The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The pattern of blood vessels in the eye is unique to each person because it rarely changes over time. Therefore, it is well known that retinal blood vessels are useful for biometrics. This paper describes a biometrics method using the Jaccard similarity coefficient (JSC) based on blood vessel regions in retinal image pairs. The retinal image pairs were rough matched by the center of their optic discs...
In terms of die-attach for high TJ device, metallization on the backside of the bare chip and the substrate surface affect the high-temperature reliability of the joint due to the accelerated atomic diffusions. We evaluated two types of electroless plated metallization schemes which are Ni/Ag and Ni/Pd/Pt/Ag, respectively. High temperature storage of 250 °C for 500 h was used to test the high temperature...
Alveolar bone resorption, which can be observed on dental panoramic radiographs (DPRs), is one of the most important signs of the progression of periodontal disease. However, quantitative and consistent evaluation of alveolar bone resorption is labor intense, because of a large number of DPR examinations performed each year. In our previous study, we developed an automated scheme for detection of...
Linear skull fracture, following head trauma, may reach major blood vessels, such as the middle meningeal artery or sinus venosus, and may cause epidural hematoma. However, hematoma is likely to be missed in the initial interpretation because it spreads only gradually. In addition, the fracture lines that run along the scan slice plane are often missed during initial interpretation. In this study,...
Retinal arteriolar narrowing is decided based on the artery and vein diameter ratio (AVR). Previous methods segmented blood vessels and classified arteries and veins by color pixels in the centerlines of blood vessels. AVR was definitively determined through measurement of artery and vein diameters. However, this approach was not sufficient for cases with close contact between the artery of interest...
With increase in the use of Wireless LANs in the enterprise area, network systems are often scattered across multiple locations in a wide area. Hence, there may be cases where a network administrator manages multiple locations. When users complain about connectivity issues, network administrators are expected to diagnose these problems without disrupting the normal operation of devices such as wireless...
A smart community simulator that simulates electricity consumption and thermal energy consumption is being developed by the authors. The simulator is designed to be able to work with modules implemented as individual external emulators of many kinds of facilities and homes. With this simulator, we can change aspects and features of the community and estimate the long-term effects of these changes...
In a wireless convergecast network, load-balancing routing contributes to improving energy-efficiency by eliminating the difference of relaying load among one-hop nodes. Load-balancing algorithms can be operated by centralized and distributed implementation. Centralized implementation needs to collect global neighborhood information, which leads to a large amount of signaling overhead. On the contrary,...
Automated interference detection is required for operation and management services in wireless networks as Wireless Local Area Networks (WLANs) based on IEEE 802.11 Standard since co-channel interference from other wireless transmitters occurs irregularly. We propose a new approach for detecting the presence of interference on 802.11 links. Our solution focuses on the Access Point (AP)-initiated monitoring...
Recently, wireless networks using ISM band have been attracting a lot of attention. In these systems using carrier sense multiple access with collision avoidance (CSMA/CA), the packet collision and recollision between hidden nodes occur frequently and drastically decrease the network (NW) capacity. In this paper, we propose a packet retransmission protocol to avoid the packet recollision in 1 hop...
Multimedia, including audio, image, and video, etc., is a ubiquitous part of modern life. Quality evaluation, both objective and subjective, is of fundamental importance for various multimedia applications. In this letter, a novel quality-aware feature is proposed for blind/no-reference (NR) image quality assessment (IQA). The new quality-aware feature is generated from the proposed joint generalized...
Glaucoma is a leading cause of permanent blindness. Retinal imaging is useful for early detection of glaucoma. In order to evaluate the presence of glaucoma, ophthalmologists may determine the cup and disc areas and diagnose glaucoma using a vertical optic cup-to-disc (C/D) ratio and a rim-to-disc (R/D) ratio. Previously we proposed a method to determine cup edge by analyzing a vertical profile of...
One serious challenge of wireless multi-hop ad hoc networks is frequent link and node failures due to lossy wireless channels and low-cost hardware. Failure detection plays an important role in network maintenance. In order to reduce communication overhead, local-based failure detection methods conduct diagnosis processes in a local area. However, the overhead of them is still very large because several...
Cold boot attack is a side channel attack that recovers data from memory, which persists for a short period after power is lost. In the course of this attack, the memory gradually degrades over time and only a corrupted version of the data may be available to the attacker. Recently, great efforts havebeen devoted to reconstructing the original data from a corrupted version of AES key schedules, based...
Totalizer (TO) by Bailleux et al. and Half Sorting Network (HS) by Asin et al. are typical CNF encoding methods of cardinality constraint. The former is based on unary adder, while the latter is based on odd-even merge. Although TO is inferior to HS in terms of the number of clauses, TO is superior to HS in terms of the number of variables. We propose a new method called Modulo Totalizer (MTO) to...
Multimedia, including audio, image and video, etc, is a ubiquitous part of modern life. Evaluations, both objective and subjective, are of fundamental importance for numerous multimedia applications. In this paper, based on statistics of local binary pattern (LBP), we propose a novel and efficient quality similarity index for no reference (NR) image quality assessment (IQA). First, with the Laplacian...
Data acquisition systems play an important role in several industries. Because highly scalable ad-hoc networks with multi-hop transmissions can be easily constructed at low cost, such networks are considered suitable for data acquisition systems. However, a lack of centralized control makes it difficult to respond to congestion when system capacity is exceeded. Therefore, the estimation of system...
Diabetic retinopathy (DR) is the most frequent cause of blindness. Microaneurysm (MA) is an early symptom of DR. Therefore, the detection of MA is important for the early detection of DR. We have proposed an automated MA detection method based on double-ring filter, but it has given many false positives. In this paper, we propose an MA detection method based on eigenvalue analysis using a Hessian...
Coalition Structure Generation (CSG), a main research issue in the domain of coalition games, involves partitioning agents into exhaustive and disjoint coalitions so that the social welfare is optimized. The advent of compact representation schemes, such as marginal contribution networks (MC-nets), promotes the efficiency of solving the CSG problem. In this paper, inspired by the dramatic speed-up...
Glaucoma is the first leading cause of vision loss in Japan, thus developing a scheme for helping glaucoma diagnosis is important. For this problem, automated nerve fiber layer defects (NFLDs) detection method was proposed, but glaucoma risk assessment using this method was not evaluated. In this paper, computerized risk assessment for having glaucoma was attempted by use of the patients' clinical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.