The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] character(392hit)

141-160hit(392hit)

  • Inferring Network Impact Factors: Applying Mixed Distribution to Measured RTTs

    Yasuhiro SATO  Shingo ATA  Ikuo OKA  Chikato FUJIWARA  

     
    PAPER-Network

      Vol:
    E92-B No:4
      Page(s):
    1233-1243

    The end-to-end round trip time (RTT) is one of the most important communication characteristics for Internet applications. From the viewpoint of network operators, RTT may also become one of the important metrics to understand the network conditions. Given this background, we should know how a factor such as a network incident influences RTTs. It is obvious that two or more factors may interfere in the observed delay characteristics, because packet transmission delays in the Internet are strongly dependent on the time-variant condition of the network. In this paper, we propose a modeling method by using mixed distribution which enables us to express delay characteristic more accurately where two or more factors exist together. And, we also propose an inferring method of network behavior by decomposition of the mixed distribution based on modeling results. Furthermore, in experiments we investigate the influence caused by each network impact factor independently. Our proposed method can presume the events that occur in a network from the measurements of RTTs by using the decomposition of the mixed distribution.

  • Probabilistic Synthesis of Personal-Style Handwriting

    Hyunil CHOI  Jin Hyung KIM  

     
    PAPER-Pattern Recognition

      Vol:
    E92-D No:4
      Page(s):
    653-661

    The goal of personal-style handwriting synthesis is to produce texts in the same style as an individual writer by analyzing the writer's samples of handwriting. The difficulty of handwriting synthesis is that the output should have the characteristics of the person's handwriting as well as looking natural, based on a limited number of available examples. We develop a synthesis algorithm which produces handwriting that exhibits naturalness based on the probabilistic character model.

  • A Construction of Binary Cyclotomic Sequences Using Extension Fields

    Zhixiong CHEN  Xiaoni DU  Rong SUN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:2
      Page(s):
    663-667

    Based on the cyclotomy classes of extension fields, a family of binary cyclotomic sequences are constructed and their pseudorandom measures (i.e., the well-distribution measure and the correlation measure of order k) are estimated using certain exponential sums. A lower bound on the linear complexity profile is also presented in terms of the correlation measure.

  • Character Projection Mask Set Optimization for Enhancing Throughput of MCC Projection Systems

    Makoto SUGIHARA  Yusuke MATSUNAGA  Kazuaki MURAKAMI  

     
    PAPER-Physical Level Design

      Vol:
    E91-A No:12
      Page(s):
    3451-3460

    Character projection (CP) lithography is utilized for maskless lithography and is a potential for the future photomask manufacture because it can project ICs much faster than point beam projection or variable-shaped beam (VSB) projection. In this paper, we first present a projection mask set development methodology for multi-column-cell (MCC) systems, in which column-cells can project patterns in parallel with the CP and VSB lithographies. Next, we present an INLP (integer nonlinear programming) model as well as an ILP (integer linear programming) model for optimizing a CP mask set of an MCC projection system so that projection time is reduced. The experimental results show that our optimization has achieved 33.4% less projection time in the best case than a naive CP mask development approach. The experimental results indicate that our CP mask set optimization method has virtually increased cell pattern objects on CP masks and has decreased VSB projection so that it has achieved higher projection throughput than just parallelizing two column-cells with conventional CP masks.

  • Contract Specification in Java: Classification, Characterization, and a New Marker Method

    Chien-Tsun CHEN  Yu Chin CHENG  Chin-Yun HSIEH  

     
    PAPER-Fundamentals of Software and Theory of Programs

      Vol:
    E91-D No:11
      Page(s):
    2685-2692

    Design by Contract (DBC), originated in the Eiffel programming language, is generally accepted as a practical method for building reliable software. Currently, however, few languages have built-in support for it. In recent years, several methods have been proposed to support DBC in Java. We compare eleven DBC tools for Java by analyzing their impact on the developer's programming activities, which are characterized by seven quality attributes identified in this paper. It is shown that each of the existing tools fails to achieve some of the quality attributes. This motivates us to develop ezContract, an open source DBC tool for Java that achieves all of the seven quality attributes. ezContract achieves streamlined integration with the working environment. Notably, standard Java language is used and advanced IDE features that work for standard Java programs can also work for the contract-enabled programs. Such features include incremental compilation, automatic refactoring, and code assist.

