The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

12341-12360hit(42807hit)

  • Quantization Error-Aware Tomlinson-Harashima Precoding in Multiuser MISO Systems with Limited Feedback

    Yanzhi SUN  Muqing WU  Jianming LIU  Chaoyi ZHANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3015-3018

    In this letter, a quantization error-aware Tomlinson-Harashinma Precoding (THP) is proposed based on the equivalent zero-forcing (ZF) criterion in Multiuser Multiple-Input Single-Output (MU-MISO) systems with limited feedback, where the transmitter has only quantized channel direction information (CDI). This precoding scheme is robust to the channel uncertainties arising from the quantization error and the lack of channel magnitude information (CMI). Our simulation results show that the new THP scheme outperforms the conventional precoding scheme in limited feedback systems with respect to Bit Error Ratio (BER).

  • A Report Generator for Database and Web Applications

    Woei-Kae CHEN  Pin-Ying TU  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E95-D No:9
      Page(s):
    2265-2276

    Report generation is one of the most important tasks for database and e-commerce applications. Current report tools typically provide a set of predefined components that are used to specify report layout and format. However, available layout options are limited, and WYSIWYG formatting is not allowed. This paper proposes a four-phase report generation process to overcome these problems. The first phase retrieves source tables from the database. The second phase reorganizes the layout of the source tables by transferring the source tables into a set of new flat tables (in the first normal form). The third phase restructures the flat tables into a nested table (report) by specifying the report structure. The last phase formats the report with a WYSIWYG format editor supporting a number of formatting rules designed specifically for nested reports. Each phase of the proposed process supports visual programming, giving an easy-to-use user interface and allowing very flexible report layouts and formats. A visual end-user-programming tool, called TPS, is developed to demonstrate the proposed process and show that reports with sophisticated layouts can be created without writing low-level report generation programs.

  • Flow Control Scheme Using Adaptive Receiving Opportunity Control for Wireless Multi-Hop Networks

    Atsushi TAKAHASHI  Nobuyoshi KOMURO  Shiro SAKATA  Shigeo SHIODA  Tutomu MURASE  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2751-2758

    In wireless single-hop networks, IEEE 802.11e Enhanced Distributed Channel Access (EDCA) is the standard for Quality of Service (QoS) control. However, it is necessary for controlling QoS to modify the currently used IEEE 802.11 Distributed Coordination Function (DCF)-compliant terminals as well as Access Points (APs). In addition, it is necessary to modify the parameter of IEEE 802.11e EDCA when the traffic is heavy. This paper proposes a novel scheme to guarantee QoS of high-priority flow with Receiving Opportunity Control in MAC Frame (ROC) employed adaptive flow control in wireless multi-hop network. In the proposed scheme, the edge APs which are directly connected to user terminals estimate the network capacity, and calculate appropriate ACK prevention probability against low-priority flow according to traffic load. Simulation evaluation results show that the proposed scheme guarantees QoS.

  • RING: A Cross-Layer P2P Group Conferencing Mechanism over Mobile Ad-Hoc Networks

    Jun-Li KUO  Chen-Hua SHIH  Cheng-Yuan HO  Ming-Ching WANG  Yaw-Chung CHEN  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2759-2768

    In the infrastructure-less disaster environment, the application of the peer-to-peer (P2P) group conference over mobile ad hoc network (MANET) can be used to communicate with each other when the rescue crews search the survivors but work separately. However, there still are several problems of in-time multimedia delivery in P2P-MANET: (1) MANET mobility influences the maintenance of P2P overlay. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the difficulty of multi-source P2P group conferencing. Therefore, P2P conferencing cannot work well on MANET. To overcome the above disadvantages, in this paper, we present a cross-layer P2P group conferencing mechanism over MANET, called RING (Real-time Intercommunication Network Gossip). The RING uses the ring overlay to manage peers and utilizes the cross-layer mechanism to force the ring overlay to be proximal to MANET topology. Therefore, RING can lead efficient in-time multimedia streaming delivery. On the other hand, the ring overlay can deal with peer joining/leaving fast and simply, and improves the delivery efficiency with the minimum signaling overhead. Through mathematical theory and a series of experiments, we demonstrate that RING is workable and it can shorten the source-to-end delay with minimal signaling overhead.

  • MMSE-Based Precoders for Cooperative MIMO Systems with Direct Link

    Byungwook YOO  Chungyong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    2999-3002

    We propose linear precoders which jointly minimize the mean-squared error of estimated symbol at the destination node for cooperative multiple-input multiple-output communication systems. Unlike the existing precoders which require high computational complexity to solve the optimization problem on the direct link, the proposed precoder is expressed in a closed-form. Simulation results show that the proposed precoder outperforms the existing precoders in the low SNR region. Moreover, we observe that the proposed iterative algorithm is not sensitive to the initial matrices.

