The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Z(5900hit)

2581-2600hit(5900hit)

  • Generalized Hash Chain Traversal with Selective Output

    Dae Hyun YUM  Jae Woo SEO  Kookrae CHO  Pil Joong LEE  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E93-D No:5
      Page(s):
    1303-1306

    A hash chain H for a one-way hash function h() is a sequence of hash values < v0, v1, ..., vn >, where v0 is a public value, vn a secret value, and vi = h(vi+1). A hash chain traversal T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n. While previous hash chain traversal algorithms were designed to output all hash values vi (1 ≤ i ≤ n) in order, there are applications where every m-th hash value (i.e., vm, v2m, v3m, ...) is required to be output. We introduce a hash chain traversal algorithm that selectively outputs every m-th hash value efficiently. The main technique is a transformation from a hash chain traversal algorithm outputting every hash value into that outputting every m-th hash value. Compared with the direct use of previous hash chain traversal algorithms, our proposed method requires less memory storages and computational costs.

  • A Robust Room Inverse Filtering Algorithm for Speech Dereverberation Based on a Kurtosis Maximization

    Jae-woong JEONG  Young-cheol PARK  Dae-hee YOUN  Seok-Pil LEE  

     
    LETTER-Speech and Hearing

      Vol:
    E93-D No:5
      Page(s):
    1309-1312

    In this paper, we propose a robust room inverse filtering algorithm for speech dereverberation based on a kurtosis maximization. The proposed algorithm utilizes a new normalized kurtosis function that nonlinearly maps the input kurtosis onto a finite range from zero to one, which results in a kurtosis warping. Due to the kurtosis warping, the proposed algorithm provides more stable convergence and, in turn, better performance than the conventional algorithm. Experimental results are presented to confirm the robustness of the proposed algorithm.

  • An Anycast-Based Emergency Service for Healthcare Wireless Sensor Networks

    Shyr-Kuen CHEN  Pi-Chung WANG  

     
    LETTER

      Vol:
    E93-B No:4
      Page(s):
    858-861

    In this letter, we develop an anycast-based emergency service for healthcare wireless sensor networks. The new service could operate with sensors to detect and activate an alarm system based on predefined conditions that are specific to the patient and the disease. The new service is implemented on 802.15.4 ZigBee which usually has large control overhead and long transmission times. To improve the service performance, our service identifies the closest emergency service provider to alleviate the control overhead and achieve immediate assistance when a patient requests for an emergency service. We also increase the reliability of packet transmission by using a Recovery Point scheme. Our simulations and experiment demonstrate that our scheme is efficient and feasible for healthcare wireless sensor networks.

  • Autonomous Navigation System for Mobile Robot Using Randomly Distributed Passive RFID Tags

    Sunhong PARK  Shuji HASHIMOTO  

     
    PAPER

      Vol:
    E93-A No:4
      Page(s):
    711-719

    This paper presents an autonomous navigation system for a mobile robot using randomly distributed passive RFID tags. In the case of randomly distributed RFID tags, it is difficult to provide the precise location of the robot especially in the area of sparse RFID tag distribution. This, combined with the wide turning radius of the robot, can cause the robot to enter a zigzag exploration path and miss the goal. In RFID-based navigation, the key is to reduce both the number of RFID tags and the localization error for practical use in a large space. To cope with these, we utilized the Read time, which measures the reading time of each RFID tag. With this, we could estimate accurately the localization and orientation without using any external sensors or increasing the RFID tags. The average estimation errors of 7.8 cm in localization and 11 degrees in orientation were achieved with 102 RFID tags in the area of 4.2 m by 6.2 m. Our proposed method is verified with the path trajectories produced during navigation compared with conventional approaches.

  • An Improved Anchor Shot Detection Method Using Fitness of Face Location and Dissimilarity of Icon Region

    Ji-Soo KEUM  Hyon-Soo LEE  Masafumi HAGIWARA  

     
    LETTER-Image

      Vol:
    E93-A No:4
      Page(s):
    863-866

    In this letter, we propose an improved anchor shot detection (ASD) method in order to effectively retrieve anchor shots from news video. The face location and dissimilarity of icon region are used to reduce false alarms in the proposed method. According to the results of the experiment on several types of news video, the proposed method obtained high anchor detection results compared with previous methods.

