The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] tin(3578hit)

2221-2240hit(3578hit)

  • Automatic Scoring for Prosodic Proficiency of English Sentences Spoken by Japanese Based on Utterance Comparison

    Yoichi YAMASHITA  Keisuke KATO  Kazunori NOZAWA  

     
    PAPER-Speech Synthesis and Prosody

      Vol:
    E88-D No:3
      Page(s):
    496-501

    This paper describes techniques of scoring prosodic proficiency of English sentences spoken by Japanese. The multiple regression model predicts the prosodic proficiency using new prosodic measures based on the characteristics of Japanese novice learners of English. Prosodic measures are calculated by comparing prosodic parameters, such as F0, power and duration, of learner's and native speaker's speech. The new measures include the approximation error of the fitting line and the comparison result of prosodic parameters for a limited segment of the word boundary rather than the whole utterance. This paper reveals that the introduction of the new measures improved the correlation by 0.1 between the teachers' and automatic scores.

  • Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems

    Wook SHIN  Jong-Youl PARK  Dong-Ik LEE  

     
    PAPER-Application Information Security

      Vol:
    E88-D No:3
      Page(s):
    619-627

    The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate attack trials from normal behaviors. This paper shows the specification of the extended concept and model, and presents simple analysis results.

  • An Adaptive Dynamic Buffer Management (ADBM) Approach for Input Buffers in ATM Networks

    Ricardo CITRO  Tony S. LEE  Seong-Soon JOO  Sumit GHOSH  

     
    PAPER-Switching for Communications

      Vol:
    E88-B No:3
      Page(s):
    1084-1096

    Current literature on input buffer management reveals that, in representative ATM networks under highly bursty traffic conditions, the fuzzy thresholding approach yields lower cell loss rate at the cost of lower throughput. Also, under less bursty traffic, the traditional fixed thresholding approach achieves higher throughput at the expense of higher cell loss rate. The integration of these two properties into practice is termed adaptive dynamic buffer management (ADBM) approach for input buffers and its assessment is the objective of this paper. The argument is that, given that the traffic conditions are constantly changing, to achieve efficiency during actual operation, the network control must dynamically switch, at every ATM switch, under the call processor's control, between the two input buffer management techniques, dictated by the nature of the traffic at the inputs of the corresponding switch. The need to involve the call processor marks the first effort in the literature to dynamically configure input buffer management architectures at the switch fabric level under higher level call processor control. It stems from the fact that the switch fabric operates very fast and cannot engage in complex decision making without incurring stiff penalty. To achieve this goal, the network control needs knowledge of the burstiness of the traffic at the inputs of every ATM switch. The difficulties with this need are two-fold. First, it is not always easy to obtain the traffic model and model parameters for a specific user's call. Second, even where the traffic model and the model parameters are known for a specific user's call, this knowledge is valid only at the source switch where the user interfaces with the network. At all other switches in the network, the cells of the traffic in question interact asynchronously with the cells from other traffic sources and are subject to statistical multiplexing. Thus, to obtain the exact nature of the composite traffic at the inputs of any ATM switch, is a challenge. Conceivably, one may determine the burstiness by counting the number of cells incurred at the inputs of an ATM switch over a defined time interval. The challenge posed by this proposition lies in the very definition of burstiness in that the time interval must approach, in the limit, zero or the resolution of time in the network. To address this challenge, first, a 15-node representative ATM network is modeled in an asynchronous, distributed simulator and, second, simulated on a network of workstations under realistic traffic stimuli. Third, burstiness indices are measured for the synthetic, stochastic traffic at the inputs of every ATM switch as a function of the progress of simulation for different choices of time interval values, ranging from 20,000 timesteps down to 1,000 timesteps. A timestep equals 2.73 µs. Results reveal that consistent burstiness indices are obtained for interval choices between 1,000 and 5,000 timesteps and that a burstiness index of 25, measured at 3,000 timestep interval, constitutes a reasonable and practical threshold value that distinguishes highly bursty traffic that warrants the use of the fuzzy thresholding approach from less bursty traffic that can benefit from the fixed thresholding scheme. A comparative performance analysis of ADBM yields the following. For pure fixed and pure fuzzy thresholding schemes, the throughputs are at 73.88% and 71.53% while the cell drop rates are at 4.31% and 2.44%,respectively. For the ADBM approach, where the input buffer management alternates at each individual ATM switch between the fixed and fuzzy schemes, governed by measured burstiness index threshold of 25 for a 3,000 timestep interval, the throughput is 74.77%, which is higher than even the pure fixed scheme while the cell drop rate is 2.21% that is lower than that of the pure fuzzy scheme. In essence, ADBM successfully integrates the best characteristics of the fuzzy and fixed thresholding schemes.

