Keyword Search Result

[Keyword] hierarchical(214hit)

101-120hit(214hit)

  • Co-modeling, Experimental Verification, and Analysis of Chip-Package Hierarchical Power Distribution Network

    Hyunjeong PARK  Hyungsoo KIM  Jun So PAK  Changwook YOON  Kyoungchoul KOO  Joungho KIM  

     
    PAPER-Electromagnetic Theory

      Vol:
    E91-C No:4
      Page(s):
    595-606

    In this paper, we present and verify a new chip-package co-modeling and simulation approach for a low-noise chip-package hierarchical power distribution network (PDN) design. It is based on a hierarchical modeling to combine distributed circuit models at both chip-level PDN and package-level PDN. In particular, it includes all on- and off-chip parasitic circuit elements in the hierarchical PDN with a special consideration on on-chip decoupling capacitor design and placement inside chip. The proposed hierarchical PDN model was successfully validated with good correlations and subsequent analysis to a series of Z11 and Z21 PDN impedance measurements with a frequency range from 1 MHz to 3 GHz. Using the proposed model, we can analyze and estimate the performance of the chip-package hierarchical PDN as well as can predict the effect of high frequency electromagnetic interactions between the chip-level PDN and the package-level PDN. Furthermore, we can precisely anticipate PDN resonance frequencies, noise generation sources, and noise propagation paths through the multiple levels in the hierarchical PDN.

  • An Effective Load Balancing Scheme for 3D Texture-Based Sort-Last Parallel Volume Rendering on GPU Clusters

    Won-Jong LEE  Vason P. SRINI  Woo-Chan PARK  Shigeru MURAKI  Tack-Don HAN  

     
    PAPER-Computer Graphics

      Vol:
    E91-D No:3
      Page(s):
    846-856

    We present an adaptive dynamic load balancing scheme for 3D texture based sort-last parallel volume rendering on a PC cluster equipped with GPUs. Our scheme exploits not only task parallelism but also data parallelism during rendering by combining the hierarchical data structures (octree and parallel BSP tree) in order to skip empty regions and distribute proper workloads to rendering nodes. Our scheme can also conduct a valid parallel rendering and image compositing in visibility order by employing a 3D clustering algorithm. To alleviate the imbalance when the transfer function is changed, a load rebalancing is inexpensively supported by exchanging only needed data. A detailed performance analysis is provided and scaling characteristics of our scheme are discussed. These show that our scheme can achieve significant performance gains by increasing parallelism and decreasing synchronizing costs compared to the traditional static distribution schemes.

  • A Hybrid Image Coder Based on SPIHT Algorithm with Embedded Block Coding

    Tze-Yun SUNG  Hsi-Chin HSIN  

     
    LETTER-Image

      Vol:
    E90-A No:12
      Page(s):
    2979-2984

    Embedded zero-tree coding in wavelet domain has drawn a lot of attention for image compression applications. Among noteworthy zero-tree algorithms is the set partitioning in hierarchical trees (SPIHT) algorithm. For images with textures, high frequency wavelet coefficients are likely to become significant after a few scan passes of SPIHT, and therefore the coding results are often insufficient. It is desirable that the low frequency and high frequency components of an image are coded using different strategies. In this paper, we propose a hybrid algorithm using the SPIHT and EBC (embedded block coding) to code low frequency and high frequency wavelet coefficients, respectively; the intermediate coding results of low frequency coefficients are used to facilitate the coding operation of high frequency coefficients. Experimental results show that the coding performance can be significantly improved by the hybrid SPIHT-EBC algorithm.

  • Congestion Avoidance and Fair Event Detection in Wireless Sensor Network

    Md. MAMUN-OR-RASHID  Muhammad Mahbub ALAM  Md. Abdur RAZZAQUE  Choong Seon HONG  

     
    PAPER

      Vol:
    E90-B No:12
      Page(s):
    3362-3372

    Congestion in WSN increases the energy dissipation rates of sensor nodes as well as the loss of packets and thereby hinders fair and reliable event detection. We find that one of the key reasons of congestion in WSN is allowing sensing nodes to transfer as many packets as possible. This is due to the use of CSMA/CA that gives opportunistic medium access control. In this paper, we propose an energy efficient congestion avoidance protocol that includes source count based hierarchical and load adaptive medium access control and weighted round robin packet forwarding. We also propose in-node fair packet scheduling to achieve fair event detection. The results of simulation show our scheme exhibits more than 90% delivery ratio even under bursty traffic condition which is good enough for reliable event perception.

