The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] order(489hit)

161-180hit(489hit)

  • Scattering of Light by a Single Imperfection Core in a Waveguide System

    Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E94-C No:1
      Page(s):
    59-62

    An asymptotic expansion of the amplitude of the scattered wave by an imperfection core in a waveguide system is derived and it is shown that the scattered wave is partially canceled by the direct wave at large distance and a shadow takes place. For z→ ∞ where z is the distance along the waveguide axis the amplitudes of the direct and scattered waves decrease in proportion to z- and in the shadow region the amplitude of the sum of both waves decreases in proportion to z-. To supplement the analytical results some numerical examples are shown.

  • An Efficient Ordered Sequential Cooperative Spectrum Sensing Scheme Based on Evidence Theory in Cognitive Radio

    Nhan NGUYEN-THANH  Insoo KOO  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3248-3257

    Spectrum sensing is a fundamental function for cognitive radio network to protect transmission of primary system. Cooperative spectrum sensing, which can help increasing sensing performance, is regarded as one of the most promising methods in realizing a reliable cognitive network. In such cooperation system, however the communication resources such as sensing time delay, control channel bandwidth and consumption energy for reporting the cognitive radio node's sensing results to the fusion center may become extremely huge when the number of cognitive users is large. In this paper, we propose an ordered sequential cooperative spectrum sensing scheme in which the local sensing data will be sent according to its reliability order to the fusion center. In proposed scheme, the sequential fusion process is sequentially conducted based on Dempster Shafer theory of evidence's combination of the reported sensing results. Above all, the proposed scheme is highly feasible due to the proposed two ordered sequential reporting methods. From simulation results, it is shown that the proposed technique not only keeps the same sensing performance of non-sequential fusion scheme but also extremely reduces the reporting resource requirements.

  • Improved Indoor Location Estimation Using Fluorescent Light Communication System with a Nine-Channel Receiver

    Xiaohan LIU  Hideo MAKINO  Kenichi MASE  

     
    PAPER

      Vol:
    E93-B No:11
      Page(s):
    2936-2944

    The need for efficient movement and precise location of robots in intelligent robot control systems within complex buildings is becoming increasingly important. This paper proposes an indoor positioning and communication platform using Fluorescent Light Communication (FLC) employing a newly developed nine-channel receiver, and discusses a new location estimation method using FLC, that involves a simulation model and coordinate calculation formulae. A series of experiments is performed. Distance errors of less than 25 cm are achieved. The enhanced FLC system yields benefits such as greater precision and ease of use.

  • Phase Offsets for Binary Sequences Using Order and Index

    Young-Joon SONG  

     
    LETTER-Coding Theory

      Vol:
    E93-A No:9
      Page(s):
    1697-1699

    When a zero offset reference sequence is defined, the i-bit shifted sequence has phase offset i with respect to the reference sequence. In this letter, we propose a new algorithm to compute phase offsets for a periodic binary sequence using the concept of order and index of an integer based on the number theoretical approach. We define an offset evaluation function that is used to calculate the phase offset, and derive properties of the function. Once the function is computed, the phase offset of the sequence is simply obtained by taking the index of it. The new algorithm overcomes the restrictions found in conventional methods on the length and the number of '0's and '1's in binary codes. Its application to the code acquisition is also investigated to show the proposed method is useful.

  • MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values

    Hasan KADHEM  Toshiyuki AMAGASA  Hiroyuki KITAGAWA  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E93-D No:9
      Page(s):
    2520-2533

    Encryption can provide strong security for sensitive data against inside and outside attacks. This is especially true in the "Database as Service" model, where confidentiality and privacy are important issues for the client. In fact, existing encryption approaches are vulnerable to a statistical attack because each value is encrypted to another fixed value. This paper presents a novel database encryption scheme called MV-OPES (Multivalued--Order Preserving Encryption Scheme), which allows privacy-preserving queries over encrypted databases with an improved security level. Our idea is to encrypt a value to different multiple values to prevent statistical attacks. At the same time, MV-OPES preserves the order of the integer values to allow comparison operations to be directly applied on encrypted data. Using calculated distance (range), we propose a novel method that allows a join query between relations based on inequality over encrypted values. We also present techniques to offload query execution load to a database server as much as possible, thereby making a better use of server resources in a database outsourcing environment. Our scheme can easily be integrated with current database systems as it is designed to work with existing indexing structures. It is robust against statistical attack and the estimation of true values. MV-OPES experiments show that security for sensitive data can be achieved with reasonable overhead, establishing the practicability of the scheme.

