The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] AIC(177hit)

161-177hit(177hit)

  • Attenuation Correction for X-Ray Emission Computed Tomography of Laser-Produced Plasma

    Yen-Wei CHEN  Zensho NAKAO  Shinichi TAMURA  

     
    LETTER-Image Theory

      Vol:
    E79-A No:8
      Page(s):
    1287-1290

    An attenuation correction method was proposed for laser-produced plasma emission computed tomography (ECT), which is based on a relation of the attenuation coefficient and the emission coefficient in plasma. Simulation results show that the reconstructed images are dramatically improved in comparison to the reconstructions without attenuation correction.

  • Assignment of Data Types to Words in a Natural Language Specification

    Yasunori ISHIHARA  Atsushi OHSAKI  Hiroyuki SEKI  Tadao KASAMI  

     
    PAPER-Automata,Languages and Theory of Computing

      Vol:
    E79-D No:6
      Page(s):
    820-828

    When a natural language specification is translated into a formal one, it is important for objects and operations appearing in the natural language specification to be appropriately classified according to the framework of data types in the formal specification. In this paper, we propose a semi-automatic method of constructing a context-free grammar (cfg) representing an assignment of data types to words in a given natural language specification. In our method, a cfg is mechanically constructed from sample sentences in a natural language specification, where the cfg represents type declarations of expressions and type hierarchy. Then, the cfg is appropriately modified by adding nonterminals/production rules that represent type inclusion relations. In this modification process, candidates for the productions to be added are presented to the user. Finally, the cfg is simplified based on structural equivalence. The result of applying this method to a part of the OSI session protocol specification (39 sentences) is also presented. There was an example in which ambiguity of anaphoric bindings was solved by type checking based on the resulting cfg.

  • On the Performance of Algebraic Geometric Codes

    Tomoharu SHIBUYA  Hajime JINUSHI  Shinji MIURA  Kohichi SAKANIWA  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E79-A No:6
      Page(s):
    928-937

    In this paper, we show that the conventional BCH codes can be better than the AG codes when the number of check symbols is relatively small. More precisely, we consider an AG code on Cab whose number of check symbols is less than min {g+a, n-g}, where n and g denote the code length and the genus of the curve, respectively. It is shown that there always exists an extended BCH code, (i) which has the same designed distance as the Feng-Rao designed distance of the AG code and the code length and the rate greater than those of the AG code, or (ii) which has the same number of check symbols as that of the AG code, the designed distance not less than that of the AG code and the code length longer than that of the AG code.

  • CDMA-AIC: Highly Spectrum-Efficient CDMA Cellular System Based on Adaptive Interference Cancellation

    Shousei YOSHIDA  Akihisa USHIROKAWA  

     
    PAPER-Modulation, Demodulation

      Vol:
    E79-B No:3
      Page(s):
    353-360

    This paper describes a CDMA cellular system based on adaptive interference cancellation (CDMA-AIC) with a large capacity. In the CDMA-AIC, each base station employs a single-user type adaptive interference canceller (AIC), which consists of a fractionally chip-spaced code-orthogonalizing filter (COF) and a coherent detector. The AIC adaptively removes power-dominant multiple-access interferences (MAIs) in the cellular system, regardless of whether they are intra-cell interferences or inter-cell interferences, without any information about them, such as spreading codes, signal received timings and channel parameters. Evaluation under the multiple-cell environment demonstrates that the reverse link capacity of the CDMA-AIC with QPSK modulation is 3.6 times as large as the capacity of the CDMA without MAI cancellation. Further, the capacity is less sensitive to transmission power control errors than that of the conventional CDMA systems.

  • Reliability Functions for Concatenated Codes Employing Modular Codes with Maximum Likelihood Decoding

    Tomohiko UYEMATSU  Junya KAGA  Eiji OKAMOTO  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1160-1169

    This paper investigates the error correcting capabilities of concatenated codes employing algebraic geometry codes as outer codes and time-varying randomly selected inner codes, used on discrete memoryless channels with maximum likelihood decoding. It is proved that Gallager's random coding error exponent can be obtained for all rates by such codes. Further, it is clarified that the error exponent arbitrarily close to Gallager's can be obtained for almost all random selections of inner codes with a properly chosen code length, provided that the length of the outer code is sufficiently large. For a class of regular channels, the result is also valid for linear concatenated codes, and Gallager's expurgated error exponent can be asymptotically obtained for all rates.

