The search functionality is under construction.
The search functionality is under construction.

IEICE TRANSACTIONS on Information

  • Impact Factor

    0.59

  • Eigenfactor

    0.002

  • article influence

    0.1

  • Cite Score

    1.4

Advance publication (published online immediately after acceptance)

Volume E92-D No.6  (Publication Date:2009/06/01)

    Regular Section
  • A Solution of the All-Pairs Shortest Paths Problem on the Cell Broadband Engine Processor

    Kazuya MATSUMOTO  Stanislav G. SEDUKHIN  

     
    PAPER-Computation and Computational Models

      Page(s):
    1225-1231

    The All-Pairs Shortest Paths (APSP) problem is a graph problem which can be solved by a three-nested loop program. The Cell Broadband Engine (Cell/B.E.) is a heterogeneous multi-core processor that offers the high single precision floating-point performance. In this paper, a solution of the APSP problem on the Cell/B.E. is presented. To maximize the performance of the Cell/B.E., a blocked algorithm for the APSP problem is used. The blocked algorithm enables reuse of data in registers and utilizes the memory hierarchy. We also describe several optimization techniques for effective implementation of the APSP problem on the Cell/B.E. The Cell/B.E. achieves the performance of 8.45 Gflop/s for the APSP problem by using one SPE and 50.6 Gflop/s by using six SPEs.

  • Fuzzy Entropy Based Fuzzy c-Means Clustering with Deterministic and Simulated Annealing Methods

    Makoto YASUDA  Takeshi FURUHASHI  

     
    PAPER-Computation and Computational Models

      Page(s):
    1232-1239

    This article explains how to apply the deterministic annealing (DA) and simulated annealing (SA) methods to fuzzy entropy based fuzzy c-means clustering. By regularizing the fuzzy c-means method with fuzzy entropy, a membership function similar to the Fermi-Dirac distribution function, well known in statistical mechanics, is obtained, and, while optimizing its parameters by SA, the minimum of the Helmholtz free energy for fuzzy c-means clustering is searched by DA. Numerical experiments are performed and the obtained results indicate that this combinatorial algorithm of SA and DA can represent various cluster shapes and divide data more properly and stably than the standard single DA algorithm.

  • A New Signature-Based Indexing Scheme for Efficient Trajectory Retrieval in Spatial Networks

    Jae-Woo CHANG  Jung-Ho UM  

     
    PAPER-Database

      Page(s):
    1240-1249

    Even though it is very important to retrieve similar trajectories with a given query trajectory, there has been a little research on trajectory retrieval in spatial networks, like road networks. In this paper, we propose an efficient indexing scheme for retrieving moving object trajectories in spatial networks. For this, we design a signature-based indexing scheme for efficiently dealing with the trajectories of current moving objects as well as for maintaining those of past moving objects. In addition, we provide an insertion algorithm for storing the segment information of a moving object trajectory as well as a retrieval algorithm to find a set of moving objects whose trajectories match the segments of a query trajectory. Finally, we show that our signature-based indexing scheme achieves at least twice better performance on trajectory retrieval than the leading trajectory indexing schemes, such as TB-tree, FNR-tree, and MON-tree.

  • Feature Interaction Verification Using Unbounded Model Checking with Interpolation

    Takafumi MATSUO  Tatsuhiro TSUCHIYA  Tohru KIKUNO  

     
    PAPER-Dependable Computing

      Page(s):
    1250-1259

    In this paper, we propose an unbounded model checking method for feature interaction verification for telecommunication systems. Unbounded model checking is a SAT-based verification method and has attracted recent attention as a powerful approach. The interpolation-based approach is one of the most promising unbounded model checking methods and has been proven to be effective for hardware verification. However, the application of unbounded model checking to asynchronous systems, such as telecommunication systems, has rarely been practiced. This is because, with the conventional encoding, the behavior of an asynchronous system can only be represented as a large propositional formula, thus resulting in large computational cost. To overcome this problem we propose to use a new scheme for encoding the behavior of the system and adapt the unbounded model checking algorithm to this encoding. By exploiting the concurrency of an asynchronous system, this encoding scheme allows a very concise formula to represent system's behavior. To demonstrate the effectiveness of our approach, we conduct experiments where 21 pairs of telecommunication services are verified using several methods including ours. The results show that our approach exhibits significant speed-up over unbounded model checking using the traditional encoding.

