The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] bound(451hit)

241-260hit(451hit)

  • Delayed Perturbation Bounds for Receding Horizon Controls

    ChoonKi AHN  PyungSoo KIM  

     
    LETTER-Systems and Control

      Vol:
    E90-A No:8
      Page(s):
    1704-1706

    This letter presents delayed perturbation bounds (DPBs) for receding horizon controls (RHCs) of continuous-time systems. The proposed DPBs are obtained easily by solving convex problems represented by linear matrix inequalities (LMIs). We show, by numerical examples, that the RHCs have larger DPBs than conventional linear quadratic regulators (LQRs).

  • Boundary Detection in Echocardiographic Images Using Markovian Level Set Method

    Jierong CHENG  Say-Wei FOO  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E90-D No:8
      Page(s):
    1292-1300

    Owing to the large amount of speckle noise and ill-defined edges present in echocardiographic images, computer-based boundary detection of the left ventricle has proved to be a challenging problem. In this paper, a Markovian level set method for boundary detection in long-axis echocardiographic images is proposed. It combines Markov random field (MRF) model, which makes use of local statistics with level set method that handles topological changes, to detect a continuous and smooth boundary. Experimental results show that higher accuracy can be achieved with the proposed method compared with two related MRF-based methods.

  • Generalized Performance Upper Bounds for Terminated Convolutional Codes

    Hichan MOON  Donald C. COX  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E90-B No:6
      Page(s):
    1360-1366

    In this paper, we propose tight performance upper bounds for convolutional codes terminated with an input sequence of finite length. To obtain the upper bounds, a generalized weight enumerator of single error event is defined to represent the relation between the Hamming distance of the coded output and the Hamming distance of the selected input bits of a terminated convolutional code. In the generalized weight enumerator of single error event, codewords composed of multiple error events are not counted to provide tighter performance upper bounds. The upper bounds on frame error rate (FER) and average bit error rate (BER) of selected bits are computed from the generalized weight enumerators of single error event. A simple method is presented to compute the weight enumerator of a terminated convolutional code based on a modified trellis diagram.

  • Color Texture Segmentation Using Color Transform and Feature Distributions

    Shiuh-Ku WENG  Chung-Ming KUO  Wei-Cung KANG  

     
    LETTER-Pattern Recognition

      Vol:
    E90-D No:4
      Page(s):
    787-790

    This letter presents a simple scheme to transform colors to some representative classes for color information reduction. Then, the weighted distributions of color index histogram (CIH) and local binary pattern (LBP) are applied to measure the similarity of adjacent texture regions during the segmentation process. In addition, for improving the segmentation accuracy, an efficient boundary checking algorithm is proposed. The proposed method not only saves execution time but also segments the distinct texture regions correctly.

  • Cost Analysis of BestRelay Retransmission Trees for Reliable Multicasting

    Chang-Han KIM  Jae-Heon YANG  Ikjun YEOM  

     
    PAPER-Network

      Vol:
    E90-B No:3
      Page(s):
    527-537

    In this paper, we address how to construct efficient retransmission trees for reliable multicast. Efficiency of retransmission trees mainly depends on locations of repairers, which are in charge of retransmitting lost packets. We propose an algorithm for each receiver to find a repairer for efficient recovery. The resulting tree for retransmission is organized by pairs of a receiver and a repairer which is the host "nearest" to the receiver among the multicast group members "nearer" to the sender. We formally prove that the proposed algorithm realizes reliable multicast with only constant times of a lower bound cost achievable through impractical router support. We also evaluate the algorithm through extensive simulations.

  • Scattered-Field Time Domain Boundary Element Method and Its Application to Transient Electromagnetic Field Simulation in Particle Accelerator Physics

    Kazuhiro FUJITA  Hideki KAWAGUCHI  Shusuke NISHIYAMA  Satoshi TOMIOKA  Takeaki ENOTO  Igor ZAGORODNOV  Thomas WEILAND  

     
    PAPER-Numerical Techniques, Computational Electromagnetic

      Vol:
    E90-C No:2
      Page(s):
    265-274

    Authors have been working in particle accelerator wake field analysis by using the Time Domain Boundary Element Method (TDBEM). A stable TDBEM scheme was presented and good agreements with conventional wake field analysis of the FDTD method were obtained. On the other hand, the TDBEM scheme still contains difficulty of initial value setting on interior region problems for infinitely long accelerator beam pipe. To avoid this initial value setting, we adopted a numerical model of beam pipes with finite length and wall thickness on open scattering problems. But the use of such finite beam pipe models causes another problem of unwanted scattering fields at the beam pipe edge, and leads to the involvement of interior resonant solutions. This paper presents a modified TDBEM scheme, Scattered-field Time Domain Boundary Element Method (S-TDBEM) to treat the infinitely long beam pipe on interior region problems. It is shown that the S-TDBEM is able to avoid the excitation of the edge scattering fields and the involvement of numerical instabilities caused by interior resonance, which occur in the conventional TDBEM.

