The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] modification(40hit)

1-20hit(40hit)

  • Change Impact Analysis for Refinement-Based Formal Specification

    Shinnosuke SARUWATARI  Fuyuki ISHIKAWA  Tsutomu KOBAYASHI  Shinichi HONIDEN  

     
    PAPER

      Pubricized:
    2019/05/22
      Vol:
    E102-D No:8
      Page(s):
    1462-1477

    Refinement-based formal specification is a promising approach to the increasing complexity of software systems, as demonstrated in the formal method Event-B. It allows stepwise modeling and verifying of complex systems with multiple steps at different abstraction levels. However, making changes is more difficult, as caution is necessary to avoid breaking the consistency between the steps. Judging whether a change is valid or not is a non-trivial task, as the logical dependency relationships between the modeling elements (predicates) are implicit and complex. In this paper, we propose a method for analyzing the impact of the changes of Event-B. By attaching labels to modeling elements (predicates), the method helps engineers understand how a model is structured and what needs to be modified to accomplish a change.

  • A Wind-Noise Suppressor with SNR Based Wind-Noise Detection and Speech-Wind Discrimination

    Masanori KATO  Akihiko SUGIYAMA  

     
    PAPER-Digital Signal Processing

      Vol:
    E101-A No:10
      Page(s):
    1638-1645

    A wind-noise suppressor with SNR based wind-noise detection and speech-wind discrimination is proposed. Wind-noise detection is performed in each frame and frequency based on the power ratio of the noisy speech and an estimated stationary noise. The detection result is modified by speech presence likelihood representing spectral smoothness to eliminate speech components. To suppress wind noise with little speech distortion, spectral gains are made smaller in the frame and the frequency where wind-noise is detected. Subjective evaluation results show that the 5-grade MOS for the proposed wind-noise suppressor reaches 3.4 and is 0.56 higher than that by a conventional noise suppressor with a statistically significant difference.

  • Polymer Surface Modification Due to Active Oxygen Species and Ultraviolet Light Exposures

    Kazuki HOSOYA  Ryo WAKAYAMA  Kei OYA  Satoru IWAMORI  

     
    BRIEF PAPER

      Vol:
    E100-C No:2
      Page(s):
    137-140

    Active oxygen species (AOS), e.g., excited singlet oxygen atom [O(1D)], excited singlet oxygen molecules (1O2), ground-state oxygen atom [O(3P)] and hydroxyl radical (OH), generated under two wavelengths (185 and 254 nm) of ultraviolet (UV) light were exposed to polyethylene (PE), polypropylene (PP) and polystyrene (PS) sheets. We investigated effects of the AOS exposure on the surface modification of these polymer sheets. Nonwoven sheet was used for the surface modification to eliminate an effect of the UV light irradiation. Although hydrophobicity of the PE and PP surfaces was maintained, the PS was changed into the hydrophilic surface.

  • Lightness Modification Method Considering Craik-O'Brien Effect for Protanopia and Deuteranopia

    Shi BAO  Go TANAKA  Hakaru TAMUKOH  Noriaki SUETAKE  

     
    LETTER-Image

      Vol:
    E99-A No:11
      Page(s):
    2008-2011

    Protanopes and deuteranopes are difficult to distinguish some color pairs. In this letter, a new lightness modification method which considers the Craik-O'Brien effect is proposed. The lightness modification is performed at parts which are difficult to distinguish in the protanopia or deuteranopia. Experiments show the validity of the proposed method.

  • Improvements of Voice Timbre Control Based on Perceived Age in Singing Voice Conversion

    Kazuhiro KOBAYASHI  Tomoki TODA  Tomoyasu NAKANO  Masataka GOTO  Satoshi NAKAMURA  

     
    PAPER-Speech and Hearing

      Pubricized:
    2016/07/21
      Vol:
    E99-D No:11
      Page(s):
    2767-2777

