The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

6961-6980hit(20498hit)

  • A Markov-Based Satellite-to-Ground Optical Channel Model and Its Effective Coding Scheme

    Yoshitoshi YAMASHITA  Eiji OKAMOTO  Yasunori IWANAMI  Yozo SHOJI  Morio TOYOSHIMA  Yoshihisa TAKAYAMA  

     
    PAPER-Satellite Communications

      Vol:
    E95-B No:1
      Page(s):
    254-262

    We propose a novel channel model of satellite-to-ground optical transmission to achieve a global-scale high-capacity communication network. In addition, we compose an effective channel coding scheme based on low-density generator matrix (LDGM) code suitable for that channel. Because the first successful optical satellite communication demonstrations are quite recent, no practical channel model has been introduced. We analyze the results of optical transmission experiments between ground station and the Optical Inter-orbit Communications Engineering Test Satellite (OICETS) performed by NICT and JAXA in 2008 and propose a new Markov-based practical channel model. Furthermore, using this model we design an effective long erasure code (LEC) based on LDGM to achieve high-quality wireless optical transmissions.

  • Functional Duality between Distributed Source Coding and Broadcast Channel Coding in the Case of Correlated Messages

    Suhan CHOI  Hichan MOON  Eunchul YOON  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:1
      Page(s):
    275-278

    In this letter, functional duality between distributed source coding (DSC) with correlated messages and broadcast channel coding (BCC) with correlated messages is considered. It is shown that under certain conditions, for a given DSC problem with correlated messages, a functional dual BCC problem with correlated messages can be obtained, and vice versa. That is, the optimal encoder-decoder mappings for one problem become the optimal decoder-encoder mappings for the dual problem. Furthermore, the correlation structure of the messages in the two dual problems and the source distortion and channel cost measure for this duality are specified.

  • A Basic Fuzzy-Estimation Theory for Available Operation of Extremely Complicated Large-Scale Network Systems

    Kazuo HORIUCHI  

     
    PAPER-Circuit Theory

      Vol:
    E95-A No:1
      Page(s):
    338-345

    In this paper, we shall describe a basic fuzzy-estimation theory based on the concept of set-valued operators, suitable for available operation of extremely complicated large-scale network systems. Fundamental conditions for availability of system behaviors of such network systems are clarified in a form of β-level fixed point theorem for system of fuzzy-set-valued operators. Here, the proof of this theorem is accomplished by the concept of Hausdorff's ball measure of non-compactness introduced into the Banach space.

  • Almost Perfect Sequences and Periodic Complementary Sequence Pairs over the 16-QAM Constellation

    Fanxin ZENG  Xiaoping ZENG  Zhenyu ZHANG  Guixin XUAN  

     
    LETTER-Digital Signal Processing

      Vol:
    E95-A No:1
      Page(s):
    400-405

    Based on quadriphase perfect sequences and their cyclical shift versions, three families of almost perfect 16-QAM sequences are presented. When one of two time shifts chosen equals half a period of quadriphase sequence employed and another is zero, two of the proposed three sequence families possess the property that their out-of-phase autocorrelation function values vanish except one. At the same time, to the other time shifts, the nontrivial autocorrelation function values in three families are zero except two or four. In addition, two classes of periodic complementary sequence (PCS) pairs over the 16-QAM constellation, whose autocorrelation is similar to the one of conventional PCS pairs, are constructed as well.

  • Underground Electric Signal at the Occurrence of the Niigataken Chuetsu-oki Earthquake in 2007, Japan

    Kan OKUBO  Akihiro TAKEUCHI  Yukinobu NAKAMURA  Nobunao TAKEUCHI  

     
    BRIEF PAPER-Electromagnetic Compatibility

      Vol:
    E95-C No:1
      Page(s):
    110-114

    The electric field mill in our underground observation room detected a co-seismic electromagnetic signal in the vertical electrostatic field ca. 8 s after the origin time of the Niigataken Chuetsu-oki Earthquake in 2007, but ca. 30 s before the arrival time of the P-waves.

  • Undeniable and Unpretendable Signatures

    Le Trieu PHONG  Kaoru KUROSAWA  Wakaha OGATA  

     
    PAPER-Authentication

      Vol:
    E95-A No:1
      Page(s):
    138-150

    Undeniable signature, and unpretendable signature schemes have been studied independently. In this paper, efficient schemes which serve as both at the same time are presented. The schemes find their typical application in anonymous auction where the winner cannot deny her bid; nobody can pretend to be the winner; and the anonymity of all losers is preserved. The security of the schemes is proved in the common reference string model under discrete logarithm type assumptions.