  • Localized Proxy-MIPv6 with Route Optimization in IP-Based Networks

    Sihun PARK  Namhi KANG  Younghan KIM  

     
    LETTER-Internet

      Vol:
    E90-B No:12
      Page(s):
    3682-3686

    Proxy Mobile IPv6 (PMIPv6) is designed not only to avoid tunneling overhead over the air but also to manage the mobility of hosts that are not equipped with any mobility management software. However, PMIPv6 leads to increasing signaling cost as mobile nodes move frequently because the protocol is based on the global mobility management protocol. In this letter we propose Localized PMIPv6 with Route Optimization (LPMIPv6-RO). Our numerical analysis shows that the proposed scheme outperforms previously proposed mobility protocols in terms of both signaling and packet delivery cost.

  • Hierarchical Decomposition of Depth Map Sequences for Representation of Three-Dimensional Dynamic Scenes

    Sung-Yeol KIM  Yo-Sung HO  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E90-D No:11
      Page(s):
    1813-1820

    In this paper, we propose a new scheme to represent three-dimensional (3-D) dynamic scenes using a hierarchical decomposition of depth maps. In the hierarchical decomposition, we split a depth map into four types of images: regular mesh, boundary, feature point and number-of-layer (NOL) images. A regular mesh image is obtained by down-sampling a depth map. A boundary image is generated by gathering pixels of the depth map on the region of edges. For generating feature point images, we select pixels of the depth map on the region of no edges according to their influence on the shape of a 3-D surface, and convert the selected pixels into images. A NOL image includes structural information to manage the other three images. In order to render a frame of 3-D dynamic scenes, we first generate an initial surface utilizing the information of regular mesh, boundary and NOL images. Then, we enhance the initial surface by adding the depth information of feature point images. With the proposed scheme, we can represent consecutive 3-D scenes successfully within the framework of a multi-layer structure. Furthermore, we can compress the data of 3-D dynamic scenes represented by a mesh structure by a 2-D video coder.

  • A Hierarchical Service Management System for MPLS Network Services

    Kenji KUMAKI  Ikuo NAKAGAWA  Kenichi NAGAMI  Tomohiko OGISHI  Shigehiro ANO  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2764-2771

    This paper proposes a hierarchical service management system for MPLS network services. Traditionally, general management systems which have been deployed in some service providers control MPLS LSPs (e.g. RSVP-TE, LDP) and services (e.g. L2VPN, L3VPN and IP) separately. If a fault occurs in an MPLS network, the dedicated management system for MPLS LSPs can detect the fault and recognize the state of MPLS LSPs. However, it cannot detect the extent of the impact due to the fault in each service. Furthermore, its own inability to identify the affected customer means it takes some time to identify the affected customers, cooperating manually with the dedicated management system for services. Therefore, this paper proposes a new automatic correlation between MPLS LSPs and each service. In particular, this paper proposes a new algorithm for a correlation between RSVP-TE LSPs and L3VPN services. Simulations are conducted to evaluate the capacity on a correlation table and the performance searching on a correlation table, and results show this system is very scalable within real MPLS production networks. This system, with the automatic correlation, could be sufficiently deployed in real MPLS production networks.

  • Asymmetric Attribute Aggregation in Hierarchical Networks

    Lei LEI  Yuefeng JI  Lin GUO  

     
    PAPER-Network

      Vol:
    E90-B No:8
      Page(s):
    2034-2045

    To achieve scalability and security, large networks are often structured hierarchically as a collection of domains. In hierarchical networks, the topology and QoS parameters of a domain have to be first aggregated before being propagated to other domains. However, topology aggregation may distort useful information. Although spanning tree aggregation can perfectly encode attribute information of symmetric networks, it can not be applied to asymmetric networks directly. In this paper, we propose a spanning tree based attribute aggregation method for asymmetric networks. The time complexity of the proposed method and the space complexity of its resulted aggregated topology are the same with that of the spanning tree aggregation method in symmetric networks. This method can guarantee that the attributes of more than half of the links in the networks are unaltered after aggregation. Simulation results show that the proposed method achieves the best tradeoff between information accuracy and space complexity among the existing asymmetric attribute aggregation methods.

