The search functionality is under construction.

Keyword Search Result

[Keyword] deviation(28hit)

1-20hit(28hit)

  • Dynamic Limited Variable Step-Size Algorithm Based on the MSD Variation Cost Function Open Access

    Yufei HAN  Jiaye XIE  Yibo LI  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2023/09/11
      Vol:
    E107-A No:6
      Page(s):
    919-922

    The steady-state and convergence performances are important indicators to evaluate adaptive algorithms. The step-size affects these two important indicators directly. Many relevant scholars have also proposed some variable step-size adaptive algorithms for improving performance. However, there are still some problems in these existing variable step-size adaptive algorithms, such as the insufficient theoretical analysis, the imbalanced performance and the unachievable parameter. These problems influence the actual performance of some algorithms greatly. Therefore, we intend to further explore an inherent relationship between the key performance and the step-size in this paper. The variation of mean square deviation (MSD) is adopted as the cost function. Based on some theoretical analyses and derivations, a novel variable step-size algorithm with a dynamic limited function (DLF) was proposed. At the same time, the sufficient theoretical analysis is conducted on the weight deviation and the convergence stability. The proposed algorithm is also tested with some typical algorithms in many different environments. Both the theoretical analysis and the experimental result all have verified that the proposed algorithm equips a superior performance.

  • Improving Seeded k-Means Clustering with Deviation- and Entropy-Based Term Weightings

    Uraiwan BUATOOM  Waree KONGPRAWECHNON  Thanaruk THEERAMUNKONG  

     
    PAPER

      Pubricized:
    2020/01/08
      Vol:
    E103-D No:4
      Page(s):
    748-758

    The outcome of document clustering depends on the scheme used to assign a weight to each term in a document. While recent works have tried to use distributions related to class to enhance the discrimination ability. It is worth exploring whether a deviation approach or an entropy approach is more effective. This paper presents a comparison between deviation-based distribution and entropy-based distribution as constraints in term weighting. In addition, their potential combinations are investigated to find optimal solutions in guiding the clustering process. In the experiments, the seeded k-means method is used for clustering, and the performances of deviation-based, entropy-based, and hybrid approaches, are analyzed using two English and one Thai text datasets. The result showed that the deviation-based distribution outperformed the entropy-based distribution, and a suitable combination of these distributions increases the clustering accuracy by 10%.

  • Robust Sparse Signal Recovery in Impulsive Noise Using Bayesian Methods

    Jinyang SONG  Feng SHEN  Xiaobo CHEN  Di ZHAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:1
      Page(s):
    273-278

    In this letter, robust sparse signal recovery is considered in the presence of heavy-tailed impulsive noise. Two Bayesian approaches are developed where a Bayesian framework is constructed by utilizing the Laplace distribution to model the noise. By rewriting the noise-fitting term as a reweighted quadratic function which is optimized in the sparse signal space, the Type I Maximum A Posteriori (MAP) approach is proposed. Next, by exploiting the hierarchical structure of the sparse prior and the likelihood function, we develop the Type II Evidence Maximization approach optimized in the hyperparameter space. The numerical results verify the effectiveness of the proposed methods in the presence of impulsive noise.

  • Evaluation of Overflow Probability of Bayes Code in Moderate Deviation Regime

    Shota SAITO  Toshiyasu MATSUSHIMA  

     
    LETTER-Shannon Theory

      Vol:
    E100-A No:12
      Page(s):
    2728-2731

    This letter treats the problem of lossless fixed-to-variable length source coding in moderate deviation regime. We investigate the behavior of the overflow probability of the Bayes code. Our result clarifies that the behavior of the overflow probability of the Bayes code is similar to that of the optimal non-universal code for i.i.d. sources.

