The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] order(489hit)

61-80hit(489hit)

  • Speech Enhancement with Impact Noise Activity Detection Based on the Kurtosis of an Instantaneous Power Spectrum

    Naoto SASAOKA  Naoya HAMAHASHI  Yoshio ITOH  

     
    PAPER-Digital Signal Processing

      Vol:
    E100-A No:9
      Page(s):
    1942-1950

    In a speech enhancement system for impact noise, it is important for any impact noise activity to be detected. However, because impact noise occurs suddenly, it is not always easy to detect. We propose a method for impact noise activity detection based on the kurtosis of an instantaneous power spectrum. The continuous duration of a generalized impact noise is shorter than that of speech, and the power of such impact noise varies dramatically. Consequently, the distribution of the instantaneous power spectrum of impact noise is different from that of speech. The proposed detection takes advantage of kurtosis, which depends on the sharpness and skirt of the distribution. Simulation results show that the proposed noise activity detection improves the performance of the speech enhancement system.

  • The Structural Vulnerability Analysis of Power Grids Based on Second-Order Centrality

    Zhong-Jian KANG  Yi-Jia ZHANG  Xin-Ling GUO  Zhe-Ming LU  

     
    LETTER-Systems and Control

      Vol:
    E100-A No:7
      Page(s):
    1567-1570

    The application of complex network theory to power grid analysis has been a hot topic in recent years, which mainly manifests itself in four aspects. The first aspect is to model power system networks. The second aspect is to reveal the topology of the grid itself. The third aspect is to reveal the inherent vulnerability and weakness of the power network itself and put forward the pertinent improvement measures to provide guidance for the construction of power grid. The last aspect is to analyze the mechanism of cascading failure and establish the cascading fault model of large power failure. In the past ten years, by using the complex network theory, many researchers have investigated the structural vulnerability of power grids from the point of view of topology. This letter studies the structural vulnerability of power grids according to the effect of selective node removal. We apply several kinds of node centralities including recently-presented second-order centrality (SOC) to guide the node removal attack. We test the effectiveness of all these centralities in guiding the node removal based on several IEEE power grids. Simulation results show that, compared with other node centralities, the SOC is relatively effective in guiding the node removal and can destroy the power grid with negative degree-degree correlation in less steps.

  • Second-Order Sampling of 2-D Frequency Distributions by Using the Concepts of Tiling Clusters and Pair Regions

    Toshihiro HORI  

     
    PAPER-Analog Signal Processing

      Vol:
    E100-A No:6
      Page(s):
    1286-1295

    Second-order sampling of 2-D frequency distributions is examined in this paper. When a figure in the frequency space can fill up the entire frequency space by tiling, we call this figure a tiling cluster. We also introduce the concept of pair regions. The results obtained for the second-order sampling of 1-D and 2-D frequency distributions are arranged using these two concepts. The sampling functions and sampling positions of second-order sampling of a 2-D rectangular-complement highpass frequency distribution, which have not been solved until now, are explicitly presented by using these two concepts.

  • Efficient Balanced Truncation for RC and RLC Networks

    Yuichi TANJI  

     
    PAPER-Circuit Theory

      Vol:
    E100-A No:1
      Page(s):
    266-274

    An efficient balanced truncation for RC and RLC networks is presented in this paper. To accelerate the balanced truncation, sparse structures of original networks are considered. As a result, Lyapunov equations, the solutions of which are necessary for making the transformation matrices, are efficiently solved, and the reduced order models are efficiently obtained. It is proven that reciprocity of original networks is preserved while applying the proposed method. Passivity of the reduced RC networks is also guaranteed. In the illustrative examples, we will show that the proposed method is compatible with PRIMA in efficiency and is more accurate than PRIMA.

  • RFS: An LSM-Tree-Based File System for Enhanced Microdata Performance

    Lixin WANG  Yutong LU  Wei ZHANG  Yan LEI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2016/09/06
      Vol:
    E99-D No:12
      Page(s):
    3035-3046

    File system workloads are increasing write-heavy. The growing capacity of RAM in modern nodes allows many reads to be satisfied from memory while writes must be persisted to disk. Today's sophisticated local file systems like Ext4, XFS and Btrfs optimize for reads but suffer from workloads dominated by microdata (including metadata and tiny files). In this paper we present an LSM-tree-based file system, RFS, which aims to take advantages of the write optimization of LSM-tree to provide enhanced microdata performance, while offering matching performance for large files. RFS incrementally partitions the namespace into several metadata columns on a per-directory basis, preserving disk locality for directories and reducing the write amplification of LSM-trees. A write-ordered log-structured layout is used to store small files efficiently, rather than embedding the contents of small files into inodes. We also propose an optimization of global bloom filters for efficient point lookups. Experiments show our library version of RFS can handle microwrite-intensive workloads 2-10 times faster than existing solutions such as Ext4, Btrfs and XFS.

