The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ions(1385hit)

221-240hit(1385hit)

  • Wiener-Hopf Analysis of the Plane Wave Diffraction by a Thin Material Strip

    Takashi NAGASAKA  Kazuya KOBAYASHI  

     
    PAPER

      Vol:
    E100-C No:1
      Page(s):
    11-19

    The diffraction by a thin material strip is analyzed for the H-polarized plane wave incidence using the Wiener-Hopf technique together with approximate boundary conditions. An asymptotic solution is obtained for the case where the thickness and the width of the strip are small and large compared with the wavelength, respectively. The scattered field is evaluated asymptotically based on the saddle point method and a far field expression is derived. Scattering characteristics are discussed in detail via numerical results of the radar cross section.

  • A Memory-Access-Efficient Implementation for Computing the Approximate String Matching Algorithm on GPUs

    Lucas Saad Nogueira NUNES  Jacir Luiz BORDIM  Yasuaki ITO  Koji NAKANO  

     
    PAPER-GPU computing

      Pubricized:
    2016/08/24
      Vol:
    E99-D No:12
      Page(s):
    2995-3003

    The closeness of a match is an important measure with a number of practical applications, including computational biology, signal processing and text retrieval. The approximate string matching (ASM) problem asks to find a substring of string Y of length n that is most similar to string X of length m. It is well-know that the ASM can be solved by dynamic programming technique by computing a table of size m×n. The main contribution of this work is to present a memory-access-efficient implementation for computing the ASM on a GPU. The proposed GPU implementation relies on warp shuffle instructions which are used to accelerate the communication between threads without resorting to shared memory access. Despite the fact that O(mn) memory access operations are necessary to access all elements of a table with size n×m, the proposed implementation performs only $O( rac{mn}{w})$ memory access operations, where w is the warp size. Experimental results carried out on a GeForce GTX 980 GPU show that the proposed implementation, called w-SCAN, provides speed-up of over two fold in computing the ASM as compared to another prominent alternative.

  • A Bit-Write-Reducing and Error-Correcting Code Generation Method by Clustering ECC Codewords for Non-Volatile Memories

    Tatsuro KOJO  Masashi TAWADA  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER

      Vol:
    E99-A No:12
      Page(s):
    2398-2411

    Non-volatile memories are paid attention to as a promising alternative to memory design. Data stored in them still may be destructed due to crosstalk and radiation. We can restore the data by using error-correcting codes which require extra bits to correct bit errors. Further, non-volatile memories consume ten to hundred times more energy than normal memories in bit-writing. When we configure them using error-correcting codes, it is quite necessary to reduce writing bits. In this paper, we propose a method to generate a bit-write-reducing code with error-correcting ability. We first pick up an error-correcting code which can correct t-bit errors. We cluster its codeswords and generate a cluster graph satisfying the S-bit flip conditions. We assign a data to be written to each cluster. In other words, we generate one-to-many mapping from each data to the codewords in the cluster. We prove that, if the cluster graph is a complete graph, every data in a memory cell can be re-written into another data by flipping at most S bits keeping error-correcting ability to t bits. We further propose an efficient method to cluster error-correcting codewords. Experimental results show that the bit-write-reducing and error-correcting codes generated by our proposed method efficiently reduce energy consumption. This paper proposes the world-first theoretically near-optimal bit-write-reducing code with error-correcting ability based on the efficient coding theories.

  • Auto-Radiometric Calibration in Photometric Stereo

    Wiennat MONGKULMANN  Takahiro OKABE  Yoichi SATO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2016/09/01
      Vol:
    E99-D No:12
      Page(s):
    3154-3164

    We propose a framework to perform auto-radiometric calibration in photometric stereo methods to estimate surface orientations of an object from a sequence of images taken using a radiometrically uncalibrated camera under varying illumination conditions. Our proposed framework allows the simultaneous estimation of surface normals and radiometric responses, and as a result can avoid cumbersome and time-consuming radiometric calibration. The key idea of our framework is to use the consistency between the irradiance values converted from pixel values by using the inverse response function and those computed from the surface normals. Consequently, a linear optimization problem is formulated to estimate the surface normals and the response function simultaneously. Finally, experiments on both synthetic and real images demonstrate that our framework enables photometric stereo methods to accurately estimate surface normals even when the images are captured using cameras with unknown and nonlinear response functions.

