Dae Hyun YUM Jae Woo SEO Kookrae CHO Pil Joong LEE
A hash chain H for a one-way hash function h() is a sequence of hash values < v0, v1, ..., vn >, where v0 is a public value, vn a secret value, and vi = h(vi+1). A hash chain traversal T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n. While previous hash chain traversal algorithms were designed to output all hash values vi (1 ≤ i ≤ n) in order, there are applications where every m-th hash value (i.e., vm, v2m, v3m, ...) is required to be output. We introduce a hash chain traversal algorithm that selectively outputs every m-th hash value efficiently. The main technique is a transformation from a hash chain traversal algorithm outputting every hash value into that outputting every m-th hash value. Compared with the direct use of previous hash chain traversal algorithms, our proposed method requires less memory storages and computational costs.
Jae-woong JEONG Young-cheol PARK Dae-hee YOUN Seok-Pil LEE
In this paper, we propose a robust room inverse filtering algorithm for speech dereverberation based on a kurtosis maximization. The proposed algorithm utilizes a new normalized kurtosis function that nonlinearly maps the input kurtosis onto a finite range from zero to one, which results in a kurtosis warping. Due to the kurtosis warping, the proposed algorithm provides more stable convergence and, in turn, better performance than the conventional algorithm. Experimental results are presented to confirm the robustness of the proposed algorithm.
In this letter, we develop an anycast-based emergency service for healthcare wireless sensor networks. The new service could operate with sensors to detect and activate an alarm system based on predefined conditions that are specific to the patient and the disease. The new service is implemented on 802.15.4 ZigBee which usually has large control overhead and long transmission times. To improve the service performance, our service identifies the closest emergency service provider to alleviate the control overhead and achieve immediate assistance when a patient requests for an emergency service. We also increase the reliability of packet transmission by using a Recovery Point scheme. Our simulations and experiment demonstrate that our scheme is efficient and feasible for healthcare wireless sensor networks.
This paper presents an autonomous navigation system for a mobile robot using randomly distributed passive RFID tags. In the case of randomly distributed RFID tags, it is difficult to provide the precise location of the robot especially in the area of sparse RFID tag distribution. This, combined with the wide turning radius of the robot, can cause the robot to enter a zigzag exploration path and miss the goal. In RFID-based navigation, the key is to reduce both the number of RFID tags and the localization error for practical use in a large space. To cope with these, we utilized the Read time, which measures the reading time of each RFID tag. With this, we could estimate accurately the localization and orientation without using any external sensors or increasing the RFID tags. The average estimation errors of 7.8 cm in localization and 11 degrees in orientation were achieved with 102 RFID tags in the area of 4.2 m by 6.2 m. Our proposed method is verified with the path trajectories produced during navigation compared with conventional approaches.
Ji-Soo KEUM Hyon-Soo LEE Masafumi HAGIWARA
In this letter, we propose an improved anchor shot detection (ASD) method in order to effectively retrieve anchor shots from news video. The face location and dissimilarity of icon region are used to reduce false alarms in the proposed method. According to the results of the experiment on several types of news video, the proposed method obtained high anchor detection results compared with previous methods.
In most cases in wireless networks, a user has a two-way communication that consists of two sessions: uplink and downlink sessions, and its overall satisfaction to the communication depends on the quality of service of both sessions. However, in most previous approaches in wireless resource allocation, the satisfactions of a user for its uplink and downlink sessions are modeled separately and treated independently, which fails to accurately model user's overall satisfaction to its communication. Hence, in this paper we model user's overall satisfaction to its communication considering both its uplink and downlink sessions. To this end, we propose a novel concept for a utility function to model user's overall satisfaction to its communication, which is called a user-level utility function, considering user's satisfaction to uplink and downlink sessions jointly. To show the appropriateness of our approach, we apply our user-level utility functions to scheduling problems in TDMA wireless networks and show the performance improvement of our approach over the traditional approach that does not treat uplink and downlink sessions of a user jointly.
In wireless networks, sleep mode based power saving mechanisms can reduce the energy consumption at the expense of additional packet delay. This letter analyzes its packet queueing delay and wireless terminals' energy efficiency. Based on the analysis, optimal sleep window size can be derived to optimize terminal energy efficiency with delay constraint.
Miroslav SAMARDIJA Jiro HIROKAWA Makoto ANDO
A series of windows in the narrow wall of a fully-dielectric-filled rectangular waveguide to feed partially-dielectric-filled oversized-rectangular waveguide is presented. The overall structure is single-layer and 3-dimensional however; the waveguide which is uniform along the height is analyzed by the 2-dimensional method of moments and the oversized waveguide which is uniform in the longitudinal direction of the waveguide is analyzed by the 2-dimensional mode matching. It is found that utilizing simple mode conversions between the two orthogonally uniform structures is sufficient for obtaining the results similar to those of a 3-dimensional solver HFSS. The parameters for the windows designed for a uniform input division are presented. A simulation shows that a 12 window array provides a 3.5% bandwidth in terms of reflection below -20 dB. The uniform excitation of the quasi-TEM wave is confirmed in the 60 GHz band by measuring a uniform aperture field in amplitude and phase over the slotted oversized-waveguide.