  • A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

    Kwangwook SHIN  Seunghak LEE  Geunhwi LIM  Hyunsoo YOON  

     
    PAPER-Network

      Vol:
    E90-B No:7
      Page(s):
    1651-1662

    Several structured peer-to-peer networks have been created to solve the scalability problem of previous peer-to-peer systems such as Gnutella and Napster. These peer-to-peer networks which support distributed hash table functionality construct a sort of structured overlay network, which can cause a topology mismatch between the overlay and the underlying physical network. To solve this mismatch problem, we propose a topology-aware hierarchical overlay framework for DHTs. The hierarchical approach for the overlay is based on the concept that the underlying global Internet is also a hierarchical architecture, that is, a network of networks. This hierarchical approach for the overlay puts forth two benefits: finding data in a physically near place with a high probability, and smaller lookup time. Our hierarchical overlay framework is different from other hierarchical architecture systems in a sense that it provides a specific self-organizing grouping algorithm. Our additional optimization schemes complete the basic algorithm which constructs a hierarchical structure without any central control.

  • Efficient Clustering Scheme Considering Non-uniform Correlation Distribution for Ubiquitous Sensor Networks

    Daisuke MAEDA  Hideyuki UEHARA  Mitsuo YOKOYAMA  

     
    PAPER

      Vol:
    E90-A No:7
      Page(s):
    1344-1352

    We propose a novel clustering scheme considering non-uniform correlation distribution derived by experimental environment property. Firstly, we investigate the entropy property of actual environment, and then show that its spatial correlation is not uniformly distributed. Based on this result, we present the clustering strategy which provides the efficient data aggregation. Through the simulation under the non-uniform correlation distribution, we show the advantage of the proposed scheme in terms of the energy consumption property per node and the network lifetime.

  • A Half-Skewed Octree for Volume Ray Casting

    Sukhyun LIM  Byeong-Seok SHIN  

     
    PAPER-Computer Graphics

      Vol:
    E90-D No:7
      Page(s):
    1085-1091

    A hierarchical representation formed by an octree for a volume ray casting is a well-known data structure to skip over transparent regions requiring little preprocessing and storage. However, it accompanies unnecessary comparison and level shift between octants. We propose a new data structure named half-skewed octree, which is an auxiliary octree to support the conventional octree. In preprocessing step, a half-skewed octree selects eight different child octants in each generation step compared with the conventional octree. During rendering, after comparing an octant of the conventional octree with corresponding octant of the half-skewed octree simultaneously at the same level, a ray chooses one of two octants to jump over transparent regions farther away. By this method, we can reduce unnecessary comparison and level shift between octants. Another problem of a conventional octree structure is that it is difficult to determine a distance from the boundary of a transparent octant to opposite boundary. Although we exploit the previously proposed distance template, we cannot expect the acceleration when a ray direction is almost parallel to the octant's boundary. However, our method can solve it without additional operations because a ray selects one octant to leap farther away. As a result, our approach is much faster than the method using conventional octree while preserving image quality and requiring minimal storage.

  • Universally Composable Hierarchical Hybrid Authenticated Key Exchange

    Haruki OTA  Kazuki YONEYAMA  Shinsaku KIYOMOTO  Toshiaki TANAKA  Kazuo OHTA  

     
    PAPER-Protocols

      Vol:
    E90-A No:1
      Page(s):
    139-151

    Password-based authenticated key exchange protocols are more convenient and practical, since users employ human-memorable passwords that are simpler to remember than cryptographic secret keys or public/private keys. Abdalla, Fouque, and Pointcheval proposed the password-based authenticated key exchange protocol in a 3-party model (GPAKE) in which clients trying to establish a secret do not share a password between themselves but only with a trusted server. On the other hand, Canetti presented a general framework, which is called universally composable (UC) framework, for representing cryptographic protocols and analyzing their security. In this framework, the security of protocols is maintained under a general protocol composition operation called universal composition. Canetti also proved a UC composition theorem, which states that the definition of UC-security achieves the goal of concurrent general composition. A server must manage all the passwords of clients when the 3-party password-based authenticated key exchange protocols are realized in large-scale networks. In order to resolve this problem, we propose a hierarchical hybrid authenticated key exchange protocol (H2AKE). In H2AKE, forwarding servers are located between each client and a distribution server, and the distribution server sends the client an authentication key via the forwarding servers. In H2AKE, public/private keys are used between servers, while passwords are also used between clients and forwarding servers. Thus, in H2AKE, the load on the distribution server can be distributed to the forwarding servers concerning password management. In this paper, we define hierarchical hybrid authenticated key exchange functionality. H2AKE is the universal form of the hierarchical (hybrid) authenticated key exchange protocol, which includes a 3-party model, and it has the characteristic that the construction of the protocol can flexibly change according to the situation. We also prove that H2AKE is secure in the UC framework with the security-preserving composition property.

