The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

10521-10540hit(18690hit)

  • Left-Handed Material Composed of Planar Circuit-Type Resonators in a Waveguide

    Hiroshi KUBO  Tsuyoshi MUKAI  Atsushi SANADA  

     
    PAPER

      Vol:
    E89-C No:9
      Page(s):
    1330-1336

    A compact, nonradiative, and easy fabricated left-handed material composed of planar circuit-type resonators in a cutoff waveguide is proposed. It is shown that the TE-type evanescent field is equivalent to the field in ε-negative material and the resonator works as a particle with negative permeability. The existence of a left-handed mode is ensured by a field distribution and a dispersion relation. After showing that the two constituents have an influence on the permittivity or the permeability of the material, on the basis of an idea of impedance, the material is matched to a conventional waveguide. Finally the material can be applied to a left-handed leaky-wave antenna.

  • Orthogonal Set of Huffman Sequences and Its Application to Suppressed-Interference Quasi-Synchronous CDMA System

    Yoshihiro TANADA  

     
    PAPER

      Vol:
    E89-A No:9
      Page(s):
    2283-2291

    A Huffman sequence has a zero-sidelobe aperiodic autocorrelation function except at both shift ends. This paper presents orthogonal sets of the zero correlation zone (ZCZ) Huffman sequences and the application to a quasi-synchronous CDMA system with interferences suppressed. The sequences with low or large peak values are constructed on the basis of sequence spectra corresponding to multiple convolution of elementary sequences, and include the ZCZ sequences. The CDMA system is constructed from the ZCZ sequences, and suppresses intersymbol and interchannel interferences.

  • The Central Limit Theorem for the Normalized Sums of the MAI for SSMA Communication Systems Using Spreading Sequences of Markov Chains

    Hiroshi FUJISAKI  Gerhard KELLER  

     
    PAPER

      Vol:
    E89-A No:9
      Page(s):
    2307-2314

    We extend the sliding block code in symbolic dynamics to transform J (≥2) sequences of Markov chains with time delays. Under the assumption that the chains are irreducible and aperiodic, we prove the central limit theorem (CLT) for the normalized sums of extended sliding block codes from J sequences of Markov chains. We apply the theorem to the system analysis of asynchronous spread spectrum multiple access (SSMA) communication systems using spreading sequences of Markov chains. We find that the standard Gaussian approximation (SGA) for estimations of bit error probabilities in such systems is the 0-th order approximation of the evaluation based on the CLT. We also provide a simple theoretical evaluation of bit error probabilities in such systems, which agrees properly with the experimental results even for the systems with small number of users and low length of spreading sequences.

  • Multiobjective Evolutionary Approach to the Design of Optimal Controllers for Interval Plants via Parallel Computation

    Chen-Chien James HSU  Chih-Yung YU  Shih-Chi CHANG  

     
    PAPER-Systems and Control

      Vol:
    E89-A No:9
      Page(s):
    2363-2373

    Design of optimal controllers satisfying performance criteria of minimum tracking error and disturbance level for an interval system using a multi-objective evolutionary approach is proposed in this paper. Based on a worst-case design philosophy, the design problem is formulated as a minimax optimization problem, subsequently solved by a proposed two-phase multi-objective genetic algorithm (MOGA). By using two sets of interactive genetic algorithms where the first one determines the maximum (worst-case) cost function values for a given set of controller parameters while the other one minimizes the maximum cost function values passed from the first genetic algorithm, the proposed approach evolutionarily derives the optimal controllers for the interval system. To suitably assess chromosomes for their fitness in a population, root locations of the 32 generalized Kharitonov polynomials will be used to establish a constraints handling mechanism, based on which a fitness function can be constructed for effective evaluation of the chromosomes. Because of the time-consuming process that genetic algorithms generally exhibit, particularly the problem nature of minimax optimization, a parallel computation scheme for the evolutionary approach in the MATLAB-based working environment is also proposed to accelerate the design process.

