The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

7781-7800hit(20498hit)

  • Generic Permutation Network for QC-LDPC Decoder

    Xiao PENG  Xiongxin ZHAO  Zhixiang CHEN  Fumiaki MAEHARA  Satoshi GOTO  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E93-A No:12
      Page(s):
    2551-2559

    Permutation network plays an important role in the reconfigurable QC-LDPC decoder for most modern wireless communication systems with multiple code rates and various code lengths. This paper presents the generic permutation network (GPN) for the reconfigurable QC-LDPC decoder. Compared with conventional permutation networks, this proposal could break through the input number restriction, such as power of 2 and other limited number, and optimize the network for any application in demand. Moreover, the proposed scheme could greatly reduce the latency because of less stages and efficient control signal generating algorithm. In addition, the proposed network processes the nature of high parallelism which could enable several groups of data to be cyclically shifted simultaneously. The synthesis results using the 90 nm technology demonstrate that this architecture can be implemented with the gate count of 18.3k for WiMAX standard at the frequency of 600 MHz and 10.9k for WiFi standard at the frequency of 800 MHz.

  • Performance Bound for Turbo-Coded 2-D FSO/CDMA Systems over Atmospheric Turbulence Channels

    Anh T. PHAM  Tu A. LUU  Ngoc T. DANG  

     
    LETTER

      Vol:
    E93-A No:12
      Page(s):
    2696-2699

    We propose Turbo-coded two-dimensional (2-D) free-space optical (FSO) CDMA systems for broadband access networks. The performance bound for the proposed system over atmospheric turbulence channels is obtained considering multiple-access interference (MAI) and receiver noise. The results show that the proposed system offers a better performance than that of previously proposed ones. Also, it has a better tolerance to the atmospheric turbulence and the increase in the number of users.

  • Logical Position Exchange Algorithm for Efficient Management in ZigBee Tree Networks

    Saeyoung AHN  Sunshin AN  

     
    LETTER

      Vol:
    E93-B No:12
      Page(s):
    3526-3529

    Currently, there are various routing methods that consider the energy in a wireless sensor environment. The algorithm we consider is a low-rate wireless personal area network, viz., 802.15.4, and ZigBee routing network. Considering, the overall organization of the network energy efficiency, we suggest a logical position exchange (LPE) algorithm between specified nodes. Logical positioning means connecting high sub-networks and low sub-networks based on the neighbor nodes information of the address ID, and depth in the ZigBee tree topology network. When one of the nodes of the tree topology network, which is responsible for connecting multiple low sub-networks and high sub-networks, has difficulty performing its important roles in the network, because of energy exhaustion, it exchanges essential information and entrusts logical positioning to another node that is capable of it. A partial change in the logical topology enhances the energy efficiency in the network.

  • Flow-Admission Control Based on Equality of Heterogeneous Traffic (Two-Type Flow Model)

    Sumiko MIYATA  Katsunori YAMAOKA  

     
    PAPER-Network System

      Vol:
    E93-B No:12
      Page(s):
    3564-3576

    Multimedia applications such as video and audio have recently come into much wider use. Because this heterogeneous traffic consumes most of the network's resources, call admission control (CAC) is required to maintain high-quality services. User satisfaction depends on CAC's success in accommodating application flows. Conventional CACs do not take into consideration user satisfaction because their main purpose is to improve the utilization of resources. Moreover, if we assume a service where an ISP provides a "flat-based charging," each user may receive same user satisfaction as a result of users being accommodated in a network, even if each has a different bandwidth. Therefore, we propose a novel CAC to maximize total user satisfaction based on a new philosophy where heterog eneous traffic is treated equally in networks. Theoretical analysis is used to derive optimal thresholds for various traffic configurations with a full search system. We also carried out theoretical numerical analysis to demonstrate the effectiveness of our new CAC. Moreover, we propose a sub-optimal threshold configuration obtained by using an approximation formula to develop practical CAC from these observations. We tested and confirmed that performance could be improved by using sub-optimal parameters.

