IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E92.A, Issue 7
Displaying 1-29 of 29 articles from this issue
Special Section on Recent Advances in Technologies for Assessing System Reliability
  • Shigeru Yanagi
    2009 Volume E92.A Issue 7 Pages 1557
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    Download PDF (52K)
  • Yuki TOYOSAKA, Hideo HIROSE
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1558-1562
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    There are two main methods for pandemic simulations: the SEIR model and the MAS model. The SEIR model can deal with simulations quickly for many homogeneous populations with simple ordinary differential equations; however, the model cannot accommodate many detailed conditions. The MAS model, the multi-agent simulation, can deal with detailed simulations under the many kinds of initial and boundary conditions with simple social network models. However, the computing cost will grow exponentially as the population size becomes larger. Thus, simulations in the large-scale model would hardly be realized unless supercomputers are available. By combining these two methods, we may perform the pandemic simulations in the large-scale model with lower costs. That is, the MAS model is used in the early stage of a pandemic simulation to determine the appropriate parameters to be used in the SEIR model. With these obtained parameters, the SEIR model may then be used. To investigate the validity of this combined method, we first compare the simulation results between the SEIR model and the MAS model. Simulation results of the MAS model and the SEIR model that uses the parameters obtained by the MAS model simulation are found to be close to each other.
    Download PDF (322K)
  • Koichi TOKUNO, Shigeru YAMADA
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1563-1571
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    In this paper, we discuss software performability evaluation considering the real-time property; this is defined as the attribute that the system can complete the task within the stipulated response time limit. We assume that the software system has two operational states from the viewpoint of the end users: one is operating with the desirable performance level according to specification and the other is with degraded performance level. The dynamic software reliability growth process with performance degradation is described by the extended Markovian software reliability model with imperfect debugging. Assuming that the software system can process the multiple tasks simultaneously and that the arrival process of the tasks follows a nonhomogeneous Poisson process, we analyze the distribution of the number of tasks whose processes can be completed within the processing time limit with the infinite server queueing model. We derive several software performability measures considering the real-time property; these are given as the functions of time and the number of debugging activities. Finally, we illustrate several numerical examples of the measures to investigate the impact of consideration of the performance degradation on the system performability evaluation.
    Download PDF (353K)
  • Toshio NAKAGAWA, Kenichiro NARUSE, Sayori MAEJI
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1572-1577
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    We have a job with N tandem tasks each of which is executed successively until it is completed. A double modular system of error detection for the processing of each task is adopted. Either type of checkpoints such as compare-checkpoint or compare-and-store-checkpoint can be placed at the end of tasks. Three schemes for the above process of a job are considered and the mean execution time of each scheme is obtained. Three schemes are compared and the best scheme is determined numerically. As an example, a job with 4 tasks is given and 6 types of schemes are compared numerically. Finally, we consider a majority decision system as an error masking system and compute the mean execution time for three schemes.
    Download PDF (200K)
  • Koji SHINGYOCHI, Hisashi YAMAMOTO
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1578-1584
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    A linear consecutive-k-out-of-n: F system is an ordered sequence of n components. This system fails if, and only if, k or more consecutive components fail. Optimal arrangement is one of the main problems for such kind of system. In this problem, we want to obtain an optimal arrangement of components to maximize system reliability, when all components of the system need not have equal component failure probability and all components are mutually statistically independent. As n becomes large, however, the amount of calculation would be too much to solve within a reasonable computing time even by using a high-performance computer. Hanafusa and Yamamoto proposed applying Genetic Algorithm (GA) to obtain quasi optimal arrangement in a linear consecutive-k-out-of-n: F system. GA is known as a powerful tool for solving many optimization problems. They also proposed ordinal representation, which produces only arrangements satisfying the necessary conditions for optimal arrangements and eliminates redundant arrangements with same system reliabilities produced by reversal of certain arrangements. In this paper, we propose an efficient GA. We have modified the previous work mentioned above to allocate components with low failure probabilities, that is to say reliable components, at equal intervals, because such arrangements seem to have relatively high system reliabilities. Through the numerical experiments, we observed that our proposed GA with interval k provides better solutions than the previous work for the most cases.
    Download PDF (270K)
  • Yuto SAKAI, Koichiro RINSAKA, Tadashi DOHI
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1585-1592
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.
