The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Z(5900hit)

3681-3700hit(5900hit)

  • Analysis of Collision Channel with Asynchronous Access

    Laszlo GYORFI  Sandor GYORI  

     
    PAPER-Communication Theory

      Vol:
    E88-A No:10
      Page(s):
    2878-2884

    A T user multiple access collision channel without feedback is considered where the channel inputs are called packets. The packets take values from non-binary input alphabet. It is supposed that at most M users are active, i.e., are communicating simultaneously (2 M T). We are looking for codes and protocol sequences of users of minimum length such that from the output of the channel it can be determined which users were active, what were their synchron positions, and what they sent.

  • On Transformation between Discretized Bernoulli and Tent Maps

    Daisaburo YOSHIOKA  Akio TSUNEDA  Takahiro INOUE  

     
    PAPER

      Vol:
    E88-A No:10
      Page(s):
    2678-2683

    In this paper, it is proved that there is a transformation between two types of nonlinear feedback shift register which can be regarded as implementation of the Bernoulli and tent maps with finite precision. This transformation can be interpreted as a sort of finite dimension version of topological conjugation between the Bernoulli and tent maps on continuous phase space. Several properties of periodic sequences generated from extended NFSRs are derived from the relation.

  • A Spatiotemporal Neuronal Filter for Channel Equalization and Video Restoration

    Elhassane IBNELHAJ  Driss ABOUTAJDINE  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E88-D No:10
      Page(s):
    2427-2431

    In this paper we present a 3D adaptive nonlinear filter, namely the 3D adaptive CPWLN, based on the Canonical Piece Wise-Linear Network with an LMS L-filter type of adaptation. This filter is used to equalize nonlinear channel effect and remove impulsive/or mixed impulsive and Additive White Gaussian noise from video sequences. First, motion compensation is performed by a robust estimator. Then, a 3-D CPWLN LMS L-filter is applied. The overall combination is able to adequately remove undesired effects of communication channel and noise. Computer simulations on real-world image sequences are included. The algorithm yields promising results in terms of both objective and subjective quality of the restored sequence.

  • Computational Complexity and Performance of RAKE Receivers with Channel Estimation for DS-UWB

    Hiroyuki SATO  Tomoaki OHTSUKI  

     
    PAPER-RAKE Receiver

      Vol:
    E88-A No:9
      Page(s):
    2318-2326

    In this paper, we evaluate the computational complexity and the performance of the RAKE receivers for the Direct Sequence--Ultra Wideband (DS-UWB) with considering the accuracy of channel estimation in a multipath channel. As RAKE receivers for DS-UWB, we consider the maximal-ratio combining (MRC)-RAKE, the minimum mean square error (MMSE)-RAKE, and the MRC-RAKE-Equalizer that is the MRC-RAKE followed by a liner equalizer. Generally, if the channel estimation is perfect, as the number of fingers or taps increases, the performance of each receiver is improved, however the computational complexity of each receiver increases. In practice, the channel estimation is not perfect. The channel estimation error makes their performances degraded. Therefore, the performances of the RAKE receivers depend on the accuracy of channel estimation. Consequently, we evaluate the computational complexities and the Bit Error Rates (BERs) of MRC-RAKE, MMSE-RAKE, and MRC-RAKE-Equalizer with considering the accuracy of channel estimation for DS-UWB. We show that the accuracy of channel estimation affects the BER of each receiver significantly. We also show that when the accuracy of channel estimation is high, MRC-RAKE-Equalizer can achieve the better BER than MMSE-RAKE with less computational complexity, while MMSE-RAKE can achieve the better BER than MRC-RAKE-Equalizer when the accuracy of channel estimation is low.