  • Personalized Web Page Recommendation Based on Preference Footprint to Browsed Pages

    Kenta SERIZAWA  Sayaka KAMEI  Syuhei HAYASHI  Satoshi FUJITA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/08/08
      Vol:
    E99-D No:11
      Page(s):
    2705-2715

    In this paper, a new scheme for personalized web page recommendation using multi-user search engine query information is proposed. Our contribution is a scheme that improves the accuracy of personalization for various types of contents (e.g., documents, images and music) without increasing user burden. The proposed scheme combines “preference footprints” for browsed pages with collaborative filtering. We acquire user interest using words that are relevant to queries submitted by users, attach all user interests to a page as a footprint when it is browsed, and evaluate the relevance of web pages in relation to words in footprints. The performance of the scheme is evaluated experimentally. The results indicate that the proposed scheme improves the precision and recall of previous schemes by 1%-24% and 80%-107%, respectively.

  • Throughput Analysis of WLANs in Saturation and Non-Saturation Heterogeneous Conditions with Airtime Concept

    Yin WAN  Kosuke SANADA  Nobuyoshi KOMURO  Gen MOTOYOSHI  Norio YAMAGAKI  Shigeo SHIODA  Shiro SAKATA  Tutomu MURASE  Hiroo SEKIYA  

     
    PAPER

      Vol:
    E99-B No:11
      Page(s):
    2289-2296

    This paper presents an analytical model for network throughput of WLANs, taking into account heterogeneous conditions, namely network nodes transmit different length frames with various offered load individually. The airtime concept, which is often used in multi-hop network analyses, is firstly applied for WLAN analysis. The proposed analytical model can cover the situation that there are saturation and non-saturation nodes in the same network simultaneously, which is the first success in the WLAN analyses. This paper shows the network throughput characteristics of four scenarios. Scenario 1 considers the saturation throughputs for the case that one or two length frames are transmitted at the identical offered load. Scenarios 2 and 3 are prepared for investigating the cases that all network nodes transmit different length frames at the identical offered load and identical length frames at the different offered loads, respectively. The heterogeneous conditions for not only frame length but also offered load are investigated in Scenario 4.

  • Statistical Analysis of Phase-Only Correlation Functions with Phase-Spectrum Differences Following Wrapped Distributions

    Shunsuke YAMAKI  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:10
      Page(s):
    1790-1798

    This paper proposes statistical analysis of phase-only correlation functions with phase-spectrum differences following wrapped distributions. We first assume phase-spectrum differences between two signals to be random variables following a linear distribution. Next, based on directional statistics, we convert the linear distribution into a wrapped distribution by wrapping the linear distribution around the circumference of the unit circle. Finally, we derive general expressions of the expectation and variance of the POC functions with phase-spectrum differences following wrapped distributions. We obtain exactly the same expressions between a linear distribution and its corresponding wrapped distribution.

  • Topics Arising from the WRC-15 with Respect to Satellite-Related Agenda Items Open Access

    Nobuyuki KAWAI  Satoshi IMATA  

     
    INVITED PAPER

      Vol:
    E99-B No:10
      Page(s):
    2113-2120

    Along with remarkable advancement of radiocommunication services including satellite services, the radio-frequency spectrum and geostationary-satellite orbit are getting congested. WRC-15 was held in November 2015 to study and implement efficient use of those natural resources. There were a number of satellite-related agenda items associated with frequency allocation, new usages of satellite communications and satellite regulatory issues. This paper overviews the outcome from these agenda items of WRC-15 as well as the agenda items for the next WRC (i.e. the WRC-19).