    Download PDF (344K)
  • Hisashi YAMAMOTO, Tomoaki AKIBA, Hideki NAGATSUKA
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1593-1599
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    In this paper, first, we propose a new recursive algorithm for evaluating generalized multi-state k-out-of-n: F systems. This recursive algorithm can be applied to the systems even though the states of all components in the system are assumed to be non-i.i.d. random variables. Our algorithm is useful for any multi-state k-out-of-n: F system, including the decreasing, increasing and constant multi-state k-out-of-n: F system. Furthermore, our algorithm can evaluate the state distributions of the other non-monotonic multi-state k-out-of-n: F systems. Next, we calculate the order of computing time and memory capacity of the proposed algorithm. We perform numerical experiments in the non-i.i.d. case. The results show that the proposed algorithm is efficient for evaluating the system state distribution of multi-state k-out-of-n: F system when n is large and kl are small.
    Download PDF (359K)
  • Nobuyuki TAMURA, Daiki MURAOKA, Tetsushi YUGE, Shigeru YANAGI
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1600-1607
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    This paper considers a two-echelon repair model where several series systems comprising multiple items are operated in each base. We propose a basic model and two modified models. For two models, approximation methods are developed to derive the system availability. The difference between the basic model and the first modified model is whether the normal items in failed series systems are available as spare or not. The second modified model relaxes the assumptions of the first modified model to reflect more realistic situation. We perform numerical analysis for the models to compare their system availabilities and verify the accuracy of the approximation methods.
    Download PDF (227K)
  • Hideki NAGATSUKA, Toshinari KAMAKURA, Tsunenori ISHIOKA
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1608-1614
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    The situations where several population parameters need to be estimated simultaneously arise frequently in wide areas of applications, including reliability modeling, survival analysis and biological study. In this paper, we propose Bayesian methods of estimation of the ordered parameters of the two exponential populations, which incorporate the prior information about the simple order restriction, but sometimes breaks the order restriction. A simulation study shows that the proposed estimators are more efficient (in terms of mean square errors) than the isotonic regression of the maximum likelihood estimators with equal weights. An illustrative example is finally presented.
    Download PDF (239K)
  • Hiroyuki OKAMURA, Tadashi DOHI
    Article type: PAPER
    2009 Volume E92.A Issue 7 Pages 1615-1622
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    This paper proposes a dynamic capture-recapture (DCR) model to estimate not only the total number of software faults but also quantitative software reliability from observed data. Compared to conventional static capture-recapture (SCR) model and usual software reliability models (SRMs) in the past literature, the DCR model can handle dynamic behavior of software fault-detection processes and can evaluate quantitative software reliability based on capture-recapture sampling of software fault data. This is regarded as a unified modeling framework of SCR and SRM with the Bayesian estimation. Simulation experiments under some plausible testing scenarios show that our models are superior to SCR and SRMs in terms of estimation accuracy.
    Download PDF (287K)
Regular Section
  • Young-Geun LEE, Han-Sam JUNG, Ki-Seok CHUNG
    Article type: PAPER
    Subject area: Digital Signal Processing
    2009 Volume E92.A Issue 7 Pages 1623-1632
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    Many DSP applications such as FIR filtering and DCT (discrete cosine transformation) require multiplication with constants. Therefore, optimizing the performance of constant multiplication improves the overall performance of these applications. It is well-known that shifting can replace a constant multiplication if the constant is a power of two. In this paper, we extend this idea in such a way that by employing more than two barrel shifters, we can design highly efficient constant multipliers. We have found that by using two or three shifters, we can generate a large set of constants. Using these constants, we can execute a typical set of FIR or DCT applications with few errors. Furthermore, with variable precision support, we can carry out a fairly large class of DSP applications with high computational efficiency. Compared to conventional multipliers, we can achieve power savings of up to 56% with negligible computational errors.
    Download PDF (1685K)
  • Toshiyuki UTO, Masaaki IKEHARA, Kenji OHUE
    Article type: PAPER
    Subject area: Digital Signal Processing
    2009 Volume E92.A Issue 7 Pages 1633-1641
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    This paper describes a design method of cosine-modulated filter banks (CMFB's) for an efficient coding of images. Whereas the CMFB has advantages of low design and implementation cost, subband filters of the CMFB do not have linear phase property. This prevents from employing a symmetric extension in transformation process, and leads to a degradation of the image compression performance. However, a recently proposed smooth extension alleviates the problem with CMFB's. As a result, well-designed CMFB's can be expected to be good candidates for a transform block in image compression applications. In this paper, we present a novel design approach of regular CMFB's. After introducing a regularity constraint on lattice parameters of a prototype filter in paraunitary (PU) CMFB's, we also derive a regularity condition for perfect reconstruction (PR) CMFB's. Finally, we design regular 8-channel PUCMFB and PRCMFB by an unconstrained optimization of residual lattice parameters, and several simulation results for test images are compared with various transforms for evaluating the proposed image coder based on the CMFB's with one degree of regularity. In addition, we show a computational complexity of the designed CMFB's.