  • Energy Saving Scheme with an Extra Active Period for LAN Switches

    Hitomi TAMURA  Ritsuko TOMIHARA  Yutaka FUKUDA  Kenji KAWAHARA  Yuji OIE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E93-B No:12
      Page(s):
    3542-3554

    An immense number of LAN switches are currently in use worldwide. Therefore, methods that can reduce the energy consumption of these devices are of great practical interest. A simple way to save power in LAN switches is to switch the interfaces to sleep mode when no packets are buffered and to keep the interfaces in active mode while there are packets to be transmitted. Although this would appear to be the most effective energy saving scheme, mode switching gives rise to in-rush current, which can cause electrical damage to devices. This problem arises from excessive mode switching, which should be avoided. Thus, the main objective is to develop a method by which to reduce the number of mode switchings that result in short-duration sleep modes because these switchings do not contribute greatly to energy efficiency but can damage the device. To this end, a method is adopted whereby the interface is kept in active mode for an "extra" period of time after all packets have been flushed from the buffer. This period is the "extra active period (EAP)" and this scheme protects the device at the expense of energy saving efficiency. In this paper, this scheme is evaluated analytically in terms of its power reduction ratio and frequency of mode changes by modifying the M/M/1 and IPP/M/1 queuing models. The numerical results show how the duration of the extra active period degrades the energy saving performance while reducing the number of mode changes. We analytically show an exact trade-off between the power reduction ratio and the average number of turn-ons in the EAP model with Poisson packet arrival. Furthermore, we extend the scheme to determine the EAP dynamically and adaptively depending on the short-term utilization of the interface and demonstrate the effectiveness of the extended scheme by simulation. The newly developed scheme will enable LAN switches to be designed with energy savings in mind without exceeding the constraints of the device.

  • The Q-Enhanced CMOS Active Bandpass Filter with Two-Stage Self-Calibration

    Hangue PARK  Jongwook ZEONG  Wonsuk CHOI  Jung Han CHOI  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E93-C No:12
      Page(s):
    1700-1703

    A Q-enhanced 8th order CMOS active bandpass filter is presented employing a novel two-stage self-calibration technique. The proposed active filter shows the better out-band attenuation performance than other reported CMOS active bandpass filters. The proposed calibration method enables the stable filtering operation affected by neither the input power variation nor the strong interference power. It is fabricated using 65 nm CMOS process. The measured 3 dB bandwidth is 54 MHz at 2.37 GHz. The insertion loss is 2.9 dB and the out-band attenuation is 27.5 dB at 15 MHz offset frequency. The performance of the filter remains unchanged for 5% supply voltage variations.

  • Chordal Graph Based Channel Assignment for Multicast and Unicast Traffic in Wireless Mesh Networks

    Junfeng JIN  Yusheng JI  Baohua ZHAO  Hao ZHOU  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3409-3416

    With the increasing popularity of multicast and real-time streaming service applications, efficient channel assignment algorithms that handle both multicast and unicast traffic in wireless mesh networks are needed. One of the most effective approaches to enhance the capacity of wireless networks is to use systems with multiple channels and multiple radio interfaces. However, most of the past works focus on vertex coloring of a general contention graph, which is NP-Complete, and use the greedy algorithm to achieve a suboptimal result. In this paper, we combine unicast and multicast with a transmission set, and propose a framework named Chordal Graph Based Channel Assignment (CGCA) that performs channel assignment for multicast and unicast traffic in multi-channel multi-radio wireless mesh networks. The proposed framework based on chordal graph coloring minimizes the interference of the network and prevents unicast traffic from starvation. Simulation results show that our framework provides high throughput and low end-to-end delay for both multicast and unicast traffic. Furthermore, our framework significantly outperforms other well-known schemes that have a similar objective in various scenarios.