  • A Network Address Translation Approach to the Inbound Session Problem in Private Networks

    Ming-Deng HSIEH  Hung-Chun CHANG  Chien-Chao TSENG  Tsan-Pin WANG  

     
    PAPER-Networks

      Vol:
    E90-D No:2
      Page(s):
    482-489

    This paper proposes a Dynamic-Configurable NAT (DCNAT) approach to the inbound session problem for private networks behind NAT routers. DCNAT is a port-based NAT scheme that adopts a registration procedure for a host to register a session with a DCNAT router before originating a communication session to a host behind the DCNAT router. With the registration procedure, the DCNAT router can create NAT binding entries dynamically for address: port translation before the inbound session starts. Furthermore the dynamic creation of NAT binding entries makes DCNAT very flexible in supporting inbound accesses to a large number of services opened dynamically by the private nodes behind an NAT router. Although DCNAT requires minor modification to the originating host and the NAT router, it is highly suitable for proxy-based applications, such as web browsing, or instant message delivery.

  • High Accuracy Fundamental Matrix Computation and Its Performance Evaluation

    Kenichi KANATANI  Yasuyuki SUGAYA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E90-D No:2
      Page(s):
    579-585

    We compare the convergence performance of different numerical schemes for computing the fundamental matrix from point correspondences over two images. First, we state the problem and the associated KCR lower bound. Then, we describe the algorithms of three well-known methods: FNS, HEIV, and renormalization. We also introduce Gauss-Newton iterations as a new method for fundamental matrix computation. For initial values, we test random choice, least squares, and Taubin's method. Experiments using simulated and real images reveal different characteristics of each method. Overall, FNS exhibits the best convergence properties.

  • Partitioning a Multi-Weighted Graph to Connected Subgraphs of Almost Uniform Size

    Takehiro ITO  Kazuya GOTO  Xiao ZHOU  Takao NISHIZEKI  

     
    PAPER-Graph Algorithms

      Vol:
    E90-D No:2
      Page(s):
    449-456

    Assume that each vertex of a graph G is assigned a constant number q of nonnegative integer weights, and that q pairs of nonnegative integers li and ui, 1 ≤ i ≤ q, are given. One wishes to partition G into connected components by deleting edges from G so that the total i-th weights of all vertices in each component is at least li and at most ui for each index i, 1 ≤ i ≤ q. The problem of finding such a "uniform" partition is NP-hard for series-parallel graphs, and is strongly NP-hard for general graphs even for q = 1. In this paper we show that the problem and many variants can be solved in pseudo-polynomial time for series-parallel graphs and partial k-trees, that is, graphs with bounded tree-width.

  • Motion-Based Boundary Tracking of Moving Object Using Parametric Active Contour Model

    Boo Hwan LEE  Il CHOI  Gi Joon JEON  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E90-D No:1
      Page(s):
    355-363

    This paper presents a motion-based boundary tracking method for a moving deformable object in an image sequence using a parametric active contour model. Deciding the local converging directions of the contour points is essential for correctly extracting the boundary of a moving deformable object. Thus, a new energy function for a parametric active contour model is proposed based on the addition of a directional energy term using a frame difference map to the greedy snake. The frame difference map is used to obtain motion information on an object with fast and non-rigid motion. Plus, updating rules for the frame difference map are also developed to encourage the stable convergence of the contour points. Experiments on a set of synthetic and real image sequences show that the proposed method could fully track a speedy deformable object while exactly extracting the boundary of the object in every frame.

