The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

10941-10960hit(18690hit)

  • Sensitivity of Time Response to Characteristic Ratios

    Youngchol KIM  Keunsik KIM  Shunji MANABE  

     
    PAPER-Systems and Control

      Vol:
    E89-A No:2
      Page(s):
    520-527

    In recent works [1],[4], it has been shown that the damping of a linear time invariant system relates to the so-called characteristic ratios (αk, k=1,…, n-1) which are defined by coefficients of the denominator of the transfer function. However, the exact relations are not yet fully understood. For the purpose of exploring the issue, this paper presents the analysis of time response sensitivity to the characteristic ratio change. We begin with the sensitivity of output to the perturbations of coefficients of the system denominator and then the first order approximation of the αk perturbation effect is computed by an explicit transfer function. The results are extended to all-pole systems in order to investigate which characteristic ratios act dominantly on step response. The same analysis is also performed to a special class of systems whose denominator is composed of so called K-polynomial. Finally, some illustrative examples are given.

  • Superimposed Frequency Symbol Based Adaptive Downlink OFDM with Frequency Spreading and Equalization

    Chang-Jun AHN  Hiroshi HARADA  Yukiyoshi KAMIO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:2
      Page(s):
    500-508

    In AMS/OFDM systems, a base station controls the modulation level of each subcarrier with feedback information (FBI), and then, adaptive modulated packets are transmitted from the base station to the mobile station. In this case, the mobile station requires modulation level information (MLI) to demodulate the received packet. The MLI is generally transmitted as a data symbol, so the throughput is degraded. To overcome this problem and increase the total throughput, in this paper, we propose superimposed frequency symbol based adaptive OFDM with frequency spreading and equalization. In the proposed system, each S/P transformed signal is spread by orthogonal spreading codes and combined. This means that each subcarrier holds several superimposed S/P transformed signals with the same power rate. In this case, the frequency-selective faded subcarriers obtain the same power rate for each S/P transformed signal. Therefore, the detected signals also obtain the same SINR, and as a result, we can assign the same modulation level for each frequency symbol spreading block. Hence, the proposed system requires only one piece of FBI and MLI for each frequency symbol spreading block, as compared with conventional adaptive OFDM.

  • Frequency Reuse Power Allocation for Broadband Cellular Networks

    Joohwan KIM  Hyukmin SON  Sanghoon LEE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:2
      Page(s):
    531-538

    An FRPA (frequency reuse power allocation) technique by employing the frequency reuse notion as a strategy for overcoming the ICI (intercell interference) and maintaining the QoS (quality of service) at the cell boundary is described for broadband cellular networks. In the scheme, the total bandwidth is divided into sub-bands and two different power levels are then allocated to sub-bands based on the frequency reuse for forward-link cell planning. In order to prove the effectiveness of the proposed algorithm, a Monte Carlo simulation was performed based on the Chernoff upper bound. The simulation shows that this technique can achieve a high channel throughput while maintaining the required QoS at the cell boundary.

  • Reciprocity: Enforcing Contribution in P2P Perpendicular Downloading

    Ming CHEN  Guangwen YANG  

     
    PAPER-Peer-to-Peer Computing

      Vol:
    E89-D No:2
      Page(s):
    563-569

    Flash bulk files downloading in style of P2P through perpendicular pattern becomes more popular recently. Many peers download different pieces of shared files from the source in parallel. They try to reconstruct complete files by exchanging needed pieces with other downloading peers. The throughput of entire downloading community, as well as the perceived downloading rate of each peer, greatly depends on uploading bandwidth contributed by every individual peer. Unfortunately, without proper built-in incentive mechanism, peers inherently tend to relentlessly download while intentionally limiting their uploading bandwidth. In this paper, we propose a both effective and efficient incentive approach--Reciprocity, which is only based on end-to-end measurement and reaction: a peer caps uploading rate to each of its peers at the rate that is proportional to its downloading rate from that one. It requires no centralized control, or electronic monetary payment, or certification. Preliminary experiments' results reveal that this approach offers favorable performance for cooperative peers, while effectively punishing defective ones.

  • Toward Incremental Parallelization Using Navigational Programming

    Lei PAN  Wenhui ZHANG  Arthur ASUNCION  Ming Kin LAI  Michael B. DILLENCOURT  Lubomir F. BIC  Laurence T. YANG  

     
    PAPER-Parallel/Distributed Programming Models, Paradigms and Tools

      Vol:
    E89-D No:2
      Page(s):
    390-398

    The Navigational Programming (NavP) methodology is based on the principle of self-migrating computations. It is a truly incremental methodology for developing parallel programs: each step represents a functioning program, and each intermediate program is an improvement over its predecessor. The transformations are mechanical and straightforward to apply. We illustrate our methodology in the context of matrix multiplication, showing how the transformations lead from a sequential program to a fully parallel program. The NavP methodology is conducive to new ways of thinking that lead to ease of programming and high performance. Even though our parallel algorithm was derived using a sequence of mechanical transformations, it displays certain performance advantages over the classical handcrafted Gentleman's Algorithm.