    As one of the techniques enabling individual singers to produce the varieties of voice timbre beyond their own physical constraints, a statistical voice timbre control technique based on the perceived age has been developed. In this technique, the perceived age of a singing voice, which is the age of the singer as perceived by the listener, is used as one of the intuitively understandable measures to describe voice characteristics of the singing voice. The use of statistical voice conversion (SVC) with a singer-dependent multiple-regression Gaussian mixture model (MR-GMM), which effectively models the voice timbre variations caused by a change of the perceived age, makes it possible for individual singers to manipulate the perceived ages of their own singing voices while retaining their own singer identities. However, there still remain several issues; e.g., 1) a controllable range of the perceived age is limited; 2) quality of the converted singing voice is significantly degraded compared to that of a natural singing voice; and 3) each singer needs to sing the same phrase set as sung by a reference singer to develop the singer-dependent MR-GMM. To address these issues, we propose the following three methods; 1) a method using gender-dependent modeling to expand the controllable range of the perceived age; 2) a method using direct waveform modification based on spectrum differential to improve quality of the converted singing voice; and 3) a rapid unsupervised adaptation method based on maximum a posteriori (MAP) estimation to easily develop the singer-dependent MR-GMM. The experimental results show that the proposed methods achieve a wider controllable range of the perceived age, a significant quality improvement of the converted singing voice, and the development of the singer-dependnet MR-GMM using only a few arbitrary phrases as adaptation data.

  • Performance Analysis of Demand Data Modification Mechanism for Power Balancing Control

    Yuki MINAMI  Shun-ichi AZUMA  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:7
      Page(s):
    1562-1564

    For the electric demand prediction problem, a modification mechanism of predicted demand data has been proposed in the previous work. In this paper, we analyze the performance of the modification mechanism in power balancing control. Then, we analytically derive an upper bound of the performance, which is characterized by system parameters and prediction precision.

  • Single Symbol Decodable QO-STBC with Full Diversity

    Naotoshi YODA  Chang-Jun AHN  Ken-ya HASHIMOTO  

     
    PAPER-Foundations

      Vol:
    E97-A No:1
      Page(s):
    2-6

    Space-time block code (STBC) with complex orthogonal designs achieves full diversity with a simple maximum-likelihood (ML) decoding, however, do not achieve a full transmission rate for more than two antennas. To attain a higher transmission rate, STBC with quasi-orthogonal designs were proposed, whereas there are interference terms caused by relaxing the orthogonality. It has an impact on decoding complexity because a receiver needs to decode two symbols at a time. Moreover, QO-STBC does not achieve full diversity. In this paper, we propose a scheme which makes possible to decode symbols one by one, and two schemes which gain full transmission diversity by upsetting the balance of the transmit power and rotating constellation.

  • A New Histogram Modification Method for Stereoscopic Image Enhancement

    Seung-Won JUNG  Sung-Jea KO  

     
    LETTER-Image

      Vol:
    E95-A No:11
      Page(s):
    2090-2092

    Histogram modification based image enhancement algorithms have been extensively used in 2-D image applications. In this letter, we apply a histogram modification framework to stereoscopic image enhancement. The proposed algorithm estimates the histogram of a stereo image pair without explicitly computing the pixel-wise disparity. Then, the histogram in the occluded regions is estimated and used to determine the target histogram of the stereo image. Experimental results demonstrate the effectiveness of the proposed algorithm.

  • A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction

    Xin LIAO  Qiaoyan WEN  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:7
      Page(s):
    1189-1192

    In this letter, a novel steganographic method with four-pixel differencing and exploiting modification direction is proposed. Secret data are embedded into each four-pixel block by adaptively applying exploiting modification direction technique. The difference value of the four-pixel block is used to judge whether the pixels in edge areas can tolerate larger changes than those in smooth areas. The readjustment guarantees to extract the secret data exactly and to minimize the embedding distortion. Since the proposed method processes non-overlapping 22 pixels blocks instead of two consecutive pixels, the features of edge can be considered sufficiently. Compared with the previous method, experimental results show that the proposed method provides better performance, i.e., larger embedding capacity and better image quality.

  • Audio Watermarking Robust against Playback Speed Modification

    Lili LI  Xiangzhong FANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:12
      Page(s):
    2889-2893

    This letter proposes a spread spectrum audio watermarking robust against playback speed modification (PSM) attack which introduces both time-scale modification and pitch shifting. Two important improvements are exploited to achieve this robustness. The first one is selecting an embedding region according to the stable characteristic of the audio energy. The second one is stretching the pseudo-random noise sequence to match the length of the embedding region before embedding and detection. Experimental results show that our method is highly robust to common audio signal processing attacks and synchronization attacks including PSM, cropping, trimming and jittering.