  • A 2-D Image Stabilization Algorithm for UWB Pulse Radars with Fractional Boundary Scattering Transform

    Takuya SAKAMOTO  

     
    PAPER-Sensing

      Vol:
    E90-B No:1
      Page(s):
    131-139

    The UWB (ultra-wideband) pulse radar is a promising candidate as an environment measurement method for rescue robots. Radar imaging to locate a nearby target is known as an ill-posed inverse problem, on which various studies have been done. However, conventional algorithms require long computational time, which makes it difficult to apply them to real-time operations of robots. We have proposed a fast radar imaging algorithm, the SEABED algorithm, for UWB pulse radars. This algorithm is based on a reversible transform, BST (Boundary Scattering Transform), between the target shape and the observed data. This transform enables us to estimate target shapes quickly and accurately in a noiseless environment. However, in a noisy environment the image estimated by the SEABED algorithm is degraded because BST utilizes differential operations. We have also proposed an image stabilization method, which utilizes the upper bound of the smoothness of received data. This method can be applied only to convex objects, not to concave ones. In this paper, we propose a fractional BST, which is obtained by expanding the conventional BST, and an image stabilization method by using the fractional BST. We show that the estimated image can be stabilized regardless of the shape of target.

  • Sequence Set with Three Low Correlation Zones

    Xiaoming TAO  Chao ZHANG  Jianhua LU  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E89-B No:12
      Page(s):
    3421-3424

    Sequence set with Three Zero Correlation Zones (T-ZCZ) is applied in Quasi-Synchronized CDMA communication system to reduce the Multiple Access Interference (MAI) and Inter Symbol Interference (ISI). In this letter, we present a class of sequence set with Three Low Correlation Zones (T-LCZ), which has more sequences and flexibility than T-ZCZ sequence set. Moreover, the theoretical bound on T-LCZ sequences is derived for estimating the performance of such sequence set.

  • Computation of Controllable Sublanguages for Unbounded Petri Nets Using Their Approximation Models

    Shigemasa TAKAI  Yongming BAI  

     
    LETTER-Concurrent Systems

      Vol:
    E89-A No:11
      Page(s):
    3250-3253

    We study computation of a controllable sublanguage of a given non-prefix-closed regular specification language for an unbounded Petri net. We approximate the generated language of the unbounded Petri net by a regular language, and compute the supremal controllable sublanguage of the specification language with respect to the regular language approximation. This computed language is a controllable sublanguage with respect to the original generated language of the unbounded Petri net, but is not necessarily the supremal one. We then present a sufficient condition under which the computed sublanguage is the supremal controllable sublanguage with respect to the original generated language of the unbounded Petri net.

  • Round-Robin with VirtualClock Scheduling Algorithm in Multiservice Packet Networks

    Lei WANG  Mike H. MACGREGOR  

     
    PAPER-Network

      Vol:
    E89-B No:11
      Page(s):
    3040-3045

    In this paper, we present a scheduler that incorporates round robin service within a VirtualClock discipline. Time-stamp based scheduling algorithms attain a low local delay bound and performance guarantee, but are computationally complex. On the other hand, round robin schemes are simple to implement and have computational complexity of O(1), but they are well known for their output burstiness and short-term unfairness. In order to overcome this problem, we combine round robin with VirtualClock in an algorithm we call VCRR. VCRR possesses better fairness than simple round robin, low jitter and a good scheduling delay bound. At the same time, VCRR preserves the O(1) time complexity of round robin. Simulation experiments show VCRR's efficiency in terms of delay performance, jitter and fairness.

  • Signal Reconstruction with Boundary-Matching via Iterative Algorithm

    Chau-Yun HSU  Tsung-Ming LO  

     
    PAPER-Digital Signal Processing

      Vol:
    E89-A No:11
      Page(s):
    3283-3289

    In various applications of signals transmission and processing, there is always a possibility of loss of samples. The iterative algorithm of Papoulis-Gerchberg (PG) is famous for solving the band-limited lost samples recovery problem. Two problems are known in this domain: (1) a band-limited signal practically is difficult to be obtained and (2) the convergence rate is too slow. By inserting a subtraction by a polynomial in the PG algorithm, using boundary-matched concept, a significant increase in performance and speed of its convergence has been achieved. In this paper, we propose an efficient approach to restore lost samples by adding a preprocess which meets the periodic boundary conditions of Fast Fourier transform in the iteration method. The accuracy of lost samples reconstruction by using the PG algorithm can be greatly improved with the aid of mapping the input data sequence of satisfying the boundary conditions. Further, we also developed another approach that force the signal to meet a new critical boundary conditions in Fourier domain that make the parameters of the preprocessing can be easily obtained. The simulation indicates that the mean square error (MSE) of the recovery and the convergence rate with the preprocess concept is better and faster than the one without preprocess concept. Our both proposed approaches can also be applied to other cases of signal restoration, which allow Cadzow's iterative processing method, with more convenience and flexibility.