  • Selecting Help Messages by Using Robust Grammar Verification for Handling Out-of-Grammar Utterances in Spoken Dialogue Systems

    Kazunori KOMATANI  Yuichiro FUKUBAYASHI  Satoshi IKEDA  Tetsuya OGATA  Hiroshi G. OKUNO  

     
    PAPER-Speech and Hearing

      Vol:
    E93-D No:12
      Page(s):
    3359-3367

    We address the issue of out-of-grammar (OOG) utterances in spoken dialogue systems by generating help messages. Help message generation for OOG utterances is a challenge because language understanding based on automatic speech recognition (ASR) of OOG utterances is usually erroneous; important words are often misrecognized or missing from such utterances. Our grammar verification method uses a weighted finite-state transducer, to accurately identify the grammar rule that the user intended to use for the utterance, even if important words are missing from the ASR results. We then use a ranking algorithm, RankBoost, to rank help message candidates in order of likely usefulness. Its features include the grammar verification results and the utterance history representing the user's experience.

  • Accuracy Enhancement of Grid-Based SSTA by Coefficient Interpolation

    Shinyu NINOMIYA  Masanori HASHIMOTO  

     
    PAPER-Device and Circuit Modeling and Analysis

      Vol:
    E93-A No:12
      Page(s):
    2441-2446

    Statistical timing analysis for manufacturing variability requires modeling of spatially-correlated variation. Common grid-based modeling for spatially-correlated variability involves a trade-off between accuracy and computational cost, especially for PCA (principal component analysis). This paper proposes to spatially interpolate variation coefficients for improving accuracy instead of fining spatial grids. Experimental results show that the spatial interpolation realizes a continuous expression of spatial correlation, and reduces the maximum error of timing estimates that originates from sparse spatial grids For attaining the same accuracy, the proposed interpolation reduced CPU time for PCA by 97.7% in a test case.

  • Optimized Spatial Capacity by Eigenvalue Decomposition of Adjacency Matrix

    Fumie ONO  

     
    LETTER

      Vol:
    E93-B No:12
      Page(s):
    3514-3517

    In this letter, an eigenspace of network topology is introduced to increase a spatial capacity. The network topology is represented as an adjacency matrix. By an eigenvector of adjacency matrix, efficient two way transmission can be realized in wireless distributed networks. It is confirmed by numerical analysis that the scheme with an eigenvector of adjacency matrix supplies higher spatial capacity and reliability than that of conventional scheme.

  • Social Network Based P2P Multicast Reducing Psychological Forwarding Cost in Mobile Networks

    Hiroyuki KUBO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E93-D No:12
      Page(s):
    3260-3268

    The demand for data/audio streaming/video streaming multicast services in large scale networks has been increasing. Moreover, the improved transmission speed and mobile-device capability in wireless access networks enable people to use such services via their personal mobile devices. Peer-to-peer (P2P) architecture ensures scalability and robustness more easily and more economically than server-client architecture; as the number of nodes in a P2P network increases, the amount of workload per node decreases and lessens the impact of node failure. However, mobile users feel much larger psychological cost due to strict limitations on bandwidth, processing power, memory capacity, and battery life, and they want to minimize their contributions to these services. Therefore, the issue of how we can reduce this psychological cost remains. In this paper, we consider how effective a social networking service is as a platform for mobile P2P multicast. We model users' cooperative behaviors in mobile P2P multicast streaming, and propose a social-network based P2P streaming architecture for mobile networks. We also measured the psychological forwarding cost of real users in mobile P2P multicast streaming through an emulation experiment, and verify that our social-network based mobile P2P multicast streaming improves service quality by reducing the psychological forwarding cost using multi-agent simulation.

  • An Enhanced Automatic Gain Control Algorithm for Initial Cell Search in 3GPP LTE TDD System

    Jun-Hee JANG  Keun-Dea KIM  Hyung-Jin CHOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:12
      Page(s):
    3606-3615