  • Retrieval of Images Captured by Car Cameras Using Its Front and Side Views and GPS Data

    Toshihiko YAMASAKI  Takayuki ISHIKAWA  Kiyoharu AIZAWA  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    217-223

    Recently, cars are equipped with a lot of sensors for safety driving. We have been trying to store the driving-scene video with such sensor data and to detect the change of scenery of streets. Detection results can be used for building historical database of town scenery, automatic landmark updating of maps, and so forth. In order to compare images to detect changes, image retrieval taken at nearly identical locations is required as the first step. Since Global Positioning System (GPS) data essentially contain some noises, we cannot rely only on GPS data for our image retrieval. Therefore, we have developed an image retrieval algorithm employing edge-histogram-based image features in conjunction with hierarchical search. By using edge histograms projected onto the vertical and horizontal axes, the retrieval has been made robust to image variation due to weather change, clouds, obstacles, and so on. In addition, matching cost has been made small by limiting the matching candidates employing the hierarchical search. Experimental results have demonstrated that the mean retrieval accuracy has been improved from 65% to 76% for the front-view images and from 34% to 53% for the side-view images.

  • VLSI Implementation of a Modified Efficient SPIHT Encoder

    Win-Bin HUANG  Alvin W. Y. SU  Yau-Hwang KUO  

     
    PAPER-VLSI Architecture

      Vol:
    E89-A No:12
      Page(s):
    3613-3622

    Set Partitioning in Hierarchical Trees (SPIHT) is a highly efficient technique for compressing Discrete Wavelet Transform (DWT) decomposed images. Though its compression efficiency is a little less famous than Embedded Block Coding with Optimized Truncation (EBCOT) adopted by JPEG2000, SPIHT has a straight forward coding procedure and requires no tables. These make SPIHT a more appropriate algorithm for lower cost hardware implementation. In this paper, a modified SPIHT algorithm is presented. The modifications include a simplification of coefficient scanning process, a 1-D addressing method instead of the original 2-D arrangement of wavelet coefficients, and a fixed memory allocation for the data lists instead of a dynamic allocation approach required in the original SPIHT. Although the distortion is slightly increased, it facilitates an extremely fast throughput and easier hardware implementation. The VLSI implementation demonstrates that the proposed design can encode a CIF (352288) 4:2:0 image sequence with at least 30 frames per second at 100-MHz working frequency.

  • Performance Analysis of the Mobility Anchor Point in Hierarchical Mobile IPv6

    Younghyun KIM  Miyoung KIM  Youngsong MUN  

     
    PAPER

      Vol:
    E89-B No:10
      Page(s):
    2715-2721

    Internet engineering task force (IETF) has proposed hierarchical mobile IPv6 (HMIPv6) in order to reduce a frequent location registration of a mobile node in mobile IPv6 (MIPv6). All traffics toward a mobile node must be transmitted through a MAP in HMIPv6. This brings unnecessary packet latency because of the increased processing cost of packet at the MAP. At this point, the processing cost of packet at the MAP is influenced by the packet arrival rate for a mobile node, cell mobility rate and the number of mobile nodes in MAP domain. In this paper, we analyze the MAP's performance considering the above elements. For this, we compare total cost of HMIPv6 with total cost of MIPv6 as MAP's capability after we define Markov chain model for performance analysis. Also, we define network's total profit as total cost of MIPv6 minus total cost of HMIPv6. Then, we can find optimal capability of MAP such that total profit has maximum value. Also, we use the blocking probability by the MAP's capability as performance estimation element. As a conclusion, we can observe both HMIPv6's performance by the MAP's capability and optimal capability of the MAP, and blocking probability form a relationship of trade off between them.