  • Homotopy Equivalent Spectral Transformation and Morse Theory

    Yoshinao SHIRAKI  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1186-1191

    The systematic treatment of speech-spectrum transformation can be obtained in terms of algebraic topology and Morse theory. Some properties of homotopy-equivalence in the transformation of 1- and 2-dimensional speech spectrum are discussed.

  • Error Correction/Detection Decoding Scheme of Binary Hamming Codes

    Chaehag YI  Jae Hong LEE  

     
    LETTER-Information Theory and Coding Theory

      Vol:
    E78-A No:8
      Page(s):
    1046-1048

    An error correction/detection decoding scheme of binary Hamming codes is proposed. Error correction is performed by algebraic decoding and then error detection is performed by simple likelihood ratio testing. The proposed scheme reduces the probability of undetected decoding error in comparison with conventional error correction scheme and increases throughjput in comparison with conventional error detection scheme.

  • Learning Theory Toward Genome Informatics

    Satoru MIYANO  

     
    PAPER-Machine Learning and Its Applications

      Vol:
    E78-D No:5
      Page(s):
    560-567

    This paper discusses some problems in Molecular Biology for which learning paradigms are strongly desired. We also present a framework of knowledge discovery by PAC-learning paradigm together with its theory and practice developed in our work for discovery from amino acid sequences.

  • A Modified Information Criterion for Automatic Model and Parameter Selection in Neural Network Learning

    Sumio WATANABE  

     
    PAPER-Bio-Cybernetics and Neurocomputing

      Vol:
    E78-D No:4
      Page(s):
    490-499

    This paper proposes a practical training algorithm for artificial neural networks, by which both the optimally pruned model and the optimally trained parameter for the minimum prediction error can be found simultaneously. In the proposed algorithm, the conventional information criterion is modified into a differentiable function of weight parameters, and then it is minimized while being controlled back to the conventional form. Since this method has several theoretical problems, its effectiveness is examined by computer simulations and by an application to practical ultrasonic image reconstruction.

  • Decomposable Termination of Composable Term Rewriting Systems

    Masahito KURIHARA  Azuma OHUCHI  

     
    PAPER-Algorithm and Computational Complexity

      Vol:
    E78-D No:4
      Page(s):
    314-320

    We extend the theorem of Gramlich on modular termination of term rewriting systems, by relaxing the disjointness condition and introducing the composability instead. More precisely, we prove that if R1, R-1 are composable, terminating term rewriting systems such that their union is nonterminating then for some a {1, -1}, Ra OR is nonterminating and R-aRa is Fa-lifting. Here, OR is defined to be the special system {or(x, y) x, or(x, y) y}, Fa is the set of function symbols associated with Ra, and an Fa-lifting system contains a rule which has either a variable or a symbol from Fa at the leftmost position of its right-hand side. The extended theorem is stronger than the original one in that it relaxed the disjointness and constructor-sharing conditions and allowed the two systems to share defined symbols in common under the restriction of composability. The corollaries of the theorem show several sufficient conditions for decomposability of termination, which are useful for proving termination of term rewriting systems defined by combination of several composable modules.

  • Inductive Inference of Algebraic Processes Based on Hennessy-Milner Logic

    Atsushi TOGASHI  Shigetomo KIMURA  

     
    INVITED PAPER

      Vol:
    E77-A No:10
      Page(s):
    1594-1601

    This paper considers algebraic basic processes, a subset of communicating processes in CCS by Milner, and presents a synthesis algorithm to infer a process that satisfies the properties of the process, represented as fomulae in Hennessy-Milner Logic. The validity of the proposed algorithm can be stated that it synthesizes a process in the limit, which cannot be distinguished from the target one with respect to the strong equivalence.

  • A Translation Method from Natural Language Specifications of Communication Protocols into Algebraic Specifications Using Contextual Dependencies

    Yasunori ISHIHARA  Hiroyuki SEKI  Tadao KASAMI  Jun SHIMABUKURO  Kazuhiko OKAWA  

     
    PAPER-Automaton, Language and Theory of Computing

      Vol:
    E76-D No:12
      Page(s):
    1479-1489

    This paper presents a method of translating natural language specifications of communication protocols into algebraic specifications. Such a natural language specification specifies action sequences performed by the protocol machine (program). Usually, a sentence implicitly specifies the state of the protocol machine at which the described actions must be performed. The authors propose a method of analyzing the implicitly specified states of the protocol machine taking the OSI session protocol specification (265 sentences) as an example. The method uses the following properties: (a) syntactic properties of a natural language (English in this paper); (b) syntactic properties introduced by the target algebraic specifications, e.g., type constraints; (c) properties specific to the target domain, e.g., properties of data types. This paper also shows the result of applying this method to the main part of the OSI session protocol specification (29 paragraphs, 98 sentences). For 95 sentences, the translation system uniquely determines the states specified implicitly by these sentences, using only (a) and (b) described above. By using (c) in addition, each implicitly specified state in the remaining three sentences is uniquely determined.

