The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

11181-11200hit(20498hit)

  • Modified Algorithm on Maximum Detected Bit Flipping Decoding for High Dimensional Parity-Check Code

    Yuuki FUNAHASHI  Shogo USAMI  Ichi TAKUMI  Masayasu HATA  

     
    LETTER-Coding Theory

      Vol:
    E89-A No:10
      Page(s):
    2670-2675

    We have researched high dimensional parity-check (HDPC) codes that give good performance over a channel that has a very high error rate. HDPC code has a little coding overhead because of its simple structure. It has hard-in, maximum detected bit flipping (MDBF) decoding that has reasonable decoding performance and computational cost. In this paper, we propose a modified algorithm for MDBF decoding and compare the proposed MDBF decoding with conventional hard-in decoding.

  • Binary Zero-Correlation Zone Sequence Set Construction Using a Cyclic Hadamard Sequence

    Takafumi HAYASHI  

     
    PAPER-Sequences

      Vol:
    E89-A No:10
      Page(s):
    2649-2655

    The present paper introduces a new construction of a class of binary periodic sequence set having a zero-correlation zone (hereinafter binary ZCA sequence set). The cross-correlation function and the side-lobe of the auto-correlation function of the proposed sequence set is zero for the phase shifts within the zero-correlation zone. The present paper shows that such a construction generates a binary ZCA sequence set by using a cyclic difference set and a collection of mutually orthogonal complementary sets.

  • Layer Error Characteristics of Lattice-Reduction Aided V-BLAST Detectors

    Tien Duc NGUYEN  Xuan Nam TRAN  Tadashi FUJINO  

     
    PAPER-Coding Theory

      Vol:
    E89-A No:10
      Page(s):
    2535-2542

    Recently, lattice reduction aided (LRA) detectors have been introduced into Vertical Bell-Labs Layered Space-Time (V-BLAST) systems to obtain nearly optimal bit error rate (BER) performance for only small additional complexity. In this paper, the layer error characteristics of LRA-V-BLAST detectors are investigated and compared with those of conventional V-BLAST ones. Two important conclusions are drawn for the LRA-V-BLAST detectors. First, the variation of their mean square error (MSE) within each detection iteration is not as large as in conventional V-BLAST detectors. Second, thanks to lattice reduction there exists an inherent sub-optimal detection order from the last to the first layer. These conclusions allow LRA-V-BLAST detectors to avoid optimal ordering to further reduce the complexity. LRA-V-BLAST detectors without optimal ordering are shown to obtain almost the same BER performance of LRA-V-BLAST detector with optimal ordering.

  • An Efficient Scheme for Supporting Personal Mobility in SIP-Based VoIP Services

    Tsan-Pin WANG  KauLin CHIU  

     
    PAPER

      Vol:
    E89-B No:10
      Page(s):
    2706-2714

    SIP is promising for VoIP signaling to support personal mobility. This paper first introduces and compares single registration (SR) and multiple registration (MR) for personal mobility. The SR scheme is weak in support of personal mobility without user's assistance. In contrast, the MR scheme supports personal mobility inherently by using sequential search or pure parallel search. However, sequential search may suffer from long delay for call setup, while pure parallel search consumes network resource. In this paper, we propose pipelined search for multiple registration. Both simulation and analytic results show that the proposed scheme compromises the two schemes in terms of delay and consuming network resource.

  • Design of Novel Time-Domain Equalizer (TEQ) for OFDM Systems

    Lan YANG  Chung Gu KANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:10
      Page(s):
    2940-2944

    In a typical OFDM system, a time domain equalizer (TEQ) can be used in order to reduce the channel length, allowing for shortening of the Cyclic Prefix (CP). In this paper, a novel TEQ method is proposed for OFDM systems, which can reduce implementation complexity without sacrificing performance. Furthermore, the length of the proposed TEQ may be arbitrary. For time-varying channels, an adaptive method is also developed to track the variation of the optimum TEQ coefficients rather than recomputing inversion of the channel matrix.

  • Evaluation of BER in Bluetooth Wireless Systems Disturbed by Radiated Noise from Spread Spectrum Clock Systems

    Takahide MURAKAMI  Yasushi MATSUMOTO  Katsumi FUJII  Akira SUGIURA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E89-B No:10
      Page(s):
    2897-2904

    Frequency-modulated clock signals are widely used in personal computers to reduce the amplitude of the clock harmonic noise, as measured using an electromagnetic interference (EMI) test receiver. However, the power of the clock harmonics is not decreased with this technique called spread spectrum clocking (SSC). Hence, the impact of the harmonics of a frequency-modulated clock on the bit error rate (BER) and packet error rate (PER) of a Bluetooth system is theoretically analyzed. In addition, theoretical analysis covers the effectiveness of a frequency hopping spread spectrum (FH-SS) scheme and forward error correction (FEC) in mitigating the degradation in the BER and PER caused by clock harmonic interference. The results indicate that the BER and PER strongly depend on the modulating frequency and maximum frequency deviation of the clock harmonic. They also indicate that radiated clock harmonics may considerably degrade the BER and PER when a Bluetooth receiver is very close to a personal computer. Frequency modulating the clock harmonics slightly reduces the BER while it negligibly reduces the PER.

