The search functionality is under construction.

Keyword Search Result

[Keyword] construction(248hit)

121-140hit(248hit)

  • Construction of Abdominal Probabilistic Atlases and Their Value in Segmentation of Normal Organs in Abdominal CT Scans

    Hyunjin PARK  Alfred HERO  Peyton BLAND  Marc KESSLER  Jongbum SEO  Charles MEYER  

     
    PAPER-Biological Engineering

      Vol:
    E93-D No:8
      Page(s):
    2291-2301

    A good abdominal probabilistic atlas can provide important information to guide segmentation and registration applications in the abdomen. Here we build and test probabilistic atlases using 24 abdominal CT scans with available expert manual segmentations. Atlases are built by picking a target and mapping other training scans onto that target and then summing the results into one probabilistic atlas. We improve our previous abdominal atlas by 1) choosing a least biased target as determined by a statistical tool, i.e. multidimensional scaling operating on bending energy, 2) using a better set of control points to model the deformation, and 3) using higher information content CT scans with visible internal liver structures. One atlas is built in the least biased target space and two atlases are built in other target spaces for performance comparisons. The value of an atlas is assessed based on the resulting segmentations; whichever atlas yields the best segmentation performance is considered the better atlas. We consider two segmentation methods of abdominal volumes after registration with the probabilistic atlas: 1) simple segmentation by atlas thresholding and 2) application of a Bayesian maximum a posteriori method. Using jackknifing we measure the atlas-augmented segmentation performance with respect to manual expert segmentation and show that the atlas built in the least biased target space yields better segmentation performance than atlases built in other target spaces.

  • Self-Construction of Aggregation Tree for Gathering Mobile Data in Wireless Sensor Network

    Sangbin LEE  Songmin KIM  Sungjun KIM  Doohyun KO  Bumjin KIM  Sunshin AN  

     
    LETTER-Network

      Vol:
    E93-B No:5
      Page(s):
    1264-1267

    A network of sensors can be used to obtain state based data from the area in which they are deployed. To reduce costs, the data sent via intermediate sensors to a sink are often aggregated. In this letter, we introduce Self-Construction of Aggregation Tree (SCAT) scheme which uses a novel data aggregation scheme utilizing the knowledge of the mobile node and the infrastructure (static node tree) in gathering the data from the mobile node. The static nodes can construct a near- optimal aggregation tree by themselves, using the knowledge of the mobile node, which is a process similar to forming the centralized aggregation tree.

  • A Novel CPR-TDS-OFDM System for High-Speed Mobile Reception

    Linglong DAI  Jian FU  Kewu PENG  Jun WANG  Arthur ALANIZ  Zhixing YANG  

     
    LETTER-Broadcast Systems

      Vol:
    E93-B No:3
      Page(s):
    788-791

    This paper proposes a novel system called the cyclic prefix reconstructable time domain synchronous orthogonal frequency division multiplexing ( CPR-TDS-OFDM ) system, which uses a new frame structure and restores the cyclicity of the received OFDM block with low complexity. Simulation results show that the CPR-TDS-OFDM system outperforms the conventional TDS-OFDM system in high-speed fading channels.

  • On-Demand End-to-End Optical Network Construction for Grid Applications with Adaptive and Distributed Control over Multi-Domain WSONs

    Sugang XU  Weiping REN  Hiroaki HARAI  

     
    PAPER

      Vol:
    E93-B No:3
      Page(s):
    536-545

    In this paper, we address the on-demand end-to-end optical network construction problem for grid applications in new generation large-scale multi-domain wavelength switched optical networks (WSON). According to users' requests for high-performance distributed computing, groups of dedicated end-to-end lightpaths among geographically distributed grid resources can be established dynamically forming multiple-lightpath optical networks for grid applications, namely, optical grid network (OGN). To facilitate the automated OGN construction, we introduce an optical grid network infrastructure providing an integrated and self-contained OGN service to grid users with totally distributed control. In this infrastructure, for easy construction, especially in a large-scale multi-domain WSON environment, we propose an overlay approach to construct OGNs in a peer-to-peer fashion, which conceals the communication architecture of the underlying heterogeneous optical networks. In particular, we propose an adaptive construction mechanism that can develop the OGN flexibly by adapting to the dynamically changed optical network circumstance. To enable users to take the advantage of the end-to-end lightpaths of WSON directly, a wavelength-oriented end-host configuration scheme is proposed. Experimental results on a developed prototype and an optical-fibre test-bed network successfully validate the proposal.