  • Continuous Speech Recognition Based on General Factor Dependent Acoustic Models

    Hiroyuki SUZUKI  Heiga ZEN  Yoshihiko NANKAKU  Chiyomi MIYAJIMA  Keiichi TOKUDA  Tadashi KITAMURA  

     
    PAPER-Feature Extraction and Acoustic Medelings

      Vol:
    E88-D No:3
      Page(s):
    410-417

    This paper describes continuous speech recognition incorporating the additional complement information, e.g., voice characteristics, speaking styles, linguistic information and noise environment, into HMM-based acoustic modeling. In speech recognition systems, context-dependent HMMs, i.e., triphone, and the tree-based context clustering have commonly been used. Several attempts to utilize not only phonetic contexts, but additional complement information based on context (factor) dependent HMMs have been made in recent years. However, when the additional factors for testing data are unobserved, methods for obtaining factor labels is required before decoding. In this paper, we propose a model integration technique based on general factor dependent HMMs for decoding. The integrated HMMs can be used by a conventional decoder as standard triphone HMMs with Gaussian mixture densities. Moreover, by using the results of context clustering, the proposed method can determine an optimal number of mixture components for each state dependently of the degree of influence from additional factors. Phoneme recognition experiments using voice characteristic labels show significant improvements with a small number of model parameters, and a 19.3% error reduction was obtained in noise environment experiments.

  • Delay Fault Testing of Processor Cores in Functional Mode

    Virendra SINGH  Michiko INOUE  Kewal K. SALUJA  Hideo FUJIWARA  

     
    PAPER-Dependable Computing

      Vol:
    E88-D No:3
      Page(s):
    610-618

    This paper proposes an efficient methodology of delay fault testing of processor cores using their instruction sets. These test vectors can be applied in the functional mode of operation, hence, self-testing of processor core becomes possible for path delay fault testing. The proposed approach uses a graph theoretic model (represented as an Instruction Execution Graph) of the datapath and a finite state machine model of the controller for the elimination of functionally untestable paths at the early stage without looking into the circuit details and extraction of constraints for the paths that can potentially be tested. Parwan and DLX processors are used to demonstrate the effectiveness of our method.

  • A New Routing Protocol Using Route Redundancy in Ad Hoc Networks

    Sangkyung KIM  Sunshin AN  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    1000-1008

    This paper proposes a new ad hoc routing protocol using route redundancy as one of route selection criteria. It is important to provide redundancy for the route from source to destination in mobile ad hoc networks that are susceptible to failure. Route redundancy implies the relative possibility that redundant paths will exist on a route to be built up. Our proposal aims to establish a route that contains more redundant paths toward a destination node by involving intermediate nodes with relatively more adjacent nodes in a possible route. Our approach can localize the effects of route failures, and reduce control traffic overhead and route reconfiguration time by enhancing the reachability to the destination node without source-initiated route rediscoveries at route failures. We show the route setup procedure considering link redundancy and the route reconfiguration procedures employing redundant path information at the intermediate nodes. Further, this paper presents a new route maintenance protocol. Most of existing ad hoc routing protocols re-initiate a route query procedure when a destination node moves away and a route failure occurs. However, our scheme makes the destination node find a neighbor node that knows the way to the source node and establish a partial route to the neighbor node. If the destination node can find any and connect to it, the route will be recovered. This produces less control overhead than a source-initiated route discovery. We show the performance of our routing schemes through simulations using the Network Simulator 2 (ns-2).