  • DC and AC Responses of Josephson Vortex Flow Transistors with High Tc Superconducting Thin Films

    Yasushi DODA  Iwao KAWAYAMA  Hironaru MURAKAMI  Masayoshi TONOUCHI  

     
    PAPER

      Vol:
    E89-C No:2
      Page(s):
    177-181

    We fabricated Josephson vortex flow transistors (JVFTs) with a parallel array of Josephson junctions that were prepared using c-axis-oriented 100-nm-thick YBa2Cu3O7-δ (YBCO) thin films grown on 24bicrystal MgO (100) substrates. We observed clear modulations of the critical current and the flow voltage with DC current input to the control line that was inductively coupled to the array of junctions. From the results, we estimated the parameters of the device, e.g., the mutual inductance and the self-inductance, and calculated the operation frequency at which the device potentially exhibited these parameters. Moreover, the current gain and the transresistance were evaluated and found to be 0.5 and 0.15 Ω, respectively. In addition, we observed the high-frequency responses of the JVFT to the input AC current of the sine wave or the square pulse wave. A clear oscillation of the output voltage could be observed with a 1 MHz sine wave and 250 kHz square pulse wave. We also discussed the feasibility of higher frequency operation by using it as an input interface for a single flux quantum (SFQ) logic circuit.

  • Credible Worker Selection Mechanism for Grid Computing

    Kiejin PARK  Jinsung YI  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    605-611

    The concept of grid computing emerged with the appearance of high-speed network. Effective grid worker (i.e., computing resource) selection mechanism is important to achieve reliable grid computing system since each worker participate in grid computing is heterogeneous. In this paper, we suggest a credible worker selection mechanism that maximizes grid computing performance by allocating appropriate tasks to each grid worker. Diverse workers can be used efficiently by grid applications through the ranking process of worker's credibility. Initially, the rank of each grid worker's credibility is decided considering static information only such as CPU speed, RAM size, storage capacity and network bandwidth. And then, the rank is refined by using dynamic information such as failure rate, turn around time provided after the task is completed, and correctness of the return value. In the experiments, we find that the proposed mechanism provides improved grid computing performance with high credibility.

  • Bi-Connectivity Augmentation for Specified Vertices of a Graph with Upper Bounds on Vertex-Degree Increase

    Toshiya MASHIMA  Takanori FUKUOKA  Satoshi TAOKA  Toshimasa WATANABE  

     
    PAPER-Graph Algorithm

      Vol:
    E89-D No:2
      Page(s):
    751-762

    The 2-vertex-connectivity augmentation problem for a specified set of vertices of a graph with degree constraints, 2VCA-SV-DC, is defined as follows: "Given an undirected graph G = (V,E), a specified set of vertices S ⊆V with |S|3 and a function g:V→Z+∪{∞}, find a smallest set E' of edges such that (V,E ∪E') has at least two internally-disjoint paths between any pair of vertices in S and such that vertex-degree increase of each v ∈V by the addition of E' to G is at most g(v), where Z+ is the set of nonnegative integers." This paper shows a linear time algorithm for 2VCA-SV-DC.

  • Dynamic Channel Allocation for Mobile Cellular Systems Using a Control Theoretical Approach

    Yaya WEI  Chuang LIN  Xin JIN  Raad RAAD  Fengyuan REN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:2
      Page(s):
    621-624

    The guard channel scheme in wireless mobile networks has attracted and is still drawing research interest owing to easy implementation and flexible control. Dynamic guard channel schemes have already been proposed in the literature to adapt to varying traffic load. This paper presents a novel control-theoretic approach to dynamically reserve guard channels called PI-Guard Channel (PI-GC) controller that maintains the handoff blocking probability (HBP) to a predefined value; while it still improves the channel resource utilization.

  • Linear and Compact Floating Node Voltage-Controlled Variable Resistor Circuit

    Muneo KUSHIMA  Motoi INABA  Koichi TANNO  

     
    LETTER

      Vol:
    E89-A No:2
      Page(s):
    459-460

    In this letter, my proposals for a Floating node voltage-controlled Variable Resistor circuit (FVR) are based upon its advantages as linear and compact. The performance of the proposed circuit was confirmed by PSpice simulation. The simulation results are reported in this letter.

