Mitsubishi Electric

Displaying 1-33 of 33 results

  • White Papers // Feb 2012

    On the Indifferentiable Hash Functions in the Multi-Stage Security Games

    It had been widely believed that the indifferentiability framework ensures composition in any security game. However, Ristenpart, Shacham, and Shrimpton (EUROCRYPT 2011) demonstrated that for some multi-stage security, there exists a cryptosystem which is secure in the Random Oracle (RO) model but is broken when some indifferentiable hash function is...

    Provided By Mitsubishi Electric

  • White Papers // Jan 2012

    Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption

    In this paper, the authors present two Non-zero Inner-Product Encryption (NIPE) schemes that are adaptively secure under a standard assumption, the Decisional LINear (DLIN) assumption, in the standard model. One of the proposed NIPE schemes features constant-size ciphertexts and the other features constant-size secret-keys. Their NIPE schemes imply an Identity-Based...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2011

    Decentralized Attribute-Based Signatures

    In this paper, the authors present the first Decentralized Multi-Authority Attribute-Based Signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for general (non-monotone) predicates is fully secure (adaptive-predicate unforgeable and perfect private) under a standard assumption, the Decisional LINear (DLIN) assumption,...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2011

    Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model

    This paper presents a fully secure (adaptive-predicate unforgeable and private) Attribute-Based Signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under standard assumptions, the Decisional LINear (DLIN) assumption and the existence of Collision Resistant (CR) hash functions. The admissible predicates of the proposed...

    Provided By Mitsubishi Electric

  • White Papers // Jan 2011

    Intermediate View Generation for Perceived Depth Adjustment of Stereo Video

    There is significant industry activity on delivery of 3D video to the home. It is expected that 3D capable devices will be able to provide consumers with the ability to adjust the depth perceived for stereo content. This paper provides an overview of related techniques and evaluates the effectiveness of...

    Provided By Mitsubishi Electric

  • White Papers // Nov 2010

    Fully Secure Functional Encryption With General Relations From the Decisional Linear Assumption

    This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product relations. The security is proven under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. The proposed functional encryption scheme covers, as...

    Provided By Mitsubishi Electric

  • White Papers // Jan 2010

    Dual Power Multiple Access With Multipacket Reception Using Local CSI

    Contention-based multiple access is a crucial component of many wireless systems. Multiple-Packet Reception (MPR) schemes that use interference cancellation technique to receive and decode multiple packets that arrive simultaneously are known to be very efficient. However, the MPR schemes proposed in the literature require complex receivers capable of performing advanced...

    Provided By Mitsubishi Electric

  • White Papers // Nov 2009

    Regressed Importance Sampling on Manifolds for Efficient Object Tracking

    In this paper, a new integrated particle filter is proposed for video object tracking. After particles are generated by importance sampling, each particle is regressed on the transformation space where the mapping function is learned offline by regression on pose manifold using Lie algebra, leading to a more effective allocation...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Pilot Matrix Design for Interim Channel Estimation in Two-Hop MIMO AF Relay Systems

    In this paper, the authors are concerned with a two-hop Multi-Input-Multi-Output (MIMO) Amplify-and-Forward (AF) relay system consisting of a Source Node (SN), a Relay Node (RN), and a Destination Node (DN). Since the simple RN in this system is unaware of the structure of its received signal and incapable of...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Invertible Motion Blur in Video

    The authors show that motion blur in successive video frames is invertible even if the Point-Spread Function (PSF) due to motion smear in a single photo is non-invertible. Blurred photos exhibit nulls (zeros) in the frequency transform of the PSF, leading to an ill-posed de-convolution. Hardware solutions to avoid this...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Optical Performance Monitoring Via Histogram: A Data-Driven Approach

    The authors apply three alternative statistical learning methods to estimate optical transmission impairments (e.g., noises, chromatic dispersion) from synchronous histograms. Linear regression yields good accuracy. A more sophisticated locally weighted regression technique performs better. Optical Performance Monitoring (OPM) will be critical for reconfigurable all-optical networks in the future. Recent research...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    3D Pose Estimation and Segmentation Using Specular Cues

    The authors demonstrated that specular reflections can be used for localization and pose estimation of specular objects using a known CAD model. They showed that simple feature/ intensity matching can surprisingly handle textureless and highly specular objects in challenging scenes with cluttered background, inter-reflections and partial occlusions. The authors approach...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Analysis, Insights and Generalization of a Fast Decentralized Relay Selection Mechanism