    Download PDF (524K)
  • Kazuhiro KOMATSU, Shuji SANNOMIYA, Makoto IWATA, Hiroaki TERADA, Sugur ...
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2009 Volume E92.A Issue 7 Pages 1642-1651
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    The self-timed pipeline (STP) is one of the most promising VLSI/SoC architectures. It achieves efficient utilization of tens of billions of transistors, consumes ultra low power, and is easy-to-design because of its signal integrity and low electro-magnetic interference. These basic features of the STP have been proven by the development of self-timed data-driven multimedia processors, DDMP's. This paper proposes a novel scheme of interacting self-timed (clockless) pipelines by which the various distributed and interconnected pipelines can achieve highly functional stream processing in future giga-transistor chips. The paper also proposes a set of elementary coupling control modules that facilitate various combinations of flow-thru processing between pipelines, and then discusses the practicality of the proposed scheme through the LSI design of application modules such as a priority-based queue, a mutual interconnection network, and a pipelined sorter.
    Download PDF (883K)
  • Qiang FU, Wai-Shing LUK, Jun TAO, Changhao YAN, Xuan ZENG
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2009 Volume E92.A Issue 7 Pages 1652-1659
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    In this paper, a spectral domain method named the SDF (Spectral Density Fitting) method for intra-die spatial correlation function extraction is presented. Based on theoretical analysis of random field, the spectral density, as the spectral domain counterpart of correlation function, is employed to estimate the parameters of the correlation function effectively in the spectral domain. Compared with the existing extraction algorithm in the original spatial domain, the SDF method can obtain the same quality of results in the spectral domain. In actual measurement process, the unavoidable measurement error with arbitrary frequency components would greatly confound the extraction results. A filtering technique is further developed to diminish the high frequency components of the measurement error and recover the data from noise contamination for parameter estimation. Experimental results have shown that the SDF method is practical and stable.
    Download PDF (449K)
  • Seiichi MATSUDA, Naoki KANAYAMA, Florian HESS, Eiji OKAMOTO
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2009 Volume E92.A Issue 7 Pages 1660-1667
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    We observe a natural generalisation of the ate and twisted ate pairings, which allow for performance improvements in non standard applications of pairings to cryptography like composite group orders. We also give a performance comparison of our pairings and the Tate, ate and twisted ate pairings for certain polynomial families based on operation count estimations and on an implementation, showing that our pairings can achieve a speedup of a factor of up to two over the other pairings.
    Download PDF (244K)
  • Haruhiko KANEKO, Eiji FUJIWARA
    Article type: PAPER
    Subject area: Coding Theory
    2009 Volume E92.A Issue 7 Pages 1668-1676
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    Nonbinary M-ary data processed by data entry systems, such as keyboard devices and character recognition systems, often have various types of error, such as symbol-substitution errors, deletion errors, insertion errors, and adjacent-symbol-transposition errors. This paper proposes nonsystematic M-ary codes capable of correcting these errors. The code is defined as a set of codewords that satisfy three conditions required to correct substitution, deletion/insertion, and adjacent-symbol-transposition errors. Since symbol-substitution errors in data entry systems are usually asymmetric, this paper also presents asymmetric-symbol-substitution error correcting codes capable of correcting deletion, insertion, and adjacent-symbol-transposition errors. For asymmetric-symbol-substitution error correction, we employ a mapping derived from the vertex coloring in an error directionality graph. The evaluation shows that the asymmetric codes have three to five times larger number of codewords than the symmetric codes.
    Download PDF (560K)
  • Masanori HIROTOMO, Masami MOHRI, Masakatu MORII
    Article type: PAPER
    Subject area: Coding Theory
    2009 Volume E92.A Issue 7 Pages 1677-1689
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    Low-density parity-check (LDPC) codes are linear block codes defined by sparse parity-check matrices. The codes exhibit excellent performance under iterative decoding, and the weight distribution is used to analyze lower error probability of their decoding performance. In this paper, we propose a probabilistic method for computing the weight distribution of LDPC codes. The proposed method efficiently finds low-weight codewords in a given LDPC code by using Stern's algorithm, and stochastically computes the low part of the weight distribution from the frequency of the found codewords. It is based on a relation between the number of codewords with a given weight and the rate of generating the codewords in Stern's algorithm. In the numerical results for LDPC codes of length 504, 1008 and 4896, we could compute the weight distribution by the proposed method with greater accuracy than by conventional methods.