  • Performance Comparison between Equal-Average Equal-Variance Equal-Norm Nearest Neighbor Search (EEENNS) Method and Improved Equal-Average Equal-Variance Nearest Neighbor Search (IEENNS) Method for Fast Encoding of Vector Quantization

    Zhibin PAN  Koji KOTANI  Tadahiro OHMI  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E88-D No:9
      Page(s):
    2218-2222

    The encoding process of vector quantization (VQ) is a time bottleneck preventing its practical applications. In order to speed up VQ encoding, it is very effective to use lower dimensional features of a vector to estimate how large the Euclidean distance between the input vector and a candidate codeword could be so as to reject most unlikely codewords. The three popular statistical features of the average or the mean, the variance, and L2 norm of a vector have already been adopted in the previous works individually. Recently, these three statistical features were combined together to derive a sequential EEENNS search method in [6], which is very efficient but still has obvious computational redundancy. This Letter aims at giving a mathematical analysis on the results of EEENNS method further and pointing out that it is actually unnecessary to use L2 norm feature anymore in fast VQ encoding if the mean and the variance are used simultaneously as proposed in IEENNS method. In other words, L2 norm feature is redundant for a rejection test in fast VQ encoding. Experimental results demonstrated an approximate 10-20% reduction of the total computational cost for various detailed images in the case of not using L2 norm feature so that it confirmed the correctness of the mathematical analysis.

  • Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks

    Hua-Yi LIN  Yueh-Min HUANG  Tzone-I WANG  

     
    PAPER

      Vol:
    E88-B No:9
      Page(s):
    3598-3613

    Unlike traditional networks, the characteristics of mobile wireless devices that can dynamically form a network without any infrastructure and wired line mean that mobile ad hoc networks frequently display partition owing to node mobility or link failures. Consequently, an ad hoc network is difficult to provide on-line access to trusted authorities or centralized servers. Despite the existence of well-known security mechanisms, the absence of a stationary central authorization facility in an open and distributed communication environment is a major challenge. Consequently, applying traditional Public Key Infrastructure (PKI) security architecture to mobile ad hoc networks will create secure blind sides. Based on this perspective, this study proposes a novel scalable and robust cluster-organized key management scheme. Distribution of trust to an aggregation of cluster heads using a threshold scheme faculty provides mobile ad hoc networks with robust key management. Furthermore, the proposed approach provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making the proposed approach more suitable for numerous mobile devices. Additionally, this study proposes a Cluster Secure Based Routing Protocol (CSBRP) to integrate into the key management to enhance non-repudiation of routing information and routing performances. Finally, this study introduces a mathematical model to demonstrate that the proposed cluster-based communication outperforms the node-based approach.

  • Load Balancing Routing Algorithm for Reverse Proxy Servers

    Satosi KATO  Hidetosi OKAMOTO  Toyofumi TAKENAKA  

     
    PAPER-Internet

      Vol:
    E88-B No:9
      Page(s):
    3693-3700

    We propose a novel routing algorithm for reverse proxy servers, called load balancing content address hashing (LB-CAH), and evaluate the performance of the proposed routing algorithm compared with that of the content address hashing (CAH) and the hash and slide (HAS) routing algorithms. The proposed LB-CAH routing algorithm calculates the popularity of pages in the load balancer using an LFU caching technique and periodically makes a popularity list. Using this popularity list, the proposed routing algorithm selects a reverse proxy server as follows. When the requested page appears in the popularity list, the request is routed according to the round robin method; otherwise, it is routed according to the content address hashing method. We evaluate and compare the LB-CAH, CAH and HAS routing algorithms by simulation experiments from the viewpoints of load balancing, consumed cache space and cache hit rate. Simulation experiments show that the proposed LB-CAH routing algorithm achieves almost the same degree of load balancing as the HAS algorithm and the same cache hit rate as the CAH algorithm for reverse proxy servers in various web site environments.

  • An Iterative Factorization Method Based on Rank 1 for Projective Structure and Motion

    Shigang LIU  Chengke WU  Li TANG  Jing JIA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E88-D No:9
      Page(s):
    2183-2188

    We propose a method for the recovery of projective structure and motion by the factorization of the rank 1 matrix containing the images of all points in all views. In our method, the unknowns are the 3D motion and relative depths of the set of points, not their 3D positions. The coordinates of the points along the camera plane are given by their image positions in the first frame. The knowledge of the coordinates along the camera plane enables us to solve the SFM problem by iteratively factorizing the rank 1 matrix. This simplifies the decomposition compared with the SVD (Singular Value Decomposition). Experiments with both simulated and real data show that the method is efficient for the recovery of projective structure and motion.