  • Quasi-Orthogonal STBC System Using Unequal Power Allocation Scheme

    Yeon Ju LIM  Bong Jun KIM  Sang Kyu PARK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:9
      Page(s):
    2633-2637

    Quasi-orthogonal Space Time Block Code (STBC) was designed to provide full transmission rate when using more than two antennas. However, it cannot have a full diversity gain because of the interference resulted from its quasi orthogonality property. In order to achieve full diversity from quasi-orthogonal STBC, the interference can be removed by a Simple Correlation Canceling (SCC) algorithm which improves a system performance significantly. However, the SCC algorithm has a disadvantage that produces noise enhancement, thereby resulting in performance degradation. Accordingly, without increasing an extra system complexity, an unequal power allocation scheme in a transmitter is proposed to achieve a better system performance than the conventional STBC system using the SCC algorithm. Also, the unequal power allocation scheme enables a receiver to use a simple decoding procedure that does not produce noise enhancement.

  • On Optimal Construction of Two Classes of ZCZ Codes

    Takafumi HAYASHI  Shinya MATSUFUJI  

     
    LETTER

      Vol:
    E89-A No:9
      Page(s):
    2345-2350

    This paper presents constructions of two kinds of sets of sequences with a zero correlation zone, called ZCZ code, which can reach the upper bound of the member size of the sequence set. One is a ZCZ code which can be constructed by a unitary matrix and a perfect sequence. Especially, a ternary perfect sequence with elements 1 and zero can be used to construct the proposed ZCZ code. The other is a ZCZ code of pairs of ternary sequences and binary sequences which can be constructed by an orthogonal matrix that includes a Hadamard matrix and an orthogonal sequence pair. As a special case, an orthogonal sequence pair, which consists of a ternary sequence and a binary sequence, can be used to construct the proposed ZCZ code. These codes can provide CDMA systems without co-channel interference.

  • Traffic Engineering for Provisioning Restorable Hose-Model VPNs

    Yu-Liang LIU  Yeali Sunny SUN  Meng Chang CHEN  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2394-2403

    Virtual Private Networks (VPNs) are overlay networks established on top of a public network backbone with the goal of providing a service comparable to Private Networks (PNs). The recently proposed VPN hose-model provides customers with flexible and convenient ways to specify their bandwidth requirements. To meet the specified bandwidth requirements, the Network Service Provider (NSP) must reserve sufficient bandwidth on the data transmission paths between each pair of endpoints in a VPN. In addition, the reliability of a VPN depends on the reliability of the data transmission paths. Italiano et al. proposed an algorithm that finds a set of backup paths for a given VPN (VPN tree) under the single-link failure model [1]. When a link failure is detected on a VPN tree, a backup path corresponding to the failed link can be activated to restore the disconnected VPN tree into a new one, thereby ensuring the reliability of the VPN. However, Italiano's algorithm cannot guarantee that the specified bandwidth requirement of the given VPN under the single-link failure model will be met. To address this issue, we propose a new backup path set selection algorithm called BANGUAD in this paper. In addition, the problem of establishing multiple bandwidth-guaranteed hose-model VPNs under the single-link failure model has not been investigated previously. However in this problem, bandwidth-sharing algorithms have the potential to improve the performance of a provisioning algorithm significantly. Therefore, we also propose a bandwidth sharing algorithm and three provisioning algorithms for establishing multiple bandwidth-guaranteed hose-model VPNs under the single-link failure model. Simulations that compare the performance of the proposed algorithms are reported.

  • Temporal Error Concealment Based on Weighted Pixel Estimator

    Tien-Ying KUO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E89-D No:9
      Page(s):
    2583-2586

    A temporal error concealment algorithm for the block-based video coder has been proposed. The concept of block overlapping is adopted to conceal the erroneous blocks, and the recovered pixels are estimated by the weighted sum from the overlapping. The overlapping weighting matrix has been carefully selected in order to fully exploit the spatial-temporal correlation between boundary blocks and the lost block. Furthermore, the motion vector for the lost block has been recovered by considering the best results for the overlapping. The experimental results are shown by integrating our algorithm into the H.263+ coder.

