time interval or includes data about temporal relations of events in time varying situations, because it has no mechanism manipulating temporal data. In this paper, we propose the extended ATMS that can maintain the truth of the information in the knowledge-based system using information changing over time or temporal relations of events. To maintain the contexts generated by relations of events, we modify the label representation method, the disjunction and conjunction simplification method in the label-propagation procedure and the nogood handling method of the conventional ATMS.

  • Design Method for a Multimedia-Oriented Multiply-Adder

    Motonobu TONOMURA  

     
    PAPER

      Vol:
    E83-C No:2
      Page(s):
    220-226

    This paper describes a new design method for multiply-adders able to process a large quantity of multimedia data. I propose a (signed digits)(unsigned digits) fixed-point multiply-add/subtract unit. The unit eliminates the problems caused by the critical one-bit arithmetic precision drop-off peculiar to the conventional (signed digits)(signed digits) fixed-point multiply scheme. By simultaneously counting in the carry-save form, based on 7-3 counters simultaneously inputting the accumulation terms and the add/sub operation terms of multiplication results, carries are propagated faster than in the conventional method.

  • A Survey of Mobile Data Networks

    Apostolis K. SALKINTZIS  

     
    INVITED PAPER

      Vol:
    E83-B No:2
      Page(s):
    119-120

    The proliferation and development of cellular voice systems over the past several years has exposed the capabilities and the effectiveness of wireless communications and, thus, has paved the way for wide-area wireless data applications as well. The demand for such applications is currently experiencing a significant increase and, therefore, there is a strong call for advanced and efficient mobile data technologies. This article deals with these mobile data technologies and aims to exhibit their potential. It provides a thorough survey of the most important mobile packet data services and technologies, including MOBITEX, CDPD, ARDIS, and the emerging GPRS. For each technology, the article outlines its main technical characteristics, discusses its architectural aspects, and explains the medium access protocol, the services provided, and the mobile routing scheme.

  • Low Power and Low Voltage MOSFETs with Variable Threshold Voltage Controlled by Back-Bias

    Toshiro HIRAMOTO  Makoto TAKAMIYA  

     
    INVITED PAPER

      Vol:
    E83-C No:2
      Page(s):
    161-169

    We have studied the characteristic trade-offs in low power and low voltage MOSFETs from the viewpoint of back-gate control and body effect factor. Previously reported MOSFET structures are classified into four categories in terms of back-gate structures. It is shown that a MOSFET with a fixed back-bias has only a limited current drive at low voltage irrespective of device structures, while current drive of a dynamic threshold MOSFET with body tied to gate is more enhanced with increasing body effect factor. We have proposed a new dynamic threshold MOSFET, electrically induced body (EIB) DTMOS, which has a very large body effect factor at low threshold voltage and high current drive at low supply voltage.

  • A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet

    Ching-Yun LEE  Yi-Shiung YEH  Deng-Jyi CHEN  Kuo-Lung KU  

     
    PAPER-Applications of Information Security Techniques

      Vol:
    E83-D No:2
      Page(s):
    190-199

    The use of Internet for various business applications and resource sharing has grown tremendously over the last few years. Internet security has become an important issue for both academic and industrial sectors. Much related network security research has been conducted such as user authentication, data confidentiality, and data integrity. In some applications, a critical document can be divided into pieces and allocated in different locations over the Internet for security access concern. To access such an important document, one must reconstruct the divided pieces from different locations under the given Internet environment. In this paper, a probability model for reconstructing secret sharing and algorithms to perform share assignment are presented. Also, an evaluation algorithm to measure the probability of secret sharing reconstruction is proposed. Illustrative examples and simulation results are provided to demonstrate the applicability of our method.

  • Extraction of 1/f Component from Heartbeat Interval Signal by Singular Spectrum Analysis

    Dah-Chuan CHIOU  Hui-Hsun HUANG  Hsiao-Lung CHAN  Chien-Ping WU  

     
    LETTER-Medical Engineering

      Vol:
    E83-D No:2
      Page(s):
    302-304

    Heartbeat interval time series is an example of natural signals with 1/f characteristics. The exponent α of the 1/fα spectrum has some clinical significance. But sometimes the 1/f components is superimposed by some sinusoid components in the signal. To estimate the slope accurately, the 1/f component must be extracted from the signal. The singular spectrum analysis (SSA) method is recruited here to perform the task. Experimental results on data from real patients are satisfactory.

  • A Nonblocking Group Membership Protocol for Large-Scale Distributed Systems

    Mulan ZHU  Kentaro SHIMIZU  

     
    PAPER-Computer Systems

      Vol:
    E83-D No:2
      Page(s):
    177-189

    This paper presents a robust and nonblocking group membership protocol for large-scale distributed systems. This protocol uses the causal relation between membership-updating messages (i. e. , those specifying the adding and deleting of members) and allows the messages to be executed in a nonblocking manner. It differs from conventional group membership protocols in the following points: (1) neither global locking nor global synchronization is required; (2) membership-updating messages can be issued without being synchronized with each other, and they can be executed immediately after their arrival. The proposed protocol therefore is highly scalable, and is more tolerant to node and network failures and to network partitions than are the conventional protocols. This paper proves that the proposed protocol works properly as long as messages can eventually be received by their destinations. This paper also discusses some design issues, such as multicast communication of the regular messages, fault tolerance and application to reliable communication protocols (e. g. , TCP/IP).