    In this paper, we propose an AGC (Automatic Gain Control) algorithm for initial cell search in 3GPP (3rd Generation Partnership Project) LTE (Long Term Evolution) TDD (Time Division Duplex) system. Since the received signal has a large signal power difference between uplink and downlink subframe in wireless communication systems using a TDD scheme, conventional AGC scheme cannot sufficiently adjust the AGC gain because the AGC gain cannot converge fast enough to properly respond. Therefore, conventional AGC scheme leads to increased AGC gain variation, and the received signal will be attenuated by large AGC gain variation. To overcome this limitation, we propose an AGC scheme based on the average amplitude ratio calculation which can not only effectively increase convergence speed of the AGC gain but also maintain the stability of AGC operation in LTE TDD system. Also, it is important for AGC to converge efficiently for the accurate radio frame timing detection during the subsequent initial cell search procedure. Therefore, we also consider the proposed AGC scheme in combination with PSS (Primary Synchronization Signal) detection interface for the first step of initial cell search process in LTE TDD system to obtain both a stable AGC operation and accurate PSS detection performance. By extensive computer simulation in the presence of frequency offset and various channel environments, we verified that the proposed method can obtain a good behavior in terms of demodulation and PSS detection performance in LTE TDD system.

  • EXIT Analysis for MAP-Based Joint Iterative Decoding of Separately Encoded Correlated Sources

    Kentaro KOBAYASHI  Takaya YAMAZATO  Masaaki KATAYAMA  

     
    LETTER

      Vol:
    E93-B No:12
      Page(s):
    3509-3513

    We develop a mathematical framework for the extrinsic information transfer (EXIT) analysis to assess the convergence behavior of maximum a posteriori (MAP)-based joint iterative decoding of correlated sources, which are separately encoded and transmitted over noisy channels. Unlike the previous work, our approach focuses on the case side information about the correlation is not perfectly given at the joint decoder but is extracted from decoder output and updated in an iterative manner. The presented framework provides a convenient way to compare between schemes. We show that it allows us to easily and accurately predict joint decoding gain and turbo cliff position.

  • Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model

    Hao BAI  Chang-zhen HU  Gang ZHANG  Xiao-chuan JING  Ning LI  

     
    LETTER-Dependable Computing

      Vol:
    E93-D No:12
      Page(s):
    3410-3413

    The letter proposes a novel binary vulnerability analyzer for executable programs that is based on the Hidden Markov Model. A vulnerability instruction library (VIL) is primarily constructed by collecting binary frames located by double precision analysis. Executable programs are then converted into structurized code sequences with the VIL. The code sequences are essentially context-sensitive, which can be modeled by Hidden Markov Model (HMM). Finally, the HMM based vulnerability analyzer is built to recognize potential vulnerabilities of executable programs. Experimental results show the proposed approach achieves lower false positive/negative rate than latest static analyzers.

  • On-Line Electrocardiogram Lossless Compression Using Antidictionary Codes for a Finite Alphabet

    Takahiro OTA  Hiroyoshi MORITA  

     
    PAPER-Biological Engineering

      Vol:
    E93-D No:12
      Page(s):
    3384-3391

    An antidictionary is particularly useful for data compression, and on-line electrocardiogram (ECG) lossless compression algorithms using antidictionaries have been proposed. They work in real-time with constant memory and give better compression ratios than traditional lossless data compression algorithms, while they only deal with ECG data on a binary alphabet. This paper proposes on-line ECG lossless compression for a given data on a finite alphabet. The proposed algorithm gives not only better compression ratios than those algorithms but also uses less computational space than they do. Moreover, the proposed algorithm work in real-time. Its effectiveness is demonstrated by simulation results.

  • Improved Demons Technique with Orthogonal Gradient Information for Medical Image Registration

    Cheng LU  Mrinal MANDAL  

     
    LETTER-Biological Engineering

      Vol:
    E93-D No:12
      Page(s):
    3414-3417

    Accurate registration is crucial for medical image analysis. In this letter, we proposed an improved Demons technique (IDT) for medical image registration. The IDT improves registration quality using orthogonal gradient information. The advantage of the proposed IDT is assessed using 14 medical image pairs. Experimental results show that the proposed technique provides about 8% improvement over existing Demons-based techniques in terms of registration accuracy.