    Relay selection for cooperative communications has attracted considerable research interest recently. While several criteria have been proposed for selecting one or more relays and analyzed, mechanisms that perform the selection in a distributed manner have received relatively less attention. In this paper, the authors analyze a splitting algorithm for selecting...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Optimization of Split-and-Combine Relaying

    Relays play an important role for increasing rate and reducing energy consumption of wireless networks. In this paper the authors consider a three-node network (source, relay, and destination) in which they want to minimize total energy consumption for given transmission rate. The authors analyze and optimize the Split-Combine-Relaying (SCR) protocol...

    Provided By Mitsubishi Electric

  • White Papers // Aug 2009

    QoS/QoE Techniques for IPTV Transmissions

    Internet Protocol TV (IPTV) has recently gained momentum as one of the key applications in the telecommunications market. Most researchers believe that IPTV service represents a key opportunity for operators around the world to benefit from video delivery over IP networks. In this paper, the authors investigate the Quality of...

    Provided By Mitsubishi Electric

  • White Papers // Jul 2009

    A Graph Approach to Dynamic Fractional Frequency Reuse (FFR) in Multi-Cell OFDMA Networks

    A graph-based framework for dynamic Fractional Frequency Reuse (FFR) in multi-cell OFDMA networks is proposed in this work. FFR is a promising resource allocation technique that can effectively mitigate Inter-Cell Interference (ICI) in OFDMA networks. The proposed scheme enhances the conventional FFR by enabling adaptive spectral sharing per cell load...

    Provided By Mitsubishi Electric

  • White Papers // Jul 2009

    Implementation of a Cooperative MAC Protocol: Performance and Challenges in Real Environment

    Cooperative communication is a buzz word in research community today. It enables nodes to achieve spatial extensive investigations have been directed to closely examine its performance by means of both analysis and simulation. However, the study of this new technology in an implementation based system is very limited. In this...

    Provided By Mitsubishi Electric

  • White Papers // Jul 2009

    Depth Reconstruction Filter and Down/Up Sampling for Depth Coding in 3D Video

    Depth images represent Three-Dimensional (3D) scene information and are commonly used for Depth Image Based Rendering (DIBR) to support 3D video and free-viewpoint video applications. The virtual view is generally rendered by DIBR technique and its quality highly depends on the quality of depth data. Thus, efficient depth coding is...

    Provided By Mitsubishi Electric

  • White Papers // Jul 2009

    Geometric Sequence (GS) Imaging With Bayesian Smoothing for Optical and Capacitive Imaging Sensors

    In this paper, the authors introduce a novel technique called Geometric Sequence (GS) imaging, specifically for the purpose of low power and light weight tracking in human computer interface design. The imaging sensor is programmed to capture the scene with a train of packets, where each packet constitutes a few...

    Provided By Mitsubishi Electric

  • White Papers // Jun 2009

    Hole-Filling Method Using Depth Based In-Painting for View Synthesis in Free Viewpoint Television (FTV) and 3D Video

    Depth Image-Based Rendering (DIBR) is generally used to synthesize a virtual view in Free Viewpoint Television (FTV) and 3D video. One of the key techniques in DIBR is how to fill the holes caused by disocclusion regions and wrong depth values. In this paper, the authors propose a new hole-filling...

    Provided By Mitsubishi Electric

  • White Papers // Jun 2009

    Static Power Allocation in Two-Hop MIMO Amplify-and-Forward Relay Systems

    In this paper, the authors propose a static power allocation algorithm for a two-hop Multi-Input-Multi-Output (MIMO) Amplify-and-Forward (AF) relay system in which the interim channel state information over the first and the second hops is unavailable. Based on the path losses over the first and the second hops, this algorithm...

    Provided By Mitsubishi Electric

  • White Papers // Jun 2009

    Fast Multiple Access Selection Through Variable Power Transmissions

    Many wireless applications demand a fast mechanism to detect the packet from a node with the highest priority ("Best node") only, while packets from nodes with lower priority are irrelevant. In this paper, the authors introduce an extremely fast contention-based multiple access algorithm that selects the best node and requires...