  • Resource Management for Fixed Relay Based Cellular Systems with Sectorization

    Yeonwoo LEE  Seung Young PARK  Sangboh YUN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:2
      Page(s):
    625-628

    Resource management for infrastructure-based two-hop fixed relay systems which are applicable to TDD-FH-OFDMA based cellular systems with sectorization is proposed in this paper. The severe interference problem caused by both inter-sector and inter-cell can be tackled by employing 6-sector directional antennas combined with the resource allocation. The simulation results demonstrate that at the outer-region of the cell, the high data rate service coverage can be extended.

  • Binary Zero-Correlation Zone Sequence Set Constructed from an M-Sequence

    Takafumi HAYASHI  

     
    LETTER-Coding Theory

      Vol:
    E89-A No:2
      Page(s):
    633-638

    The present paper introduces an improved construction of a class of binary sequences having a zero-correlation zone (hereafter binary ZCZ sequence set). The cross-correlation function and the side-lobe of the auto-correlation function of the proposed sequence set is zero for the phase shifts within the zero-correlation zone. The present paper shows that such a construction generates a binary ZCZ sequence set from an arbitrary M-sequence. The previously reported sequence construction of binary ZCZ sequence sets from an M-sequence can generate a single series of binary ZCZ sequence sets from an M-sequence. The present paper proposes an improved sequence construction that can generate more than one series of binary ZCZ sequence sets from an M-sequence.

  • An Adaptive Algorithm with Variable Step-Size for Parallel Notch Filter

    Arata KAWAMURA  Youji IIGUNI  Yoshio ITOH  

     
    PAPER-Digital Signal Processing

      Vol:
    E89-A No:2
      Page(s):
    511-519

    A parallel notch filter (PNF) for eliminating a sinusoidal signal whose frequency and phase are unknown, has been proposed previously. The PNF achieves both fast convergence and high estimation accuracy when the step-size for adaptation is appropriately determined. However, there has been no discussion of how to determine the appropriate step-size. In this paper, we derive the convergence condition on the step-size, and propose an adaptive algorithm with variable step-size so that convergence of the PNF is automatically satisfied. Moreover, we present a new filtering structure of the PNF that increases the convergence speed while keeping the estimation accuracy. We also derive a variable step-size scheme for the new PNF to guarantee the convergence. Simulation results show the effectiveness of the proposed method.

  • A Speech Packet Loss Concealment Method Using Linear Prediction

    Kazuhiro KONDO  Kiyoshi NAKAGAWA  

     
    PAPER-Speech and Hearing

      Vol:
    E89-D No:2
      Page(s):
    806-813

    We proposed and evaluated a speech packet loss concealment method which predicts lost segments from speech included in packets either before, or both before and after the lost packet. The lost segments are predicted recursively by using linear prediction both in the forward direction from the packet preceding the loss, and in the backward direction from the packet succeeding the lost segment. Predicted samples in each direction are smoothed by averaging using linear weights to obtain the final interpolated signal. The adjacent segments are also smoothed extensively to significantly reduce the speech quality discontinuity between the interpolated signal and the received speech signal. Subjective quality comparisons between the proposed method and the the packet loss concealment algorithm described in the ITU standard G.711 Appendix I showed similar scores up to about 10% packet loss. However, the proposed method showed higher scores above this loss rate, with Mean Opinion Score rating exceeding 2.4, even at an extremely high packet loss rate of 30%. Packet loss concealment of speech degraded with G.729 coding, and babble noise mixed speech showed similar trends, with the proposed method showing higher qualities at high loss rates. We plan to further improve the performance by using adaptive LPC prediction order depending on the estimated pitch, and adaptive LPC bandwidth expansion depending on the consecutive number of repetitive prediction, among many other improvements. We also plan to investigate complexity reduction using gradient LPC coefficient updates, and processing delay reduction using adaptive forward/bidirectional prediction modes depending on the measured packet loss ratio.

  • QoS Provisioning in the EPON Systems with Traffic-Class Burst-Polling Based Delta DBA

    Yeon-Mo YANG  Ji-Myong NHO  Nitaigour Premchand MAHALIK  Kiseon KIM  Byung-Ha AHN  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E89-B No:2
      Page(s):
    419-426

    As an alternative solution to provide the quality of services (QoS) for broadband access over Ethernet Passive Optical Network (EPON), we present the usage of MAC control message for plural class queues and a traffic-class burst-polling based delta dynamic bandwidth allocation (DBA), referred to as TCBP-DDBA, scheme. For better QoS support, the TCBP-DDBA minimizes packet delays and delay variations for expedited forwarding packet and maximizes throughput for assured forwarding and best effort packets. The network resources are efficiently utilized and adaptively allocated to the three traffic classes for the given unbalanced traffic conditions by guaranteeing the requested QoS. Simulation results using OPNET show that the TCBP-DDBA scheme performs well in comparison to the conventional unit-based allocation scheme over the measurement parameters such as: packet delay, packet delay variation, and channel utilization.