  • A Non-Work-Conserving Scheduler to Provide Proportional Delay Differentiated Services and Best Effort Service

    Yuan-Cheng LAI  Arthur CHANG  

     
    PAPER-Network

      Vol:
    E89-B No:9
      Page(s):
    2493-2502

    The proportional delay differentiation (PDD) model provides consistent packet delay differentiation between classes of service. Currently, the present schedulers performing the PDD model cannot achieve desired delay proportion observed in short timescales under light/moderate load. Thus, we propose a Non-Work-Conserving (NWC) scheduler, which utilizes the pseudo-waiting time for an empty queue and forces each class to compare its priority with those of all other classes. Simulation results reveal that NWC outperforms all current schedulers in achieving the PDD model. However, NWC suspends the server from transmitting packets immediately if an empty class has the maximum priority, resulting in an idle server. Therefore, we further propose two approaches, which will serve a best-effort class during this idle time. Compared with other schedulers, the proposed approaches can provide more predictable and controllable delay proportion, accompanied with satisfactory throughput and average queuing delay.

  • An Efficient User Selection Algorithm for Zero-Forcing Beamforming in Downlink Multiuser MIMO Systems

    Haibo ZHENG  Xiang CHEN  Shidong ZHOU  Jing WANG  Yongxing ZHOU  James Sungjin KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:9
      Page(s):
    2641-2645

    In this letter, we propose an efficient user selection algorithm aiming to select users with less spatially correlation and meet the user number limit of zero-forcing beamforming in downlink multiuser MIMO systems. This algorithm yields a considerable complexity reduction with only a small loss in performance and it only needs partial users' CSI feedback. Coupled with the algorithm, a null space updating method in O(K2) time and a modified proportional fair scheduling algorithm are also proposed.

  • Capacity Bound of MIMO Systems with MPSK Modulation and Time-Multiplexed Pilots

    Yifei ZHAO  Ming ZHAO  Yunzhou LI  Jing WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:9
      Page(s):
    2629-2632

    In this letter, we elucidate the ergodic capacity of multiple-input multiple-output (MIMO) systems with M-ary phase-shift keying (MPSK) modulation and time-multiplexed pilots in frequency-flat Rayleigh fading environment. With linear minimum mean square error (LMMSE) channel estimation, the optimal pilots design is presented. For mathematical tractability, we derive an easy-computing closed-form lower bound of the channel capacity. Based on the lower bound, the optimal power allocation between the data and pilots is also presented in closed-form, and the optimal training length is investigated by numerical optimization. It is shown that the transmit scheme with equal training and data power and optimized training length provides suboptimal performance, and the transmit scheme with optimized training length and training power is optimal. With the latter scheme, in most situations, the optimal training length equals the number of the transmit antennas and the corresponding optimal power allocation can be easily computed with the proposed formula.

  • Adaptive Beamforming with Robustness against Both Finite-Sample Effects and Steering Vector Mismatches

    Jing-Ran LIN  Qi-Cong PENG  Qi-Shan HUANG  

     
    PAPER-Digital Signal Processing

      Vol:
    E89-A No:9
      Page(s):
    2356-2362

    A novel approach of robust adaptive beamforming (RABF) is presented in this paper, aiming at robustness against both finite-sample effects and steering vector mismatches. It belongs to the class of diagonal loading approaches with the loading level determined based on worst-case performance optimization. The proposed approach, however, is distinguished by two points. (1) It takes finite-sample effects into account and applies worst-case performance optimization to not only the constraints, but also the objective of the constrained quadratic equation, for which it is referred to as joint worst-case RABF (JW-RABF). (2) It suggests a simple closed-form solution to the optimal loading after some approximations, revealing how different factors affect the loading. Compared with many existing methods in this field, the proposed one achieves better robustness in the case of small sample data size as well as steering vector mismatches. Moreover, it is less computationally demanding for presenting a simple closed-form solution to the optimal loading. Numerical examples confirm the effectiveness of the proposed approach.