    Provided By Mitsubishi Electric

  • White Papers // May 2009

    Semi-Supervised Information Extraction From Variable-Length Web-Page Lists

    Modern information systems integrate, aggregate, and manage information from a large number of sources, such as databases, user input, sensors, remote web services provided by other information systems, etc. Successful integration of all these data sources depends critically on the existence of data exchange protocols and Application Programmable Interfaces (APIs)...

    Provided By Mitsubishi Electric

  • White Papers // May 2009

    A New Method for Tracking Performance Evaluation Based on a Reflective Model and Perturbation Analysis

    In this paper, the authors present a novel methodology for tracking performance evaluation. Considering the continuity of the image sequences in a video, they define a new measurement called tracking difficulty which incorporates the local sequence information among a small image sequence centered at each frame. The authors subsequently use...

    Provided By Mitsubishi Electric

  • White Papers // Apr 2009

    Securing Biometric Data

    This paper discusses the application of distributed source coding techniques to biometric security. A Slepian-Wolf coding system is used to provide a secure means of storing biometric data that provides robust biometric authentication for genuine users and guards against attacks from imposters. A formal quantification of the trade off between...

    Provided By Mitsubishi Electric

  • White Papers // Mar 2009

    NLOS Channel Identification and Mitigation in UltraWideband ToA-Based Wireless Sensor Networks

    Recently, Ultra Wideband (UWB) Time of Arrival (ToA)-based localization in Wireless Sensor Networks (WSNs) have received considerable attention. For a typical WSN operating in indoor environments, the localization performance can be degraded considerably due to the existence of Non-Line-of-Sight (NLOS) channel conditions between the sensor nodes. In these channel conditions...

    Provided By Mitsubishi Electric

  • White Papers // Mar 2009

    UWB Systems For Wireless Sensor Networks

    Wireless sensor networks are emerging as an important area for communications. They enable a wealth of new applications including surveillance, building control, factory automation, and in-vehicle sensing. The sensor nodes have to operate under severe constraints on energy consumption and form factor, and provide the ability for precise self-location of...

    Provided By Mitsubishi Electric

  • White Papers // Jan 2009

    Spatial Diversity and Spatial Correlation Evaluation of Measured Vehicle-to-Vehicle Radio Channels at 5.2 GHz

    In this paper, the authors estimate the spatial diversity order and spatial correlations from channel sounder measurements of doubly-selective vehicle-to-vehicle MIMO radio channels in the 5.2 GHz band. Ivrlac and Nossek have defined a diversity measure of MIMO Rayleigh fading channels which is based on the spatial correlations of the...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2008

    Achieving Real-Time Object Detection and Tracking Under Extreme Conditions

    Object tracking is one the most important tasks in computer vision. In video surveillance, it is used to understand movement patterns of people to uncover suspicious events. It is a key component in real-time traffic management to estimate vehicle motion statistics and congestion status. Advanced vehicle control systems depend on...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2008

    Shield Fields: Modeling and Capturing 3D Occluders

    The authors describe a unified representation of occluders in light transport and photography using shield fields: the 4D attenuation function which acts on any light field incident on an occluder. The authors' key theoretical result is that shield field can be used to decouple the effects of occluders and incident...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2008

    Modified Beacon-Enabled IEEE 802.15.4 MAC for Lower Latency

    Industrial sensing, monitoring and automation offer a lucrative application domain for networking and communications. Wired sensor networks have traditionally been used for these applications because such networks adequately meet two vital requirements, i.e., low latency and high reliability, needed for an industrial deployment. Wired sensor networks, however, are not very...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2008

    Impact of Mobility on the Behavior of Interference in Cellular Wireless Networks

    In this paper, the impact of mobility is investigated in low-speed environments such as femtocells and picocells for wireless networks. Given that there is interference on the uplink of a FDD system, this study solely focuses on how interference evolves with respect to mobility of terminals which move in a...

    Provided By Mitsubishi Electric

  • White Papers // May 2008

    Proposal of Generating and Customizing Method to Construct 3D GUI for SCADA

    Recently, high-quality 3D graphics has become available at a low cost. A number of attempts to visualize information of a very large system by using 3D graphics. Although development of a 3D graphical user interface (3D-GUI) systems, however, usually needs cost more than that of a 2D Graphical User Interface...