  • On the User-Level Satisfactions with User-Level Utility Functions: A Case Study with Scheduling in TDMA Wireless Networks

    Sungyeon KIM  Jang-Won LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:4
      Page(s):
    1037-1040

    In most cases in wireless networks, a user has a two-way communication that consists of two sessions: uplink and downlink sessions, and its overall satisfaction to the communication depends on the quality of service of both sessions. However, in most previous approaches in wireless resource allocation, the satisfactions of a user for its uplink and downlink sessions are modeled separately and treated independently, which fails to accurately model user's overall satisfaction to its communication. Hence, in this paper we model user's overall satisfaction to its communication considering both its uplink and downlink sessions. To this end, we propose a novel concept for a utility function to model user's overall satisfaction to its communication, which is called a user-level utility function, considering user's satisfaction to uplink and downlink sessions jointly. To show the appropriateness of our approach, we apply our user-level utility functions to scheduling problems in TDMA wireless networks and show the performance improvement of our approach over the traditional approach that does not treat uplink and downlink sessions of a user jointly.

  • Queueing Delay and Energy Efficiency Analyses of Sleep Based Power Saving Mechanism

    Fan ZHU  Yiqun WU  Zhisheng NIU  

     
    LETTER-Energy in Electronics Communications

      Vol:
    E93-B No:4
      Page(s):
    1069-1072

    In wireless networks, sleep mode based power saving mechanisms can reduce the energy consumption at the expense of additional packet delay. This letter analyzes its packet queueing delay and wireless terminals' energy efficiency. Based on the analysis, optimal sleep window size can be derived to optimize terminal energy efficiency with delay constraint.

  • Design of Narrow Wall Windows in a Waveguide to Feed Partially-Dielectric-Filled Oversized-Rectangular Waveguide Based on 2-Dimensional Analyses of Two Orthogonal Directions

    Miroslav SAMARDIJA  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E93-B No:4
      Page(s):
    871-878

    A series of windows in the narrow wall of a fully-dielectric-filled rectangular waveguide to feed partially-dielectric-filled oversized-rectangular waveguide is presented. The overall structure is single-layer and 3-dimensional however; the waveguide which is uniform along the height is analyzed by the 2-dimensional method of moments and the oversized waveguide which is uniform in the longitudinal direction of the waveguide is analyzed by the 2-dimensional mode matching. It is found that utilizing simple mode conversions between the two orthogonally uniform structures is sufficient for obtaining the results similar to those of a 3-dimensional solver HFSS. The parameters for the windows designed for a uniform input division are presented. A simulation shows that a 12 window array provides a 3.5% bandwidth in terms of reflection below -20 dB. The uniform excitation of the quasi-TEM wave is confirmed in the 60 GHz band by measuring a uniform aperture field in amplitude and phase over the slotted oversized-waveguide.

  • Approximation to the Minimum Cost Edge Installation Problem

    Ehab MORSY  Hiroshi NAGAMOCHI  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E93-A No:4
      Page(s):
    778-786

    We consider the minimum cost edge installation problem (MCEI) in a graph G=(V,E) with edge weight w(e)≥ 0, e∈ E. We are given a vertex s∈ V designated as a sink, an edge capacity λ>0, and a source set S⊆ V with demand q(v)∈ [0,λ], v∈ S. For each edge e∈ E, we are allowed to install an integer number h(e) of copies of e. MCEI asks to send demand q(v) from each source v∈ S along a single path Pv to the sink s without splitting the demand of any source v∈ S. For each edge e∈ E, a set of such paths can pass through a single copy of e in G as long as the total demand along the paths does not exceed the edge capacity λ. The objective is to find a set P={Pv| v∈ S∈ of paths of G that minimizes the installing cost ∑e∈ E h(e)w(e). In this paper, we propose a (15/8+ρST)-approximation algorithm to MCEI, where ρST is any approximation ratio achievable for the Steiner tree problem.

  • On Detecting Target Acoustic Signals Based on Non-negative Matrix Factorization

    Yu Gwang JIN  Nam Soo KIM  

     
    LETTER-Pattern Recognition

      Vol:
    E93-D No:4
      Page(s):
    922-925

    In this paper, we propose a novel target acoustic signal detection approach which is based on non-negative matrix factorization (NMF). Target basis vectors are trained from the target signal database through NMF, and input vectors are projected onto the subspace spanned by these target basis vectors. By analyzing the distribution of time-varying normalized projection error, the optimal threshold can be calculated to detect the target signal intervals during the entire input signal. Experimental results show that the proposed algorithm can detect the target signal successfully under various signal environments.

  • Some Constacyclic and Cyclic Codes Over Fq[u]/<ut+1>

    Reza SOBHANI  Morteza ESMAEILI  

     
    PAPER-Coding Theory

      Vol:
    E93-A No:4
      Page(s):
    808-813

    A generalized Gray map for codes over the ring Fq[u]/ is introduced, where q=pm is a prime power. It is shown that the generalized Gray image of a linear length-N (1-ut)-cyclic code over Fq[u]/ is a distance-invariant linear length-qtN quasi-cyclic code of index qt/p over Fq. It turns out that if (N,p)=1 then every linear code over Fq that is the generalized Gray image of a length-N cyclic code over Fq[u]/, is also equivalent to a linear length-qtN quasi-cyclic code of index qt/p over Fq. The relationship between linear length-pN cyclic codes with (N,p)=1 over Fp and linear length-N cyclic codes over Fp+uFp is explicitly determined.