  • Device Characterization of Thin-Film Phototransistors for Photosensor Applications

    Mutsumi KIMURA  Yoshitaka NISHIZAKI  Takehiko YAMASHITA  Takehiro SHIMA  Tomohisa HACHIDA  

     
    INVITED PAPER

      Vol:
    E91-C No:10
      Page(s):
    1557-1563

    Two types of thin-film phototransistors (TFPTs), p/i/n TFPT and n/i/n TFPT, are characterized from the viewpoint of operation condition and device behavior. It is found that the detected current can be both independent of the applied voltage (Vapply) and linearly dependent on the photo-illuminance in the saturation region of the p/i/n TFPT. This characteristic is because even if Vapply increases, the depletion layer remains in the whole intrinsic region, and the electric field changes only near the p-type/intrinsic interface and intrinsic/n-type interface but remains in the most intrinsic region. This characteristic is preferable for some kinds of photosensor applications. Finally, an application example of the p/i/n TFPT, artificial retina, is introduced.

  • An Illumination-Adaptive Colorimetric Measurement Using Color Image Sensor

    Sung-Hak LEE  Jong-Hyub LEE  Kyu-Ik SOHNG  

     
    LETTER

      Vol:
    E91-C No:10
      Page(s):
    1608-1610

    An image sensor for a use of colorimeter is characterized based on the CIE standard colorimetric observer. We use the method of least squares to derive a colorimetric characterization matrix between RGB output signals and CIE XYZ tristimulus values. This paper proposes an adaptive measuring method to obtain the chromaticity of colored scenes and illumination through a 33 camera transfer matrix under a certain illuminant. Camera RGB outputs, sensor status values, and photoelectric characteristic are used to obtain the chromaticity. Experimental results show that the proposed method is valid in the measuring performance.

  • Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing

    Toshiya NAKAJIMA  Tetsuya IZU  Tsuyoshi TAKAGI  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2379-2386

    The ηT pairing for supersingular elliptic curves over GF(3m) has been paid attention because of its computational efficiency. Since most computation parts of the ηT pairing are GF(3m) multiplications, it is important to improve the speed of the multiplication when implementing the ηT pairing. In this paper we investigate software implementation of GF(3m) multiplication and propose using irreducible trinomials xm+axk+b over GF(3) such that k is a multiple of w, where w is the bit length of the word of targeted CPU. We call the trinomials "reduction optimal trinomials (ROTs)." ROTs actually exist for several m's and for typical values of w = 16 and 32. We list them for extension degrees m = 97, 167, 193, 239, 317, and 487. These m's are derived from security considerations. Using ROTs, we are able to implement efficient modulo operations (reductions) for GF(3m) multiplication compared with cases in which other types of irreducible trinomials are used (e.g., trinomials with a minimum k for each m). The reason for this is that for cases using ROTs, the number of shift operations on multiple precision data is reduced to less than half compared with cases using other trinomials. Our implementation results show that programs of reduction specialized for ROTs are 20-30% faster on 32-bit CPU and approximately 40% faster on 16-bit CPU compared with programs using irreducible trinomials with general k.

  • Leakage Current and Floating Gate Capacitor Matching Test

    Weidong TIAN  Joe R. TROGOLO  Bob TODD  

     
    INVITED PAPER

      Vol:
    E91-C No:8
      Page(s):
    1315-1320

    Capacitor mismatch is an important device parameter for precision analog applications. In the last ten years, the floating gate measurement technique has been widely used for its characterization. In this paper we describe the impact of leakage current on the technique. The leakage can come from, for example, thin gate oxide MOSFETs or high dielectric constant capacitors in advanced technologies. SPICE simulation, bench measurement, analytical model and numerical analyses are presented to illustrate the problem and key contributing factors. Criteria for accurate capacitor systematic and random mismatch characterization are developed, and practical methods of increasing measurement accuracy are discussed.