  • Delay Evaluation of Issue Queue in Superscalar Processors with Banking Tag RAM and Correct Critical Path Identification

    Kyohei YAMAGUCHI  Yuya KORA  Hideki ANDO  

     
    PAPER-Computer System

      Vol:
    E95-D No:9
      Page(s):
    2235-2246

    This paper evaluates the delay of the issue queue in a superscalar processor to aid microarchitectural design, where quick quantification of the complexity of the issue queue is needed to consider the tradeoff between clock cycle time and instructions per cycle. Our study covers two aspects. First, we introduce banking tag RAM, which comprises the issue queue, to reduce the delay. Unlike normal RAM, this is not straightforward, because of the uniqueness of the issue queue organization. Second, we explore and identify the correct critical path in the issue queue. In a previous study, the critical path of each component in the issue queue was summed to obtain the issue queue delay, but this does not give the correct delay of the issue queue, because the critical paths of the components are not connected logically. In the evaluation assuming 32-nm LSI technology, we obtained the delays of issue queues with eight to 128 entries. The process of banking tag RAM and identifying the correct critical path reduces the delay by up to 20% and 23% for 4- and 8-issue widths, respectively, compared with not banking tag RAM and simply summing the critical path delay of each component.

  • A Fuzzy Routing Method in UAV Delay Tolerant Networks

    Xuanya LI  Linlin CI  Wenbing JIN  

     
    LETTER

      Vol:
    E95-B No:9
      Page(s):
    2769-2773

    Hovering unmanned aerial vehicles (UAVs) with mutual sense and communication capability form a new-fashioned airborne ad hoc network. Traditional routing protocols assume that there has already existed an end-to-end path before the message forwarding starts which, however, is not always available in the airborne network featuring randomly violent topological changes. Local heuristic information without complex computational cost should be considered to help route in this specific delay tolerant network (DTN). In this letter, we take Crowd Density (CD) and Relative Velocity Direction (RVD) as the fuzzy inputs, and use approximate reasoning to calculate priority of alternative candidates. Finally, the proposed mechanism is compared with some existing protocols.

  • Non-contact PIM Evaluation Method Using a Standing Wave Coaxial Tube

    Daijiro ISHIBASHI  Nobuhiro KUGA  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1508-1514

    In this paper, a contactless measurement technique of passive intermodulation (PIM) using a coaxial tube excited with standing waves is proposed. The principle of the proposed method is described using a two-port network model with the lumped resistances representing the losses of a specimen and test equipment. To show its validity, a test using nickel wires producing high PIM is carried out, and its PIM-dependency on DUT-position in the coaxial tube is simulated using the FDTD method. The simulated result shows a good agreement to the experiment. Through the examination, it is found that the power consumption by the PIM source in a specimen is essential in PIM production, and sensitive PIM detection does not require good matching condition. Finally, the relation between PIM-source size and generated PIM level is also examined. The result shows that at least 18 dB-PIM reduction is obtained by PIM source size in a half-wavelength conductive wire.

  • Influence of Arc Discharge on Contact Resistance of AgNi Contacts for Electromagnetic Contactors

    Kiyoshi YOSHIDA  Koichiro SAWA  Kenji SUZUKI  Masaaki WATANABE  

     
    BRIEF PAPER

      Vol:
    E95-C No:9
      Page(s):
    1531-1534

    Experiments were carried out at several voltages to clarify the influence of the voltage on various characteristics, i.e. arc duration, contact resistance, arc energy, and the change in electrode mass. The voltage was varied from DC100 V to 160 V, the load current was fixed at 5 A constant, and the electromagnetic contactor was operated continuously up to 100,000 times. The experiments were carried out under the three operation modes which are classified by the arc discharge. As a result, the relation between the operation mode and contact resistance was clarified. When only a make arc was generated, the contact resistance was smallest. In addition, the contact resistance was not affected by the source voltage.

  • Detecting Objectionable Images Using a New Skin Detection Method

    Ali NADIAN GHOMSHEH  Alireza TALEBPOUR  

     
    PAPER-Pattern Recognition

      Vol:
    E95-D No:9
      Page(s):
    2288-2297

    In this paper, a new skin detection method using pixel color and image regional information, intended for objectionable image filtering is proposed. The method consists of three stages: skin detection, feature extraction and image classification. Skin detection is implemented in two steps. First, a Sinc function, fitted to skin color distribution in the Cb-Cr chrominance plane is used for detecting pixels with skin color properties. Next, to benefit regional information, based on the theory of color image reproduction, it's shown that the scattering of skin pixels in the RGB color space can be approximated by an exponential function. This function is incorporated to extract the final accurate skin map of the image. As objectionable image features, new shape and direction features, along with area feature are extracted. Finally, a Multi-Layer Perceptron trained with the best set of input features is used for filtering images. Experimental results on a dataset of 1600 images illustrate that the regional method improves the pixel-based skin detection rate by 10%. The final classification result with 94.12% accuracy showed better results when compared to other methods.