  • Traffic Sign Classification Using Ring Partitioned Method

    Aryuanto SOETEDJO  Koichi YAMADA  

     
    PAPER-Intelligent Transport System

      Vol:
    E88-A No:9
      Page(s):
    2419-2426

    Traffic sign recognition usually consists of two stages: detection and classification. In this paper, we describe the classification stage using the ring-partitioned method. The proposed method uses a specified grayscale image in the pre-processing step and ring-partitioned matching in the matching step. The method does not need carefully prepared many samples of traffic sign images for the training process, alternatively only the standard traffic signs are used as the reference images. The experimental results show the effectiveness of the method in the matching of occluded, rotated, and illumination problems of the traffic sign images with the fast computation time.

  • Improved Performance with Adaptive Dly-ACK for IEEE 802.15.3 WPAN over UWB PHY

    Hongyuan CHEN  Zihua GUO  Richard YAO  Yanda LI  

     
    PAPER-MAC Protocol

      Vol:
    E88-A No:9
      Page(s):
    2364-2372

    Dly-ACK scheme in IEEE 802.15.3 MAC is designed to reduce the overhead of the ACK frame in MAC layer and improve the channel utilization. However, how to using the Dly-ACK is open for implementation. In this paper, we propose an adaptive Dly-ACK scheme for both TCP and UDP traffic. We first point out the problems of applying fixed Dly-ACK scheme to these two traffic scenarios and show that the system performance is rather poor and the causes of these problems are presented. Based on our observations, two enhancement mechanisms for fixed Dly-ACK are then proposed. The first one is to request the Dly-ACK frame adaptively or change the burst size of Dly-ACK according to the transmitter queue status. The second is a retransmission counter to enable the destination DEV to deliver the MAC data frames to upper layer timely and orderly. Simulation results show that, with our enhancements, the system performance can be improved significantly compared with the conventional Imm-ACK and fixed Dly-ACK. We also investigate the impacts of some important parameters such as the buffer size on the system performance. Some important guidelines for the Dly-ACK design are given. Finally, it is worth to point out that our Dly-ACK enhancements are compatible with the standard and it is transparent to the upper layer protocols, i.e., either UDP or TCP.

  • Adaptive Neuro-Fuzzy Networks with the Aid of Fuzzy Granulation

    Keun-Chang KWAK  Dong-Hwa KIM  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E88-D No:9
      Page(s):
    2189-2196

    In this paper, we present the method for identifying an Adaptive Neuro-Fuzzy Networks (ANFN) with Takagi-Sugeno-Kang (TSK) fuzzy type based on fuzzy granulation. We also develop a systematic approach to generating fuzzy if-then rules from a given input-output data. The proposed ANFN is designed by the use of fuzzy granulation realized via context-based fuzzy clustering. This clustering technique builds information granules in the form of fuzzy sets and develops clusters by preserving the homogeneity of the clustered patterns associated with the input and output space. The experimental results reveal that the proposed model yields a better performance in comparison with Linguistic Models (LM) and Radial Basis Function Networks (RBFN) based on context-based fuzzy clustering introduced in the previous literature for Box-Jenkins gas furnace data and automobile MPG prediction.

  • An Audio-Video Multipath Streaming Scheme with Media Synchronization Control: Application-Level QoS Assessment in a Wireless Ad Hoc Network

    Toshiro NUNOME  Shuji TASAKA  

     
    PAPER

      Vol:
    E88-B No:9
      Page(s):
    3623-3634

    This paper proposes the MultiPath streaming scheme with Media Synchronization control (MPMS) for audio-video transmission in wireless ad hoc networks. In many audio-video streaming applications, media compensate each other from a perceptual point of view. On the basis of this property, we treat the two streams as separate transport streams, and then the source transmits them into two different routes if multiple routes to the destination are available. The multipath transmission disturbs the temporal structure of the streams; in MPMS, the disturbance is remedied by media synchronization control. In order to implement MPMS in this paper, we enhance the existing Dynamic Source Routing (DSR) protocol. We compare the application-level QoS of MPMS and three other schemes for audio-video transmission by simulation with ns-2. In the simulation, we also assess the influence of the multipath transmission on other traffic. The simulation result shows that MPMS is effective in achieving high QoS at the application-level.