    Provided By Mitsubishi Electric

  • White Papers // Jul 2009

    A Graph Approach to Dynamic Fractional Frequency Reuse (FFR) in Multi-Cell OFDMA Networks

    A graph-based framework for dynamic Fractional Frequency Reuse (FFR) in multi-cell OFDMA networks is proposed in this work. FFR is a promising resource allocation technique that can effectively mitigate Inter-Cell Interference (ICI) in OFDMA networks. The proposed scheme enhances the conventional FFR by enabling adaptive spectral sharing per cell load...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Pilot Matrix Design for Interim Channel Estimation in Two-Hop MIMO AF Relay Systems

    In this paper, the authors are concerned with a two-hop Multi-Input-Multi-Output (MIMO) Amplify-and-Forward (AF) relay system consisting of a Source Node (SN), a Relay Node (RN), and a Destination Node (DN). Since the simple RN in this system is unaware of the structure of its received signal and incapable of...

    Provided By Mitsubishi Electric

  • White Papers // Aug 2009

    QoS/QoE Techniques for IPTV Transmissions

    Internet Protocol TV (IPTV) has recently gained momentum as one of the key applications in the telecommunications market. Most researchers believe that IPTV service represents a key opportunity for operators around the world to benefit from video delivery over IP networks. In this paper, the authors investigate the Quality of...

    Provided By Mitsubishi Electric

  • White Papers // May 2009

    Semi-Supervised Information Extraction From Variable-Length Web-Page Lists

    Modern information systems integrate, aggregate, and manage information from a large number of sources, such as databases, user input, sensors, remote web services provided by other information systems, etc. Successful integration of all these data sources depends critically on the existence of data exchange protocols and Application Programmable Interfaces (APIs)...

    Provided By Mitsubishi Electric

  • White Papers // Jun 2009

    Hole-Filling Method Using Depth Based In-Painting for View Synthesis in Free Viewpoint Television (FTV) and 3D Video

    Depth Image-Based Rendering (DIBR) is generally used to synthesize a virtual view in Free Viewpoint Television (FTV) and 3D video. One of the key techniques in DIBR is how to fill the holes caused by disocclusion regions and wrong depth values. In this paper, the authors propose a new hole-filling...

    Provided By Mitsubishi Electric

  • White Papers // Jun 2009

    Static Power Allocation in Two-Hop MIMO Amplify-and-Forward Relay Systems

    In this paper, the authors propose a static power allocation algorithm for a two-hop Multi-Input-Multi-Output (MIMO) Amplify-and-Forward (AF) relay system in which the interim channel state information over the first and the second hops is unavailable. Based on the path losses over the first and the second hops, this algorithm...

    Provided By Mitsubishi Electric

  • White Papers // May 2009

    A New Method for Tracking Performance Evaluation Based on a Reflective Model and Perturbation Analysis

    In this paper, the authors present a novel methodology for tracking performance evaluation. Considering the continuity of the image sequences in a video, they define a new measurement called tracking difficulty which incorporates the local sequence information among a small image sequence centered at each frame. The authors subsequently use...

    Provided By Mitsubishi Electric

  • White Papers // Jun 2009

    Fast Multiple Access Selection Through Variable Power Transmissions

    Many wireless applications demand a fast mechanism to detect the packet from a node with the highest priority ("Best node") only, while packets from nodes with lower priority are irrelevant. In this paper, the authors introduce an extremely fast contention-based multiple access algorithm that selects the best node and requires...

    Provided By Mitsubishi Electric

  • White Papers // Mar 2009

    NLOS Channel Identification and Mitigation in UltraWideband ToA-Based Wireless Sensor Networks

    Recently, Ultra Wideband (UWB) Time of Arrival (ToA)-based localization in Wireless Sensor Networks (WSNs) have received considerable attention. For a typical WSN operating in indoor environments, the localization performance can be degraded considerably due to the existence of Non-Line-of-Sight (NLOS) channel conditions between the sensor nodes. In these channel conditions...

    Provided By Mitsubishi Electric

  • White Papers // Jul 2009

    Implementation of a Cooperative MAC Protocol: Performance and Challenges in Real Environment

    Cooperative communication is a buzz word in research community today. It enables nodes to achieve spatial extensive investigations have been directed to closely examine its performance by means of both analysis and simulation. However, the study of this new technology in an implementation based system is very limited. In this...