  • Intelligent Traffic Control Systems Based on IEEE 802.11 DCF/PCF

    Chanwoo PARK  Jungwoo LEE  

     
    LETTER-Intelligent Transport System

      Vol:
    E95-A No:9
      Page(s):
    1651-1654

    The research on driverless cars has been making much progress lately. In this paper, we propose a new traffic control system without traffic lights at an intersection. We assume a system with fully autonomous driverless cars, and infrastructure to avoid collision completely. When automobiles approach an intersection, they communicates with the access point in both random access mode and polling mode, and the movement of the automobiles will be coordinated by the infra structure (access point). Traffic congestion is very difficult to predict and deal with because it is a function of many unknown factors such as number of cars, weather, road conditions, accidents, etc. The proposed algorithm is designed for urban road networks to ease the congestion, and make it more predictable at the same time. A key idea of this paper is that IEEE 802.11 DCF/PCF mechanisms are used to control traffic flow for driverless cars when there are no traffic lights at an intersection. The algorithm uses the concept of contention/contention-free period of IEEE 802.11 to find a balance between the efficiency of traffic flow and the fairness between users.

  • Position and Shape of Break Arcs Driven by Transverse Magnetic Field

    Tomoaki SASAKI  Junya SEKIKAWA  Takayoshi KUBONO  

     
    BRIEF PAPER

      Vol:
    E95-C No:9
      Page(s):
    1527-1530

    Break arcs are generated in a DC48 V and 10 A resistive circuit. The external transverse magnetic field of a permanent magnet is applied to the break arcs. The position and shape of the break arc are investigated. As a result, it is confirmed that the cathode spot region was shifted upward earlier than the anode spot region. This result shows that the cathode spot region is easily driven by the transverse magnetic field than the anode spot region.

  • Throughput Improvement Technique Using Adaptive Control of Perturbation Interval for Downlink Multi-User MIMO Based on Vector Perturbation

    Hiroki MORI  Yuji TOHZAKA  Tsuguhide AOKI  Yasuhiko TANABE  

     
    PAPER-Antennas and Propagation

      Vol:
    E95-B No:9
      Page(s):
    2861-2869

    In a downlink multi-user multiple-input multiple-output (MU-MIMO) system, the vector perturbation (VP) method, which is one of the non-linear precoding methods, is a promising technique with which to maximize the channel capacity. In the VP method, the receiver requires the modulo operation to remove the perturbation signal added at the transmitter. However, owing to noise, the modulo operation may not run correctly which makes the soft demapper produce unreliable log-likelihood ratios (LLRs), resulting in a degradation of system throughput. To enhance the throughput performance, we propose a method that expands the basic perturbation interval and adaptively controls the expansion rate according to the modulation and coding scheme (MCS). The optimum expansion rate is derived by link-level simulation and the system throughput is measured by system-level simulation. The system-level simulation results show that the proposed VP method can obtain higher throughput than the conventional VP method.

  • Efficient Voice Transmissions for MIL-STD-188-220-Based Wideband Tactical Systems

    Sewon HAN  Byung-Seo KIM  

     
    LETTER-Network

      Vol:
    E95-B No:9
      Page(s):
    2964-2967

    Unlike analogue voice signal-oriented and narrowband-based conventional tactical systems, the future tactical networks will deal with packet-based voice traffic over a wide channel bandwidth. In this paper, a method is proposed to improve the performance of voice packet transmission for MIL-STD-188-220 military standard-based wideband communication systems. By utilizing Bump-Slots for voice packet transmissions, significant improvements are achieved. This is confirmed by extensive simulations.

  • Effect of Lubricant on Lifetime of Au-Plated Slip-Ring and Ag-Pd-Cu Brush System for Small Electric Power

    Koichiro SAWA  Yasunori SUZUKI  Noboru MORITA  Kaoru ENDO  Takahiro UENO  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1465-1472