    Download PDF (430K)
  • Hideki TANAKA, Takashi MORIE, Kazuyuki AIHARA
    Article type: PAPER
    Subject area: Neural Networks and Bioengineering
    2009 Volume E92.A Issue 7 Pages 1690-1698
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    In this paper, we propose an analog CMOS circuit which achieves spiking neural networks with spike-timing dependent synaptic plasticity (STDP). In particular, we propose a STDP circuit with symmetric function for the first time, and also we demonstrate associative memory operation in a Hopfield-type feedback network with STDP learning. In our spiking neuron model, analog information expressing processing results is given by the relative timing of spike firing events. It is well known that a biological neuron changes its synaptic weights by STDP, which provides learning rules depending on relative timing between asynchronous spikes. Therefore, STDP can be used for spiking neural systems with learning function. The measurement results of fabricated chips using TSMC 0.25µm CMOS process technology demonstrate that our spiking neuron circuit can construct feedback networks and update synaptic weights based on relative timing between asynchronous spikes by a symmetric or an asymmetric STDP circuits.
    Download PDF (897K)
  • Karthik MURALIDHAR, Kwok Hung LI, Sapna GEORGE
    Article type: LETTER
    Subject area: Engineering Acoustics
    2009 Volume E92.A Issue 7 Pages 1699-1703
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    To attain good performance in an acoustic echo cancellation system, it is important to have a variable step size (VSS) algorithm as part of an adaptive filter. In this paper, we are concerned with the development of a VSS algorithm for a recently proposed subband affine projection (SAP) adaptive filter. Two popular VSS algorithms in the literature are the methods of delayed coefficients (DC) and variable regularization (VR). However, the merits and demerits of them are mutually exclusive. We propose a VSS algorithm* that is a hybrid of both methods and combines their advantages. An extensive study of the new algorithm in different scenarios like the presence double-talk (DT) during the transient phase of the adaptive filter, DT during steady state, and varying DT power is conducted and reasoning is given to support the observed behavior. The importance of the method of VR as part of a VSS algorithm is emphasized.
    Download PDF (621K)
  • Fang YANG, Jun WANG, Jintao WANG, Jian SONG, Zhixing YANG
    Article type: LETTER
    Subject area: Noise and Vibration
    2009 Volume E92.A Issue 7 Pages 1704-1707
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    In this paper, a novel consecutive-pilot design is proposed to suppress phase noise (PHN) in orthogonal frequency-division multiplexing (OFDM) system. The estimation of PHN is performed by a cross-correlation between the received and locally generated pilots in frequency-domain. Simulations show that the proposed scheme can effectively ameliorate the impairment due to PHN, at the cost of acceptable additional transmission bandwidth and low implementation complexity.
    Download PDF (332K)
  • Joon-Ik SON, Young-Do IM
    Article type: LETTER
    Subject area: Systems and Control
    2009 Volume E92.A Issue 7 Pages 1708-1712
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    This study involves implementing an intelligent controller using the fuzzy control algorithm to minimize cold weld and splash in inverter AC spot welding. This study presents an experimental curve of a welding output current and the maximum value of the Instantaneous Heating Rate (IHRmax) using the contact diameter of an electrode as the parameter. It also presents the experimental curve of a welding output current and the slope (S) of the instantaneous dynamic resistance using the instantaneous contact area of an electrode as the parameter. To minimize cold weld and splash, this study proposes an intelligent controller that controls the optimum welding current in real time by estimating the contact diameter of an electrode and the contact area of the initial welding part.
    Download PDF (846K)
  • Kuo-Jen LIN
    Article type: LETTER
    Subject area: Circuit Theory
    2009 Volume E92.A Issue 7 Pages 1713-1715
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    A two-quadrant CMOS current divider using a two-variable second-order Taylor series approximation is proposed. The approximation divider is realized with a compact circuit. The simulation results indicate that the compact divider has with sufficient accuracy, small distortion, and high bandwidth for only 1.8V supply voltage.
    Download PDF (196K)
  • Chul-Woong YANG, Ki Yong LEE, Myoung Ho KIM, Yoon-Joon LEE
    Article type: LETTER
    Subject area: Algorithms and Data Structures
    2009 Volume E92.A Issue 7 Pages 1716-1719
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    We propose an efficient dynamic hash index structure suitable for a NAND flash memory environment. Since write operations incur significant overhead in NAND flash memory, our design of index structure focuses on minimizing the number of write operations for hash index updates. Through a set of extensive experiments, we show the effectiveness of the proposed hash index structure in a NAND flash memory environment.