  • Ellipse Fitting with Hyperaccuracy

    Kenichi KANATANI  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E89-D No:10
      Page(s):
    2653-2660

    For fitting an ellipse to a point sequence, ML (maximum likelihood) has been regarded as having the highest accuracy. In this paper, we demonstrate the existence of a "hyperaccurate" method which outperforms ML. This is made possible by error analysis of ML followed by subtraction of high-order bias terms. Since ML nearly achieves the theoretical accuracy bound (the KCR lower bound), the resulting improvement is very small. Nevertheless, our analysis has theoretical significance, illuminating the relationship between ML and the KCR lower bound.

  • A New Class of Binary Constant Weight Codes Derived by Groups of Linear Fractional Mappings

    Jun IMAI  Yoshinao SHIRAKI  

     
    PAPER-Coding Theory

      Vol:
    E89-A No:10
      Page(s):
    2481-2492

    Let A(n, d, w) denote the maximum possible number of code words in binary (n,d,w) constant weight codes. For smaller instances of (n, d, w)s, many improvements have occurred over the decades. However, unknown instances still remain for larger (n, d, w)s (for example, those of n > 30 and d > 10). In this paper, we propose a new class of binary constant weight codes that fill in the remaining blank instances of (n, d, w)s. Specifically, we establish several new non-trivial lower bounds such as 336 for A(64, 12, 8), etc. (listed in Table 2). To obtain these results, we have developed a new systematic technique for construction by means of groups acting on some sets. The new technique is performed by considering a triad (G, Ω, f) := ("Group G," "Set Ω," "Action f on Ω") simultaneously. Our results described in Sect. 3 are obtained by using permutations of the elements of a set that include ∞ homogeneously like the other elements, which play a role to improve their randomness. Specifically, in our examples, we adopt the following model such as (PGL2(Fq), P1(Fq), "linear fractional action of subgroups of PGL2(Fq) on P1(Fq)") as a typical construction model. Moreover, as an application, the essential examples in [7] constructed by using an alternating group are again reconstructed with our new technique of a triad model, after which they are all systematically understood in the context of finite subgroups that act fractionally on a projective space over a finite field.

  • Temporal Error Concealment Based on Weighted Pixel Estimator

    Tien-Ying KUO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E89-D No:9
      Page(s):
    2583-2586

    A temporal error concealment algorithm for the block-based video coder has been proposed. The concept of block overlapping is adopted to conceal the erroneous blocks, and the recovered pixels are estimated by the weighted sum from the overlapping. The overlapping weighting matrix has been carefully selected in order to fully exploit the spatial-temporal correlation between boundary blocks and the lost block. Furthermore, the motion vector for the lost block has been recovered by considering the best results for the overlapping. The experimental results are shown by integrating our algorithm into the H.263+ coder.

  • On Efficient Core Selection for Reducing Multicast Delay Variation under Delay Constraints

    Moonseong KIM  Young-Cheol BANG  Hyung-Jin LIM  Hyunseung CHOO  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2385-2393

    With the proliferation of multimedia group applications, the construction of multicast trees satisfying the Quality of Service (QoS) requirements is becoming a problem of the prime importance. An essential factor of these real-time application is to optimize the Delay- and delay Variation-Bounded Multicast Tree (DVBMT) problem. This problem is to satisfy the minimum delay variation and the end-to-end delay within an upper bound. The DVBMT problem is known as NP-complete problem. The representative algorithms for the problem are DVMA, DDVCA, and so on. In this paper, we show that the proposed algorithm outperforms any other algorithm. The efficiency of our algorithm is verified through the performance evaluation and the enhancement is up to about 13.5% in terms of the multicast delay variation. The time complexity of our algorithm is O(mn2) which is comparable to well known DDVCA.

  • On Linear Complexity and Schaub Bound for Cyclic Codes by Defining Sequence with Unknown Elements

    Junru ZHENG  Takayasu KAIDA  

     
    LETTER

      Vol:
    E89-A No:9
      Page(s):
    2337-2340

    The Schaub bound is one of well-known lower bounds of the minimum distance for given cyclic code C, and defined as the minimum value, which is a lower bound on rank of matrix corresponding a codeword, in defining sequence for all sub-cyclic codes of given code C. In this paper, we will try to show relationships between the Schaub bound, the Roos bound and the shift bound from numerical experiments. In order to reduce computational time for the Schaub bound, we claim one conjecture, from numerical examples in binary and ternary cases with short code length that the Schaub bound can be set the value from only defining sequence of given code C.

241-260hit(451hit)