  • Low-Complexity Viterbi Equalizer for MBOK DS-UWB Systems

    Kenichi TAKIZAWA  Ryuji KOHNO  

     
    PAPER-Coding

      Vol:
    E88-A No:9
      Page(s):
    2350-2355

    This paper presents a low-complexity equalization for M-ary biorthogonal keying based direct sequence ultra wideband (MBOK DS-UWB) systems. We focus on a Viterbi equalizer, which is based on maximum likelihood sequence estimation (MLSE). To reduce the computational complexity of MLSE-based equalizer, we use two strategies. One is the use of delayed-decision feedback sequence estimation (DDFSE), which is a hybrid estimation between MLSE and decision feedback estimation (DFE). And the other is the truncation of state transition in MLSE by considering MBOK pulse mapping. The reduced complexity sequence estimation is named as reduced state (RS)-DDFSE. By the use of RS-DDFSE, the complexity of Viterbi equalizer for MBOK DS-UWB is significantly reduced, by comparison with that of MLSE. The performance of RS-DDFSE based equalizer is evaluated on multipath fading channel models provided by IEEE802.15.3a. An analysis on trellis diagram of RS-DDFSE and simulation results show that the impact on error rate performance generated by the complexity lower is slight.

  • Observation of Faraday Rotation and Magnetic Circular Dichroism in an Optical Near-Field Probe Coated with Fe

    Tadashi KAWAZOE  Shinya MARUYAMA  Kiyoshi KOBAYASHI  Motoichi OHTSU  

     
    LETTER

      Vol:
    E88-C No:9
      Page(s):
    1850-1852

    We demonstrate a novel fiber device exhibiting magnetic circular dichroism (MCD) and Faraday rotation in sharpened optical fibers coated with Fe. The degree of MCD was 0.68 in a magnetic field of 0.35 T and the Faraday rotation angle was as great as 110 degrees. Such great magneto-optical effect is due to optical near-field interactions in the sub-wavelength region, i.e., in the tip of the near-field fiber probe. These effects can be attributed to the large magnitude of the magneto optical coefficient of Fe.

  • A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization

    Chin-Chen CHANG  Wen-Chuan WU  

     
    PAPER-Application Information Security

      Vol:
    E88-D No:9
      Page(s):
    2159-2167

    To increase the number of the embedded secrets and to improve the quality of the stego-image in the vector quantization (VQ)-based information hiding scheme, in this paper, we present a novel information-hiding scheme to embed secrets into the side match vector quantization (SMVQ) compressed code. First, a host image is partitioned into non-overlapping blocks. For these seed blocks of the image, VQ is adopted without hiding secrets. Then, for each of the residual blocks, SMVQ or VQ is employed according to the smoothness of the block such that the proper codeword is chosen from the state codebook or the original codebook to compress it. Finally, these compressed codes represent not only the host image but also the secret data. Experimental results show that the performance of the proposed scheme is better than other VQ-based information hiding scheme in terms of the embedding capacity and the image quality. Moreover, in the proposed scheme, the compression rate is better than the compared scheme.

  • Estimation of Radiated Power of Radio Transmitters Using a Reverberation Chamber

    Tsutomu SUGIYAMA  Takashi SHINOZUKA  Ken IWASAKI  

     
    PAPER-Measurements

      Vol:
    E88-B No:8
      Page(s):
    3158-3163

    A procedure for estimating radiated power of radio transmitter is proposed based on a statistical property of field intensity time variation distribution in a reverberation chamber. When random varying multipath waves produced by stirrers in a reverberation chamber are received together with a direct wave, the resulting mixed waves are regarded as a kind of multipath waves. Theoretical and experimental results are reported regarding a procedure for estimating radiated power from the 63.2% value of CDF (Cumulative Distribution Function) of an envelope of multipath waves.