  • Adaptive Diagnosis of Variants of the Hypercube

    Aya OKASHITA  Toru ARAKI  Yukio SHIBATA  

     
    PAPER-Graphs and Networks

      Vol:
    E88-A No:3
      Page(s):
    728-735

    System-level fault diagnosis deals with the problem of identifying faulty nodes (processors) in a multiprocessor system. Each node is faulty or fault-free, and it can test other nodes in the system, and outputs the test results. The test result from a node is reliable if the node is fault-free, but the result is unreliable if it is faulty. In this paper, we prove that four variants of the hypercube: the crossed cube, the twisted cube, the Mobius cube, and the enhanced cube, are adaptively diagnosed using at most 4 parallel testing rounds, with at most n faulty nodes (for the enhanced cube, with at most n + 1 faulty nodes), where each processor participates in at most one test in each round. Furthermore, we propose another diagnosis algorithm for the n-dimensional enhanced cube with at most n + 1 faulty nodes, and show that it is adaptively diagnosed with at most 5 rounds in the worst case, but with at most 3 rounds if the number of existing faulty nodes is at most n -log(n + 1).

  • Impact of Protocols and Network Configuration on Node-Level Availability in Sensor Networks

    Toshiaki TSUCHIYA  Hiroshi SAITO  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    981-990

    We investigate the effects of the performance of sensor networks on network availability and in turn evaluate the impact of protocols and network configuration on these effects. The typical wireless sensor network of the future consists of a large number of micro-sized sensors that are equipped with batteries of limited capacity. In such a network, energy consumption is one of the most important issues. Several representative protocols that are applied in ring and linear network configurations are analyzed, and explicit formulae for network availability are derived for each of them. Numerical values derived by using these formulae yielded the surprising result that backup routes do not always improve network availability. This is because the loads imposed by the backup routes on network segments that do not include dead sensor nodes reduce sensor-node lifetimes in these segments.

  • A Genetic Algorithm for Routing with an Upper Bound Constraint

    Jun INAGAKI  Miki HASEYAMA  

     
    LETTER-Biocybernetics, Neurocomputing

      Vol:
    E88-D No:3
      Page(s):
    679-681

    This paper presents a method of searching for the shortest route via the most designated points with the length not exceeding the preset upper bound. The proposed algorithm can obtain the quasi-optimum route efficiently and its effectiveness is verified by applying the algorithm to the actual map data.

  • A Receiver Authentication and Group Key Delivery Protocol for Secure Multicast

    Hidetoshi UENO  Hideharu SUZUKI  Norihiro ISHIKAWA  Osamu TAKAHASHI  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    1139-1148

    We propose receiver authentication and group key delivery protocol (AKDP) to realize secure multicast communication. AKDP provides three principal functions: 1) group key delivery for data confidentiality, 2) receiver access control to cope with denial of service and 3) receiver authentication for user accounting. AKDP has a negotiation function to choose and offer only those functions required by the situation. We evaluate the feasibility of AKDP by developing a prototype system and show that total communication time is acceptable (i.e. 406 ms). We also show that the negotiation function of AKDP reduces total communication time because unnecessary functions can be skipped. We demonstrate that the negotiation function reduces the total communication time by 52% if user accounting is not executed. We also find that the scalability of group control and key server is not insignificant if multiple receivers access it simultaneously; however, we also propose a secure multicast architecture that can accommodate multiple servers and so guarantee scalability.

  • Spectrum Tuning of Fiber Bragg Gratings by Strain Distributions and Its Applications

    Chee Seong GOH  Sze Yun SET  Kazuro KIKUCHI  

     
    PAPER

      Vol:
    E88-C No:3
      Page(s):
    363-371

    We report tunable optical devices based on fiber Bragg gratings (FBGs), whose filtering characteristics are controlled by strain distributions. These devices include a widely wavelength tunable filter, a tunable group-velocity dispersion (GVD) compensator, a tunable dispersion slope (DS) compensator, and a variable-bandwidth optical add/drop multiplexer (OADM), which will play important roles for next-generation reconfigurable optical networks.

  • Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning

    Kichan BAE  Hyunsoo YOON  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    973-980

    Energy-efficient operations are essential to prolonging the lifetime of wireless sensor networks. Clustering sensor nodes is one approach that can reduce energy consumption by aggregating data, controlling transmission power levels, and putting redundant sensor nodes to sleep. To distribute the role of a cluster head, clustering approaches should be based on efficient cluster configuration schemes. Therefore, low overhead in the cluster configuration process is one of the key constraints for energy-efficient clustering. In this paper, we present an autonomous clustering approach using a coverage estimation-based self-pruning algorithm. Our strategy for clustering is to allow the best candidate node within its own cluster range to declare itself as a cluster head and to dominate the other nodes in the range. This same self-declaration strategy is also used in the active sensor election process. As a result, the proposed scheme can minimize clustering overheads by obviating both the requirements of collecting neighbor information beforehand and the iterative negotiating steps of electing cluster heads. The proposed scheme allows any type of sensor network application, including spatial query execution or periodic environment monitoring, to operate in an energy-efficient manner.

  • New Switching Control for Synchronous Rectifications in Low-Voltage Paralleled Converter System without Voltage and Current Fluctuations

    Hiroshi SHIMAMORI  Teruhiko KOHAMA  Tamotsu NINOMIYA  

     
    PAPER-Electronic Circuits

      Vol:
    E88-C No:3
      Page(s):
    395-402

    Paralleled converter system with synchronous rectifiers (SRs) causes several problems such as surge voltage, inhalation current and circulating current. Generally, the system stops operation of the SRs in light load to avoid these problems. However, simultaneously, large voltage fluctuations in the output of the modules are occurred due to forward voltage drop of diode. The fluctuations cause serious faults to the semiconductor devices working in very low voltage such as CPU and VLSI. Moreover, the voltage fluctuations generate unstable current fluctuations in the paralleled converter system with current-sharing control. This paper proposes new switching control methods for rectifiers to reduce the voltage and current fluctuations. The effectiveness of the proposed methods is confirmed by computer simulation and experimental results.

  • Access Control for Security and Privacy in Ubiquitous Computing Environments

    Shigeki YAMADA  Eiji KAMIOKA  

     
    INVITED PAPER

      Vol:
    E88-B No:3
      Page(s):
    846-856

    Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.

  • SDC: A Scalable Approach to Collect Data in Wireless Sensor Networks

    Niwat THEPVILOJANAPONG  Yoshito TOBE  Kaoru SEZAKI  

     
    PAPER-Software Platform Technologies

      Vol:
    E88-B No:3
      Page(s):
    890-902

    In this paper, we present Scalable Data Collection (SDC) protocol, a tree-based protocol for collecting data over multi-hop, wireless sensor networks. The design of the protocol aims to satisfy the requirements of sensor networks that every sensor transmits sensed data to a sink node periodically or spontaneously. The sink nodes construct the tree by broadcasting a HELLO packet to discover the child nodes. The sensor receiving this packet decides an appropriate parent to which it will attach, it then broadcasts the HELLO packet to discover its child nodes. Based on this process, the tree is quickly created without flooding of any routing packets. SDC avoids periodic updating of routing information but the tree will be reconstructed upon node failures or adding of new nodes. The states required on each sensor are constant and independent of network size, thereby SDC scales better than the existing protocols. Moreover, each sensor can make forwarding decisions regardless of the knowledge on geographical information. We evaluate the performance of SDC by using the ns-2 simulator and comparing with Directed Diffusion, DSR, AODV, and OLSR. The simulation results demonstrate that SDC achieves much higher delivery ratio and lower delay as well as scalability in various scenarios.

  • A New 3-D Display Method Using 3-D Visual Illusion Produced by Overlapping Two Luminance Division Displays

    Hideaki TAKADA  Shiro SUYAMA  Kenji NAKAZAWA  

     
    PAPER-Electronic Displays

      Vol:
    E88-C No:3
      Page(s):
    445-449

    We are developing a simple three-dimensional (3-D) display method that uses only two transparent images using luminance division displays without any extra equipment. This method can be applied to not only electronic displays but also the printed sheets. The method utilizes a 3-D visual illusion in which two ordinary images with many edges can be perceived as an apparent 3-D image with continuous depth between the two image planes, when two identical images are overlapped from the midpoint of the observer's eyes and their optical-density ratio is changed according to the desired image depths. We can use transparent printed sheets or transparent liquid crystal displays to display two overlapping transparent images using this 3-D display method. Subjective test results show that the perceived depths changed continuously as the optical-density ratio changed. Deviations of the perceived depths from the average for each observer were sufficiently small. The depths perceived by all six observers coincided well.

