The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

17701-17720hit(18690hit)

  • A 3 Volt 1 Mbit Full-Featured EEPROM Using a Highly-Reliable MONOS Device Technology

    Shin-ichi MINAMI  Kazuaki UJIIE  Masaaki TERASAWA  Kazuhiro KOMORI  Kazunori FURUSAWA  Yoshiaki KAMIGAKI  

     
    PAPER-Non-volatile Memory

      Vol:
    E77-C No:8
      Page(s):
    1260-1269

    A low-voltage operation and highly-reliable nonvoltatile semiconductor memory with a large capacity has been manufactured using 0.8-µm CMOS technology. This 3-volt, 1-Mbit, full-featured MONOS EEPROM has a chip size of 51.3 mm2 and a memory cell size of 23.1µm2. An asymmetric programming voltage method fully exploits the abilities of the MONOS device and provides 10-year data retention after 106 erase/write cycles. Because of its wide-margin circuit design, this EEPROM can also be operated at 5 volts. High-speed read out is provided by using the polycide word line and the differential sense amplifier with a MONOS dummy memory. New functions such as data protection with software and programming-end indication with a toggle bit are added, and chips are TSOP packaged for use in many kinds of portable equipment.

  • Analysis of High-Tc Superconducting Microstrip Antenna Using Modified Spectral Domain Moment Method

    Nozomu ISHII  Toru FUKASAWA  Kiyohiko ITOH  

     
    PAPER-HTS

      Vol:
    E77-C No:8
      Page(s):
    1242-1248

    In this paper, we analyze high-Tc superconducting (HTS) microstrip antenna (MSA) using modified spectral domain moment method. Although it is assumed that the patch and the ground plane of the MSA are perfect electric conductors (PECs) in the conventional spectral domain method, we modify this method to compute the conduction loss of the HTS-MSA. In our analysis, the effect of the HTS film is introduced by the surface impedance which we can estimate by using the three fluid model and experimental results. This paper presents numerical results about the HTS-MSA, for example, the relations between the thickness of the substrate and the radiation efficiency, the temperature and the resonant frequency, and so forth. And we discuss the effective power range where the performance of the HTS-MSA is superior to that of the Cu-MSA.

  • Delay Analysis of Continuous ARQ Schemes with Markovian Error Channel

    Yukuo HAYASHIDA  Masaharu KOMATSU  

     
    PAPER-Communication Theory

      Vol:
    E77-B No:8
      Page(s):
    1023-1031

    Go-Back-N automatic repeat request (GBN ARQ) and Stop-and wait (SW) ARQ schemes are one of fundamental and widely used error control procedures for data communication and computer communication systems. The throughput and delay performances of these ARQ schemes have been analyzed for a random error channel, which could not applicable for a radio channel, for example. In this paper, considering the correlated, noisy channel, we derive the exact formula for the delay of a frame in GBN and SW ARQ schemes. First, the delay formula for the discrete time M[x]/G/1 queueing system with starter. Next, the virtual service time of a frame is found in terms of the decay factor of a two-state Markov chain. As a result, it is shown that the performance of the delay is improved with the larger decay factor.

  • Extraction of Inclined Character Strings from Unformed Document Images Using the Confidence Value of a Character Recognizer

    Kei TAKIZAWA  Daisaku ARITA  Michihiko MINOH  Katsuo IKEDA  

     
    PAPER

      Vol:
    E77-D No:7
      Page(s):
    839-845

    A method for extracting and recognizing character strings from unformed document images, which have inclined character strings and have no structure at all, is described. To process such kinds of unformed documents, previous schemes, which are intended only to deal with documents containing nothing but horizontal or vertical strings of characters, do not work well. Our method is based on the idea that the processes of recognition and extraction of character patterns should operate together, and on the characteristic that the character patterns are located close to each other when they belong to the same string. The method has been implemented and applied to several images. The experimental results show the robustness of our method.