  • Design Differences in Pedestrian Navigation Systems Depending on the Availability of Carriable Navigation Information

    Tetsuya MANABE  Takaaki HASEGAWA  

     
    PAPER-Intelligent Transport System

      Vol:
    E100-A No:5
      Page(s):
    1197-1205

    In this paper, the differences in navigation information design, which is important for kiosk-type pedestrian navigation systems, were experimentally examined depending on presence or absence of carriable navigation information in order to acquire the knowledge to contribute design guidelines of kiosk-type pedestrian navigation systems. In particular, we used route complexity information calculated using a regression equation that contained multiple factors. In the absence of carriable navigation information, both the destination arrival rate and route deviation rate improved. Easy routes were designed as M (17 to 39 characters in Japanese), while complicated routes were denoted as L (40 or more characters in Japanese). On the contrary, in the presence of carriable navigation information, the user's memory load was found to be reduced by carrying the same navigation information as kiosk-type terminals. Thus, the reconsideration of kiosk-type pedestrian navigation systems design, e.g., the means of presenting navigation information, is required. For example, if the system attaches importance to a high destination arrival rate, L_Carrying without regard to route complexity is better. If the system attaching importance to the low route deviation rate, M_Carrying in the case of easy routes and L_Carrying in the case of complicated routes have been better. Consequently, this paper presents the differences in the designs of pedestrian navigation systems depending on whether carriable navigation information is absent or present.

  • Estimating Head Orientation Using a Combination of Multiple Cues

    Bima Sena Bayu DEWANTARA  Jun MIURA  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2016/03/03
      Vol:
    E99-D No:6
      Page(s):
    1603-1614

    This paper proposes an appearance-based novel descriptor for estimating head orientation. Our descriptor is inspired by the Weber-based feature, which has been successfully implemented for robust texture analysis, and the gradient which performs well for shape analysis. To further enhance the orientation differences, we combine them with an analysis of the intensity deviation. The position of a pixel and its intrinsic intensity are also considered. All features are then composed as a feature vector of a pixel. The information carried by each pixel is combined using a covariance matrix to alleviate the influence caused by rotations and illumination. As the result, our descriptor is compact and works at high speed. We also apply a weighting scheme, called Block Importance Feature using Genetic Algorithm (BIF-GA), to improve the performance of our descriptor by selecting and accentuating the important blocks. Experiments on three head pose databases demonstrate that the proposed method outperforms the current state-of-the-art methods. Also, we can extend the proposed method by combining it with a head detection and tracking system to enable it to estimate human head orientation in real applications.

  • Software Abnormal Behavior Detection Based on Function Semantic Tree

    Yingxu LAI  Wenwen ZHANG  Zhen YANG  

     
    PAPER-Software System

      Pubricized:
    2015/07/03
      Vol:
    E98-D No:10
      Page(s):
    1777-1787

    Current software behavior models lack the ability to conduct semantic analysis. We propose a new model to detect abnormal behaviors based on a function semantic tree. First, a software behavior model in terms of state graph and software function is developed. Next, anomaly detection based on the model is conducted in two main steps: calculating deviation density of suspicious behaviors by comparison with state graph and detecting function sequence by function semantic rules. Deviation density can well detect control flow attacks by a deviation factor and a period division. In addition, with the help of semantic analysis, function semantic rules can accurately detect application layer attacks that fail in traditional approaches. Finally, a case study of RSS software illustrates how our approach works. Case study and a contrast experiment have shown that our model has strong expressivity and detection ability, which outperforms traditional behavior models.

  • Balance Differential Coherent Bit Synchronization Algorithm for GNSS Receiver

    Dengyun LEI  Weijun LU  Yanbin ZHANG  Dunshan YU  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E98-B No:6
      Page(s):
    1133-1140

    Due to low signal-to-carrier ratio and high dynamic, the frequency deviation affects the bit synchronization in GNSS receiver. This paper proposes a balance differential coherent bit synchronization algorithm, which uses the differential coherent method to eliminate the influence of the frequency deviation. By enlarging the differential distance, the proposed algorithm achieves higher bit synchronization rates. Combining two complementary differential coherent parts, the proposed algorithm avoids the unbalance problem and the attenuation of accumulation. Furthermore, a general architecture is presented to reduce the system complexity. Experimental results show that the proposed algorithm improves the sensitivity of bit synchronization by 3∼7dB compared with the previous method.