    Provided By Mitsubishi Electric

  • White Papers // Mar 2009

    UWB Systems For Wireless Sensor Networks

    Wireless sensor networks are emerging as an important area for communications. They enable a wealth of new applications including surveillance, building control, factory automation, and in-vehicle sensing. The sensor nodes have to operate under severe constraints on energy consumption and form factor, and provide the ability for precise self-location of...

    Provided By Mitsubishi Electric

  • White Papers // Apr 2009

    Securing Biometric Data

    This paper discusses the application of distributed source coding techniques to biometric security. A Slepian-Wolf coding system is used to provide a secure means of storing biometric data that provides robust biometric authentication for genuine users and guards against attacks from imposters. A formal quantification of the trade off between...

    Provided By Mitsubishi Electric

  • White Papers // Jan 2009

    Spatial Diversity and Spatial Correlation Evaluation of Measured Vehicle-to-Vehicle Radio Channels at 5.2 GHz

    In this paper, the authors estimate the spatial diversity order and spatial correlations from channel sounder measurements of doubly-selective vehicle-to-vehicle MIMO radio channels in the 5.2 GHz band. Ivrlac and Nossek have defined a diversity measure of MIMO Rayleigh fading channels which is based on the spatial correlations of the...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2008

    Shield Fields: Modeling and Capturing 3D Occluders

    The authors describe a unified representation of occluders in light transport and photography using shield fields: the 4D attenuation function which acts on any light field incident on an occluder. The authors' key theoretical result is that shield field can be used to decouple the effects of occluders and incident...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2008

    Modified Beacon-Enabled IEEE 802.15.4 MAC for Lower Latency

    Industrial sensing, monitoring and automation offer a lucrative application domain for networking and communications. Wired sensor networks have traditionally been used for these applications because such networks adequately meet two vital requirements, i.e., low latency and high reliability, needed for an industrial deployment. Wired sensor networks, however, are not very...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2008

    Impact of Mobility on the Behavior of Interference in Cellular Wireless Networks

    In this paper, the impact of mobility is investigated in low-speed environments such as femtocells and picocells for wireless networks. Given that there is interference on the uplink of a FDD system, this study solely focuses on how interference evolves with respect to mobility of terminals which move in a...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2008

    Achieving Real-Time Object Detection and Tracking Under Extreme Conditions

    Object tracking is one the most important tasks in computer vision. In video surveillance, it is used to understand movement patterns of people to uncover suspicious events. It is a key component in real-time traffic management to estimate vehicle motion statistics and congestion status. Advanced vehicle control systems depend on...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2011

    Decentralized Attribute-Based Signatures

    In this paper, the authors present the first Decentralized Multi-Authority Attribute-Based Signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for general (non-monotone) predicates is fully secure (adaptive-predicate unforgeable and perfect private) under a standard assumption, the Decisional LINear (DLIN) assumption,...

    Provided By Mitsubishi Electric

  • White Papers // Dec 2011

    Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model

    This paper presents a fully secure (adaptive-predicate unforgeable and private) Attribute-Based Signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under standard assumptions, the Decisional LINear (DLIN) assumption and the existence of Collision Resistant (CR) hash functions. The admissible predicates of the proposed...

    Provided By Mitsubishi Electric

  • White Papers // Jan 2012

    Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption

    In this paper, the authors present two Non-zero Inner-Product Encryption (NIPE) schemes that are adaptively secure under a standard assumption, the Decisional LINear (DLIN) assumption, in the standard model. One of the proposed NIPE schemes features constant-size ciphertexts and the other features constant-size secret-keys. Their NIPE schemes imply an Identity-Based...

    Provided By Mitsubishi Electric

  • White Papers // Feb 2012

    On the Indifferentiable Hash Functions in the Multi-Stage Security Games

    It had been widely believed that the indifferentiability framework ensures composition in any security game. However, Ristenpart, Shacham, and Shrimpton (EUROCRYPT 2011) demonstrated that for some multi-stage security, there exists a cryptosystem which is secure in the Random Oracle (RO) model but is broken when some indifferentiable hash function is...

    Provided By Mitsubishi Electric

  • White Papers // May 2008

    Proposal of Generating and Customizing Method to Construct 3D GUI for SCADA

    Recently, high-quality 3D graphics has become available at a low cost. A number of attempts to visualize information of a very large system by using 3D graphics. Although development of a 3D graphical user interface (3D-GUI) systems, however, usually needs cost more than that of a 2D Graphical User Interface...