  • Constructing and Counting Boolean Functions on Even Variables with Maximum Algebraic Immunity

    Yuan LI  Min YANG  Haibin KAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:3
      Page(s):
    640-643

    A method to construct Boolean functions with maximum algebraic immunity have been proposed in . Based on that method, we propose a different method to construct Boolean functions on even variables with maximum algebraic immunity in this letter. By counting on our construction, a lower bound of the number of such Boolean functions is derived, which is the best among all the existing lower bounds.

  • Evolutionary P2P Networking That Fuses Evolutionary Computation and P2P Networking Together

    Kei OHNISHI  Yuji OIE  

     
    PAPER-Network

      Vol:
    E93-B No:2
      Page(s):
    317-327

    In the present paper, we propose an evolutionary P2P networking technique that dynamically and adaptively optimizes several P2P network topologies, in which all of the nodes are included at the same time, in an evolutionary manner according to given evaluation criteria. In addition, through simulations, we examine whether the proposed evolutionary P2P networking technique can provide reliable search capability in dynamic P2P environments. In simulations, we assume dynamic P2P environments in which each node leaves and joins the network with its own probability and in which search objects vary with time. The simulation results show that topology reconstruction by the evolutionary P2P networking technique is better than random topology reconstruction when only a few types of search objects are present in the network at any moment and these search objects are not replicated. Moreover, for the scenario in which the evolutionary P2P networking technique is more effective, we show through simulations that when each node makes several links with other nodes in a single network topology, the evolutionary P2P networking technique improves the reliable search capability. Finally, the number of links that yields more reliable search capability appears to depend on how often nodes leave and join the network.

  • Strong Anonymous Signature

    Rui ZHANG  Hideki IMAI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:10
      Page(s):
    2487-2491

    The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the signer, if the message is hidden from the verifier. However, in many practical applications, e.g., an anonymous paper review system mentioned in [18], the message for anonymous authentication is actually known to the verifier. This implies that the effectiveness of previous anonymous signatures may be unjustified in these applications. In this paper, we extend the previous models, and develop a related primitive called strong anonymous signatures. For strong anonymous signatures, the identity of the signer remains secret even if the challenge message is chosen by an adversary. We then demonstrate some efficient constructions and prove their security in our model.

  • Autonomous Pull-Push Community Construction Technology for High-Assurance

    Khalid MAHMOOD  Xiaodong LU  Yuji HORIKOSHI  Kinji MORI  

     
    PAPER-Wireless Network

      Vol:
    E92-D No:10
      Page(s):
    1836-1846

    Location Based Services (LBS) are expected to become one of the major drivers of ubiquitous services due to recent inception of GPS-enabled mobile devices, the development of Web2.0 paradigm, and emergence of 3G broadband networks. Having this vision in mind, Community Context-attribute-oriented Collaborative Information Environment (CCCIE) based Autonomous Decentralized Community System (ADCS) is proposed to enable provision of services to specific users in specific place at specific time considering various context-attributes. This paper presents autonomous community construction technology that share service discovered by one member among others in flexible way to improve timeliness and reduce network cost. In order to meet crucial goal of real-time and context-aware community construction (provision of service/ service information to users with common interests), and defining flexible service area in highly dynamic operating environment of ADCS, proposed progressive ripple based service discovery technique introduces novel idea of snail's pace and steady advancing search followed by swift boundary confining mechanism; while service area construction shares the discovered service among members in defined area to further improve timeliness and reduce network cost. Analysis and empirical results verify the effectiveness of the proposed technique.