We consider the minimum cost edge installation problem (MCEI) in a graph G=(V,E) with edge weight w(e)≥ 0, e∈ E. We are given a vertex s∈ V designated as a sink, an edge capacity λ>0, and a source set S⊆ V with demand q(v)∈ [0,λ], v∈ S. For each edge e∈ E, we are allowed to install an integer number h(e) of copies of e. MCEI asks to send demand q(v) from each source v∈ S along a single path Pv to the sink s without splitting the demand of any source v∈ S. For each edge e∈ E, a set of such paths can pass through a single copy of e in G as long as the total demand along the paths does not exceed the edge capacity λ. The objective is to find a set P={Pv| v∈ S∈ of paths of G that minimizes the installing cost ∑e∈ E h(e)w(e). In this paper, we propose a (15/8+ρST)-approximation algorithm to MCEI, where ρST is any approximation ratio achievable for the Steiner tree problem.
In this paper, we propose a novel target acoustic signal detection approach which is based on non-negative matrix factorization (NMF). Target basis vectors are trained from the target signal database through NMF, and input vectors are projected onto the subspace spanned by these target basis vectors. By analyzing the distribution of time-varying normalized projection error, the optimal threshold can be calculated to detect the target signal intervals during the entire input signal. Experimental results show that the proposed algorithm can detect the target signal successfully under various signal environments.
A generalized Gray map for codes over the ring Fq[u]/
Min LIANG Jian CHEN Lin KANG Biaobing JIN Weiwei XU Peiheng WU
Low noise terahertz (THz) receivers based on superconducting niobium nitride (NbN) hot electron bolometer (HEB) mixers have been designed, fabricated and measured for applications in astronomy and cosmology. The NbN HEB mixer consists of a planar antenna and an NbN bridge connecting across the antenna's inner terminals on a high-resistivity Si substrate. To eliminate the influence of direct detection and instability of the local oscillation (LO) power, a wire grid has been used to change the input LO power for compensating the shift of bias current during Y-factor measurement. The double sideband (DSB) receiver noise temperatures at 4.2 K without corrections have been measured from 0.65 to 3.1 THz. The excess quantum noise factor β of about 4 has been obtained, which agrees well with the calculated value. Allan variance of the HEB has been characterized, and Allan time TA longer than 0.4 s is obtained. We also estimated the temperature resolution of the HEB from the Allan variance and obtained the minimum temperature resolution of 1.1 K using a Gunn oscillator with its multipliers at 0.65 THz as an LO source.
Lihong MA Dong YU Gang WEI Jing TIAN Hanqing LU
Major challenges of the conventional spread-transform dither modulation (STDM) watermarking approach are two-fold: (i) it exploits a fixed watermarking strength (more particularly, the quantization index step size) to the whole cover image; and (ii) it is fairly vulnerable to the amplitude changes. To tackle the above challenges, an adaptive spread-transform dither modulation (ASTDM) approach is proposed in this paper for conducting robust color image watermarking by incorporating a new perceptual model into the conventional STDM framework. The proposed approach exploits a new perceptual model to adjust the quantization index step sizes according to the local perceptual characteristics of a cover image. Furthermore, in contrast to the conventional Watson's model is vulnerable to the amplitude changes, our proposed new perceptual model makes the luminance masking thresholds be consistent with any amplitude change, while keeping the consistence to the properties of the human visual system. In addition, certain color artifacts could be incurred during the watermark embedding procedure, since some intensity values are perceptibly changed to label the watermark. For that, a color artifact suppression algorithm is proposed by mathematically deriving an upper bound for the intensity values according to the inherent relationship between the saturation and the intensity components. Extensive experiments are conducted using 500 images selected from Corel database to demonstrate the superior performance of the proposed ASTDM approach.
Keiichi UCHIMURA Masato KAWANO Hiroki TOKITSU Zhencheng HU
In recent years, digital maps have been used in a variety of scenarios, including car navigation systems and map information services over the Internet. These digital maps are formed by multiple layers of maps of different scales; the map data most suitable for the specific situation are used. Currently, the production of map data of different scales is done by hand due to constraints related to processing time and accuracy. We conducted research concerning technologies for automatic generation of simplified map data from detailed map data. In the present paper, the authors propose the following: (1) a method to transform data related to streets, rivers, etc. containing widths into line data, (2) a method to eliminate the component points of the data, and (3) a method to eliminate data that lie below a certain threshold. In addition, in order to evaluate the proposed method, a user survey was conducted; in this survey we compared maps generated using the proposed method with the commercially available maps. From the viewpoint of the amount of data reduction and processing time, and on the basis of the results of the survey, we confirmed the effectiveness of the automatic generation of simplified maps using the proposed methods.