  • On the 2-Adic Complexity of Periodic Binary Sequences

    Lu ZHAO  Qiao-yan WEN  Jie ZHANG  Zheng-ping JIN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:1
      Page(s):
    367-371

    The 2-adic complexity of binary periodic sequences plays an important role in cryptology. In this paper, by means of the usual Fourier transform, we give a simpler form of the upper bound for 2-adic complexity than related result before. For pn-periodic sequences, we discuss the relation between sequences and their Fourier coefficients. Furthermore, based on the relation, we get the lower bound for the number of pn-periodic sequences with given 2-adic complexity.

  • Adaptive and Iterative ITI Canceller for Inter-Track Asynchronous Shingled Write Magnetic Recording

    Masaaki FUJII  

     
    PAPER-Storage Technology

      Vol:
    E95-C No:1
      Page(s):
    155-162

    An adaptive and iterative intertrack-interference (ITI) cancelling scheme is described for multi-track signal detection in inter-track asynchronous shingled write magnetic recording. There is write-clock frequency drift in asynchronous recording systems. Read-back signals obtained with a wide read head scanning narrow tracks thus suffer from not only intersymbol interference (ISI) but also time-variant ITI. To efficiently cope with static ISI and time-variant ITI, multi-track soft interference cancellers and two-dimensional partial-response filters are incorporated based on per-survivor processing into each trellis state defined in a one-dimensional/two-dimensional trellis-switching max-log-MAP detector. In addition, the computational complexity can be reduced based on channel interpolation and intermittent TDPR-filter control by allowing small degradation in signal detection. Computer simulation results in media-noise-dominant environments demonstrate that the proposed adaptive and iterative ITI canceller achieves bit error rates close to those obtained in a non-ITI case when the read-head off-track ratio is up to 50% in write-clock frequency difference of 0.02%.

  • Waveform Calibration of Ground Penetrating Radars for Identification of Buried Objects

    Masahiko NISHIMOTO  Kousuke TOMURA  Kohichi OGATA  

     
    BRIEF PAPER-Remote Sensing

      Vol:
    E95-C No:1
      Page(s):
    105-109

    This brief paper proposes a method for calibration of GPR pulse waveforms that is effective for identification of buried objects in the ground and/or in concrete structures. This approach is based on the inverse filtering operation that eliminates the influence of GPR antenna characteristics, and a response from a flat metal plate is employed as a reference data for calibration. In order to evaluate the effectiveness of this approach, it is applied to actual experimental data measured by the UWB-GPR antennas. The results show the validity of the method and importance of the waveform calibration for target identification.

  • A Total-Field/Scattered-Field Boundary for the Multi-Dimensional CIP Method

    Yoshiaki ANDO  Satoi MURAKOSHI  

     
    PAPER-Electromagnetic Theory

      Vol:
    E95-C No:1
      Page(s):
    115-121

    A total-field/scattered-field (TF/SF) boundary for the constrained interpolation profile (CIP) method is proposed for multi-dimensional electromagnetic problems. Incident fields are added to or subtracted from update equations in order to satisfy advection equations into which Maxwell's equations are reduced by means of the directional splitting. Modified incident fields are introduced to take into account electromagnetic fields after advection. The developed TF/SF boundary is examined numerically, and the results show that it operates with good performance. Finally, we apply the proposed TF/SF boundary to a scattering problem, and it can be solved successfully.

  • Noise Canceling Balun-LNA with Enhanced IIP2 and IIP3 for Digital TV Applications

    Saeed SAEEDI  Mojtaba ATARODI  

     
    PAPER-Integrated Electronics

      Vol:
    E95-C No:1
      Page(s):
    146-154

    An inductorless low noise amplifier (LNA) with active balun for digital TV (DTV) applications is presented. The LNA exploits a noise cancellation technique which allows for simultaneous wide-band impedance matching and low noise design. The matching and amplifier stages in the LNA topology perform single-ended to differential signal conversion with balanced output. The second and third-order nonlinearity of the individual amplifiers as well as the distortion caused by the interaction between the stages are suppressed to achieve high IIP2 and IIP3. A method for intrinsic cancellation of the second-order interaction is employed to reduce the dependence of the IIP3 on the frequency spacing between the interfering signals in the two-tone test of DTV tuners. Fabricated in a 0.18 µm CMOS technology, the LNA core size is 0.21 mm2. Measurements show that the LNA IIP3 and IIP2 are +12 dBm and +21 dBm, respectively. The IIP3 variation is less than 5 dB in the 10 MHz to 200 MHz frequency spacing range. A voltage gain of 14.5 dB and a noise figure below 4 dB are achieved in a frequency range from 100 MHz to 1 GHz. The LNA consumes 11 mA from a 1.8 V supply voltage.