  • Fuzzy Rule-Based Edge Detection Using Multiscale Edge Images

    Kaoru ARAKAWA  

     
    PAPER

      Vol:
    E83-A No:2
      Page(s):
    291-300

    Fuzzy rule-based edge detection using multiscale edge images is proposed. In this method, the edge image is obtained by fuzzy approximate reasoning from multiscale edge images which are obtained by derivative operators with various window sizes. The effect of utilizing multiscale edge images for edge detection is already known, but how to design the rules for deciding edges from multiscale edge images is not clarified yet. In this paper, the rules are represented in a fuzzy style, since edges are usually defined ambiguously, and the fuzzy rules are designed optimally by a training method. Here, the fuzzy approximate reasoning is expressed as a nonlinear function of the multiscale edge image data, and the nonlinear function is optimized so that the mean square error of the edge detection be the minimum. Computer simulations verify its high performance for actual images.

  • Performance Analysis of Layer3 Switch: Case of Flow-Driven Connection Setup

    Kenji KAWAHARA  Shougo NAKAZAWA  Tetsuya TAKINE  Yuji OIE  

     
    PAPER-IP/ATM

      Vol:
    E83-B No:2
      Page(s):
    130-139

    The layer3 switch enables us to fast transmit IP datagrams using the cut-through technique. The current layer3 router would become bottleneck in terms of delay performance as the amount of traffic injected into high speed networks gets relatively large. Thus, the layer3 switch should be an important element constructing the next generation Internet backbone. In this paper, we analyze the cut-through rate, the datagram waiting time and the mis-ordered rate of a layer3 switch in case of flow-driven connection setup. In the analysis, by using 3-state Markov modulated Bernoulli process (MMBP), we model the arrival process of IP flow and IP datagram from each source. Furthermore, we investigate impacts of the arrival rate and the average datagram length on the performance.

  • Quality of Service Guarantee in a Combined Input Output Queued Switch

    Tsern-Huei LEE  Yaw-Wen KUO  Jyh-Chiun HUANG  

     
    PAPER-ATM Switch and System Development

      Vol:
    E83-B No:2
      Page(s):
    190-195

    Combined input output queued (CIOQ) architecture such as crossbar with speedup has recently been proposed to build a large capacity switch for broadband integrated services networks. It was shown that, for a speedup factor of 2, a CIOQ switch can achieve 100% throughput with a simple maximal matching algorithm. Achieving 100% throughput, however, is not sufficient for per-connection quality of service (QoS) guarantee. In [2],[3], it is proved that a CIOQ switch with a speedup factor of 2 can exactly emulate an output queued (OQ) switch if stable matching is adopted. Unfortunately, the complexity of currently known algorithms makes stable matching impractical for high-speed switches. In this paper, we propose a new matching algorithm called the least cushion first/most urgent first (LCF/MUF) algorithm and formally prove that a CIOQ switch with a speedup factor of 2 can exactly emulate an OQ switch which adopts any service discipline for cell transmission. A potential implementation of our proposed matching algorithm for strict priority service discipline is also presented.

  • A Practical Off-Line Digital Money System with Partially Blind Signatures Based on the Discrete Logarithm Problem

    Shingo MIYAZAKI  Kouichi SAKURAI  

     
    LETTER

      Vol:
    E83-A No:1
      Page(s):
    106-108

    We propose an untraceable electronic money system. Our system uses the partially blind signature based on the discrete logarithm problem, and applies secret key certificates to the payment protocol.

  • Digital Watermarking Technique for Motion Pictures Based on Quantization

    Hiroshi OGAWA  Takao NAKAMURA  Atsuki TOMIOKA  Youichi TAKASHIMA  

     
    PAPER

      Vol:
    E83-A No:1
      Page(s):
    77-89

    A quantization-based watermarking system for motion pictures is proposed. In particular, methods for improving the image quality of watermarked video, the watermarking data tolerance, and the accuracy of watermark data detection are described. A quantitative evaluation of the reliability of watermarked data, which has not generally been discussed up to now, is also performed.