  • Online Timing Correlation of Streaming Data with Uncertain Timestamps

    Chan-gun LEE  Aloysius K. MOK  Prabhudev KONANA  

     
    PAPER-Dependable Computing

      Page(s):
    1260-1267

    We introduce the interval timing correlation, which can establish timing correlation conditions to handle interval timing timestamps. Interval timestamps are adopted to handle the temporal uncertainties in the timestamps of stream data. A probabilistic querying approach is taken in order to support timing predicates such as deadline, delay, and within over interval timestamps. A timing correlation condition entails a desired confidence threshold (minimum satisfaction probability). We define the interval timing correlation and discuss how to implement the algorithm. We present an analysis result which can effectively identify only tuples that need to be considered in determining the correlation. The performance of the proposed algorithm is shown.

  • A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Takamichi SAITO  

     
    PAPER-Application Information Security

      Page(s):
    1268-1279

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  • User and Device Adaptation in Summarizing Sports Videos

    Naoko NITTA  Noboru BABAGUCHI  

     
    PAPER-Image Processing and Video Processing

      Page(s):
    1280-1288

    Video summarization is defined as creating a video summary which includes only important scenes in the original video streams. In order to realize automatic video summarization, the significance of each scene needs to be determined. When targeted especially on broadcast sports videos, a play scene, which corresponds to a play, can be considered as a scene unit. The significance of every play scene can generally be determined based on the importance of the play in the game. Furthermore, the following two issues should be considered: 1) what is important depends on each user's preferences, and 2) the summaries should be tailored for media devices that each user has. Considering the above issues, this paper proposes a unified framework for user and device adaptation in summarizing broadcast sports videos. The proposed framework summarizes sports videos by selecting play scenes based on not only the importance of each play itself but also the users' preferences by using the metadata, which describes the semantic content of videos with keywords, and user profiles, which describe users' preference degrees for the keywords. The selected scenes are then presented in a proper way using various types of media such as video, image, or text according to device profiles which describe the device type. We experimentally verified the effectiveness of user adaptation by examining how the generated summaries are changed by different preference degrees and by comparing our results with/without using user profiles. The validity of device adaptation is also evaluated by conducting questionnaires using PCs and mobile phones as the media devices.

  • Interactive Region Matching for 2D Animation Coloring Based on Feature's Variation

    Pablo GARCIA TRIGO  Henry JOHAN  Takashi IMAGIRE  Tomoyuki NISHITA  

     
    PAPER-Image Recognition, Computer Vision

      Page(s):
    1289-1295

    We propose an interactive method for assisting the coloring process of 2D hand-drawn animated cartoons. It segments input frames (each hand-drawn drawing of the cartoon) into regions (areas surrounded by closed lines. E.g. the head, the hands) extracts their features, and then matches the regions between frames, allowing the user to fix coloring mistakes interactively. Its main contribution consists in storing matched regions in lists called "chains" for tracking how the region features vary along the animation. Consequently, the matching rate is improved and the matching mistakes are reduced, thus reducing the total effort needed until having a correctly colored cartoon.

  • Segmenting Shape Using Deformation Information

    Ruiqi GUO  Shinichiro OMACHI  Hirotomo ASO  

     
    PAPER-Image Recognition, Computer Vision

      Page(s):
    1296-1303

    To segment a shape into parts is an important problem in shape representation and analysis. We propose in this paper a novel framework of shape segmentation using deformation models learned from multiple shapes. The deformation model from the target image to every other image is then estimated. Finally, normalized-cut graph partition is applied to the graph constructed based on the similarity of local patches in the target image, and a segmentation of the shape is carried out. Experimental results for images from MPEG7 shape database show the effectiveness of the proposed method.