  • Game-Theoretic Approach to Capacity and Stability Evaluations of Decentralized Adaptive Route Selections in Wireless Ad Hoc Networks

    Koji YAMAMOTO  Susumu YOSHIDA  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    1009-1016

    A game-theoretic analysis is applied to the evaluation of capacity and stability of a wireless ad hoc network in which each source node independently chooses a route to the destination node so as to enhance throughput. First, the throughput of individual multihop transmission with rate adaptation is evaluated. Observations from this evaluation indicate that the optimal number of hops in terms of the achievable end-to-end throughput depends on the received signal-to-noise ratio. Next, the decentralized adaptive route selection problem in which each source node competes for resources over arbitrary topologies is defined as a game. Numerical results reveal that in some cases this game has no Nash equilibria; i.e., each rational source node cannot determine a unique route. The occurrence of such cases depends on both the transmit power and spatial arrangement of the nodes. Then, the obtained network throughput under the equilibrium conditions is compared to the capacity under centralized scheduling. Numerical results reveal that when the transmit power is low, decentralized adaptive route selection may attain throughput near the capacity.

  • Azim: Direction-Based Service System for Both Indoors and Outdoors

    Yohei IWASAKI  Nobuo KAWAGUCHI  Yasuyoshi INAGAKI  

     
    PAPER-Application

      Vol:
    E88-B No:3
      Page(s):
    1034-1044

    In this paper, we propose an advanced location-based service that we call a direction-based service, which utilizes both the position and direction of a user. The direction-based service enables a user to point to an object of interest for command or investigation. We also describe the design, implementation and evaluations of a direction-based service system named Azim. With this system, the direction of the user can be obtained by a magnetic-based direction sensor. The sensor is also used for azimuth-based position estimation, in which a user's position is estimated by having the user point to and measure azimuths of several markers or objects whose positions are already known. Because this approach does not require any other accurate position sensors or positive beacons, it can be deployed cost-effectively. Also, because the measurements are naturally associated with some degree of error, the position is calculated as a probability distribution. The calculation considers the error of direction measurement and the pre-obtained field information such as obstacles and magnetic field disturbance, which enables robust position measurements even in geomagnetically disturbed environments. For wide-area use, the system also utilizes a wireless LAN to obtain rough position information by identifying base stations. We have implemented a prototype system for the proposed method and some applications for the direction-based services. Furthermore, we have conducted experiments both indoors and outdoors, and exemplified that positioning accuracy by the proposed method is precise enough for a direction-based service.

  • Running Inverse for Implementing Decorrelating Detectors in Synchronous DS/CDMA Systems

    Jung Suk JOO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:3
      Page(s):
    1291-1293

    We propose an efficient method for updating the inverse of the signature waveform cross-correlations (SWC) matrix when the number of users in the synchronous direct-sequence code-division multiple-access (DS/CDMA) system changes. It is shown that the computational complexity of the proposed method is O(n2) in which n represents the number of active users in the system.

  • VFF-PASTd Based Multiple Target Angle Tracking with Angular Innovation

    Yong Kug PYEON  Jun-Seok LIM  Sug-Joon YOON  

     
    LETTER-Navigation, Guidance and Control Systems

      Vol:
    E88-B No:3
      Page(s):
    1313-1319

    Ryu et al.'s recent paper proposed a multiple target angle-tracking algorithm without data association. This algorithm, however, shows degraded performance on evasive maneuvering targets, because the estimated signal subspace is degraded in the algorithm. In this paper, we propose a new algorithm where, VFF-PASTd (Variable Forgetting Factor PASTd) algorithm is applied to the Ryu's algorithm to effectively handle the evasive target tracking with better time-varying signal subspace.

2221-2240hit(3578hit)