  • Analysis and Optimization for a Contactor with Feedback Controlled Magnet System

    Yingyi LIU  Degui CHEN  Chunping NIU  Liang JI  Weixiong TONG  

     
    PAPER-Contactors & Circuit Breakers

      Vol:
    E91-C No:8
      Page(s):
    1273-1279

    In the optimum design of AC contactors, it is important to analyze the dynamic behavior. Moreover, movable contact and core bounces have remarkable effect on the lifetime of contactors. According to a new kind of contactor with feedback controlled magnet system, this paper builds two different sets of periodically inter-transferred equations to obtain the dynamic characteristics of the contactor. The equations describe the coupling of the electric circuit, electromagnetic field and mechanical system taking account of the influence of friction. Then, the paper gives an optimum design to the dimension and the duty ratio of the contactor' pulse modulated wave (PWM) under different exciting, and proves, by experiment and simulation, that the bounce time of the contactor working in the optimized duty ratio is much less than that of the general AC contactors.

  • Detection of Leak Location in a Pipeline by Acoustic Signal

    Umut YUNUS  Masaru TSUNASAKI  Yiwei HE  Masanobu Kominami   Katsumi YAMASHITA  

     
    PAPER-Engineering Acoustics

      Vol:
    E91-A No:8
      Page(s):
    2053-2061

    Gas or water leaks in pipes that are buried under ground or that are situated in the walls of buildings may occur due to aging or unpredictable accidents, such as earthquakes. Therefore, the detection of leaks in pipes is an important task and has been investigated extensively. In the present paper, we propose a novel leak detection method by means of acoustic wave. We inject an acoustic chirp signal into a target pipeline and then estimate the leak location from the delay time of the compressed pulse by passing the reflected signal through a correlator. In order to distinguish a leak reflection in a complicated pipeline arrangement, the reflection characteristics of leaks are carefully discussed by numerical simulations and experiments. There is a remarkable difference in the reflection characteristics between the leak and other types of discontinuity, and the property can be utilized to distinguish the leak reflection. The experimental results show that, even in a complicated pipe arrangement including bends and branches, the proposed approach can successfully implement the leak detection. Furthermore, the proposed approach has low cost and is easy to implement because only a personal computer and some commonly equipment are required.

  • High Resolution DOA Estimation Using Unwrapped Phase Information of MUSIC-Based Noise Subspace

    Koichi ICHIGE  Kazuhiko SAITO  Hiroyuki ARAI  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1990-1999

    This paper presents a high resolution Direction-Of-Arrival (DOA) estimation method using unwrapped phase information of MUSIC-based noise subspace. Superresolution DOA estimation methods such as MUSIC, Root-MUSIC and ESPRIT methods are paid great attention because of their brilliant properties in estimating DOAs of incident signals. Those methods achieve high accuracy in estimating DOAs in a good propagation environment, but would fail to estimate DOAs in severe environments like low Signal-to-Noise Ratio (SNR), small number of snapshots, or when incident waves are coming from close angles. In MUSIC method, its spectrum is calculated based on the absolute value of the inner product between array response and noise eigenvectors, means that MUSIC employs only the amplitude characteristics and does not use any phase characteristics. Recalling that phase characteristics plays an important role in signal and image processing, we expect that DOA estimation accuracy could be further improved using phase information in addition to MUSIC spectrum. This paper develops a procedure to obtain an accurate spectrum for DOA estimation using unwrapped and differentiated phase information of MUSIC-based noise subspace. Performance of the proposed method is evaluated through computer simulation in comparison with some conventional estimation methods.