  • Single-View Sketch Based Surface Modeling

    Alexis ANDRE  Suguru SAITO  Masayuki NAKAJIMA  

     
    PAPER-Image Recognition, Computer Vision

      Page(s):
    1304-1311

    We propose a sketch-based modeling system where all user input is performed from a unique viewpoint. The strokes drawn by the user must not then be restricted to the drawing plane: their orientation in the 3D space is automatically determined by the system. The desired surface is reconstructed from a grid made of two groups of similar lines, that are considered co-planar. The orientation of the two sets of planes is determined by assuming that at the intersection of a representative line of each group, those two lines are perpendicular.

  • Estimation of Optimal Parameter in ε-Filter Based on Signal-Noise Decorrelation

    Mitsuharu MATSUMOTO  Shuji HASHIMOTO  

     
    LETTER-Algorithm Theory

      Page(s):
    1312-1315

    ε-filter is a nonlinear filter for reducing noise and is applicable not only to speech signals but also to image signals. The filter design is simple and it can effectively reduce noise with an adequate filter parameter. This paper presents a method for estimating the optimal filter parameter of ε-filter based on signal-noise decorrelation and shows that it yields the optimal filter parameter concerning a wide range of noise levels. The proposed method is applicable where the noise to be removed is uncorrelated with signal, and it does not require any other knowledge such as noise variance and training data.

  • Cross-Domain Service Composition in OSGi Environments

    Choonhwa LEE  Seungjae LEE  Eunsam KIM  Wonjun LEE  

     
    LETTER-System Programs

      Page(s):
    1316-1319

    This letter presents a new approach to provide inter-domain service compositions for OSGi environments. Our proposal of remote wire objects extends OSGi's wiring capability across the framework boundaries, so that even remote services can join in the composition. Hence, a better composition is made possible with a richer set of candidate services from foreign domains.

  • Optimal Gain Filter Design for Perceptual Acoustic Echo Suppressor

    Kihyeon KIM  Hanseok KO  

     
    LETTER-Speech and Hearing

      Page(s):
    1320-1323

    This Letter proposes an optimal gain filter for the perceptual acoustic echo suppressor. We designed an optimally-modified log-spectral amplitude estimation algorithm for the gain filter in order to achieve robust suppression of echo and noise. A new parameter including information about interferences (echo and noise) of single-talk duration is statistically analyzed, and then the speech absence probability and the a posteriori SNR are judiciously estimated to determine the optimal solution. The experiments show that the proposed gain filter attains a significantly improved reduction of echo and noise with less speech distortion.

  • H.264 Fast Inter-Mode Selection Based on Coded Block Patterns

    Shih-Hsuan YANG  Bo-Yuan CHEN  Kuo-Hsin WANG  

     
    LETTER-Image Processing and Video Processing

      Page(s):
    1324-1327

    A new H.264 fast inter-mode decision algorithm based on coded block patterns is presented. Compared to the exhaustive mode search, the proposed method achieves an average 57 % reduction in computation time with negligible degradation in visual quality. The speed and rate-distortion performance is comparable to known fast algorithms that involve more elaborate mechanisms.

  • A Basic Study on Stimulation Pulse Width Determination for Dynamic Presentation of Electrocutaneous Sensation Patterns

    Yuka MINEGISHI  Takashi WATANABE  Makoto YOSHIZAWA  

     
    LETTER-Biological Engineering

      Page(s):
    1328-1330

    In this study, we aimed to realize a method of presenting dynamic electrocutaneous sensation patterns as a user interface for persons with disabilities. In this study, the previously used pulse width (200 µs) was used in pattern recognition testing on the forearm and was compared with the short pulse width (80 µs) used for stimulation. A cathodic pulse with a frequency of 100 pps, which was suggested to be suitable in our previous study, was used. Experimental results on neurologically intact subjects suggested that the previously used pulse width was suitable and that a short pulse width would not be effective for stabilizing the stimulation amplitude or for improving the pattern recognition ability of our method.