  • A Computer-Aided Distinction Method of Borderline Grades of Oral Cancer

    Mustafa M. SAMI  Masahisa SAITO  Shogo MURAMATSU  Hisakazu KIKUCHI  Takashi SAKU  

     
    PAPER-Image

      Vol:
    E93-A No:8
      Page(s):
    1544-1552

    We have developed a new computer-aided diagnostic system for differentiating oral borderline malignancies in hematoxylin-eosin stained microscopic images. Epithelial dysplasia and carcinoma in-situ (CIS) of oral mucosa are two different borderline grades similar to each other, and it is difficult to distinguish between them. A new image processing and analysis method has been applied to a variety of histopathological features and shows the possibility for differentiating the oral cancer borderline grades automatically. The method is based on comparing the drop-shape similarity level in a particular manually selected pair of neighboring rete ridges. It was found that the considered similarity level in dysplasia was higher than those in epithelial CIS, of which pathological diagnoses were conventionally made by pathologists. The developed image processing method showed a good promise for the computer-aided pathological assessment of oral borderline malignancy differentiation in clinical practice.

  • Robust Reduced Order Observer for Discrete-Time Lipschitz Nonlinear Systems

    Sungryul LEE  

     
    LETTER-Systems and Control

      Vol:
    E93-A No:8
      Page(s):
    1560-1564

    The robust reduced order observer for a class of discrete-time Lipschitz nonlinear systems with external disturbance is proposed. It is shown that the proposed observer design can suppress the effect on the estimation error of external disturbance up to the prescribed level. Also, linear matrix inequalities are used to represent sufficient conditions on the existence of the proposed observer. Moreover, the maximum admissible Lipschitz constant of the proposed design is obtained for a given disturbance attenuation level. Finally, an illustrative example is given to verify the effectiveness of the proposed design.

  • A New Region-Based Active Contour Model with Skewness Wavelet Energy for Segmentation of SAR Images

    Gholamreza AKBARIZADEH  Gholam Ali REZAI-RAD  Shahriar BARADARAN SHOKOUHI  

     
    PAPER

      Vol:
    E93-D No:7
      Page(s):
    1690-1699

    A new method of segmentation for Synthetic Aperture Radar (SAR) images using the skewness wavelet energy has been presented. The skewness is the third order cumulant which measures the local texture along the region-based active contour. Nonlinearity in intensity inhomogeneities often occur in SAR images due to the speckle noise. In this paper we propose a region-based active contour model that is able to use the intensity information in local regions and to cope with the speckle noise and nonlinear intensity inhomogeneity of SAR images. We use a wavelet coefficients energy distribution to analyze the SAR image texture in each sub-band. A fitting energy called skewness wavelet energy is defined in terms of a contour and a functional so that, the regions and their interfaces will be modeled by level set functions. A functional relationship has been calculated on these level sets in terms of the third order cumulant, from which an energy minimization is derived. Minimizing the calculated functions derives the optimal segmentation based on the texture definitions. The results of the implemented algorithm on the test images from the Radarsat SAR images of agricultural and urban regions show a desirable performance of the proposed method.

  • Efficient Method to Measure IMD of Power Amplifier with Simplified Phase Determination Procedure to Clarify Memory Effect Origins

    Takeshi TAKANO  Yasuyuki OHISHI  Shigekazu KIMURA  Michiharu NAKAMURA  Kazuo NAGATANI  Eisuke FUKUDA  Yoshimasa DAIDO  Kiyomichi ARAKI  

     
    PAPER

      Vol:
    E93-C No:7
      Page(s):
    991-999

    This paper describes a time-domain expression based on the physical model of power amplifiers where electric memory effect is considered to be caused by even-order nonlinearity and bias impedance. It is demonstrated that the time-domain expression is consistent with the general memory polynomial reported by D.R. Morgan et al. To confirm validity of the physical model, a simple method is proposed to measure amplitude and phase of IMD by two tone test: the phase is extracted from measured small signal S-parameters of the amplifier under test. The method is applied to a GaN FET amplifier under condition that memory effect is enhanced by applying inductive cable for DC supply. Frequency dependent IMD is fitted by a parallel connection of L, C, and R: it has been confirmed that the frequency dependence of IMD is given by the bias impedance at even order harmonics of envelope frequency. The frequency dependence assures the validity of the physical model as well as the time-domain expression.