  • Quantitative Characterization of Surface Amino Groups of Plasma-Polymerized Films Prepared from Nitrogen-Containing Monomers for Bioelectronic Applications

    Hitoshi MUGURUMA  

     
    PAPER-Organic Molecular Electronics

      Vol:
    E91-C No:6
      Page(s):
    963-967

    The surface amino groups of plasma-polymerized films prepared from various nitrogen-containing monomers were quantitatively characterized for bioelectronic and biomedical applications. X-ray photoelectron spectroscopy (XPS) measurements were conducted on two kinds of surfaces: pristine surfaces of plasma-polymerized film prepared using various nitrogen-containing monomers, and theirs surfaces whose amino groups had been derivatized by a primary-amine-selective reagent carrying an XPS label. The XPS data showed that the maximum surface density of amino groups for this film was 8.41013 cm-2. Amino groups constituted 14-64% of all surface nitrogen atoms (NH/N), depending on the monomer used.

  • GUI Change Method according to Roles of Widgets and Change Patterns

    Junko SHIROGANE  Hajime IWATA  Kazuhiro FUKAYA  Yoshiaki FUKAZAWA  

     
    PAPER-Software Engineering

      Vol:
    E91-D No:4
      Page(s):
    907-920

    To develop usable software, it is necessary to develop Graphical User Interfaces (GUIs) in iterative steps, such as evaluating the usability of GUIs and improving GUIs. In improving GUIs, developers are often required to modify both the GUI and the logic code of the software. In our research, to facilitate GUI improvement, we propose a method of automatically searching for code to be modified and suggesting how to modify them. To search for appropriate code to be modified, we define the roles of widgets according to their purpose and the patterns for how to change GUIs. In our method, how to change GUIs is specified, and then the parts of source programs that are required to be modified are searched for. Also, we classify methods for each widget according to their functions. Using this classification, a method of modifying the code that is searched for is suggested.

  • On Detection of Bridge Defects with Stuck-at Tests

    Kohei MIYASE  Kenta TERASHIMA  Xiaoqing WEN  Seiji KAJIHARA  Sudhakar M. REDDY  

     
    PAPER-Defect-Based Testing

      Vol:
    E91-D No:3
      Page(s):
    683-689

    If a test set for more complex faults than stuck-at faults is generated, higher defect coverage would be obtained. Such a test set, however, would have a large number of test vectors, and hence the test costs would go up. In this paper we propose a method to detect bridge defects with a test set initially generated for stuck-at faults in a full scan sequential circuit. The proposed method doesn't add new test vectors to the test set but modifies test vectors. Therefore there are no negative impacts on test data volume and test application time. The initial fault coverage for stuck-at faults of the test set is guaranteed with modified test vectors. In this paper we focus on detecting as many as possible non-feedback AND-type, OR-type and 4-way bridging faults, respectively. Experimental results show that the proposed method increases the defect coverage.

  • Improved Collision Search for Hash Functions: New Advanced Message Modification

    Yusuke NAITO  Kazuo OHTA  Noboru KUNIHIRO  

     
    PAPER-Hash Functions

      Vol:
    E91-A No:1
      Page(s):
    46-54

    In this paper, we discuss the collision search for hash functions, mainly in terms of their advanced message modification. The advanced message modification is a collision search tool based on Wang et al.'s attacks. Two advanced message modifications have previously been proposed: cancel modification for MD4 and MD5, and propagation modification for SHA-0. In this paper, we propose a new concept of advanced message modification, submarine modification. As a concrete example combining the ideas underlying these modifications, we apply submarine modification to the collision search for SHA-0. As a result, we show that this can reduce the collision search attack complexity from 239 to 236 SHA-0 compression operations.

  • A Relocation Method for Circuit Modifications

    Kunihiko YANAGIBASHI  Yasuhiro TAKASHIMA  Yuichi NAKAMURA  

     
    PAPER-Circuit Synthesis

      Vol:
    E90-A No:12
      Page(s):
    2743-2751

    In this paper, we propose a novel migration method. In this method, the resultant placement retains the structure of the original placement, called model placement, as much as possible. For this purpose, we minimize the sum of the difference in area between the model placement and the relocated one and the total amount of displacement between them. Moreover, to achieve a short runtime, we limit the solution space and change the packing origin in the optimization process. We construct the system on Sequence-Pair. Experimental results show that our approach preserves the chip area and the overall circuit structure with 98% less runtime than that realized by naive simulated annealing.