  • Two-Stage Random-Access Using Two-Hop Relay for Multi-Hop Systems

    Yoichiro MIZUNO  Ryo HASEGAWA  Riaz ESMAILZADEH  Masao NAKAGAWA  

     
    PAPER-Spread Spectrum

      Vol:
    E89-A No:10
      Page(s):
    2630-2639

    Higher transmission rates are one of the main characteristics of the fourth-generation (4G*) of mobile communications. These systems are expected to operate at higher frequency bands, which experience larger propagation loss. This results in larger required transmission power, which causes several problems, particularly for uplink communications, as the typical mobile station (MS) has limited transmission power. Multi-hop systems have been proposed to address this problem. In this paper, we consider the issue of random-access (RA) in a multi-hop system. It is clear that a two-hop mobile communication system requires a two-stage RA process. In this paper, we propose a two-stage RA process that is an extension of the RA process of the CDMA-based 3GPP standard. The proposed method uses a hybrid of code division multiple access (CDMA) and Slotted-ALOHA. To realize the proposed two-hop RA, we dedicate one slot for second-hop transmissions in each interval (predefined); we refer to this as the interval slots allocation (ISsA) technique. Numerical analyses and simulations are conducted to evaluate its basic performance in a multi-hop system. The results demonstrate the superior throughput-delay performance of the proposed two-stage RA multi-hop system with ISsA.

  • A New Vertex Adjustment Method for Polygon-Based Shape Coding

    Byoung-Ju YUN  Jae-Soo CHO  Yun-Ho KO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E89-D No:10
      Page(s):
    2693-2695

    In this paper, we propose a new vertex adjustment method which is based on the size ratio of an object and that of a polygon. In the conventional polygonal approximation methods, the sizes of an object and an approximating polygon are quite different, therefore there are so many error pixels between them. The proposed method reduces the size of error regions by adjusting the size of the polygon to that of an object. Simulation results show outstanding performance of the proposed method.

  • Coding for Sources That Output Symbols According to Poisson Process

    Mikihiko NISHIARA  

     
    PAPER-Information Theory

      Vol:
    E89-A No:10
      Page(s):
    2906-2913

    We consider coding for sources that output the symbols according to Poisson process from the viewpoint of real-time transmission. In order to reduce the transmission delay we avoid using input buffers. However, the lack of buffer causes overflow error. The theoretical relation between the transmission rate and the error probability is clarified. It is shown that the optimal code that minimizes the probability of error differs from the code that minimizes the expected codeword length. We also investigate the case of block coding as one of the applications of buffers.

  • Mutual Complementarity between Diffusion-Type Flow Control and TCP

    Chisa TAKANO  Kaori MURANAKA  Keita SUGIYAMA  Masaki AIDA  

     
    PAPER-Network

      Vol:
    E89-B No:10
      Page(s):
    2850-2859

    In current IP-based networks, the application of window-based end-to-end flow control, including TCP, to ensure reliable flows is an essential factor. However, since such a flow control is provided by the end hosts, end-to-end control cannot be applied to decision-making in a time-scale shorter than the round-trip delay. We have previously proposed a diffusion-type flow control mechanism to realize the extremely time sensitive flow control that is required for high-speed networks. In this mechanism, each network node manages its own traffic only on the basis of the local information directly available to it, by using predetermined rules. The implementation of decision-making at each node can lead to optimal performance for the whole network. Our previous studies showed that the mechanism works well, by itself, in high-speed networks. However, to apply this mechanism to actual networks, it needs to be able to coexist with other existing protocols. In this paper, we investigate the performance of diffusion-type flow control coexisting with TCP. We show that diffusion-type flow control can coexist with TCP and the two can be complementary. Then, we show that a combination of both controls achieves higher network performance than TCP alone in high-speed networks.

  • Introduction to a New Performance Factor of Soft Handoff for Real-Time Streaming Services

    Young-uk CHUNG  Dong-Ho CHO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:10
      Page(s):
    2933-2935

    We describe a new characteristic of soft handoff, call failure when a mobile moves from the handoff region to the normal region, and introduce the metric of region-transition failure probability to more accurately assess the performance of CDMA systems that support real-time video streaming services. This characteristic has not been considered in previous research. Simulations show that this failure must be considered since it significantly degrades system performance.