  • Document Image Segmentation and Layout Analysis

    Takashi SAITOH  Toshifumi YAMAAI  Michiyoshi TACHIKAWA  

     
    PAPER

      Vol:
    E77-D No:7
      Page(s):
    778-784

    A system for segmentation of document image and ordering text areas is described, and applied to complex printed page layouts of both Japanese and English. There is no need to make any assumptions about the shape of blocks, hence the segmentation technique can handle not only skewed images without skew-correction but also documents where columns are not rectangular. In this technique, based on the bottom-up strategy, the connected components are extracted from the reduced image, and classiferd according to their local information. The connected components calssified as characters are then merged into lines, and the lines are merged into areas. Extracted text areas are classified as body, caption, header or footer. A tree graph of the layout of the body texts is made, and the texts ordered by preorder traversal on the graph. We introduce the concept of an influence range of each node, a procedure for handling titles, thus obtaining good results on various documents. The total system is fast and compact.

  • Development in Graph-and/or Network-Theoretic Research of Cellular Mobile Communication Channel Assignment Problems

    Masakazu SENGOKU  Hiroshi TAMURA  Shoji SHINODA  Takeo ABE  

     
    PAPER

      Vol:
    E77-A No:7
      Page(s):
    1117-1124

    The demand for mobile communication services is rapidly increasing, because the mobile communication service is synonymy of an ideal communication style realizing communication in anytime, anywhere and with anyone. The development of economic and social activities is a primary factor of the increasing demand for mobile communication services. The demand stimulates the development of technology in mobile communication including personal communication services. Thus mobile communication has been one of the most active research in communications in the last several years. There exist various problems to which graph & network theory is applicable in mobile communication services (for example, channel assignment algorithm in cellular system, protocol in modile communication networks and traffic control in mobile communication ). A model of a cellular system has been formulated using a graph and it is known that the channel assignment problem is equivalent to the coloring problem of graph theory. Recently, two types of coloring problems on graphs or networks related to the channel assignment problem were proposed. Mainly, we introduce these coloring problems and show some results on these problems in this paper.

  • A High Speed Contour Fill Method for Character Image Generation

    Kazuki NAKASHIMA  Masashi KOGA  Katsumi MARUKAWA  Yoshihiro SHIMA  Yasuaki NAKANO  

     
    PAPER

      Vol:
    E77-D No:7
      Page(s):
    832-838

    This paper proposes a new, high-speed method of filling in the contours of alpha-numeric characters to produce correct binary image patterns. We call this method the improved edge-fill method because it improves on a previously developed edge-fill method. Ambiguity of the conventional edge-fill method on binary images are eliminated by selecting fill pixels from combinations of Freeman's chain code, which expresses contour lines. Consequently, the areas inside the contour lines are filled in rapidly and correctly. With the new method, the processing time for character image generation is reduced by ten to tewnty percent over the conventional method. The effectiveness of the new method is examined in experiments using both Arabic numerals and letters from the Roman alphabet. Results show that this fill method is able to produce correct image patterns and that it can be applied to alpha-numeric-character contour filling.

  • Recognition of Elevation Symbols and Reconstruction of 3D Surface from Contours by Parallel Method

    Kazuhiko YAMAMOTO  Hiromitsu YAMADA  Sigeru MURAKI  

     
    PAPER

      Vol:
    E77-D No:7
      Page(s):
    749-753

    In this paper, symbols and numerals in topographic maps are recognized by the multi-angled parallelism (MAP) matching method, and small dots and lines are extracted by the MAP operation method. These results are then combined to determine the value, position, and attributes of elevation marks. Also, we reconstruct three dimensional surfaces described by contours, which is difficult even for humans since the elevation symbols are sparse. In reconstruction of the surface, we define an energy function that enfores three constraints: smoothness, fit, and contour. This energy function is minimized by solving a large linear system of simultaneous equations. We describe experiments on 25,000:1 scale topographic maps of the Tsukuba area.