  • Low Noise Receivers Based on Superconducting Niobium Nitride Hot Electron Bolometer Mixers from 0.65 to 3.1 Terahertz Open Access

    Min LIANG  Jian CHEN  Lin KANG  Biaobing JIN  Weiwei XU  Peiheng WU  

     
    INVITED PAPER

      Vol:
    E93-C No:4
      Page(s):
    473-479

    Low noise terahertz (THz) receivers based on superconducting niobium nitride (NbN) hot electron bolometer (HEB) mixers have been designed, fabricated and measured for applications in astronomy and cosmology. The NbN HEB mixer consists of a planar antenna and an NbN bridge connecting across the antenna's inner terminals on a high-resistivity Si substrate. To eliminate the influence of direct detection and instability of the local oscillation (LO) power, a wire grid has been used to change the input LO power for compensating the shift of bias current during Y-factor measurement. The double sideband (DSB) receiver noise temperatures at 4.2 K without corrections have been measured from 0.65 to 3.1 THz. The excess quantum noise factor β of about 4 has been obtained, which agrees well with the calculated value. Allan variance of the HEB has been characterized, and Allan time TA longer than 0.4 s is obtained. We also estimated the temperature resolution of the HEB from the Allan variance and obtained the minimum temperature resolution of 1.1 K using a Gunn oscillator with its multipliers at 0.65 THz as an LO source.

  • Adaptive Spread-Transform Dither Modulation Using a New Perceptual Model for Color Image Watermarking

    Lihong MA  Dong YU  Gang WEI  Jing TIAN  Hanqing LU  

     
    PAPER-Information Network

      Vol:
    E93-D No:4
      Page(s):
    843-857

    Major challenges of the conventional spread-transform dither modulation (STDM) watermarking approach are two-fold: (i) it exploits a fixed watermarking strength (more particularly, the quantization index step size) to the whole cover image; and (ii) it is fairly vulnerable to the amplitude changes. To tackle the above challenges, an adaptive spread-transform dither modulation (ASTDM) approach is proposed in this paper for conducting robust color image watermarking by incorporating a new perceptual model into the conventional STDM framework. The proposed approach exploits a new perceptual model to adjust the quantization index step sizes according to the local perceptual characteristics of a cover image. Furthermore, in contrast to the conventional Watson's model is vulnerable to the amplitude changes, our proposed new perceptual model makes the luminance masking thresholds be consistent with any amplitude change, while keeping the consistence to the properties of the human visual system. In addition, certain color artifacts could be incurred during the watermark embedding procedure, since some intensity values are perceptibly changed to label the watermark. For that, a color artifact suppression algorithm is proposed by mathematically deriving an upper bound for the intensity values according to the inherent relationship between the saturation and the intensity components. Extensive experiments are conducted using 500 images selected from Corel database to demonstrate the superior performance of the proposed ASTDM approach.

  • Development of Generation System of Simplified Digital Maps

    Keiichi UCHIMURA  Masato KAWANO  Hiroki TOKITSU  Zhencheng HU  

     
    PAPER

      Vol:
    E93-A No:4
      Page(s):
    700-710

    In recent years, digital maps have been used in a variety of scenarios, including car navigation systems and map information services over the Internet. These digital maps are formed by multiple layers of maps of different scales; the map data most suitable for the specific situation are used. Currently, the production of map data of different scales is done by hand due to constraints related to processing time and accuracy. We conducted research concerning technologies for automatic generation of simplified map data from detailed map data. In the present paper, the authors propose the following: (1) a method to transform data related to streets, rivers, etc. containing widths into line data, (2) a method to eliminate the component points of the data, and (3) a method to eliminate data that lie below a certain threshold. In addition, in order to evaluate the proposed method, a user survey was conducted; in this survey we compared maps generated using the proposed method with the commercially available maps. From the viewpoint of the amount of data reduction and processing time, and on the basis of the results of the survey, we confirmed the effectiveness of the automatic generation of simplified maps using the proposed methods.