    Download PDF (268K)
  • DaeHun NYANG, Akihiro YAMAMURA
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2009 Volume E92.A Issue 7 Pages 1720-1723
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    By modifying the private key and the public key setting in Boneh-Lynn-Shacham's short signature shcheme, a variation of BLS' short signature scheme is proposed. Based on this variation, we present a very efficient threshold signature scheme where the number of pairing computation for the signaure share verification reduces to half.
    Download PDF (73K)
  • Jong Hwan PARK, Dong Hoon LEE
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2009 Volume E92.A Issue 7 Pages 1724-1726
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    In 2006, Chatterjee and Sarkar proposed a hierarchical identity-based encryption (HIBE) scheme which can support an unbounded number of identity levels. This property is particularly useful in providing forward secrecy by embedding time components within hierarchical identities. In this paper we show that their scheme does not provide the claimed property. Our analysis shows that if the number of identity levels becomes larger than the value of a fixed public parameter, an unintended receiver can reconstruct a new valid ciphertext and decrypt the ciphertext using his or her own private key. The analysis is similarly applied to a multi-receiver identity-based encryption scheme presented as an application of Chatterjee and Sarkar's HIBE scheme.
    Download PDF (70K)
  • Jinyoung AN, Sangchoon KIM
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2009 Volume E92.A Issue 7 Pages 1727-1730
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    The performance of ultra-wideband (UWB) multiple input multiple output (MIMO) receiver based on the RAKE maximal ratio combiner (MRC) followed by a zero forcing (ZF) detector is analytically examined. For a UWB MIMO system with NT transmit antennas, NR receive antennas, and L resolvable multipath components, the proposed MIMO detection scheme is shown to have the diversity order of LNR-NT+1 and its analytical error rate expression is presented in a log-normal fading channel. We also compare the analytical BERs with the simulated results.
    Download PDF (141K)
  • Fanxin ZENG
    Article type: LETTER
    Subject area: Spread Spectrum Technologies and Applications
    2009 Volume E92.A Issue 7 Pages 1731-1736
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    In communication systems, ZCZ sequences and perfect sequences play important roles in removing multiple-access interference (MAI) and synchronization, respectively. Based on an uncorrelated polyphase base sequence set, a novel construction method, which can produce mutually orthogonal (MO) ZCZ polyphase sequence (PS) sets and perfect PSs, is presented. The obtained ZCZ PSs of each set are of ideal periodic cross-correlation functions (PCCFs), in other words, the PCCFs between such two different sequences vanishes, and the sequences between different sets are orthogonal. On the other hand, the proposed perfect PSs include Frank perfect PSs as a special case and the family size of the former is quite larger than that of the latter.
    Download PDF (110K)
  • Liang SHA, Guijin WANG, Anbang YAO, Xinggang LIN
    Article type: LETTER
    Subject area: Vision
    2009 Volume E92.A Issue 7 Pages 1737-1742
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    Particle filter has attracted increasing attention from researchers of object tracking due to its promising property of handling nonlinear and non-Gaussian systems. In this paper, we mainly explore the problem of precisely estimating observation likelihoods of particles in the joint feature-spatial space. For this purpose, a mixture Gaussian kernel function based similarity is presented to evaluate the discrepancy between the target region and the particle region. Such a similarity can be interpreted as the expectation of the spatial weighted feature distribution over the target region. To adapt outburst of object motion, we also present a method to appropriately adjust state transition model by utilizing the priors of motion speed and object size. In comparison with the standard particle filter tracker, our tracking algorithm shows the better performance on challenging video sequences.
    Download PDF (537K)
  • Seiji MIYOSHI, Hiroomi HIKAWA, Yutaka MAEDA
    Article type: LETTER
    Subject area: Neural Networks and Bioengineering
    2009 Volume E92.A Issue 7 Pages 1743-1746
    Published: July 01, 2009
    Released on J-STAGE: July 01, 2009
    JOURNAL RESTRICTED ACCESS
    We show that simultaneous perturbation can be used as an algorithm for on-line learning, and we report our theoretical investigation on generalization performance obtained with a statistical mechanical method. Asymptotic behavior of generalization error using this algorithm is on the order of t to the minus one-third power, where t is the learning time or the number of learning examples. This order is the same as that using well-known perceptron learning.
    Download PDF (367K)
feedback
Top