  • Performance Analysis of Road Traffic Data Collection System

    Jean-Paul M. G. LINNARTZ  Marcel WESTERMAN  

     
    PAPER

      Vol:
    E77-B No:7
      Page(s):
    934-938

    Advanced Traveller Information Systems (ATIS) and Advanced Traffic Management Systems (ATMS) require real-time traffic data to observe and control the trafic flow. Still, there is a lack of proficient traffic monitoring systems. One method to collect such data is using particular equipped vehicles, called probes, transmitting experienced travel times to base stations which in turn are connected to a traffic control center. In this paper we analyse the performance of a radio network for collecting real-time traffic data from probes. The results reveal that random transmission of traffic reports is a (spectrum) efficient, inexpensive and flexible method for collecting road traffic data that can provide reliable traffic monitoring.

  • Integration of Voice and Data in Wireless Information Networks with Data Steal into Voice Multiple Access

    Gang WU  Kaiji MUKUMOTO  Akira FUKUDA  

     
    PAPER

      Vol:
    E77-B No:7
      Page(s):
    939-947

    In this paper, we propose DSVMA (Data Steal into Voice Multiple Access) scheme for integration of voice and data in wireless information networks. By using speech activity detectors and effective downstream control signals, DSVMA enables data terminals to transmit multi-packet messages when voice terminals are in silent periods. The S-G (throughput versus offered load) performance of the DSVMA system and the blocking probabilities of both the second generation systems and the DSVMA systems are evaluated by the static analysis. A dynamic analysis of a system with finite number of terminals is also presented using an approximate Markov analysis method. Some numerical examples are given in the paper. As a result, it is shown that DSVMA can improve the channel utility efficiency of a circuit-switched TDMA (Time Division Multiple Access) wireless communication system and is directly applicable for second generation wireless information systems.

  • Voice Activity Detection and Transmission Error Control for Digital Cordless Telephone System

    Seishi SASAKI  Ichiro MATSUMOTO  Osamu WATANABE  Kenzo URABE  

     
    PAPER

      Vol:
    E77-B No:7
      Page(s):
    948-955

    Personal Handy Phone (PHP), the Japanese digital cordless telephone system is being developed. The 32kbits/s ADPCM (Adaptive Differential Pulse Code Modulation) codec has been standardized for PHP. This paper describes firstly, the advanced algorithms of a Voice Activity Detection (VAD) function that reduces power dissipation of a digital cordless telephone terminal, secondly, a comfort noise generator operates in conjunction with the VAD and finally, a transmission error control based on the use of the prediction coefficients generated in the ADPCM codec. These proposed algorithms function in the low signal-to-noise ratio (SNR) environment of personal radio communications. The quality of the reconstructed speech after the process is influenced by the VAD decision errors (false detection when no voice is present, or no detection when voice is present) , the similarity of the generated comfort noise to the actual background noise, and the transmission quality. The simulation results of the performance achieved by these algorithms are shown and required loading of the computation are also given.

  • Semi-Autonomous Synchronization among Base Stations for TDMA-TDD Communication Systems

    Hiroshi KAZAMA  Shigeki NITTA  Masahiro MORIKURA  Shuzo KATO  

     
    PAPER

      Vol:
    E77-B No:7
      Page(s):
    862-867

    This paper proposes a semi-autonomous frame synchronization scheme for a TDMA (Time Division Multiple Access)-TDD (Time Division Duplexing) personal communication system to realize accurate frame synchronization in a simple manner. The proposed scheme selects specific adjacent base stations by the station indicator (SID), carries out high resolution frame timing control, and compensates the propagation delay between base stations by using geographical data. This autonomously synchronizes all base stations to each other. Computer simulation and analysis results confirm the accurate and stable TDMA frame synchronization of all base stations even in fading environments.