  • HSWIS: Hierarchical Shrink-Wrapped Iso-Surface Algorithm

    Young-Kyu CHOI  Eun-Jin PARK  

     
    LETTER-Computer Graphics

      Vol:
    E92-D No:4
      Page(s):
    757-760

    A new hierarchical isosurface reconstruction scheme from a set of tomographic cross sectional images is presented. From the input data, we construct a hierarchy of volume, called the volume pyramid, based on a 3D dilation filter. After extracting the base mesh from the volume at the coarsest level by the cell-boundary method, we iteratively fit the mesh to the isopoints representing the actual isosurface of the volume. The SWIS (Shrink-wrapped isosurface) algorithm is adopted in this process, and a mesh subdivision scheme is utilized to reconstruct fine detail of the isosurface. According to experiments, our method is proved to produce a hierarchical isosurface which can be utilized by various multiresolution algorithms such as interactive visualization and progressive transmission.

  • An Accurate Approach to Large-Scale IP Traffic Matrix Estimation

    Dingde JIANG  Guangmin HU  

     
    LETTER-Network

      Vol:
    E92-B No:1
      Page(s):
    322-325

    This letter proposes a novel method of large-scale IP traffic matrix (TM) estimation, called algebraic reconstruction technique inference (ARTI), which is based on the partial flow measurement and Fratar model. In contrast to previous methods, ARTI can accurately capture the spatio-temporal correlations of TM. Moreover, ARTI is computationally simple since it uses the algebraic reconstruction technique. We use the real data from the Abilene network to validate ARTI. Simulation results show that ARTI can accurately estimate large-scale IP TM and track its dynamics.

  • On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes

    Todorka ALEXANDROVA  Hiroyoshi MORITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2138-2150

    Constructing ideal (t,n) threshold secret sharing schemes leads to some limitations on the maximum number of users, that are able to join the secret sharing scheme. We aim to remove these limitations by reducing the information rate of the constructed threshold secret sharing schemes. In this paper we propose recursive construction algorithms of (t,n) threshold secret sharing schemes, based on the generalized vector space construction. Using these algorithms we are able to construct a (t,n) threshold secret sharing scheme for any arbitrary n.

  • A New Matrix Method for Reconstruction of Band-Limited Periodic Signals from the Sets of Integrated Values

    Predrag PETROVIC  

     
    PAPER-Digital Signal Processing

      Vol:
    E91-A No:6
      Page(s):
    1446-1454

    This paper presents a new method for reconstruction of trigonometric polynomials, a specific class of bandlimited signals, from a number of integrated values of input signals. It is applied in signal reconstruction, spectral estimation, system identification, as well as in other important signal processing problems. The proposed method of processing can be used for precise rms measurements of periodic signal (or power and energy) based on the presented signal reconstruction. Based on the value of the integral of the original input (analogue) signal, with a known frequency spectrum but unknown amplitudes and phases, a reconstruction of its basic parameters is done by the means of derived analytical and summarized expressions. Subsequent calculation of all relevant indicators related to the monitoring and processing of ac voltage and current signals is provided in this manner. Computer simulation demonstrating the precision of these algorithms. We investigate the errors related to the signal reconstruction, and provide an error bound around the reconstructed time domain waveform.