  • Unambiguous Tracking Method Based on a New Combination Function for BOC Signals

    Lan YANG  Zulin WANG  Qin HUANG  Lei ZHAO  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E97-B No:4
      Page(s):
    923-929

    The auto-correlation function (ACF) of Binary Offset Carrier (BOC) modulated signals has multiple peaks which raise the problem of ambiguity in acquisition and tracking. In this paper, the ACF is split into several sub-correlation functions (SCFs) through dividing the integration period of ACF into several partials. Then a pseudo correlation function (PCF) is constructed from the SCFs through a combination function to eliminate all side-peaks. The unambiguous tracking method based on the PCF achieves better code phase tracking accuracy than the conventional methods in AWGN environment. It only requires half computation cost of Bump-Jumping (BJ) and nearly quarter of Double-Estimator, although offers slightly less accurate tracking than BJ and Double-Estimator in multi-path environment. Moreover, this method suits all kinds of BOC signals without any auxiliary correlators.

  • Dynamic Resource Management in Clouds: A Probabilistic Approach Open Access

    Paulo GONÇALVES  Shubhabrata ROY  Thomas BEGIN  Patrick LOISEAU  

     
    INVITED PAPER

      Vol:
    E95-B No:8
      Page(s):
    2522-2529

    Dynamic resource management has become an active area of research in the Cloud Computing paradigm. Cost of resources varies significantly depending on configuration for using them. Hence efficient management of resources is of prime interest to both Cloud Providers and Cloud Users. In this work we suggest a probabilistic resource provisioning approach that can be exploited as the input of a dynamic resource management scheme. Using a Video on Demand use case to justify our claims, we propose an analytical model inspired from standard models developed for epidemiology spreading, to represent sudden and intense workload variations. We show that the resulting model verifies a Large Deviation Principle that statistically characterizes extreme rare events, such as the ones produced by “buzz/flash crowd effects” that may cause workload overflow in the VoD context. This analysis provides valuable insight on expectable abnormal behaviors of systems. We exploit the information obtained using the Large Deviation Principle for the proposed Video on Demand use-case for defining policies (Service Level Agreements). We believe these policies for elastic resource provisioning and usage may be of some interest to all stakeholders in the emerging context of cloud networking.

  • Combining HMM and Weighted Deviation Linear Transformation for Highband Speech Parameter Estimation

    Hwai-Tsu HU  Chu YU  

     
    LETTER-Speech and Hearing

      Vol:
    E92-D No:7
      Page(s):
    1488-1490

    A hidden Markov model (HMM)-based parameter estimation scheme is proposed for wideband speech recovery. In each Markov state, the estimation efficiency is improved using a new mapping function derived from the weighted least squares of vector deviations. The experimental results reveal that the performance of the proposed scheme is superior to that combining the HMM and Gaussian mixture model (GMM).

  • Large Deviation Theorems Revisited: Information-Spectrum Approach

    Te-Sun HAN  

     
    PAPER-Information Theory

      Vol:
    E91-A No:10
      Page(s):
    2704-2719

    In this paper we show some new look at large deviation theorems from the viewpoint of the information-spectrum (IS) methods, which has been first exploited in information theory, and also demonstrate a new basic formula for the large deviation rate function in general, which is expressed as a pair of the lower and upper IS rate functions. In particular, we are interested in establishing the general large deviation rate functions that are derivable as the Fenchel-Legendre transform of the cumulant generating function. The final goal is to show, under some mild condition, a necessary and sufficient condition for the IS rate function to be derivable as the Fenchel-Legendre transform of the cumulant generating function, i.e., to be a rate function of Gartner-Ellis type.