  • Performance Evaluation of Slow-Frequency Hopped/Joint Frequency-Phase Modulation in Broadband and Partial-Band Noise Jamming

    Ibrahim GHAREEB  Abbas YONGAÇOLU  

     
    PAPER

      Vol:
    E77-B No:7
      Page(s):
    891-899

    A new frequency hopped spread spectrum system is introduced. The frequency hopped signal is a combination of multi frequency and multi phase signals and is referred to as Frequency Hopped/Joint Frequency-Phase Modulation (FH/JFPM). A noncoherent receiver for the FH/JFPM signals is introduced and an exact expression for the bit error rate is obtained. A performance analysis of this system is given in the presence of broadband and partial-band noise jamming. The optimal jamming strategy is evaluated. The results show that under these jamming conditions the FH/JFPM perform better than the FH/M-ary DPSK and FH/M-ary FSK systems. It is also shown that for a given channel bandwidth and data rate, the FH/JFPM system has more processing gain than its FSK or DPSK counterparts.

  • Multi-Carrier CDMA in Indoor Wireless Radio Networks

    Nathan YEE  Jean-Paul M. G. LINNARTZ  Gerhard FETTWEIS  

     
    PAPER

      Vol:
    E77-B No:7
      Page(s):
    900-904

    This paper examines a novel digital modulation/multiple access technique called Multi-Carrier Code Division Multiple Access (MC-CDMA) where each data symbol is transmitted at multiple narrowband subcarriers. Each subcarrier is encoded with a phase offset of 0 or π based on a spreading code. Analytical results are presented on the performance of this modulation scheme in an indoor wireless multipath radio channel.

  • Recognition of Line Shapes Using Neural Networks

    Masaji KATAGIRI  Masakazu NAGURA  

     
    PAPER

      Vol:
    E77-D No:7
      Page(s):
    754-760

    We apply neural networks to implement a line shape recognition/classification system. The purpose of employing neural networks is to eliminate target-specific algorithms from the system and to simplify the system. The system needs only to be trained by samples. The shapes are captured by the following operations. Lines to be processed are segmented at inflection points. Each segment is extended from both ends of it in a certain percentage. The shape of each extended segment is captured as an approximate curvature. Curvature sequence is normalized by size in order to get a scale-invariant measure. Feeding this normalized curvature date to a neural network leads to position-, rotation-, and scale-invariant line shape recognition. According to our experiments, almost 100% recognition rates are achieved against 5% random modification and 50%-200% scaling. The experimental results show that our method is effective. In addition, since this method captures shape locally, partial lines (caused by overlapping etc.) can also be recognized.

  • 7.5 MFLIPS Fuzzy Microprocessor Using SIMD and Logic-in-Memory Structure

    Mamoru SASAKI  Fumio UENO  

     
    PAPER

      Vol:
    E77-C No:7
      Page(s):
    1075-1082

    A fuzzy microprocessor is developed using 1.2 µm CMOS process. The inference scheme for the if-then fuzzy rules consists of three main steps i. e. if-part process, then-part process and defuzzification. In order to realize very high-speed inference and moderate programmability, we introduce three-type different structures i.e. SIMD, logic-in-memory and Wallace tree structures which are suitable for the three main steps. The inference speed including defuzzification is 7.5 MFLIPS which is 12.9 times higher than the previous VLSI implementation, and it can carry out many rules (960 rules) and many input and output variables (16 variables).

  • Graceful Degradation for Multiprocessor Realization of Maximally Flat FIR Digital Filters

    Saed SAMADI  Akinori NISHIHARA  Nobuo FUJII  

     
    PAPER

      Vol:
    E77-C No:7
      Page(s):
    1083-1091

    In this paper we propose a method for increasing the reliability in multiprocessor realization of lowpass and highpass FIR digital filters possessing a maximally flat magnitude response. This method is based on the use of array realization of the filter which has been proposed earlier by the authors. It is shown that if a processing module of the array functions erroneously, it is possible to exclude the module and still obtain a lowpass FIR filter. However, as a price we should tolerate a slight degradation in the magnitude response of the filter that is equivalent to a wider transition band. We also analyze the behavior of the filter when our proposed schemes are implemented on more than one module. The justification of our approach is based on that a slight degradation of the spectral characteristics of a filter may be well tolerated in most filtering applications and thus a graceful degradation in the frequency domain can sufficiently reduce the vulnerability to errors.