  • Analysis of the Trends in Logic Synthesis

    Gabrièle SAUCIER  

     
    INVITED PAPER-Logic Synthesis

      Vol:
    E76-D No:9
      Page(s):
    1006-1017

    This paper tends to analyze the trends of the research in logic synthesis. The first part is devoted to an expertise of the efficiency of factorization methods developed during the last decade and to the proposal of dedicated methods for complex logic blocks. The second part shows the importance of Binary Decision Diagrams as representation of Boolean functions. Their use in the technology mapping phase of multiplexor-based FPGAs in an industrial tool is taken as illustration.

  • Amplitude Statistics of Sea Clutter Using an X-Band Radar

    Yoshihiro ISHIKAWA  Matsuo SEKINE  Manami IDE  Mami UENO  Shogo HAYASHI  

     
    PAPER-Electronic and Radio Applications

      Vol:
    E76-B No:7
      Page(s):
    784-788

    Sea clutter was measured using an X-band radar at very high grazing angles between 8.2 and 17.5. The sea state was 7 with the wave height of 6 to 9m. The wind velocity was 25m/s. It is shown that sea clutter amplitudes obey the log-normal and K distributions using the Akaike Information Criterion (AIC) , which is more rigorous fit to the distribution to the data than the least squares method.

  • An Algebraic Specification of a Daisy Chain Arbiter

    Yu Rong HOU  Atsushi OHNISHI  Yuji SUGIYAMA  Takuji OKAMOTO  

     
    PAPER

      Vol:
    E75-D No:6
      Page(s):
    778-784

    There have been few studies on formal approaches to the specification and realization of asynchronous sequential circuits. For synchronous sequential circuits, an algebraic method is proposed as one of such approaches, but it cannot be applied to asynchronous ones directly. This paper describes an algebraic method of specifying the abstract behavior of asynchronous sequential circuits. We select an daisy chain arbiter as an example of them. In the arbiter, state transitions are caused by input changes, and all the modules do not always make state transitions simultaneously. These are main obstacles to specify it in the same way as sychronous sequential circuits. In order to remove them, we modify the meaning of input in specifications and introduce pseudo state transitions so that we can regard all the modules as if they make state transitions simultaneously. This method can be applied to most of the other asynchronous sequential circuits.

  • Net-Oriented Analysis and Design

    Shinichi HONIDEN  Naoshi UCHIHIRA  

     
    INVITED PAPER

      Vol:
    E75-A No:10
      Page(s):
    1317-1325

    Net-Oriented Analysis and Design (NOAD) is defined as three items: (1) Various nets are utilized as an effective modeling method. (2) Inter-relationships among verious nets are determined. (3) Verification or analysis methods for nets are provided and they are implemented based on the mathematical theory, that is Net theory. Very few methods have been presented to satisfy these three items. For example, the Real-Time SA method covers item (1) only. The Object-Oriented Analysis and Design method (OOA/OOD) covers items (1) and (2). NOAD can be regarded as an extension to OOA/OOD. This paper discusses how effectively various nets have been used in actual software development support metnods and tools and evaluates such several methods and tools from the NOAD viewpoint.

  • A Method of Obtaining the Maximum Likelihood Initial Height Function for Optimal Movement of a Wire Bonder

    Shengping JIANG  Hiroyuki ANZAI  

     
    PAPER-Computer Aided Design (CAD)

      Vol:
    E75-A No:9
      Page(s):
    1134-1140

    In this paper, we propose a method to simulate the curve surface of the initial height in the movement of the electronic wire bonder using the experimental data. For given measured data (xk, yk, zk (k=1, 2, , m)), we propose an algebraic surface of n-th degree as a methematical model of the initial height surface. The AIC method is a method of evaluating the goodness of a given model. The maximum likelihood model is selected by comparing with the AIC value of each model for n=0, 1, 2, 3, , 11. Useing this model, the initial raise position of the electronic wire bonder can be controlled by computer programing and can make the movement of wire bonder full-automatic. As a resurt, the well-arranged wiring and reliable contacting can be obtained.

161-177hit(177hit)