  • Approach of Metamaterial-Based Quarter-Wave Resonator and Its Application to Very Compact LTCC Bandpass Filter

    Masaya TAMURA  Toshio ISHIZAKI  Mohammed Reza M. HASHEMI  Tatsuo ITOH  

     
    PAPER

      Vol:
    E93-C No:7
      Page(s):
    1078-1088

    In this paper, a resonator based on composite right/left handed transmission line concept is discussed. This resonator excites --1st order resonance mode. We start with half-wave resonators consisting of two unit cells of a composite right/left handed transmission line. From the simulated field distributions, the center of these half-wave resonators can be short-circuited to obtain a quarter-wave resonator in the --1st mode. Susceptance slope parameters are calculated for the resonator. Then this resonator is applied for a 2-pole filter made by LTCC, which can be designed with standard filter design theory owing to the slope parameter. The dimension of the experimental filter implemented by LTCC is 2.5 mm by 1.35 mm by 0.52 mm. The insertion loss is 1.80 dB at the 2.4 GHz band. Good agreement between measured and computed results is obtained.

  • Space Complexity of TCP for Persistent Packet Reordering

    Chansook LIM  

     
    LETTER-Network

      Vol:
    E93-B No:6
      Page(s):
    1601-1604

    This letter investigates the space complexity of the sender buffer in a TCP variant, TCP-PR, to deal with packet reordering. Our finding is that with the SACK option used, TCP-PR requires the sender buffer of (β+1) pipesize where β indicates the number of RTTs that must pass before packet loss is detected.

  • A New Method for Low SNR Estimation of Noisy Speech Signals Using Fourth-Order Moments

    Roghayeh DOOST  Abolghasem SAYADIAN  Hossein SHAMSI  

     
    PAPER-Speech and Hearing

      Vol:
    E93-D No:6
      Page(s):
    1599-1607

    In this paper the SNR estimation is performed frame by frame, during the speech activity. For this purpose, the fourth-order moments of the real and imaginary parts of frequency components are extracted, for both the speech and noise, separately. For each noisy frame, the mentioned fourth-order moments are also estimated. Making use of the proposed formulas, the signal-to-noise ratio is estimated in each frequency index of the noisy frame. These formulas also predict the overall signal-to-noise ratio in each noisy frame. What makes our method outstanding compared to conventional approaches is that this method takes into consideration both the speech and noise identically. It estimates the negative SNR almost as well as the positive SNR.

  • Fourier Magnitude-Based Privacy-Preserving Clustering on Time-Series Data

    Hea-Suk KIM  Yang-Sae MOON  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E93-D No:6
      Page(s):
    1648-1651

    Privacy-preserving clustering (PPC in short) is important in publishing sensitive time-series data. Previous PPC solutions, however, have a problem of not preserving distance orders or incurring privacy breach. To solve this problem, we propose a new PPC approach that exploits Fourier magnitudes of time-series. Our magnitude-based method does not cause privacy breach even though its techniques or related parameters are publicly revealed. Using magnitudes only, however, incurs the distance order problem, and we thus present magnitude selection strategies to preserve as many Euclidean distance orders as possible. Through extensive experiments, we showcase the superiority of our magnitude-based approach.

  • Video Quality Assessment Using Spatio-Velocity Contrast Sensitivity Function

    Keita HIRAI  Jambal TUMURTOGOO  Ayano KIKUCHI  Norimichi TSUMURA  Toshiya NAKAGUCHI  Yoichi MIYAKE  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E93-D No:5
      Page(s):
    1253-1262

    Due to the development and popularization of high-definition televisions, digital video cameras, Blu-ray discs, digital broadcasting, IP television and so on, it plays an important role to identify and quantify video quality degradations. In this paper, we propose SV-CIELAB which is an objective video quality assessment (VQA) method using a spatio-velocity contrast sensitivity function (SV-CSF). In SV-CIELAB, motion information in videos is effectively utilized for filtering unnecessary information in the spatial frequency domain. As the filter to apply videos, we used the SV-CSF. It is a modulation transfer function of the human visual system, and consists of the relationship among contrast sensitivities, spatial frequencies and velocities of perceived stimuli. In the filtering process, the SV-CSF cannot be directly applied in the spatial frequency domain because spatial coordinate information is required when using velocity information. For filtering by the SV-CSF, we obtain video frames separated in spatial frequency domain. By using velocity information, the separated frames with limited spatial frequencies are weighted by contrast sensitivities in the SV-CSF model. In SV-CIELAB, the criteria are obtained by calculating image differences between filtered original and distorted videos. For the validation of SV-CIELAB, subjective evaluation experiments were conducted. The subjective experimental results were compared with SV-CIELAB and the conventional VQA methods such as CIELAB color difference, Spatial-CIELAB, signal to noise ratio and so on. From the experimental results, it was shown that SV-CIELAB is a more efficient VQA method than the conventional methods.