    The authors have been investigating degradation process of Au plated slip ring and Ag-Pd-Cu brush system. In almost all cases the lifetime of the sliding system ends, when Au plating layer is worn out, the ring surface is oxidized to be black in color and contact resistance becomes very high. Further, the lifetime is very short without lubricant. So, the lubricant is very effective to make the lifetime longer. However, even with lubricant the lifetime is varied from about 1000 hours to almost 7000 hours in the past experiments. It is an important issue how the lubricant works on the lifetime of the system. In this paper the effect of lubricant on the degradation process of contact resistance is focused on. In the past tests the lubricant is supplied only once before the test. In this test the lubricant is regularly supplied almost every 900 operation hours. Consequently, the operation more than 8000 hours is realized, which is the longest among tests so far. In addition the contact voltage drop increase gradually until 2600 hours and after that it stays almost constant around 70 mV. According to the Element Analysis after the test the Ni base plating layer is totally exposed in many tracks. It means that the Au plating layer is gradually worn out probably at the stage of increasing voltage drop. In the previous tests the lifetime ended even when the Ni plating layer remained. So, the reason of long operation in this test is guessed to be that the lubricant not only decreases wear of ring and brush, but also suppresses oxidation of the Ni layer.

  • Opportunistic Cooperative Positioning in OFDMA Systems

    Ziming HE  Yi MA  Rahim TAFAZOLLI  

     
    LETTER-Information Theory

      Vol:
    E95-A No:9
      Page(s):
    1642-1645

    This letter presents a novel opportunistic cooperative positioning approach for orthogonal frequency-division multiple access (OFDMA) systems. The basic idea is to allow idle mobile terminals (MTs) opportunistically estimating the arrival timing of the training sequences for uplink synchronization from active MTs. The major advantage of the proposed approach over state-of-the-arts is that the positioning-related measurements among MTs are performed without the paid of training overhead. Moreover, Cramer-Rao lower bound (CRLB) is utilized to derive the positioning accuracy limit of the proposed approach, and the numerical results show that the proposed approach can improve the accuracy of non-cooperative approaches with the a-priori stochastic knowledge of clock bias among idle MTs.

  • Good or Bad Committers? –– A Case Study of Committer's Activities on the Eclipse's Bug Fixing Process

    Anakorn JONGYINDEE  Masao OHIRA  Akinori IHARA  Ken-ichi MATSUMOTO  

     
    PAPER

      Vol:
    E95-D No:9
      Page(s):
    2202-2210

    There are many roles to play in the bug fixing process in open source software development. A developer called “Committer”, who has a permission to submit a patch into a software repository, plays a major role in this process and holds a key to the successfulness of the project. Despite the importance of committer's activities, we suspect that sometimes committers can make mistakes which have some consequences to the bug fixing process (e.g., reopened bugs after bug fixing). Our research focuses on studying the consequences of each committer's activities to this process. We collected each committer's historical data from the Eclipse-Platform's bug tracking system and version control system and evaluated their activities using bug status in the bug tracking system and commit log in the version control system. Then we looked deeper into each committer's characteristics to see the reasons why some committers tend to make mistakes more than the others.

  • Low-Complexity Sign Detection Algorithm for RNS {2n-1, 2n, 2n+1}

    Minghe XU  Ruohe YAO  Fei LUO  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E95-C No:9
      Page(s):
    1552-1556

    Based on a reverse converter algorithm derived from the New Chinese Remainder Theorem I, an algorithm for sign detection of RNS {2n-1, 2n, 2n+1} is presented in this paper. The hardware of proposed algorithm can be implemented using two n-bit additions and one (n+1)-bit comparator. Comparing with the previous paper, the proposed algorithm has reduced the number of additions used in the circuit. The experimental results show that the proposed circuit achieves 17.3% savings in area for small moduli and 10.5% savings in area for large moduli on an average, with almost the same speed. The power dissipations obtain 12.6% savings in average.

  • Call Admission Control with Fractional Buffer Size

    Ruben Pavel MURILLO-PEREZ  Carmen Beatriz RODRIGUEZ-ESTRELLO  Felipe CRUZ-PEREZ  

     
    LETTER-Network Management/Operation

      Vol:
    E95-B No:9
      Page(s):
    2972-2975

    In this letter a general admission control strategy is proposed and mathematically analyzed. Fractional buffering finely adjusts different QoS metrics allowing them to simultaneously achieve their maximum acceptable values, maximizing system capacity. Fractional buffering also allows the adequate and fair performance comparison among different resource management strategies and/or evaluation scenarios.

  • Reweighted Least Squares Heuristic for SARX System Identification

    Katsumi KONISHI  

     
    LETTER-Systems and Control

      Vol:
    E95-A No:9
      Page(s):
    1627-1630

    This letter proposes a simple heuristic to identify the discrete-time switched autoregressive exogenous (SARX) systems. The goal of the identification is to identify the switching sequence and the system parameters of all submodels simultaneously. In this letter the SARX system identification problem is formulated as the l0 norm minimization problem, and an iterative algorithm is proposed by applying the reweighted least squares technique. Although the proposed algorithm is heuristic, the numerical examples show its efficiency and robustness for noise.

12341-12360hit(42807hit)