  • Standard Deviation and Intra Prediction Mode Based Adaptive Spatial Error Concealment (SEC) in H.264/AVC

    Jun WANG  Lei WANG  Takeshi IKENAGA  Satoshi GOTO  

     
    PAPER-Video Coding

      Vol:
    E91-A No:10
      Page(s):
    2954-2962

    Transmission of compressed video over error prone channels may result in packet losses or errors, which can significantly degrade the image quality. Therefore an error concealment scheme is applied at the video receiver side to mask the damaged video. Considering there are 3 types of MBs (Macro Blocks) in natural video frame, i.e., Textural MB, Edged MB, and Smooth MB, this paper proposes an adaptive spatial error concealment which can choose 3 different methods for these 3 different MBs. For criteria of choosing appropriate method, 2 factors are taken into consideration. Firstly, standard deviation of our proposed edge statistical model is exploited. Secondly, some new features of latest video compression standard H.264/AVC, i.e., intra prediction mode is also considered for criterion formulation. Compared with previous works, which are only based on deterministic measurement, proposed method achieves the best image recovery. Subjective and objective image quality evaluations in experiments confirmed this.

  • An Asynchronous Circuit Design Technique for a Flexible 8-Bit Microprocessor

    Nobuo KARAKI  Takashi NANMOTO  Satoshi INOUE  

     
    PAPER

      Vol:
    E91-C No:5
      Page(s):
    721-730

    This paper presents an asynchronous design technique, an enabler for the emerging technology of flexible microelectronics that feature low-temperature processed polysilicon (LTPS) thin-film transistors (TFT) and surface-free technology by laser annealing/ablation (SUFTLA®). The first design instance chosen is an 8-bit microprocessor. LTPS TFTs are good for realizing displays having integrated VLSI circuit at lower costs. However, LTPS TFTs have drawbacks, including substantial deviations in characteristics and the self-heating phenomenon. To solve these problems, the authors adopted the asynchronous circuit design technique and developed an asynchronous design language called Verilog+, which is based on a subset of Verilog HDL® and includes minimal primitives used for describing the communications between modules, and the dedicated tools including a translator called xlator and a synthesizer called ctrlsyn. The flexible 8-bit microprocessor stably operates at 500 kHz, drawing 180 µA from a 5 V power source. The microprocessor's electromagnetic emissions are 21 dB less than those of the synchronous counterpart.

  • Adaptive Nonlinear Regression Using Multiple Distributed Microphones for In-Car Speech Recognition

    Weifeng LI  Chiyomi MIYAJIMA  Takanori NISHINO  Katsunobu ITOU  Kazuya TAKEDA  Fumitada ITAKURA  

     
    PAPER-Speech Enhancement

      Vol:
    E88-A No:7
      Page(s):
    1716-1723

    In this paper, we address issues in improving hands-free speech recognition performance in different car environments using multiple spatially distributed microphones. In the previous work, we proposed the multiple linear regression of the log spectra (MRLS) for estimating the log spectra of speech at a close-talking microphone. In this paper, the concept is extended to nonlinear regressions. Regressions in the cepstrum domain are also investigated. An effective algorithm is developed to adapt the regression weights automatically to different noise environments. Compared to the nearest distant microphone and adaptive beamformer (Generalized Sidelobe Canceller), the proposed adaptive nonlinear regression approach shows an advantage in the average relative word error rate (WER) reductions of 58.5% and 10.3%, respectively, for isolated word recognition under 15 real car environments.

  • Error Exponent of Coding for Stationary Memoryless Sources with a Fidelity Criterion

    Shunsuke IHARA  Masashi KUBO  

     
    PAPER-Information Theory

      Vol:
    E88-A No:5
      Page(s):
    1339-1345

    We investigate the error exponent in the lossy source coding with a fidelity criterion. Marton (1974) established a formula of the reliability function for the stationary memoryless source with finite alphabet. In this paper, we consider a stationary memoryless source assuming that the alphabet space is a metric space and not necessarily finite nor discrete. Our aim is to prove that Marton's formula for the reliability function remains true even if the alphabet is general.