Kilsoo JEONG Kazuto YANO Satoshi TSUKAMOTO Makoto TAROMARU
This paper proposes a new overlay transmission system for wireless LAN with RTS/CTS exchange. Conventional timing synchronization schemes may fail in the presence of inter-system interference, because they have not been designed for overlay transmission. In the proposed system, a transmitter estimates the transmission timing of the next wireless LAN DATA frame, and then sends its DATA frame at almost the same time as the estimated transmission timing to easily establish timing synchronization at the receiver. Moreover, we employ a tapped delay line adaptive array antenna at both transmitter and receiver to effectively suppress interference due to overlay transmission in a rich multipath propagation environment. The frame error rate performances of the proposed system and the IEEE 802.11a wireless LAN are evaluated through computer simulations that assume an exponentially decaying 8-path non-line-of-sight fading channel and include a timing synchronization process. Simulation results demonstrate that the proposed system can achieve overlay transmission while avoiding interference in a rich multipath propagation environment.
Xiaofeng LU Pan HUI Don TOWSLEY Juhua PU Zhang XIONG
In this paper, we propose an anonymous routing protocol, LOPP, to protect the originator's location privacy in Delay/Disruption Tolerant Network (DTN). The goals of our study are to minimize the originator's probability of being localized (Pl) and maximize the destination's probability of receiving the message (Pr). The idea of LOPP is to divide a sensitive message into k segments and send each of them to n different neighbors. Although message fragmentation could reduce the destination's probability to receive a complete message, LOPP can decrease the originator's Pl. We validate LOPP on a real-world human mobility dataset. The simulation results show that LOPP can decrease the originator's Pl by over 54% with only 5.7% decrease in destination's Pr. We address the physical localization issue of DTN, which was not studied in the literature.
Suyong EUM Shin'ichi ARAKAWA Masayuki MURATA
Topological structure of peer-to-peer (P2P) networks affects their operating performance. Thus, various models have been proposed to construct an efficient topology for the P2P networks. However, due to the simultaneous failures of peers and other disastrous events, it is difficult to maintain the originally designed topological structure that provides the network with some performance benefits. For this reason, in this paper we propose a simple local rewiring method that changes the network topology to have small diameter as well as highly clustered structure. Moreover, the presented evaluation study shows how these topological properties are involved with the performance of P2P networks.
Maciej KRETKOWSKI Ryszard JABLONSKI Yoshifumi SHIMODAIRA
Acquisition of accurate colors is important in the modern era of widespread exchange of electronic multimedia. The variety of device-dependent color spaces causes troubles with accurate color reproduction. In this paper we present the outlines of accomplished digital camera system with device-independent output formed from tristimulus XYZ values. The outstanding accuracy and fidelity of acquired color is achieved in our system by employing an embedded color calibration system based on emissive device generating reference calibration colors with user-defined spectral distribution and chromaticity coordinates. The system was tested by calibrating the camera using 24 reference colors spectrally reproduced from 24 color patches of the Macbeth Chart. The average color difference (CIEDE2000) has been found to be ΔE = 0.83, which is an outstanding result compared to commercially available digital cameras.
Masahiko JINNO Yukio TSUKISHIMA Hidehiko TAKARA Bartlomiej KOZICKI Yoshiaki SONE Toshikazu SAKANO
A virtualized optical network (VON) is proposed as a key to implementing increased agility and flexibility into the future Internet and applications by providing any-to-any connectivity with the appropriate optical bandwidth at the appropriate time. The VON is enabled by introducing optical transparentization and optical fine granular grooming based on optical orthogonal frequency division multiplexing.
Many learning machines that have hierarchical structure or hidden variables are now being used in information science, artificial intelligence, and bioinformatics. However, several learning machines used in such fields are not regular but singular statistical models, hence their generalization performance is still left unknown. To overcome these problems, in the previous papers, we proved new equations in statistical learning, by which we can estimate the Bayes generalization loss from the Bayes training loss and the functional variance, on the condition that the true distribution is a singularity contained in a learning machine. In this paper, we prove that the same equations hold even if a true distribution is not contained in a parametric model. Also we prove that, the proposed equations in a regular case are asymptotically equivalent to the Takeuchi information criterion. Therefore, the proposed equations are always applicable without any condition on the unknown true distribution.