  • Beam Tilting Dipole Antenna Elements with Forced Resonance by Reactance Loading

    Ki-Chai KIM  Ick Seung KWON  

     
    PAPER-Antennas and Propagation

      Vol:
    E83-B No:1
      Page(s):
    77-83

    The applications of reactance-loaded beam tilting dipole antennas have been reported by many researchers. The reactance elements loaded on the applications reported up to date have been used only for the purpose of beam tilting. This paper presents the basic characteristics of the beam tilting dipole antenna element in which one reactance element is used for the impedance matching at the feed point. The radiation pattern is tilted by the properly determined driving point position, and the loading reactance is used to obtain forced resonance without great changes in tilt angle. The numerical results demonstrate that the reactance element should be loaded in the region where the driving point is placed to obtain forced resonance of the antenna with little changes in beam tilt angle. In case the proposed forced resonant beam tilting antenna with 0.8λ length is driven at 0.2λ from the center, the main beam tilt angle of 57.7 degrees, the highest power gain of 8.6 dB, and VSWR=2.2 are obtained.

  • Chemical Beam Epitaxy Grown Carbon-Doped Base InP/InGaAs Heterojunction Bipolar Transistor Technology for Millimeter-Wave Applications

    Jong-In SONG  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E83-C No:1
      Page(s):
    115-121

    Carbon-doped base InP/InGaAs heterojunction bipolar transistor (HBT) technology for millimeter-wave application is presented. Ultra-high carbon doping of InGaAs layers lattice-matched to InP with hole concentrations in excess of 1 1020 /cm3 has been achieved using a chemical beam epitaxy (CBE). Heavily carbon-doped base InP/InGaAs HBT epi structures were grown and small area, self-aligned HBTs with 1.5 µm emitter finger width were fabricated using triple mesa etching and polyimide planarization techniques. The fabricated small area transistors showed a common-emitter current gain cut-off frequency (fT) as high as 200 GHz. Preliminary device reliability test results showed the potential of the heavily carbon-doped base InP/InGaAs HBT for high performance microwave and millimeter-wave applications. Applications of the InP/InGaAs single heterojunction bipolar transistor (SHBT) and double heterojunction bipolar transistor (DHBT) to a direct-coupled feedback amplifier and a power transistor, respectively, are presented.

  • An Active Learning Algorithm Based on Existing Training Data

    Hiroyuki TAKIZAWA  Taira NAKAJIMA  Hiroaki KOBAYASHI  Tadao NAKAMURA  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E83-D No:1
      Page(s):
    90-99

    A multilayer perceptron is usually considered a passive learner that only receives given training data. However, if a multilayer perceptron actively gathers training data that resolve its uncertainty about a problem being learnt, sufficiently accurate classification is attained with fewer training data. Recently, such active learning has been receiving an increasing interest. In this paper, we propose a novel active learning strategy. The strategy attempts to produce only useful training data for multilayer perceptrons to achieve accurate classification, and avoids generating redundant training data. Furthermore, the strategy attempts to avoid generating temporarily useful training data that will become redundant in the future. As a result, the strategy can allow multilayer perceptrons to achieve accurate classification with fewer training data. To demonstrate the performance of the strategy in comparison with other active learning strategies, we also propose an empirical active learning algorithm as an implementation of the strategy, which does not require expensive computations. Experimental results show that the proposed algorithm improves the classification accuracy of a multilayer perceptron with fewer training data than that for a conventional random selection algorithm that constructs a training data set without explicit strategies. Moreover, the algorithm outperforms typical active learning algorithms in the experiments. Those results show that the algorithm can construct an appropriate training data set at lower computational cost, because training data generation is usually costly. Accordingly, the algorithm proves the effectiveness of the strategy through the experiments. We also discuss some drawbacks of the algorithm.

  • Velocity Estimation for Output Regulation of Nonlinear Systems

    Seon-Ho LEE  Jong-Tae LIM  

     
    LETTER-Systems and Control

      Vol:
    E83-A No:1
      Page(s):
    164-166

    This paper addresses output regulation for nonlinear systems driven by a time varying parameter. The derivative information of the time varying parameter is necessary for the improved regulation performance but it is not readily available in general. In this paper, we propose a velocity estimation of the time varying parameter for use in the control law without amplifying noise signals.

  • Measurement of Viscosity of Liquid Using Piezoceramic Disk Transducer with a Radial Expansion Mode

    Kazuhiko IMANO  Ryosuke SHIMAZAKI  Shin'ichi MOMOZAWA  

     
    LETTER-Ultrasonics

      Vol:
    E83-A No:1
      Page(s):
    162-163

    Measurement of the viscosity of liquid using a piezoelectric disk is described. Experiments with a radial expansion mode of a piezoceramic disk were carried out for water-glycerin mixture samples. Resonant resistance has linearity to the square root of the product of density and viscosity of a liquid around 113 kHz.

  • New Algorithm for Finding Preimages in a Reduced Version of the MD4 Compression Function

    Hidenori KUWAKADO  Hatsukazu TANAKA  

     
    LETTER

      Vol:
    E83-A No:1
      Page(s):
    97-100

    This paper proposes an efficient algorithm for finding preimages of the reduced MD4 compression function consisting of only the first round and the third round. We thus show that the reduced MD4 is not a one-way function.

18341-18360hit(22683hit)