  • Optical Code Division Multiplexing for Packet Labeling in Optical Switching Networks

    Wang-Hsai YANG  Cheng-Shong WU  Hui-Kai SU  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2772-2779

    In this paper, we proposed a photonic packet switching control method by used optical correlator for optical packet label packet-switched networks for next Generation networks. The main advance is rely on using the Optical Code Division Multiplexing (OCDM) code to labeling optical packets based on source routing. Based on OCDM labeling either header modification or any label swapping techniques can be avoids. With advantage of existing OCDM coding called OCDM-labels schemes to encapsulate the packets, together with optical correlator to decode the label in optical domain, which can achieve optical packet switching without header modification/label swapping techniques. The O/E/O conversion procedure at each switching device can also be eliminated. This method not only simplifies the design of switch devices in the optical domain to simplify the packet forwarding process, but also speeds up packet forwarding and increases throughput significantly.

  • Improved Collision Attacks on MD4 and MD5

    Yu SASAKI  Yusuke NAITO  Noboru KUNIHIRO  Kazuo OHTA  

     
    PAPER-Hash Functions

      Vol:
    E90-A No:1
      Page(s):
    36-47

    At Eurocrypt'05, Wang et al. presented efficient collision attacks on MD5 and MD4 hash functions. They found a collision of MD5 with a complexity of less than 237 MD5 hash operations, and a collision of MD4 with complexity less than 28 MD4 hash operations. In their attack, the procedure to generate a collision is divided into 4 steps. First, they determine the message differential and output differentials of chaining variables in each step, which generates a collision with small complexity. Second, they construct sufficient conditions that guarantee that the desired differential is always calculated. Third, they find a message modification that can satisfy the sufficient conditions with high probability. Finally, they search for a message that satisfies all sufficient conditions. In this paper, we focus on the message modification of MD5 and MD4, and propose a new message modification. Using our message modification, a collision of MD5 can be found with complexity less than 229 MD5 hash operations, and a collision of MD4 can be found with complexity less than 3 MD4 hash operations. To improve the complexity from previous attacks, we mainly use two ideas. The first idea is to use message modification that can satisfy more sufficient conditions in the second round than in previous attacks. The second idea is to use message modification that can enable us to search for a collision starting from an intermediate step.

  • Supporting Refactoring Activities Using Histories of Program Modification

    Shinpei HAYASHI  Motoshi SAEKI  Masahito KURIHARA  

     
    PAPER

      Vol:
    E89-D No:4
      Page(s):
    1403-1412

    Refactoring is one of the promising techniques for improving program design by means of program transformation with preserving behavior, and is widely applied in practice. However, it is difficult for engineers to identify how and where to refactor programs, because proper knowledge and skills of a high order are required of them. In this paper, we propose the technique to instruct how and where to refactor a program by using a sequence of its modifications. We consider that the histories of program modifications reflect developers' intentions, and focusing on them allows us to provide suitable refactoring guides. Our technique can be automated by storing the correspondence of modification patterns to suitable refactoring operations. By implementing an automated supporting tool, we show its feasibility. The tool is implemented as a plug-in for Eclipse IDE. It selects refactoring operations by matching between a sequence of program modifications and modification patterns.

  • Evaluation of Partial File Modification for Java-Based Realtime Communication Systems

    Tetsuyasu YAMADA  Hiroshi SUNAGA  Shinji TANAKA  Satoshi SHIRAISHI  Keiichi KOYANAGI  

     
    PAPER-Switching for Communications

      Vol:
    E88-B No:10
      Page(s):
    3982-3991

    This paper proposes a Java online plug-in mechanism that can be used to modify any part in a system file coded in Java, even while the part is running, without service interruption. The Java-related plug-in capabilities are devised by using the plug-in functional elements offered by the existing C++ online plug-in that we proposed. In particular, measures on how to deal with the use of Just In Time compilation and inline expansion are considered. New linkage and file-back up techniques are proposed for this purpose. Case studies reveal its wide applicability and the degree of memory area saving effects. Evaluation proves this mechanism does not affect the performance of ordinary service processing. It is expected to be used in practice for Java-based service processing such as VoIP and Instant Messaging.

  • A Simple Predictive Method for Discriminating Costly Classes Using Class Size Metric

    Hirohisa AMAN  Naomi MOCHIDUKI  Hiroyuki YAMADA  Matu-Tarow NODA  

     
    LETTER-Software Engineering

      Vol:
    E88-D No:6
      Page(s):
    1284-1288

    Larger object classes often become more costly classes in the maintenance phase of object-oriented software. Consequently class would have to be constructed in a medium or small size. In order to discuss such desirable size, this paper proposes a simple method for predictively discriminating costly classes in version-upgrades, using a class size metric, Stmts. Concretely, a threshold value of class size (in Stmts) is provided through empirical studies using many Java classes. The threshold value succeeded as a predictive discriminator for about 73% of the sample Java classes.

1-20hit(40hit)