  • Lossless Data Compression via Substring Enumeration for k-th Order Markov Sources with a Finite Alphabet

    Ken-ichi IWATA  Mitsuharu ARIMURA  

     
    PAPER-Source Coding and Data Compression

      Vol:
    E99-A No:12
      Page(s):
    2130-2135

    A generalization of compression via substring enumeration (CSE) for k-th order Markov sources with a finite alphabet is proposed, and an upper bound of the codeword length of the proposed method is presented. We analyze the worst case maximum redundancy of CSE for k-th order Markov sources with a finite alphabet. The compression ratio of the proposed method asymptotically converges to the optimal one for k-th order Markov sources with a finite alphabet if the length n of a source string tends to infinity.

  • Second-Order Achievable Rate Region of Slepian-Wolf Coding Problem in terms of Smooth Max-Entropy for General Sources

    Shota SAITO  Toshiyasu MATSUSHIMA  

     
    LETTER-Shannon Theory

      Vol:
    E99-A No:12
      Page(s):
    2275-2280

    This letter deals with the Slepian-Wolf coding problem for general sources. The second-order achievable rate region is derived using quantity which is related to the smooth max-entropy and the conditional smooth max-entropy. Moreover, we show the relationship of the functions which characterize the second-order achievable rate region in our study and previous study.

  • Proposal of Multiscale Retinex Using Illumination Adjustment for Digital Images

    Yi RU  Go TANAKA  

     
    LETTER-Image

      Vol:
    E99-A No:11
      Page(s):
    2003-2007

    In this letter, we propose a method for obtaining a clear and natural output image by tuning the illumination component in an input image. The proposed method is based on the retinex process and it is suitable for the image quality improvement of images of which illumination is insufficient.

  • Automatic Model Order Selection for Convolutive Non-Negative Matrix Factorization

    Yinan LI  Xiongwei ZHANG  Meng SUN  Chong JIA  Xia ZOU  

     
    LETTER-Speech and Hearing

      Vol:
    E99-A No:10
      Page(s):
    1867-1870

    Exploring a parsimonious model that is just enough to represent the temporal dependency of time serial signals such as audio or speech is a practical requirement for many signal processing applications. A well suited method for intuitively and efficiently representing magnitude spectra is to use convolutive non-negative matrix factorization (CNMF) to discover the temporal relationship among nearby frames. However, the model order selection problem in CNMF, i.e., the choice of the number of convolutive bases, has seldom been investigated ever. In this paper, we propose a novel Bayesian framework that can automatically learn the optimal model order through maximum a posteriori (MAP) estimation. The proposed method yields a parsimonious and low-rank approximation by removing the redundant bases iteratively. We conducted intuitive experiments to show that the proposed algorithm is very effective in automatically determining the correct model order.

  • Comment on the Security of an Order-Preserving Encryption Scheme Using Pseudo-Random Function

    Minkyu KIM  Je HONG PARK  Dongyoung ROH  

     
    WRITTEN DISCUSSION-Fundamental Theories for Communications

      Vol:
    E99-B No:9
      Page(s):
    2108-2111

    Since the first formal cryptographic study of order-preserving encryption (OPE) by Boldyreva et al., few OPE schemes with provable security have been published. In this paper, we analyze the security of Jho et al.'s OPE scheme, and show that it is not POPF-CCA secure in opposition to what they claim.

  • Filter Design for IBI Suppression in OFDM Based Filter-and-Forward Relay Beamforming

    Satoshi NAGAI  Teruyuki MIYAJIMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:9
      Page(s):
    2072-2080

    In this paper, we consider filter-and-forward relay beamforming using orthogonal frequency-division multiplexing (OFDM) in the presence of inter-block interference (IBI). We propose a filter design method based on a constrained max-min problem, which aims to suppress IBI and also avoid deep nulls in the frequency domain. It is shown that IBI can be suppressed completely owing to the employment of beamforming with multiple relays or multiple receive antennas at each relay when perfect channel state information (CSI) is available. In addition, we modify the proposed method to cover the case where only the partial CSI for relay-receiver channels is available. Numerical simulation results show that the proposed method significantly improves the performance as the number of relays and antennas increases due to spatial diversity, and the modified method can make use of the channel correlation to improve the performance.

  • Steady State Analysis of the TCP Network with RED Algorithm

    Daisuke ITO  Tetsushi UETA  

     
    LETTER-Nonlinear Problems

      Vol:
    E99-A No:6
      Page(s):
    1247-1250

    The transmission control protocol with a random early detection (TCP/RED) is an important algorithm for a TCP congestion control [1]. It has been expressed as a simple second-order discrete-time hybrid dynamical model, and shows unique and typical nonlinear phenomena, e.g., bifurcation phenomena or chaotic attractors [2], [3]. However, detailed behavior is unclear due to discontinuity that describes the switching of transmission phases in TCP/RED, but we have proposed its analysis method in previous study. This letter clarifies bifurcation structures with it.