  • Overlay Transmission System on Wireless LAN with RTS/CTS Exchange Taking into Account Timing Synchronization

    Kilsoo JEONG  Kazuto YANO  Satoshi TSUKAMOTO  Makoto TAROMARU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:3
      Page(s):
    640-649

    This paper proposes a new overlay transmission system for wireless LAN with RTS/CTS exchange. Conventional timing synchronization schemes may fail in the presence of inter-system interference, because they have not been designed for overlay transmission. In the proposed system, a transmitter estimates the transmission timing of the next wireless LAN DATA frame, and then sends its DATA frame at almost the same time as the estimated transmission timing to easily establish timing synchronization at the receiver. Moreover, we employ a tapped delay line adaptive array antenna at both transmitter and receiver to effectively suppress interference due to overlay transmission in a rich multipath propagation environment. The frame error rate performances of the proposed system and the IEEE 802.11a wireless LAN are evaluated through computer simulations that assume an exponentially decaying 8-path non-line-of-sight fading channel and include a timing synchronization process. Simulation results demonstrate that the proposed system can achieve overlay transmission while avoiding interference in a rich multipath propagation environment.

  • LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network

    Xiaofeng LU  Pan HUI  Don TOWSLEY  Juhua PU  Zhang XIONG  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    503-509

    In this paper, we propose an anonymous routing protocol, LOPP, to protect the originator's location privacy in Delay/Disruption Tolerant Network (DTN). The goals of our study are to minimize the originator's probability of being localized (Pl) and maximize the destination's probability of receiving the message (Pr). The idea of LOPP is to divide a sensitive message into k segments and send each of them to n different neighbors. Although message fragmentation could reduce the destination's probability to receive a complete message, LOPP can decrease the originator's Pl. We validate LOPP on a real-world human mobility dataset. The simulation results show that LOPP can decrease the originator's Pl by over 54% with only 5.7% decrease in destination's Pr. We address the physical localization issue of DTN, which was not studied in the literature.

  • Self Organizing Topology Transformation for Peer-To-Peer (P2P) Networks

    Suyong EUM  Shin'ichi ARAKAWA  Masayuki MURATA  

     
    PAPER

      Vol:
    E93-B No:3
      Page(s):
    516-524

    Topological structure of peer-to-peer (P2P) networks affects their operating performance. Thus, various models have been proposed to construct an efficient topology for the P2P networks. However, due to the simultaneous failures of peers and other disastrous events, it is difficult to maintain the originally designed topological structure that provides the network with some performance benefits. For this reason, in this paper we propose a simple local rewiring method that changes the network topology to have small diameter as well as highly clustered structure. Moreover, the presented evaluation study shows how these topological properties are involved with the performance of P2P networks.

  • Development of an XYZ Digital Camera with Embedded Color Calibration System for Accurate Color Acquisition

    Maciej KRETKOWSKI  Ryszard JABLONSKI  Yoshifumi SHIMODAIRA  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E93-D No:3
      Page(s):
    651-653

    Acquisition of accurate colors is important in the modern era of widespread exchange of electronic multimedia. The variety of device-dependent color spaces causes troubles with accurate color reproduction. In this paper we present the outlines of accomplished digital camera system with device-independent output formed from tristimulus XYZ values. The outstanding accuracy and fidelity of acquired color is achieved in our system by employing an embedded color calibration system based on emissive device generating reference calibration colors with user-defined spectral distribution and chromaticity coordinates. The system was tested by calibrating the camera using 24 reference colors spectrally reproduced from 24 color patches of the Macbeth Chart. The average color difference (CIEDE2000) has been found to be ΔE = 0.83, which is an outstanding result compared to commercially available digital cameras.

  • Virtualized Optical Network (VON) for Future Internet and Applications

    Masahiko JINNO  Yukio TSUKISHIMA  Hidehiko TAKARA  Bartlomiej KOZICKI  Yoshiaki SONE  Toshikazu SAKANO  

     
    PAPER

      Vol:
    E93-B No:3
      Page(s):
    470-477

    A virtualized optical network (VON) is proposed as a key to implementing increased agility and flexibility into the future Internet and applications by providing any-to-any connectivity with the appropriate optical bandwidth at the appropriate time. The VON is enabled by introducing optical transparentization and optical fine granular grooming based on optical orthogonal frequency division multiplexing.

  • Equations of States in Statistical Learning for an Unrealizable and Regular Case

    Sumio WATANABE  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E93-A No:3
      Page(s):
    617-626

    Many learning machines that have hierarchical structure or hidden variables are now being used in information science, artificial intelligence, and bioinformatics. However, several learning machines used in such fields are not regular but singular statistical models, hence their generalization performance is still left unknown. To overcome these problems, in the previous papers, we proved new equations in statistical learning, by which we can estimate the Bayes generalization loss from the Bayes training loss and the functional variance, on the condition that the true distribution is a singularity contained in a learning machine. In this paper, we prove that the same equations hold even if a true distribution is not contained in a parametric model. Also we prove that, the proposed equations in a regular case are asymptotically equivalent to the Takeuchi information criterion. Therefore, the proposed equations are always applicable without any condition on the unknown true distribution.

2581-2600hit(5900hit)