  • RF Equivalent-Circuit Analysis of p-Type Diamond Field-Effect Transistors with Hydrogen Surface Termination

    Makoto KASU  Kenji UEDA  Hiroyuki KAGESHIMA  Yoshiharu YAMAUCHI  

     
    PAPER-Wide Bandgap Devices

      Vol:
    E91-C No:7
      Page(s):
    1042-1049

    On the basis of the RF characteristics of p-type diamond field-effect transistors (FETs) with hydrogen surface termination, we establish an equivalent circuit (EQC) model. From comparisons of three cases we reveal that to represent the device performance in the EQC, the source, gate, and drain resistance should be considered but that the gate-source and gate-drain resistance can be ignored. The features of diamond FETs are (1) a plateau of the gate capacitance in a certain gate voltage range. (2) maximum fT and fMAX cut-off frequencies near the threshold gate voltage, and (3) a high fMAX/fT ratio 3.8. We discuss these features in terms of the energy barrier between the gate metal and the two-dimensional hole channel and drift region below the gate.

  • Compensation Effect of Quasi-Inverse Filter (QIF) on Frequency Characteristic Distortion in Wideband Systems

    Mitoshi FUJIMOTO  Haiyan ZHAO  Toshikazu HORI  

     
    PAPER-Antennas

      Vol:
    E91-B No:6
      Page(s):
    1783-1790

    High-speed wireless communication systems have attracted much attention in recent years. To achieve a high-speed wireless communication system that utilizes an ultra-wide-frequency band, a broadband antenna is required. However, it is difficult to obtain an antenna that has uniform characteristics in a broad frequency band. Moreover, propagation characteristics are distorted in a multi-path environment. Thus, the communication quality tends to degrade due to the distortion in the frequency characteristics of the wideband communication system. This paper proposes a quasi-inverse filter (QIF) to improve the compensation effect for the transmitter antenna. Furthermore, we propose a method that employs the newly developed QIF that compensates for frequency characteristic distortion. We evaluate different configurations for the compensation system employing a pre-filter and post-filter in the wideband communication system. The effectiveness of the QIF in the case of severe distortion is verified by computer simulation. The proposed method is applied to a disc monopole antenna as a concrete example of a broadband antenna, and the compensation effect for the antenna is indicated.

  • Polynomial Time Identification of Strict Deterministic Restricted One-Counter Automata in Some Class from Positive Data

    Mitsuo WAKATSUKI  Etsuji TOMITA  

     
    PAPER-Algorithm Theory

      Vol:
    E91-D No:6
      Page(s):
    1704-1718

    A deterministic pushdown automaton (dpda) having just one stack symbol is called a deterministic restricted one-counter automaton (droca). When it accepts an input by empty stack, it is called strict. This paper is concerned with a subclass of real-time strict droca's, called Szilard strict droca's, and studies the problem of identifying the subclass in the limit from positive data. The class of languages accepted by Szilard strict droca's coincides with the class of Szilard languages (or, associated languages) of strict droca's and is incomparable to each of the class of regular languages and that of simple languages. After providing some properties of languages accepted by Szilard strict droca's, we show that the class of Szilard strict droca's is polynomial time identifiable in the limit from positive data in the sense of Yokomori. This identifiability is proved by giving an exact characteristic sample of polynomial size for a language accepted by a Szilard strict droca. The class of very simple languages, which is a proper subclass of simple languages, is also proved to be polynomial time identifiable in the limit from positive data by Yokomori, but it is yet unknown whether there exists a characteristic sample of polynomial size for any very simple language.

  • Calculating Inverse Filters for Speech Dereverberation

    Masato MIYOSHI  Marc DELCROIX  Keisuke KINOSHITA  

     
    INVITED PAPER

      Vol:
    E91-A No:6
      Page(s):
    1303-1309

    Speech dereverberation is one of the most difficult tasks in acoustic signal processing. Of the various problems involved in this task, this paper highlights "over-whitening," which flattens the characteristics of recovered speech. This distortion sometimes happens when inverse filters are directly calculated from microphone signals. This paper reviews two studies related to this problem. The first study shows the possibility of compensating for such over-whitening to achieve precise speech-dereverberation. The second study presents a new approach for approximating the original speech by removing the effect of late reflections from observed reverberant speech.