  • Robust Scene Extraction Using Multi-Stream HMMs for Baseball Broadcast

    Nguyen Huu BACH  Koichi SHINODA  Sadaoki FURUI  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E89-D No:9
      Page(s):
    2553-2561

    In this paper, we propose a robust statistical framework for extracting scenes from a baseball broadcast video. We apply multi-stream hidden Markov models (HMMs) to control the weights among different features. To achieve a large robustness against new scenes, we used a common simple structure for all the HMMs. In addition, scene segmentation and unsupervised adaptation were applied to achieve greater robustness against differences in environmental conditions among games. The F-measure of scene-extracting experiments for eight types of scene from 4.5 hours of digest data was 77.4% and was increased to 78.7% by applying scene segmentation. Furthermore, the unsupervised adaptation method improved precision by 2.7 points to 81.4%. These results confirm the effectiveness of our framework.

  • The Bank of Matched Filters for an Optical ZCZ Code Using a Sylvester Type Hadamard Matrix

    Takahiro MATSUMOTO  Shigeo TSUKIASHI  Shinya MATSUFUJI  Yoshihiro TANADA  

     
    PAPER

      Vol:
    E89-A No:9
      Page(s):
    2292-2298

    The optical ZCZ code is a set of pairs of binary and bi-phase sequences with zero correlation zone. An optical M-ary direct sequence spread spectrum (M-ary/DS-SS) system using this code can detect a desired sequence without interference of undesired sequences. However, the bank of matched filters in a receiver circuit may fall into large scale. In this paper, we propose the compact construction of a bank of matched filters for an M-ary/DS-SS system using an optical ZCZ code. This filter bank can decrease the number of 2-input adders from O(N2) to O(N) and delay circuits from O(N2) to O(Nlog 2 N), respectively, and is implemented on a field programmable gate array (FPGA) corresponding to 400,000 logic gates.

  • Constant Time Generation of Rectangular Drawings with Exactly n Faces

    Satoshi YOSHII  Daisuke CHIGIRA  Katsuhisa YAMANAKA  Shin-ichi NAKANO  

     
    LETTER-Algorithms and Data Structures

      Vol:
    E89-A No:9
      Page(s):
    2445-2450

    A plane drawing of a plane graph is called a rectangular drawing if every face including the outer face is a rectangle. A based rectangular drawing is a rectangular drawing with a designated base line segment on the outer face. An algorithm to generate all based rectangular drawings having exactly n faces is known. The algorithm generates each based rectangular drawing having exactly n faces in constant time "on average." In this paper, we give another simple algorithm to generate all based rectangular drawings having exactly n faces. Our algorithm generates each based rectangular drawing having exactly n faces in constant time "in the worst case." Our algorithm generates each based rectangular drawing so that it can be obtained from the preceding one by at most three operations and does not output entire drawings but the difference from the preceding one. Therefore the derived sequence of based rectangular drawings is a kind of combinatorial Gray code for based rectangular drawings.

  • Performance of Affordable Neural Network for Back Propagation Learning

    Yoko UWATE  Yoshifumi NISHIO  

     
    PAPER-Nonlinear Problems

      Vol:
    E89-A No:9
      Page(s):
    2374-2380

    Cell assembly is one of explanations of information processing in the brain, in which an information is represented by a firing space pattern of a group of plural neurons. On the other hand, effectiveness of neural network has been confirmed in pattern recognition, system control, signal processing, and so on, since the back propagation learning was proposed. In this study, we propose a new network structure with affordable neurons in the hidden layer of the feedforward neural network. Computer simulated results show that the proposed network exhibits a good performance for the back propagation learning. Furthermore, we confirm the proposed network has a good generalization ability.