  • Automatic Acronym Dictionary Construction Based on Acronym Generation Types

    Yeo-Chan YOON  So-Young PARK  Young-In SONG  Hae-Chang RIM  Dae-Woong RHEE  

     
    LETTER-Natural Language Processing

      Vol:
    E91-D No:5
      Page(s):
    1584-1587

    In this paper, we propose a new model of automatically constructing an acronym dictionary. The proposed model generates possible acronym candidates from a definition, and then verifies each acronym-definition pair with a Naive Bayes classifier based on web documents. In order to achieve high dictionary quality, the proposed model utilizes the characteristics of acronym generation types: a syllable-based generation type, a word-based generation type, and a mixed generation type. Compared with a previous model recognizing an acronym-definition pair in a document, the proposed model verifying a pair in web documents improves approximately 50% recall on obtaining acronym-definition pairs from 314 Korean definitions. Also, the proposed model improves 7.25% F-measure on verifying acronym-definition candidate pairs by utilizing specialized classifiers with the characteristics of acronym generation types.

  • Image Enlargement by Nonlinear Frequency Extrapolation with Morphological Operators

    Masayuki SHIMIZU  Makoto NAKASHIZUKA  Youji IIGUNI  

     
    PAPER-Image

      Vol:
    E91-A No:3
      Page(s):
    859-867

    In this paper, we propose an image enlargement method by using morphological operators. Our enlargement method is based on the nonlinear frequency extrapolation method (Greenspan et al., 2000) by using a Laplacian pyramid image representation. In this method, the sampling process of input images is modeled as the Laplacian pyramid. A high resolution image is obtained with the finer scale Laplacian that is extrapolated by a nonlinear operation from a low resolution Laplacian. In this paper, we propose a novel nonlinear operation for extrapolation of the finer scale Laplacian. Our nonlinear operation is realized by morphological operators and is capable of generating the finer scale Laplacian, the amplitude of which is proportional to contrasts of edges that appear in the low resolution image. In experiments, the enlargement results given by the proposed method are demonstrated. Compared with the Greenspan's method, the proposed method can recover sharp intensity transients of image edges with small artifacts.

  • Side Channel Attacks against Hash-Based MACs with PGV Compression Functions

    Katsuyuki OKEYA  

     
    PAPER-Side Channel Attacks

      Vol:
    E91-A No:1
      Page(s):
    168-175

    HMAC is one of the most famous keyed hash functions, and widely utilized. In order to design secure hash functions, we often use PGV construction consisting of 64 schemes, each of which utilizes a block cipher. If the underlying block cipher is ideal, 12 schemes are proven to be secure. In this paper, we evaluate the security of these schemes in view of side channel attacks. As it turns out, HMACs based on 11 out of 12 secure PGV schemes are vulnerable to side channel attacks, even if the underlying block cipher is secure against side channel attacks. These schemes are classified into two groups based on their vulnerabilities. For the first group which contains 8 schemes, we show that the attacker can reveal the whole key of HMAC, and selectively forge in consequence. For the other group which contains 3 schemes, we specify the importance of the execution sequence for the inner operations of the scheme, and refine it. If wrong orders of operations are used, the attacker can reveal a portion of the key of HMAC. Hence, the use of HMACs based on such PGV schemes as they are is not recommended when the resistance against side channel attacks is necessary.

  • Shrink-Wrapped Isosurface from Cross Sectional Images

    Young Kyu CHOI  James K. HAHN  

     
    PAPER-Computer Graphics

      Vol:
    E90-D No:12
      Page(s):
    2070-2076

    This paper addresses a new surface reconstruction scheme for approximating the isosurface from a set of tomographic cross sectional images. Differently from the novel Marching Cubes (MC) algorithm, our method does not extract the iso-density surface (isosurface) directly from the voxel data but calculates the iso-density point (isopoint) first. After building a coarse initial mesh approximating the ideal isosurface by the cell-boundary representation, it metamorphoses the mesh into the final isosurface by a relaxation scheme, called shrink-wrapping process. Compared with the MC algorithm, our method is robust and does not make any cracks on surface. Furthermore, since it is possible to utilize lots of additional isopoints during the surface reconstruction process by extending the adjacency definition, theoretically the resulting surface can be better in quality than the MC algorithm. According to experiments, it is proved to be very robust and efficient for isosurface reconstruction from cross sectional images.