    Provided By Mitsubishi Electric

  • White Papers // Nov 2010

    Fully Secure Functional Encryption With General Relations From the Decisional Linear Assumption

    This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product relations. The security is proven under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. The proposed functional encryption scheme covers, as...

    Provided By Mitsubishi Electric

  • White Papers // Nov 2009

    Regressed Importance Sampling on Manifolds for Efficient Object Tracking

    In this paper, a new integrated particle filter is proposed for video object tracking. After particles are generated by importance sampling, each particle is regressed on the transformation space where the mapping function is learned offline by regression on pose manifold using Lie algebra, leading to a more effective allocation...

    Provided By Mitsubishi Electric

  • White Papers // Jul 2009

    Depth Reconstruction Filter and Down/Up Sampling for Depth Coding in 3D Video

    Depth images represent Three-Dimensional (3D) scene information and are commonly used for Depth Image Based Rendering (DIBR) to support 3D video and free-viewpoint video applications. The virtual view is generally rendered by DIBR technique and its quality highly depends on the quality of depth data. Thus, efficient depth coding is...

    Provided By Mitsubishi Electric

  • White Papers // Jan 2011

    Intermediate View Generation for Perceived Depth Adjustment of Stereo Video

    There is significant industry activity on delivery of 3D video to the home. It is expected that 3D capable devices will be able to provide consumers with the ability to adjust the depth perceived for stereo content. This paper provides an overview of related techniques and evaluates the effectiveness of...

    Provided By Mitsubishi Electric

  • White Papers // Jan 2010

    Dual Power Multiple Access With Multipacket Reception Using Local CSI

    Contention-based multiple access is a crucial component of many wireless systems. Multiple-Packet Reception (MPR) schemes that use interference cancellation technique to receive and decode multiple packets that arrive simultaneously are known to be very efficient. However, the MPR schemes proposed in the literature require complex receivers capable of performing advanced...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Invertible Motion Blur in Video

    The authors show that motion blur in successive video frames is invertible even if the Point-Spread Function (PSF) due to motion smear in a single photo is non-invertible. Blurred photos exhibit nulls (zeros) in the frequency transform of the PSF, leading to an ill-posed de-convolution. Hardware solutions to avoid this...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Optical Performance Monitoring Via Histogram: A Data-Driven Approach

    The authors apply three alternative statistical learning methods to estimate optical transmission impairments (e.g., noises, chromatic dispersion) from synchronous histograms. Linear regression yields good accuracy. A more sophisticated locally weighted regression technique performs better. Optical Performance Monitoring (OPM) will be critical for reconfigurable all-optical networks in the future. Recent research...

    Provided By Mitsubishi Electric

  • White Papers // Jul 2009

    Geometric Sequence (GS) Imaging With Bayesian Smoothing for Optical and Capacitive Imaging Sensors

    In this paper, the authors introduce a novel technique called Geometric Sequence (GS) imaging, specifically for the purpose of low power and light weight tracking in human computer interface design. The imaging sensor is programmed to capture the scene with a train of packets, where each packet constitutes a few...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    3D Pose Estimation and Segmentation Using Specular Cues

    The authors demonstrated that specular reflections can be used for localization and pose estimation of specular objects using a known CAD model. They showed that simple feature/ intensity matching can surprisingly handle textureless and highly specular objects in challenging scenes with cluttered background, inter-reflections and partial occlusions. The authors approach...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Analysis, Insights and Generalization of a Fast Decentralized Relay Selection Mechanism

    Relay selection for cooperative communications has attracted considerable research interest recently. While several criteria have been proposed for selecting one or more relays and analyzed, mechanisms that perform the selection in a distributed manner have received relatively less attention. In this paper, the authors analyze a splitting algorithm for selecting...

    Provided By Mitsubishi Electric

  • White Papers // Sep 2009

    Optimization of Split-and-Combine Relaying

    Relays play an important role for increasing rate and reducing energy consumption of wireless networks. In this paper the authors consider a three-node network (source, relay, and destination) in which they want to minimize total energy consumption for given transmission rate. The authors analyze and optimize the Split-Combine-Relaying (SCR) protocol...

    Provided By Mitsubishi Electric