  • Multiple Regression of Log Spectra for In-Car Speech Recognition Using Multiple Distributed Microphones

    Weifeng LI  Tetsuya SHINDE  Hiroshi FUJIMURA  Chiyomi MIYAJIMA  Takanori NISHINO  Katunobu ITOU  Kazuya TAKEDA  Fumitada ITAKURA  

     
    PAPER-Feature Extraction and Acoustic Medelings

      Vol:
    E88-D No:3
      Page(s):
    384-390

    This paper describes a new multi-channel method of noisy speech recognition, which estimates the log spectrum of speech at a close-talking microphone based on the multiple regression of the log spectra (MRLS) of noisy signals captured by distributed microphones. The advantages of the proposed method are as follows: 1) The method does not require a sensitive geometric layout, calibration of the sensors nor additional pre-processing for tracking the speech source; 2) System works in very small computation amounts; and 3) Regression weights can be statistically optimized over the given training data. Once the optimal regression weights are obtained by regression learning, they can be utilized to generate the estimated log spectrum in the recognition phase, where the speech of close-talking is no longer required. The performance of the proposed method is illustrated by speech recognition of real in-car dialogue data. In comparison to the nearest distant microphone and multi-microphone adaptive beamformer, the proposed approach obtains relative word error rate (WER) reductions of 9.8% and 3.6%, respectively.

  • Large Deviation for Chaotic Binary Sequences Generated by Nonlinear Maps and Threshold Functions

    Yasutada OOHAMA  Tohru KOHDA  

     
    PAPER-Stochastic Process

      Vol:
    E87-A No:10
      Page(s):
    2555-2563

    In this paper we study the large deviation property for chaotic binary sequences generated by one-dimensional maps displaying chaos and thresholds functions. We deal with the case when nonlinear maps are the r-adic maps. The large deviation theory for dynamical systems is useful for investigating this problem.

  • A Design Method for Logical Topologies with Stable Packet Routing in IP over WDM Network

    Junichi KATOU  Shin'ichi ARAKAWA  Masayuki MURATA  

     
    PAPER

      Vol:
    E86-B No:8
      Page(s):
    2350-2357

    An IP (Internet Protocol) over WDM network is expected to be an infrastructure for the next-generation Internet by directly carrying IP packets on the WDM-based network. Among several architectures for IP over WDM networks, one promising way is to overlay a logical topology consisting of lightpaths over the physical WDM network so that IP packets are carried on the lightpaths. The conventional methods for designing the logical topology have been focusing on maximizing throughput of the traffic. However, when the WDM network is applied to IP, the end-to-end path provided by the logical topology of the WDM network is not suitable to IP since IP has its own metrics for route selection. In this paper, we propose a new heuristic algorithm to design a logical topology by considering the delay between nodes as an objective metric. This algorithm uses a non-bifurcated flow deviation to obtain a set of routes that IP packets are expected to traverse. Our proposal is then compared with conventional methods in terms of the average packet delays and throughput. It is shown that our method becomes effective when the number of wavelengths is a limited resource.

  • Statistical Properties of Chaotic Binary Sequences Generated by One-Dimensional Maps

    Yasutada OOHAMA  Tohru KOHDA  

     
    PAPER

      Vol:
    E85-A No:9
      Page(s):
    1993-2002

    There are several attempts to generate chaotic binary sequences by using one-dimensional maps. From the standpoint of engineering applications, it is necessary to evaluate statistical properties of sample sequences of finite length. In this paper we attempt to evaluate the statistics of chaotic binary sequences of finite length. The large deviation theory for dynamical systems is useful for investigating this problem.

1-20hit(28hit)