  • An Extension of MUSIC Exploiting Higher-Order Moments via Nonlinear Mapping

    Yuya SUGIMOTO  Shigeki MIYABE  Takeshi YAMADA  Shoji MAKINO  Biing-Hwang JUANG  

     
    PAPER-Engineering Acoustics

      Vol:
    E99-A No:6
      Page(s):
    1152-1162

    MUltiple SIgnal Classification (MUSIC) is a standard technique for direction of arrival (DOA) estimation with high resolution. However, MUSIC cannot estimate DOAs accurately in the case of underdetermined conditions, where the number of sources exceeds the number of microphones. To overcome this drawback, an extension of MUSIC using cumulants called 2q-MUSIC has been proposed, but this method greatly suffers from the variance of the statistics, given as the temporal mean of the observation process, and requires long observation. In this paper, we propose a new approach for extending MUSIC that exploits higher-order moments of the signal for the underdetermined DOA estimation with smaller variance. We propose an estimation algorithm that nonlinearly maps the observed signal onto a space with expanded dimensionality and conducts MUSIC-based correlation analysis in the expanded space. Since the dimensionality of the noise subspace is increased by the mapping, the proposed method enables the estimation of DOAs in the case of underdetermined conditions. Furthermore, we describe the class of mapping that allows us to analyze the higher-order moments of the observed signal in the original space. We compare 2q-MUSIC and the proposed method through an experiment assuming that the true number of sources is known as prior information to evaluate in terms of the bias-variance tradeoff of the statistics and computational complexity. The results clarify that the proposed method has advantages for both computational complexity and estimation accuracy in short-time analysis, i.e., the time duration of the analyzed data is short.

  • A Novel Time Delay Estimation Interpolation Algorithm Based on Second-Order Cone Programming

    Zhixin LIU  Dexiu HU  Yongjun ZHAO  Chengcheng LIU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:6
      Page(s):
    1311-1317

    Considering the obvious bias of the traditional interpolation method, a novel time delay estimation (TDE) interpolation method with sub-sample accuracy is presented in this paper. The proposed method uses a generalized extended approximation method to obtain the objection function. Then the optimized interpolation curve is generated by Second-order Cone programming (SOCP). Finally the optimal TDE can be obtained by interpolation curve. The delay estimate of proposed method is not forced to lie on discrete samples and the sample points need not to be on the interpolation curve. In the condition of the acceptable computation complexity, computer simulation results clearly indicate that the proposed method is less biased and outperforms the other interpolation algorithms in terms of estimation accuracy.

  • Fully Passive Noise Shaping Techniques in a Charge-Redistribution SAR ADC

    Zhijie CHEN  Masaya MIYAHARA  Akira MATSUZAWA  

     
    PAPER

      Vol:
    E99-C No:6
      Page(s):
    623-631

    This paper analyzes three passive noise shaping techniques in a SAR ADC. These passive noise shaping techniques can realize 1st and 2nd order noise shaping. These proposed opamp-less noise shaping techniques are realized by charge-redistribution. This means that the proposals maintain the basic architecture and operation principle of a charge-redistribution SAR ADC. Since the proposed techniques work in a passive mode, the proposals have high power efficiency. Meanwhile, the proposed noise shaping SAR ADCs are robust to feature size scaling and power supply reduction. Flicker noise is not introduced into the ADC by passive noise shaping techniques. Therefore, no additional calibration techniques for flicker noise are required. The noise shaping effects of the 1st and 2nd order noise shaping are verified by behavioral simulation results. The relationship between resolution improvement and oversampling rate is also explored in this paper.

  • Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation

    Zhili ZHOU  Ching-Nung YANG  Beijing CHEN  Xingming SUN  Qi LIU  Q.M. Jonathan WU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/03/07
      Vol:
    E99-D No:6
      Page(s):
    1531-1540

    For detecting the image copies of a given original image generated by arbitrary rotation, the existing image copy detection methods can not simultaneously achieve desirable performances in the aspects of both accuracy and efficiency. To address this challenge, a novel effective and efficient image copy detection method is proposed based on two global features extracted from rotation invariant partitions. Firstly, candidate images are preprocessed by an averaging operation to suppress noise. Secondly, the rotation invariant partitions of the preprocessed images are constructed based on pixel intensity orders. Thirdly, two global features are extracted from these partitions by utilizing image gradient magnitudes and orientations, respectively. Finally, the extracted features of images are compared to implement copy detection. Promising experimental results demonstrate our proposed method can effectively and efficiently resist rotations with arbitrary degrees. Furthermore, the performances of the proposed method are also desirable for resisting other typical copy attacks, such as flipping, rescaling, illumination and contrast change, as well as Gaussian noising.