  • Design and Fabrication of PTFE-Filled Waveguide Components by SR Direct Etching

    Mitsuyoshi KISHIHARA  Hiroaki IKEUCHI  Yuichi UTSUMI  Tadashi KAWAI  Isao OHTA  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E95-C No:1
      Page(s):
    122-129

    The metallic waveguide is one of many effective media for millimeter- and submillimeter-waves because of the advantage of its low-loss nature. This paper describes the fabrication method of PTFE-filled waveguide components with the use of the SR (synchrotron radiation) direct etching process of PTFE, sputter deposition of metal, and electroplating. PTFE is known as a difficult material to process with high precision. However, it has been reported that PTFE microstructures can be fabricated by the direct exposure to SR. First, an iris-coupled waveguide BPF with 5-stage Chebyshev response is designed and fabricated for the Q-band. It is demonstrated that the present process is applicable for the fabrication of the practical components inclusive of narrow patterns. Then, a cruciform 3 dB coupler with air-filled posts is designed and fabricated for the Q-band. Directivity and matched state of the coupler can be realized by “holes” in the dielectric material. The measurement results are also shown.

  • A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Immunity

    Yusong DU  Fangguo ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:1
      Page(s):
    417-420

    Based on Tu-Deng's conjecture and the Tu-Deng function, in 2010, X. Tang et al. proposed a class of Boolean functions in even variables with optimal algebraic degree, very high nonlinearity and optimal algebraic immunity. In this corresponding, we consider the concatenation of Tang's function and another Boolean function, and study its cryptographic properties. With this idea, we propose a class of 1-resilient Boolean functions in odd variables with optimal algebraic degree, good nonlinearity and suboptimal algebraic immunity based on Tu-Deng's conjecture.

  • SAR-Probe Calibration System Using Reference Dipole Antenna in Tissue-Equivalent Liquid

    Nozomu ISHII  Yukihiro MIYOTA  Ken-ichi SATO  Lira HAMADA  Soichi WATANABE  

     
    PAPER-Antenna Measurement

      Vol:
    E95-B No:1
      Page(s):
    60-68

    The probe used in the conventional SAR measurement is usually calibrated in a well filled with tissue-equivalent liquid surrounded by a rectangular waveguide and a matching dielectric window in the frequency range from 800 MHz to 3 GHz. However, below 800 MHz, the waveguides are too large to be used for the calibration. Therefore, we have developed another technique of calibrating the SAR-probe, that is, relating the output voltage of the probe to the field intensity produced by a reference antenna in the tissue-equivalent liquid by using two-antenna method. In this paper, the calibration system using the reference dipole antennas in the liquid at 450 MHz, 900 MHz and 2450 MHz is presented and far-field gain of the reference antenna and calibration factor of the SAR-probe are measured and compared with those obtained by using the conventional waveguide system.

  • A Simple Broadband Antenna for MIMO Applications in Cognitive Radio

    Dinh Thanh LE  Yoshio KARASAWA  

     
    PAPER-Antennas

      Vol:
    E95-B No:1
      Page(s):
    18-26

    In this paper, a simple type of printed dipole is proposed for Multi-Input Multi-Output (MIMO) applications in cognitive radio. The antenna is composed of a transmission line and a dipole. Some examinations of key factors and optimized parameters of the antenna are presented. The measured results illustrate that the proposed antenna offers a bandwidth of over 50% for Voltage Standing Wave Ratio (VSWR) less than 2, extending from 2.4 GHz to 4.0 GHz. The antenna peak gain in E-plane and radiation patterns at different frequencies are also explored. In addition, based on the proposed antenna, we introduce two simple broadband arrays for MIMO applications in cognitive radio. One has two ports and the other has four ports. Measurement results indicate that the arrays also work in a broad bandwidth. Mutual couplings between ports in each array are kept under -10 dB at the low frequencies and under -20 dB at the high frequencies of bandwidth of the arrays. Furthermore, we utilized the antenna arrays for some MIMO experiments to estimate the channel capacity in a wide frequency range.