  • Illumination-Invariant Face Representation via Normalized Structural Information

    Wonjun KIM  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2016/06/21
      Vol:
    E99-D No:10
      Page(s):
    2661-2663

    A novel method for illumination-invariant face representation is presented based on the orthogonal decomposition of the local image structure. One important advantage of the proposed method is that image gradients and corresponding intensity values are simultaneously used with our decomposition procedure to preserve the original texture while yielding the illumination-invariant feature space. Experimental results demonstrate that the proposed method is effective for face recognition and verification even with diverse lighting conditions.

  • Optical Phased Array Using Multi Dither Heterodyning Technique for Receiving Optical Beam Former

    Eisuke HARAGUCHI  Hitomi ONO  Junya NISHIOKA  Toshiyuki ANDO  Masateru NAGASE  Akira AKAISHI  Takashi TAKAHASHI  

     
    PAPER

      Vol:
    E99-B No:10
      Page(s):
    2128-2135

    To provide a satellite communication system with high reliability for social infrastructure, building flexible beam adapting to change of communication traffic is necessary. Optical Beam Forming Network has the capability of broadband transmission and small light construction. However, in space environment, there are concerns that the reception efficiency is reduced by the relative phase error of receiving signal among antenna elements with temperature fluctuation. To prevent this, we control relative phase among received signals with optical phase locked loop. In this paper, we propose the active optical phased array system using multi dither heterodyning technique for receiving OBF, and present experimental results under temperature fluctuation. We evaluated the stability of relative phase among 3 elements for temperature fluctuation at multiplexer from -15 to 45, and checked the stability of PLL among 3 elements.

  • Infinite-Horizon Team-Optimal Incentive Stackelberg Games for Linear Stochastic Systems

    Hiroaki MUKAIDANI  

     
    LETTER-Systems and Control

      Vol:
    E99-A No:9
      Page(s):
    1721-1725

    In this paper, an infinite-horizon team-optimal incentive Stackelberg strategy is investigated for a class of stochastic linear systems with many non-cooperative leaders and one follower. An incentive structure is adopted which allows for the leader's team-optimal Nash solution. It is shown that the incentive strategy set can be obtained by solving the cross-coupled stochastic algebraic Riccati equations (CCSAREs). In order to demonstrate the effectiveness of the proposed strategy, a numerical example is solved.

  • A New Marching-on-in-Order Based 2-D Unconditionally Stable FDTD Method

    Meng YANG  Yuehu TAN  Erbing LI  Cong MA  Yechao YOU  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E99-C No:9
      Page(s):
    1080-1083

    The unconditionally stable (US) Laguerre-FDTD method has recently attracted significant attention for its high efficiency and accuracy in modeling fine structures. One of the most attractive characteristics of this method is its marching-on-in-order solution scheme. This paper presents Hermite-Rodriguez functions as another type of orthogonal basis to implement a new 2-D US solution scheme.

  • Necessary Conditions for θ-Stability of Real Polynomials

    Younseok CHOO  

     
    LETTER-Systems and Control

      Vol:
    E99-A No:8
      Page(s):
    1628-1631

    In this letter we present some easily checkable necessary conditions for a polynomial with positive coefficients to have all its zeros in a prescribed sector in the left half of the complex plane. As an auxiliary result, we also obtain a new necessary condition for the Hurwitz stability.

  • New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions

    Longjiang QU  Shaojing FU  Qingping DAI  Chao LI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E99-A No:8
      Page(s):
    1584-1590

    In this paper, we study the problem of a Boolean function can be represented as the sum of two bent functions. This problem was recently presented by N. Tokareva when studying the number of bent functions [27]. Firstly, several classes of functions, such as quadratic Boolean functions, Maiorana-MacFarland bent functions, many partial spread functions etc, are proved to be able to be represented as the sum of two bent functions. Secondly, methods to construct such functions from low dimension ones are also introduced. N. Tokareva's main hypothesis is proved for n≤6. Moreover, two hypotheses which are equivalent to N. Tokareva's main hypothesis are presented. These hypotheses may lead to new ideas or methods to solve this problem. Finally, necessary and sufficient conditions on the problem when the sum of several bent functions is again a bent function are given.