  • Design of a Mobile Application Framework with Context Sensitivities

    Hyung-Min YOON  Woo-Shik KANG  Oh-Young KWON  Seong-Hun JEONG  Bum-Seok KANG  Tack-Don HAN  

     
    PAPER-Mobile Computing

      Vol:
    E89-D No:2
      Page(s):
    508-515

    New service concepts involving mobile devices with a diverse range of embedded sensors are emerging that share contexts supporting communication on a wireless network infrastructure. To promote these services in mobile devices, we propose a method that can efficiently detect a context provider by partitioning the location, time, speed, and discovery sensitivities.

  • An Online Scheduling Algorithm for Assigning Jobs in the Computational Grid

    Chuliang WENG  Minglu LI  Xinda LU  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    597-604

    The computational grid provides a promising platform for the deployment of various high-performance computing applications. Problem in implementing computational grid environments is how to effectively use various resources in the system, such as CPU cycle, memory, communication network, and data storage. There are many effective heuristic algorithms for scheduling in the computational grid, however most scheduling strategies have no theoretical guarantee at all. In this paper, a cost-based online scheduling algorithm is presented for job assignment in the grid environment with theoretical guarantee. Firstly, a scheduling framework is described, where the grid environment is characterized, and the online job model is defined. Secondly, the cost-based online scheduling algorithm is presented where costs of resources are exponential functions of their loads, and the performance of this algorithm is theoretically analyzed against the performance of the optimal offline algorithm. Finally, we implement the algorithm in the grid simulation environment, and compare the performance of the presented algorithm with the other three algorithms, and experimental results indicate that the cost-based online scheduling algorithm can outperform the other three online algorithms.

  • Generating Chordal Graphs Included in Given Graphs

    Masashi KIYOMI  Takeaki UNO  

     
    PAPER-Graph Algorithm

      Vol:
    E89-D No:2
      Page(s):
    763-770

    A chordal graph is a graph which contains no chordless cycle of at least four edges as an induced subgraph. The class of chordal graphs contains many famous graph classes such as trees, interval graphs, and split graphs, and is also a subclass of perfect graphs. In this paper, we address the problem of enumerating all labeled chordal graphs included in a given graph. We think of some variations of this problem. First we introduce an algorithm to enumerate all connected labeled chordal graphs in a complete graph of n vertices. Next, we extend the algorithm to an algorithm to enumerate all labeled chordal graphs in a n-vertices complete graph. Then, we show that we can use, with small changes, these algorithms to generate all (connected or not necessarily connected) labeled chordal graphs in arbitrary graph. All our algorithms are based on reverse search method, and time complexities to generate a chordal graph are O(1), and also O(1) delay. Additionally, we present an algorithm to generate every clique of a given chordal graph in constant time. Using these algorithms we obtain combinatorial Gray code like sequences for these graph structures in which the differences between two consecutive graphs are bounded by a constant size.

  • Mapping of Hierarchical Parallel Genetic Algorithms for Protein Folding onto Computational Grids

    Weiguo LIU  Bertil SCHMIDT  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    589-596

    Genetic algorithms are a general problem-solving technique that has been widely used in computational biology. In this paper, we present a framework to map hierarchical parallel genetic algorithms for protein folding problems onto computational grids. By using this framework, the two level communication parts of hierarchical parallel genetic algorithms are separated. Thus both parts of the algorithm can evolve independently. This permits users to experiment with alternative communication models on different levels conveniently. The underlying programming techniques are based on generic programming, a programming technique suited for the generic representation of abstract concepts. This allows the framework to be built in a generic way at application level and thus provides good extensibility and flexibility. Experiments show that it can lead to significant runtime savings on PC clusters and computational grids.

  • Capacity of Fading Channels with Quantized Channel Side Information

    Xiaofeng LIU  Hongwen YANG  Wenbin GUO  Dacheng YANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E89-B No:2
      Page(s):
    590-593

    In this letter, we study the capacity of fading channels with perfect channel side information (CSI) at the receiver and quantized CSI at the transmitter. We present a general algorithm for the joint design of optimal quantization and power control for maximizing the forward link capacity over flat fading channels. Numerical results for Rayleigh fading are given.

10941-10960hit(18690hit)