  • Colorization Based Image Coding by Using Local Correlation between Luminance and Chrominance

    Yoshitaka INOUE  Takamichi MIYATA  Yoshinori SAKAI  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E95-D No:1
      Page(s):
    247-255

    Recently, a novel approach to color image compression based on colorization has been presented. The conventional method for colorization-based image coding tends to lose the local oscillation of chrominance components that the original images had. A large number of color assignments is required to restore these oscillations. On the other hand, previous studies suggest that an oscillation of a chrominance component correlates with the oscillation of a corresponding luminance component. In this paper, we propose a new colorization-based image coding method that utilizes the local correlation between texture components of luminance and chrominance. These texture components are obtained by a total variation regularized energy minimization method. The local correlation relationships are approximated by linear functions, and their coefficients are extracted by an optimization method. This key idea enables us to represent the oscillations of chrominance components by using only a few pieces of information. Experimental results showed that our method can restore the local oscillation and code images more efficiently than the conventional method, JPEG, or JPEG2000 at a high compression rate.

  • MS Location Estimation with Genetic Algorithm

    Chien-Sheng CHEN  Jium-Ming LIN  Wen-Hsiung LIU  Ching-Lung CHI  

     
    PAPER-ITS

      Vol:
    E95-A No:1
      Page(s):
    305-312

    Intelligent transportation system (ITS) makes use of vehicle position to decrease the heavy traffic and improve service reliability of public transportation system. Many existing systems, such as global positioning system (GPS) and cellular communication systems, can be used to estimate vehicle location. The objective of wireless location is to determine the mobile station (MS) location in a wireless cellular communications system. The non-line-of-sight (NLOS) problem is the most crucial factor that it causes large measured error. In this paper, we present a novel positioning algorithm based on genetic algorithm (GA) to locate MS when three BSs are available for location purpose. Recently, GA are widely used as many various optimization problems. The proposed algorithm utilizes the intersections of three time of arrival (TOA) circles based on GA to estimate the MS location. The simulation results show that the proposed algorithms can really improve the location accuracy, even under severe NLOS conditions.

  • Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities

    Lihua WANG  Licheng WANG  Masahiro MAMBO  Eiji OKAMOTO  

     
    PAPER-Public Key Cryptography

      Vol:
    E95-A No:1
      Page(s):
    70-88

    Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hierarchical confidentialities. In our scheme, on receiving a ciphertext, the proxy has the rights to perform the following three tasks according to the message confidentiality levels of the sender's intention: (1) to decrypt the ciphertext on behalf of the original decryptor; (2) to re-encrypt the ciphertext such that another user who is designated by the original decryptor can learn the message; (3) to do nothing except for forwarding the ciphertext to the original decryptor. Our scheme supports revocability in the sense that it allows proxy's decryption and re-encryption rights to be revoked even during the valid period of the proxy key without changing the original decryptor's public information. We prove that our proposal is indistinguishable against chosen identity and plaintext attacks in the standard model. We also show how to convert it into a system against chosen identity and ciphertext attacks by using the Fujisaki-Okamoto transformation.

  • Optical Fan-Out Adapter for Compact Packaging of Components by a Jacket Removing System with a CO2 Laser

    Osanori KOYAMA  Ryou SOUGEN  Keisuke IKUSHIMA  Makoto YAMADA  Yutaka KATSUYAMA  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E95-B No:1
      Page(s):
    143-151

    A new optical fan-out adapter is proposed and fabricated by applying the jacket removing system with a CO2 laser. The fan-out adapter has both the multi-fiber connection function and the fiber separating function for single-fiber connections. In order to remove the jacket of a fiber ribbon to connectorize and fabricate the fan-out adapter, the optimum conditions of the laser power P and the scan speed V are clarified for the jacket removing. Based on the optimum conditions, the fan-out adapter was fabricated successfully. Individual fibers could be taken out from the MT connector of the fan-out adapter. The connection losses of the fabricated fan-out adapter were comparable with the values of commercially available MT connectors and SC connectors. The length of the fabricated fan-out adapter was 27 mm, including 2 MT connectors. This result clarifies that the size of the connection with a fan-out can be reduced dramatically by the proposed fan-out adapter.

  • Utility Maximization with Packet Collision Constraint in Cognitive Radio Networks

    Nguyen H. TRAN  Choong Seon HONG  Sungwon LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:1
      Page(s):
    321-324

    We study joint rate control and resource allocation with a packet collision constraint that maximizes the total utility of secondary users in cognitive radio networks. We formulate and decouple the original optimization problem into separable subproblems and then develop an algorithm that converges to optimal rate control and resource allocation. The proposed algorithm can operate on different time-scales to reduce the amortized time complexity.

6961-6980hit(20498hit)