  • An Iterative Cyclic Prefix Reconstruction Technique for Multi-Antenna Single-Carrier Transmission Systems over Multipath Wireless Channels

    Min-Sung KIM  Jong-Bu LIM  Gi-Hong IM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:11
      Page(s):
    3208-3215

    In this paper, an efficient cyclic prefix reconstruction (CPR) technique with turbo equalization is developed for multi-antenna single-carrier frequency-domain equalization (SC-FDE) systems, which are for multi-input multi-output (MIMO), space-time block code (STBC), and space-frequency block code (SFBC) applications. The proposed method includes pre-processing estimation (PPE), weighted interblock interference cancellation (WIBIC), or residual intercarrier interference suppression (RICIS). PPE is employed to compute initial values of MIMO turbo equalization and the WIBIC is developed to cancel interblock interference (IBI) at the initial iteration of the CPR for STBC SC-FDE. RICIS is used to mitigate residual intercarrier interference (ICI) after each iteration of the CPR. By applying the proposed method to the multi-antenna SC-FDE system with insufficient cyclic prefix (CP), we can significantly improve its error performance, obtaining the benefits of spectral efficiency gain and multiplexing/diversity gain in MIMO/STBC/SFBC.

  • A Generalization of the Parallel Error Correcting Codes by Allowing Some Random Errors

    Hideki YAGI  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER

      Vol:
    E90-A No:9
      Page(s):
    1745-1753

    This paper generalizes parallel error correcting codes proposed by Ahlswede et al. over a new type of multiple access channel called parallel error channel. The generalized parallel error correcting codes can handle with more errors compared with the original ones. We show construction methods of independent and non-independent parallel error correcting codes and decoding methods. We derive some bounds about the size of respective parallel error correcting codes. The obtained results imply a single parallel error correcting code can be constructed by two or more kinds of error correcting codes with distinct error correcting capabilities.

  • POCS-Based Texture Reconstruction Method Using Clustering Scheme by Kernel PCA

    Takahiro OGAWA  Miki HASEYAMA  

     
    PAPER

      Vol:
    E90-A No:8
      Page(s):
    1519-1527

    A new framework for reconstruction of missing textures in digital images is introduced in this paper. The framework is based on a projection onto convex sets (POCS) algorithm including a novel constraint. In the proposed method, a nonlinear eigenspace of each cluster obtained by classification of known textures within the target image is applied to the constraint. The main advantage of this approach is that the eigenspace can approximate the textures classified into the same cluster in the least-squares sense. Furthermore, by monitoring the errors converged by the POCS algorithm, a selection of the optimal cluster to reconstruct the target texture including missing intensities can be achieved. This POCS-based approach provides a solution to the problem in traditional methods of not being able to perform the selection of the optimal cluster due to the missing intensities within the target texture. Consequently, all of the missing textures are successfully reconstructed by the selected cluster's eigenspaces which correctly approximate the same kinds of textures. Experimental results show subjective and quantitative improvement of the proposed reconstruction technique over previously reported reconstruction techniques.

  • Image Magnification by a Compact Method with Preservation of Preferential Components

    Akira HIRABAYASHI  

     
    PAPER

      Vol:
    E90-A No:8
      Page(s):
    1534-1541

    Bicubic interpolation is one of the standard approaches for image magnification since it can be easily computed and does not require a priori knowledge nor a complicated model. In spite of such convenience, the images enlarged by bicubic interpolation are blurry, in particular for large magnification factors. This may be explained by four constraints of bicubic interpolation. Hence, by relaxing or replacing the constraints, we propose a new magnification method, which performs better than bicubic interpolation, but retains its compactness. One of the constraints is about criterion, which we replace by a criterion requiring that all pixel values are reproduced and preferential components in input images are perfectly reconstructed. We show that, by choosing the low frequency components or edge enhancement components in the DCT basis as the preferential components, the proposed method performs better than bicubic interpolation, with the same, or even less amount of computation.

121-140hit(248hit)