  • A Study on Power and Bit Assignment of Embedded Multi-Carrier Modulation Schemes for Hierarchical Image Transmission over Digital Subscriber Line

    Charlene GOUDEMAND  Francois-Xavier COUDOUX  Marc GAZALET  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E89-B No:7
      Page(s):
    2071-2073

    In this letter, we study the problem of designing an efficient power and bit allocation scheme in the context of a hierarchical image transmission system based on an embedded multi-carrier modulation (EMCM) scheme over digital subscriber line. Authors describe a novel algorithm that performs power minimization under bit rate constraint and QoS requirement. It is based on the Hughes-Hartogs algorithm, and successively allocates the bits of the high, then low priority data streams. Simulations that assess the performance of the proposed algorithm are also provided and discussed; they demonstrate the interest of the proposed scheme.

  • A Method for Tuning the Structure of a Hierarchical Causal Network Used to Evaluate a Learner's Profile

    Yoshitaka FUJIWARA  Yoshiaki OHNISHI  Hideki YOSHIDA  

     
    LETTER-Educational Technology

      Vol:
    E89-D No:7
      Page(s):
    2310-2314

    This paper presents a method for tuning the structure of a causal network (CN) to evaluate a learner's profile for a learning assistance system that employs hierarchically structured learning material. The method uses as an initial CN structure causally related inter-node paths that explicitly define the learning material structure. Then, based on this initial structure other inter-node paths (sideway paths) not present in the initial CN structure are inferred by referring to the learner's database generated through the use of a learning assistance system. An evaluation using simulation indicates that the method has an inference probability of about 63% and an inference accuracy of about 30%.

  • Multilevel Hierarchical Mobility Management in Densely Meshed Networks

    Keita KAWANO  Kazuhiko KINOSHITA  Koso MURAKAMI  

     
    PAPER-Network

      Vol:
    E89-B No:7
      Page(s):
    2002-2011

    Micromobility management is a key issue for the deployment of broadband mobile communication services. The packet loss during handover and the handover latency need to be minimized to maintain the high quality of these services. We have previously proposed a mobility management scheme that addresses this issue in wide-area mobile networks that employed hierarchical multiple mobility management routers (Mobility Anchor Points or MAPs). Our scheme directs a Mobile Terminal (MT) to a suitable MAP to fully minimize packet loss during handover, and handover latency of the MTs. In our previous work, we confirmed the effectiveness of our scheme using a simple tree network. Actual networks however, always have densely meshed topologies to provide some redundancy for the elimination of single points of failure. In such networks, it is difficult to deduce the relationships between the MAPs, and this makes it difficult for our scheme to select a suitable MAP for an MT, because the selection is performed using both the MT's smoothed speed and the relationships existing between the MAPs located above the Access Router (AR), to which the MT is connected. In this paper, we propose a method to overcome this problem, by autonomously adjusting the selection criteria that are individually configured for use at a particular AR, and we evaluate this method using simulation experiments. The results show that our mobility management scheme works well in densely meshed networks using the proposed additional method.

  • HHMM Based Recognition of Human Activity

    Daiki KAWANAKA  Takayuki OKATANI  Koichiro DEGUCHI  

     
    PAPER-Face, Gesture, and Action Recognition

      Vol:
    E89-D No:7
      Page(s):
    2180-2185

    In this paper, we present a method for recognition of human activity as a series of actions from an image sequence. The difficulty with the problem is that there is a chicken-egg dilemma that each action needs to be extracted in advance for its recognition but the precise extraction is only possible after the action is correctly identified. In order to solve this dilemma, we use as many models as actions of our interest, and test each model against a given sequence to find a matched model for each action occurring in the sequence. For each action, a model is designed so as to represent any activity containing the action. The hierarchical hidden Markov model (HHMM) is employed to represent the models, in which each model is composed of a submodel of the target action and submodels which can represent any action, and they are connected appropriately. Several experimental results are shown.

  • Fast Handover Failure-Case Analysis in Hierarchical Mobile IPv6 Networks

    Dong SU  Sang-Jo YOO  

     
    LETTER-Network

      Vol:
    E89-B No:6
      Page(s):
    1892-1895

    The fast handover protocol adopted in a IPv6 hierarchical structure provides a seamless handover in wireless IP networks by minimizing the handover latency. To reduce the handover latency, the fast handover uses anticipation based on layer 2 trigger. Nonetheless, a mobile node can still lose its connection with the old link during the fast handover procedures. Accordingly, this paper analyzes the handover latency and packet delivery costs associated with fast handover failure cases based on a timing diagram.

101-120hit(214hit)

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.