  • Overview of the Super Database Computer (SDC-I)

    Masaru KITSUREGAWA  Weikang YANG  Satoshi HIRANO  Masanobu HARADA  Minoru NAKAMURA  Kazuhiro SUZUKI  TaKayuki TAMURA  Mikio TAKAGI  

     
    INVITED PAPER

      Vol:
    E77-C No:7
      Page(s):
    1023-1031

    This paper presents an overview of the SDC-I (Super Database Computer I) developed at the University of Tokyo, Japan. The purpose of the project was to build a high performance SQL server which emphasizes query processing over transaction processing. Recently relational database systems tend to be used for heavy decision support queries, which include many join, aggregation, and order-by operations. At present high-end mainframes are used for these applications requiring several hours in some cases. While the system architecture for high traffic transaction processing systems is well established, that for adhoc query processing has not yet adequately understood. SDC-I proved that a parallel machine could attain significant performance improvements over a coventional sequential machine through the exploitation of the high degree of parallelism present in relational query processing. A unique bucket spreading parallel hash join algorithm is employed in SDC, which makes the system very robust in the presense of data skew and allows SDC to attain almost linear performance scalability. SDC adopts a hybrid parallel architecture, where globally it is a shared nothing architecture, that is, modules are connected through the multistage network, but each module itself is a symmetric multiprocessor system. Although most of the hardware elements use commodity microprocessors for improved performance to cost, only the interconnection network incorporates the special function to support our parallel relational algorithm. Data movement over the memory and the network, rather than computation, is heavy for I/O intensive database processing. A dedicated software system was carefully designed for efficient data movement. The implemented prototype consists of two modules. Its hardware and software organization is described. The performance monitoring tool was developed to visualize the system activities, which showed that SDC-I works very efficiently.

  • Knowledge for Understanding Table-Form Documents

    Toyohide WATANABE  Qin LUO  Noboru SUGIE  

     
    PAPER

      Vol:
    E77-D No:7
      Page(s):
    761-769

    The issue about document structure recognition and document understanding is today one of interesting subjects from a viewpoint of practical applications. The research objective is to extract the meaningful data from document images interpretatively and also classify them as the predefined item data automatically. In comparison with the traditional image-processing-based approaches, the knowledge-based approaches, which make use of various knowledge in order to interpret structural/constructive features of documents, have been currently investigated as more flexible and applicable methods. In this paper, we propose a totally integrated paradigm for understanding table-form documents from a viewpoint of the architectural framework.

  • Signal Strength Prediction and Distribution Characteristics in Indoor Radio Propagation at 2.5GHz Band

    Hiroshi FURUKAWA  Kuninori OOSAKI  Yoshihiko AKAIWA  Hiroyuki SHIMIZU  

     
    PAPER

      Vol:
    E77-B No:7
      Page(s):
    962-970

    In this paper, radio propagation in the medium-scale building is investigated at 2.5GHz band. In order to predict the propagation loss in any place, four major modes of propagation are considered: low-loss in line-of-sight (LOS) wave, corridor guided wave, direct transmission wave through obstructions, and the reentered wave. Based on the measured results of attenuation characteristics, the macroscopic parameters for the above mentioned modes of wave propagation are determined. Using these parameters, signal strengths are predicted with average standard deviation of 4.5dB. The fading characteristics are studied by measuring the Rician parameter and the correlation coefficient for 2-branch diversity antennas separated by 50cm. The Rician parameters are 2 in case of the LOS propagation, and 1 in case of the no LOS propagation. The two branch correlation coefficients are less than 0.5 within coverage of 80-95% in almost all the locations.

17701-17720hit(18690hit)