  • An Error Diagnosis Technique Based on Clustering of Elements

    Kosuke SHIOKI  Narumi OKADA  Kosuke WATANABE  Tetsuya HIROSE  Nobutaka KUROKI  Masahiro NUMA  

     
    PAPER-Logic Synthesis, Test and Verification

      Vol:
    E93-A No:12
      Page(s):
    2490-2496

    In this paper, we propose an error diagnosis technique based on clustering LUT elements to shorten the processing time. By grouping some elements as a cluster, our technique reduces the number of elements to be considered, which is effective to shorten the processing time for screening error location sets. First, the proposed technique partitions the circuit into FFR (fanout-free region) called cluster, which is a subcircuit composed of LUT elements without fanout. After screening the set of clusters including error locations, this technique screens error location sets composed of elements in the remaining set of clusters, where corrections should be made. Experimental results with benchmark circuits have shown that our technique shortens the processing time to 1/170 in the best case, and rectifies circuits including 6 errors which cannot be rectified by the conventional technique.

  • The Gaussian MIMO Broadcast Channel under Receive Power Protection Constraints Open Access

    Ian Dexter GARCIA  Kei SAKAGUCHI  Kiyomichi ARAKI  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3448-3460

    A Gaussian MIMO broadcast channel (GMBC) models the MIMO transmission of Gaussian signals from a transmitter to one or more receivers. Its capacity region and different precoding schemes for it have been well investigated, especially for the case wherein there are only transmit power constraints. In this paper, a special case of GMBC is investigated, wherein receive power constraints are also included. By imposing receive power constraints, the model, called protected GMBC (PGMBC), can be applied to certain scenarios in spatial spectrum sharing, secretive communications, mesh networks and base station cooperation. The sum capacity, capacity region, and application examples for the PGMBC are discussed in this paper. Sub-optimum precoding algorithms are also proposed for the PGMBC, where standard user precoding techniques are performed over a BC with a modified channel, which we refer to as the "protection-implied BC." In the protection-implied BC, the receiver protection constraints have been implied in the channel, which means that by satisfying the transmit power constraints on the protection implied channel, receiver protection constraints are guaranteed to be met. Any standard single-user or multi-user MIMO precoding scheme may then be performed on the protection-implied channel. When SINR-matching duality-based precoding is applied on the protection-implied channel, sum-capacity under full protection constraints (zero receive power), and near-sum-capacity under partial protection constraints (limited non-zero receive power) are achieved, and were verified by simulations.

  • Subtraction Inversion for Delta Path's Hardware Simplification in MASH Delta-Sigma Modulator

    Pao-Lung CHEN  

     
    LETTER-Circuit Design

      Vol:
    E93-A No:12
      Page(s):
    2616-2620

    The multistage noise-shaping (MASH) delta-sigma modulator (DSM) is the key element in a fractional-N frequency synthesizer. A hardware simplification method with subtraction inversion is proposed for delta-path's design in a MASH delta-sigma modulator. The subtraction inversion method focuses on simplification of adder-subtractor unit in the delta path with inversion of subtraction signal. It achieves with less hardware cost as compared with the conventional approaches. As a result, the hardware organization is regular and easy for expanding into higher order MASH DSM design. Analytical details of the implementation way and hardware cost function with N-th order configuration are presented. Finally, simulations with hardware description language as well as synthesis data verified the proposed design method.

  • A 9-bit 100-MS/s 1.46-mW Tri-Level SAR ADC in 65 nm CMOS

    Yanfei CHEN  Sanroku TSUKAMOTO  Tadahiro KURODA  

     
    PAPER-Circuit Design

      Vol:
    E93-A No:12
      Page(s):
    2600-2608

    A 9-bit 100-MS/s successive approximation register (SAR) ADC with low power and small area has been implemented in 65-nm CMOS technology. A tri-level charge redistribution technique is proposed to reduce DAC switching energy and settling time. By connecting bottom plates of differential capacitor arrays for charge sharing, extra reference voltage is avoided. Two reference voltages charging and discharging the capacitors are chosen to be supply voltage and ground in order to save energy and achieve a rail-to-rail input range. Split capacitor arrays with mismatch calibration are implemented for small area and small input capacitance without linearity degradation. The ADC achieves a peak SNDR of 53.1 dB and consumes 1.46 mW from a 1.2-V supply, resulting in a figure of merit (FOM) of 39 fJ/conversion-step. The total active area is 0.012 mm2 and the input capacitance is 180 fF.

7781-7800hit(20498hit)