  • Gray-Code Ranking and Unranking on Left-Weight Sequences of Binary Trees

    Ro-Yu WU  Jou-Ming CHANG  Sheng-Lung PENG  Chun-Liang LIU  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1067-1074

    Left-weight sequences (LW-sequences for short) are in common currency for encoding binary trees. In [16], Wu et al. proposed an algorithm associated with tree rotations for listing all binary trees in diverse representations including LW-sequences. In particular, such a list of LW-sequences is generated in Gray-code order. In this paper, based on this ordering, we present efficient ranking and unranking algorithms. For binary trees with n internal nodes, the time complexity and the space requirement in each of our ranking and unranking algorithms are O(n2) and O(n), respectively.

  • WHOSA: Network Flow Classification Based on Windowed Higher-Order Statistical Analysis

    Mingda WANG  Gaolei FEI  Guangmin HU  

     
    PAPER

      Vol:
    E99-B No:5
      Page(s):
    1024-1031

    Flow classification is of great significance for network management. Machine-learning-based flow classification is widely used nowadays, but features which depict the non-Gaussian characteristics of network flows are still absent. In this paper, we propose the Windowed Higher-order Statistical Analysis (WHOSA) for machine-learning-based flow classification. In our methodology, a network flow is modeled as three different time series: the flow rate sequence, the packet length sequence and the inter-arrival time sequence. For each sequence, both the higher-order moments and the largest singular values of the Bispectrum are computed as features. Some lower-order statistics are also computed from the distribution to build up the feature set for contrast, and C4.5 decision tree is chosen as the classifier. The results of the experiment reveals the capability of WHOSA in flow classification. Besides, when the classifier gets fully learned, the WHOSA feature set exhibit stronger discriminative power than the lower-order statistical feature set does.

  • FXA: Executing Instructions in Front-End for Energy Efficiency

    Ryota SHIOYA  Ryo TAKAMI  Masahiro GOSHIMA  Hideki ANDO  

     
    PAPER-Computer System

      Pubricized:
    2016/01/06
      Vol:
    E99-D No:4
      Page(s):
    1092-1107

    Out-of-order superscalar processors have high performance but consume a large amount of energy for dynamic instruction scheduling. We propose a front-end execution architecture (FXA) for improving the energy efficiency of out-of-order superscalar processors. FXA has two execution units: an out-of-order execution unit (OXU) and an in-order execution unit (IXU). The OXU is the execution core of a common out-of-order superscalar processor. In contrast, the IXU consists only of functional units and a bypass network only. The IXU is placed at the processor front end and executes instructions in order. The IXU functions as a filter for the OXU. Fetched instructions are first fed to the IXU, and the instructions are executed in order if they are ready to execute. The instructions executed in the IXU are removed from the instruction pipeline and are not executed in the OXU. The IXU does not include dynamic scheduling logic, and thus its energy consumption is low. Evaluation results show that FXA can execute more than 50% of the instructions by using IXU, thereby making it possible to shrink the energy-consuming OXU without incurring performance degradation. As a result, FXA achieves both high performance and low energy consumption. We evaluated FXA and compared it with conventional out-of-order/in-order superscalar processors after ARM big.LITTLE architecture. The results show that FXA achieves performance improvements of 7.4% on geometric mean in SPECCPU INT 2006 benchmark suite relative to a conventional superscalar processor (big), while reducing the energy consumption by 17% in the entire processor. The performance/energy ratio (the inverse of the energy-delay product) of FXA is 25% higher than that of a conventional superscalar processor (big) and 27% higher than that of a conventional in-order superscalar processor (LITTLE).

  • Distributed and Scalable Directory Service in a Parallel File System

    Lixin WANG  Yutong LU  Wei ZHANG  Yan LEI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2015/10/26
      Vol:
    E99-D No:2
      Page(s):
    313-323

    One of the patterns that the design of parallel file systems has to solve stems from the difficulty of handling the metadata-intensive I/O generated by parallel applications accessing a single large directory. We demonstrate a middleware design called SFS to support existing parallel file systems for distributed and scalable directory service. SFS distributes directory entries over data servers instead of metadata servers to offer increased scalability and performance. Firstly, SFS exploits an adaptive directory partitioning based on extendible hashing to support concurrent and unsynchronized partition splitting. Secondly, SFS describes an optimization based on recursive split-ordering that emphasizes speeding up the splitting process. Thirdly, SFS applies a write-optimized index structure to convert slow, small, random metadata updates into fast, large, sequential writes. Finally, SFS gracefully tolerates stale mapping at the clients while maintaining the correctness and consistency of the system. Our performance results on a cluster of 32-servers show our implementation can deliver more than 250,000 file creations per second on average.

61-80hit(489hit)