  • Proactive Handover Based on Human Blockage Prediction Using RGB-D Cameras for mmWave Communications

    Yuta OGUMA  Takayuki NISHIO  Koji YAMAMOTO  Masahiro MORIKURA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:8
      Page(s):
    1734-1744

    To substantially alleviate the human blockage problem in mmWave communications, this paper proposes a proactive handover system based on human blockage prediction using RGB and depth (RGB-D) cameras. The proposed scheme uses RGB-D camera images to estimate the mobility of pedestrians and to predict when blockage will occur. On the basis of this information, the proposed system transfers a mobile station (STA) communicating with one wireless BS (base station) to another BS before human blockage occurs and thus avoids blockage-induced throughput degradation. This paper presents performance modeling of both proactive handover scheme and reactive handover scheme which is based on the received power level. A numerical evaluation reveals conditions under which the proactive handover scheme achieves higher spectral efficiency compared to reactive scheme. In addition, using IEEE 802.11ad-based wireless local area network (WLAN) devices, a testbed for implementing the proposed system is built. The innovative experimental results demonstrate that the proactive handover system can considerably reduce the duration of human blockage-induced degradation of throughput performance relative to the reactive scheme.

  • Human Action Recognition from Depth Videos Using Pool of Multiple Projections with Greedy Selection

    Chien-Quang LE  Sang PHAN  Thanh Duc NGO  Duy-Dinh LE  Shin'ichi SATOH  Duc Anh DUONG  

     
    PAPER-Pattern Recognition

      Pubricized:
    2016/04/25
      Vol:
    E99-D No:8
      Page(s):
    2161-2171

    Depth-based action recognition has been attracting the attention of researchers because of the advantages of depth cameras over standard RGB cameras. One of these advantages is that depth data can provide richer information from multiple projections. In particular, multiple projections can be used to extract discriminative motion patterns that would not be discernible from one fixed projection. However, high computational costs have meant that recent studies have exploited only a small number of projections, such as front, side, and top. Thus, a large number of projections, which may be useful for discriminating actions, are discarded. In this paper, we propose an efficient method to exploit pools of multiple projections for recognizing actions in depth videos. First, we project 3D data onto multiple 2D-planes from different viewpoints sampled on a geodesic dome to obtain a large number of projections. Then, we train and test action classifiers independently for each projection. To reduce the computational cost, we propose a greedy method to select a small yet robust combination of projections. The idea is that best complementary projections will be considered first when searching for optimal combination. We conducted extensive experiments to verify the effectiveness of our method on three challenging benchmarks: MSR Action 3D, MSR Gesture 3D, and 3D Action Pairs. The experimental results show that our method outperforms other state-of-the-art methods while using a small number of projections.

  • A Linear Combining Scheme to Suppress Interference in Multiple Relay Systems

    Ahmet Ihsan CANBOLAT  Kazuhiko FUKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/02/17
      Vol:
    E99-B No:8
      Page(s):
    1867-1873

    This paper proposes an interference suppression scheme based on linear combining for multiple relay systems. Interference from base stations and relays in neighboring cells degrades the bit error rate (BER) performance of mobile stations (MSs) near cell boundaries. To suppress such interference for half-duplex relay systems, the proposed scheme linearly combines received signals of the first and second phases at MS. Without channel state information (CSI) feedback, weight coefficients for the linear combining are estimated by the recursive least-squares (RLS) algorithm, which requires only information on preamble symbols of the target MS. Computer simulations of orthogonal frequency-division multiplexing (OFDM) transmission under two-cell and frequency selective fading conditions are conducted. It is demonstrated that the RLS-based linear combining with decision directed estimation is superior to the RLS-based linear combining using only the preamble and can outperform the minimum mean-squared error (MMSE) combining with estimated CSI when the number of preamble symbols is two and four that correspond to the minimum requirements for MMSE and RLS, respectively.