  • Searching for the Best Biphase and Quadriphase Quasi-Barker Sequences

    Ka Ming HO  Wai Ho MOW  

     
    LETTER

      Vol:
    E89-A No:9
      Page(s):
    2341-2344

    Barker sequences have been used in many existing communications and ranging systems. Unfortunately, the longest known biphase and quadriphase Barker sequences are of lengths 13 and 15, respectively. In this paper, we introduce the so-called quasi-Barker sequences which achieve the minimum peak sidelobe level one within a certain window centered at the mainlobe. As our key results, all the best biphase and quadriphase quasi-Barker sequences of lengths up to 36 and 21, respectively, were obtained by an efficient computer search. These sequences may provide better multipath resistance and tracking accuracy in ranging applications.

  • A Cooperative Mechanism for Hybrid P2P File-Sharing Networks to Enhance Application-Level QoS

    Hongye FU  Naoki WAKAMIYA  Masayuki MURATA  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2327-2335

    Overlay networks, such as P2P, Grid, and CDN, have been widely deployed over physical IP networks. Since simultaneous overlay networks compete for network resources, their selfish behaviors to improve their application-oriented QoS disrupt each other. To enhance the collective performance and improve the QoS at the application level, we consider so-called the overlay network symbiosis where overlay networks cooperate with each other. In this paper, we proposed a cooperative mechanism for hybrid P2P file-sharing networks, where peers can find more files and exchange files with more peers. Through simulation experiments, we verified the effectiveness of cooperation from view points of application and system.

  • Auto-Configuration Method of Provisioning System for Internet VPNs

    Kenji HORI  Kiyohito YOSHIHARA  Hiroki HORIUCHI  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2424-2433

    Internet Virtual Private Networks (VPNs) across geographically distributed users' networks are ideal for ad-hoc group activities, such as online gaming, over the Internet. However, users find it difficult to determine and set the configurations of the VPN routers and hosts rapidly enough for ad-hoc usage, due to the need for consistency of such configurations over the users' networks. Moreover, the number of operators is insufficient to help all users. Hence, the automatic determination and setting of such configurations from the management server is desirable. Existing auto-configuration methods are insufficient for ad-hoc usage because they cannot rapidly determine and set the hosts' configurations to be consistent with the VPN and user's network they are joining. To enable ad-hoc creation of and joining to a VPN by the users themselves, we propose a new method that utilizes the Dynamic Host Configuration Protocol (DHCP), which can automatically set the configurations of many existing hosts. The DHCP server's and relay agents' configurations are automatically determined and set by the VPN management server, based on the user request, so that the hosts can be auto-configured to be consistent with the VPN and the user's network they are joining, from the DHCP server via the autoconfigured DHCP relay agents. To evaluate the time overhead of our proposed method, we implemented a test bed, including 10 VPN routers, a VPN management server, and a DHCP server. In this evaluation, the DHCP server is auto-configured for each new VPN in less than 1 second, and the DHCP relay agents on the VPN routers are auto-configured in less than 5 percent of the total time for configuring the VPN routers, regardless of the total number of the VPN routers in a VPN. These results show that the proposed method can auto-configure the VPN routers and hosts simultaneously with the DHCP, while ensuring sufficient rapidity of the entire auto-configuration operation for ad-hoc usage.

  • Khatri-Rao Unitary Space-Time Modulation

    Lei WANG  Shihua ZHU  Jun WANG  Yanxing ZENG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:9
      Page(s):
    2530-2536

    Based on the Khatri-Rao matrix product, we propose a novel unitary space-time modulation design called KR-USTM in this paper. Different from existing USTM schemes, such as the systematic approach and space-time frequency-shift keying (ST-FSK), KR-USTM does not require any computer search and can be applied to any number of transmit antennas. Moreover, the special structure of KR-USTM also makes it a high-rate scheme and achieve full antenna diversity as well as lower decoding complexity. Simulation results show that the proposed KR-USTM constellation achieves error performance comparable to existing USTM designs at low rates, while it outperforms them at high rates.

10521-10540hit(18690hit)