  • On Best-Effort Packet Reordering for Mitigating the Effects of Out-of-Order Delivery on Unmodified TCP

    John Russell LANE  Akihiro NAKAO  

     
    PAPER

      Vol:
    E93-B No:5
      Page(s):
    1095-1103

    Multipath routing and the ability to simultaneously use multiple network paths has long been proposed as a means for meeting the reliability and performance improvement goals of a next generation Internet. However, its use causes out-of-order packet delivery, which is well known to hinder TCP performance. While next-generation transport protocols will no doubt better cope with this phenomenon, a complete switch to these new protocols cannot be made on all devices "overnight"; the reality is that we will be forced to continue using TCP on such multipath networks well after deployment of a future Internet is complete. In this paper, we investigate the use of best-effort packet reordering -- an optional network layer service for improving the performance of any TCP session in the presence of out-of-order packet delivery. Such a service holds the promise of allowing unmodified TCP to take advantage of the reliability and performance gains offered by a future multipath-enabled Internet without suffering the adverse performance effects commonly associated with out-of-order packet delivery. Our experiments test the performance of two common TCP variants under packet dispersion with differing numbers of paths and amounts of inter-path latency variance. They were conducted using multipath network and packet reorderer implementations implemented within the Emulab testbed. Our results demonstrate that a simple best-effort reordering service can insulate TCP from the type of reordering that might be expected from use of packet dispersion over disjoint paths in a wide-area network, and is capable of providing significant performance benefits with few ill side-effects.

  • Efficient Window Processing over Disordered Data Streams

    Hyeon-Gyu KIM  Woo-Lam KANG  Myoung-Ho KIM  

     
    LETTER-Database

      Vol:
    E93-D No:3
      Page(s):
    635-638

    Bursty and out-of-order tuple arrivals complicate the process of determining contents and boundaries of sliding windows. To process windows over such streams efficiently, we need to address two issues regarding fast tuple insertion and disorder control. In this paper, we focus on these issues to process sliding windows efficiently over disordered data streams.

  • Closed Form Solutions to L2-Sensitivity Minimization Subject to L2-Scaling Constraints for Second-Order State-Space Digital Filters with Real Poles

    Shunsuke YAMAKI  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Vol:
    E93-A No:2
      Page(s):
    476-487

    This paper proposes closed form solutions to the L2-sensitivity minimization subject to L2-scaling constraints for second-order state-space digital filters with real poles. We consider two cases of second-order digital filters: distinct real poles and multiple real poles. The proposed approach reduces the constrained optimization problem to an unconstrained optimization problem by appropriate variable transformation. We can express the L2-sensitivity by a simple linear combination of exponential functions and formulate the L2-sensitivity minimization problem by a simple polynomial equation. As a result, L2-sensitivity is expressed in closed form, and its minimization subject to L2-scaling constraints is achieved without iterative calculations.

  • Propagation of Light in a Disordered Waveguide System: Average Amplitude

    Akira KOMIYAMA  

     
    PAPER

      Vol:
    E93-C No:1
      Page(s):
    46-51

    The coupled mode equation describing the propagation of light in a disordered waveguide system composed of randomly different cores in size is analytically solved by the perturbation method and the average amplitude of light is derived. In the summation of a perturbation series only successive scatterings from different cores are taken into account. The result obtained shows that the average amplitude behaves as if in an ordered waveguide system composed of identical cores at short distance and decreases exponentially with increasing distance at large distance. The result is compared with the result obtained by the coherent potential approximation and the both results are in good agreement with each other. The results are also compared with the results obtained by numerically solving the coupled mode equation.

  • Scan Chain Ordering to Reduce Test Data for BIST-Aided Scan Test Using Compatible Scan Flip-Flops

    Hiroyuki YOTSUYANAGI  Masayuki YAMAMOTO  Masaki HASHIZUME  

     
    PAPER

      Vol:
    E93-D No:1
      Page(s):
    10-16

    In this paper, the scan chain ordering method for BIST-aided scan test for reducing test data and test application time is proposed. In this work, we utilize the simple LFSR without a phase shifter as PRPG and configure scan chains using the compatible set of flip-flops with considering the correlations among flip-flops in an LFSR. The method can reduce the number of inverter codes required for inverting the bits in PRPG patterns that conflict with ATPG patterns. The experimental results for some benchmark circuits are shown to present the feasibility of our test method.

  • Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks

    Yukiyasu TSUNOO  Teruo SAITO  Maki SHIGERI  Takeshi KAWABATA  

     
    PAPER-Cryptanalysis

      Vol:
    E93-A No:1
      Page(s):
    144-152

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 254.1 and a computational complexity of 2120.8, which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.

161-180hit(489hit)