  • Threshold Relaxation and Holding Time Limitation Method for Accepting More General Calls under Emergency Trunk Reservation

    Kazuki TANABE  Sumiko MIYATA  Ken-ichi BABA  Katsunori YAMAOKA  

     
    PAPER

      Vol:
    E99-A No:8
      Page(s):
    1518-1528

    In emergency situations, telecommunication networks become congested due to large numbers of call requests. Also, some infrastructure breaks down, so undamaged communication resources must be utilized more efficiently. Therefore, several lines in telephone exchanges are generally reserved for emergency calls whose users communicate crucial information. The number of lines reserved for emergency calls is determined by a threshold, on a trunk reservation control method. To accept both required emergency calls and more general calls, the traffic intensity of arriving emergency calls should be estimated in advance, and a threshold should be configured so that the number of reserved lines becomes lower than the estimation. Moreover, we propose that the holding time for general calls should be positively limited. By guaranteeing the holding time sufficient for communicating essential information, holding time limitation reduces long-period calls so more general calls are accepted. In this paper, we propose a new CAC method to utilize undamaged communication resources more efficiently during emergencies. Our proposed method accepts more general calls by collaboratively relaxing the threshold of trunk reservation and limiting holding time of general calls. This method is targeted at not only the telephone exchange but also various systems on networks, e.g. base stations of the wireless network or SIP servers. With our method, the threshold is configured in consideration of the ratio of traffic intensities estimated in advance. We modeled the telephone exchange as a queueing loss system and calculated call-blocking rates of both emergency and general calls by using computer simulation. The comparison with the conventional holding time limitation method showed that our proposed method accepts the required number of emergency calls by appropriately relaxing the threshold, while suppressing the increase in call-blocking of general calls.

  • User-Centric Approach for Bandwidth Allocation Method Based on Quality of Experience

    Huong PHAM-THI  Takumi MIYOSHI  

     
    PAPER

      Vol:
    E99-B No:6
      Page(s):
    1282-1290

    This paper focuses on the bandwidth allocation methods based on real user experience for web browsing applications. Because the Internet and its services are rapidly increasing, the bandwidth allocation problem has become one of the typical challenges for Internet service providers (ISPs) and network planning with respect to providing high service quality. The quality of experience (QoE) plays an important role in the success of services, and the guarantee of QoE accordingly represents an important goal in network resource control schemes. To cope with this issue, this paper proposes two user-centric bandwidth resource allocation methods for web browsing applications. The first method dynamically allocates bandwidth by considering the same user's satisfaction in terms of QoE with respect to all users in the system, whereas the second method introduces an efficient trade-off between the QoE of each user group and the average QoE of all users. The purpose of these proposals is to provide a flexible solution to reasonably allocate limited network resources to users. By considering service quality from real users' perception viewpoint, the proposed allocation methods enable us to understand actual users' experiences. Compared to previous works, the numerical results show that the proposed bandwidth allocation methods achieve the following contributions: improving the QoE level for dissatisfied users and providing a fair distribution, as well as retaining a reasonable average QoE.

  • Refined RC4 Key Correlations of Internal States in WPA

    Ryoma ITO  Atsuko MIYAJI  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1132-1144

    WPA is the security protocol for IEEE 802.11 wireless networks standardized as a substitute for WEP in 2003, and uses RC4 stream cipher for encryption. It improved a 16-byte RC4 key generation procedure, which is known as TKIP, from that in WEP. One of the remarkable features in TKIP is that the first 3-byte RC4 key is derived from the public parameter IV, and an analysis using this feature has been reported by Sen Gupta et al. at FSE 2014. They focused on correlations between the keystream bytes and the known RC4 key bytes in WPA, which are called key correlations or linear correlations, and improved the existing plaintext recovery attack using their discovered correlations. No study, however, has focused on such correlations including the internal states in WPA. In this paper, we investigated new linear correlations including unknown internal state variables in both generic RC4 and WPA. From the result, we can successfully discover various new linear correlations, and prove some correlations theoretically.

221-240hit(1385hit)