  • Fundamental Characteristics of Stationary Lithium-Ion Secondary Cells and a Cell-Voltage-Equalizing Circuit

    Toshio MATSUSHIMA  Shinya TAKAGI  Seiichi MUROYAMA  Toshio HORIE  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E88-B No:8
      Page(s):
    3436-3442

    This paper describes the characteristics of lithium-ion cells developed for stationary use, as in the case of stand-by sources in power systems. The effect of a cell-voltage-equalizing circuit developed for batteries of cells is also demonstrated. The tested lithium-ion cells were suitable to be charged by the constant-current, constant-voltage (CCCV) method and could be charged efficiently over a wide range of temperatures. They also showed good discharge performance with little dependence on the discharge current and temperature. Total capacity reduction of over 60% can be expected in batteries of lithium-ion cells. The cell-voltage-equalizing circuit was shown to be useful and necessary for batteries of lithium-ion cells in order to suppress deviations in the cell voltage and capacity loss.

  • General Method to Construct LS Codes by Complete Complementary Sequences

    Chao ZHANG  Xiaokang LIN  Shigeki YAMADA  Mitsutoshi HATORI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:8
      Page(s):
    3484-3487

    Large Area Synchronized (LAS)-CDMA, actually composed of LA codes and pulse compressing LS codes, has been proposed as a most promising scheme in 3G and 4G wireless communications. LS codes are famous for the Zero Correlation Zone (ZCZ) in the auto-correlation and cross-correlation functions, which endows the codes with the capability to perfectly reduce the Multiple Access Interference (MAI) and Inter Symbol Interference (ISI) if the maximum transmission delay is less than the length of ZCZ. In this letter, we provide a general and systematic method to construct LS codes from the set of complete complementary sequences. Our method is much more general than the ordinary LS construction method revealed previously.

  • A Possibilistic and Stochastic Programming Approach to Fuzzy Random MST Problems

    Hideki KATAGIRI  El Bekkaye MERMRI  Masatoshi SAKAWA  Kosuke KATO  Ichiro NISHIZAKI  

     
    PAPER-Neural Networks and Fuzzy Systems

      Vol:
    E88-D No:8
      Page(s):
    1912-1919

    This paper deals with minimum spanning tree problems where each edge weight is a fuzzy random variable. In order to consider the imprecise nature of the decision maker's judgment, a fuzzy goal for the objective function is introduced. A novel decision making model is constructed based on possibility theory and on a stochastic programming model. It is shown that the problem including both randomness and fuzziness is reduced to a deterministic equivalent problem. Finally, a polynomial-time algorithm is provided to solve the problem.

  • Performance of Wireless LAN System Based on IEEE 802.11g Standard under Man-Made Noise Environment

    Akihiko SHIOTSUKI  Shinichi MIYAMOTO  Norihiko MORINAGA  

     
    PAPER-Communications

      Vol:
    E88-B No:8
      Page(s):
    3213-3220

    2.4 GHz-band wireless LAN system based on a new standard, IEEE 802.11g, has been taking a great attention as it provides the attractive features such as low cost, unlicensed spectrum use, and high speed transmission rate up to 54 Mbps. However, 2.4 GHz radio frequency band is also used for Industrial, Scientific and Medical (ISM) devices such as microwave ovens, and the man-made noise leaked from ISM devices is known to be one of the major causes of the degradation in the performance of wireless communications systems using 2.4 GHz radio frequency band. In this paper, we evaluate the bit error rate (BER) and the throughput performances of WLAN system based on IEEE 802.11g standard (IEEE 802.11g WLAN system) under man-made noise environment, and discuss the effect of man-made noise on the performance of IEEE 802.11g WLAN system. Numerical results show that the BER and the throughput performances of IEEE 802.11g WLAN system are much degraded by the influence of man-made noise.

3681-3700hit(5900hit)