  • Instant Casting Movie Theater: The Future Cast System

    Akinobu MAEJIMA  Shuhei WEMLER  Tamotsu MACHIDA  Masao TAKEBAYASHI  Shigeo MORISHIMA  

     
    PAPER-Computer Graphics

      Vol:
    E91-D No:4
      Page(s):
    1135-1148

    We have developed a visual entertainment system called "Future Cast" which enables anyone to easily participate in a pre-recorded or pre-created film as an instant CG movie star. This system provides audiences with the amazing opportunity to join the cast of a movie in real-time. The Future Cast System can automatically perform all the processes required to make this possible, from capturing participants' facial characteristics to rendering them into the movie. Our system can also be applied to any movie created using the same production process. We conducted our first experimental trial demonstration of the Future Cast System at the Mitsui-Toshiba pavilion at the 2005 World Exposition in Aichi Japan.

  • Automatic Language Identification with Discriminative Language Characterization Based on SVM

    Hongbin SUO  Ming LI  Ping LU  Yonghong YAN  

     
    PAPER-Language Identification

      Vol:
    E91-D No:3
      Page(s):
    567-575

    Robust automatic language identification (LID) is the task of identifying the language from a short utterance spoken by an unknown speaker. The mainstream approaches include parallel phone recognition language modeling (PPRLM), support vector machine (SVM) and the general Gaussian mixture models (GMMs). These systems map the cepstral features of spoken utterances into high level scores by classifiers. In this paper, in order to increase the dimension of the score vector and alleviate the inter-speaker variability within the same language, multiple data groups based on supervised speaker clustering are employed to generate the discriminative language characterization score vectors (DLCSV). The back-end SVM classifiers are used to model the probability distribution of each target language in the DLCSV space. Finally, the output scores of back-end classifiers are calibrated by a pair-wise posterior probability estimation (PPPE) algorithm. The proposed language identification frameworks are evaluated on 2003 NIST Language Recognition Evaluation (LRE) databases and the experiments show that the system described in this paper produces comparable results to the existing systems. Especially, the SVM framework achieves an equal error rate (EER) of 4.0% in the 30-second task and outperforms the state-of-art systems by more than 30% relative error reduction. Besides, the performances of proposed PPRLM and GMMs algorithms achieve an EER of 5.1% and 5.0% respectively.

  • Segmentation of On-Line Freely Written Japanese Text Using SVM for Improving Text Recognition

    Bilan ZHU  Masaki NAKAGAWA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E91-D No:1
      Page(s):
    105-113

    This paper describes a method of producing segmentation point candidates for on-line handwritten Japanese text by a support vector machine (SVM) to improve text recognition. This method extracts multi-dimensional features from on-line strokes of handwritten text and applies the SVM to the extracted features to produces segmentation point candidates. We incorporate the method into the segmentation by recognition scheme based on a stochastic model which evaluates the likelihood composed of character pattern structure, character segmentation, character recognition and context to finally determine segmentation points and recognize handwritten Japanese text. This paper also shows the details of generating segmentation point candidates in order to achieve high discrimination rate by finding the optimal combination of the segmentation threshold and the concatenation threshold. We compare the method for segmentation by the SVM with that by a neural network (NN) using the database HANDS-Kondate_t_bf-2001-11 and show the result that the method by the SVM bring about a better segmentation rate and character recognition rate.

  • BDD Representation for Incompletely Specified Multiple-Output Logic Functions and Its Applications to the Design of LUT Cascades

    Munehiro MATSUURA  Tsutomu SASAO  

     
    PAPER-Logic Synthesis and Verification

      Vol:
    E90-A No:12
      Page(s):
    2762-2769

    A multiple-output function can be represented by a binary decision diagram for characteristic function (BDD_for_CF). This paper presents a method to represent multiple-output incompletely specified functions using BDD_for_CFs. An algorithm to reduce the widths of BDD_for_CFs is presented. This method is useful for decomposition of incompletely specified multiple-output functions. Experimental results for radix converters, adders, a multiplier, and lists of English words show that this method is useful for the synthesis of LUT cascades. An implementation of English words list by LUT cascades and an auxiliary memory is also shown.

141-160hit(392hit)