  • Pruning-Based Unsupervised Segmentation for Korean

    In-Su KANG  Seung-Hoon NA  Jong-Hyeok LEE  

     
    PAPER-Natural Language Processing

      Vol:
    E89-D No:10
      Page(s):
    2670-2677

    Compound noun segmentation is a key component for Korean language processing. Supervised approaches require some types of human intervention such as maintaining lexicons, manually segmenting the corpora, or devising heuristic rules. Thus, they suffer from the unknown word problem, and cannot distinguish domain-oriented or corpus-directed segmentation results from the others. These problems can be overcome by unsupervised approaches that employ segmentation clues obtained purely from a raw corpus. However, most unsupervised approaches require tuning of empirical parameters or learning of the statistical dictionary. To develop a tuning-less, learning-free unsupervised segmentation algorithm, this study proposes a pruning-based unsupervised technique that eliminates unhelpful segmentation candidates. In addition, unlike previous unsupervised methods that have relied on purely character-based segmentation clues, this study utilizes word-based segmentation clues. Experimental evaluations show that the pruning scheme is very effective to unsupervised segmentation of Korean compound nouns, and the use of word-based prior knowledge enables better segmentation accuracy. This study also shows that the proposed algorithm performs competitively with or better than other unsupervised methods.

  • Support Vector Machines Based Generalized Predictive Control of Chaotic Systems

    Serdar IPLIKCI  

     
    PAPER-Control, Neural Networks and Learning

      Vol:
    E89-A No:10
      Page(s):
    2787-2794

    This work presents an application of the previously proposed Support Vector Machines Based Generalized Predictive Control (SVM-Based GPC) method [1] to the problem of controlling chaotic dynamics with small parameter perturbations. The Generalized Predictive Control (GPC) method, which is included in the class of Model Predictive Control, necessitates an accurate model of the plant that plays very crucial role in the control loop. On the other hand, chaotic systems exhibit very complex behavior peculiar to them and thus it is considerably difficult task to get their accurate model in the whole phase space. In this work, the Support Vector Machines (SVMs) regression algorithm is used to obtain an acceptable model of a chaotic system to be controlled. SVM-Based GPC exploits some advantages of the SVM approach and utilizes the obtained model in the GPC structure. Simulation results on several chaotic systems indicate that the SVM-Based GPC scheme provides an excellent performance with respect to local stabilization of the target (an originally unstable equilibrium point). Furthermore, it somewhat performs targeting, the task of steering the chaotic system towards the target by applying relatively small parameter perturbations. It considerably reduces the waiting time until the system, starting from random initial conditions, enters the local control region, a small neighborhood of the chosen target. Moreover, SVM-Based GPC maintains its performance in the case that the measured output is corrupted by an additive Gaussian noise.

  • Tree Search Detection Based on LLR Using M Algorithm in MC-CDMA Systems

    Yoshihito MORISHIGE  Masahiro FUJII  Makoto ITAMI  Kohji ITOH  

     
    PAPER-Spread Spectrum

      Vol:
    E89-A No:10
      Page(s):
    2622-2629

    In this paper, we propose a new multiuser detection scheme using Maximum Likelihood (ML) criterion and the M algorithm for Multi Carrier (MC)-Code Division Multiple Access (CDMA) systems in the down-link channel. We first describe an implementation of ML detection separating In- and Quadrature-phase components and using well-known linear filters. In the proposed algorithm, we produce hypothesis symbol vectors in a tree structure by partly changing the sub-optimum hard decisions based on the linear filter output. At each stage, we adopt the best M likely paths with respect to the true log likelihood or distance function as survivors. We determine the symbol vector which minimizes the distance function at the final stage. Although the complexity of ML detector is exponentially increasing as a function of the number of users, the proposed scheme requires by far less complexity. We demonstrate that the proposed scheme achieves equivalent Bit Error Rate (BER) performance with lower complexity in comparison with ML detector by computer simulations. Moreover we compare the proposed detection scheme with QRD-M algorithm which is based on QR decomposition combined with M algorithm.

  • A Practical Biosignal-Based Human Interface Applicable to the Assistive Systems for People with Motor Impairment

    Ki-Hong KIM  Jae-Kwon YOO  Hong Kee KIM  Wookho SON  Soo-Young LEE  

     
    PAPER-Rehabilitation Engineering and Assistive Technology

      Vol:
    E89-D No:10
      Page(s):
    2644-2652

    An alternative human interface enabling the handicapped with severe motor disabilities to control an assistive system is presented. Since this interface relies on the biosignals originating from the contraction of muscles on the face during particular movements, even individuals with a paralyzed limb can use it with ease. For real-world application, a dedicated hardware module employing a general-purpose DSP was implemented and its validity tested on an electrically powered wheelchair. Furthermore, an additional attempt to reduce error rates to a minimum for stable operation was also made based on the entropy information inherent in the signals during the classification phase. In the experiments in which 11 subjects participated, it was found most of them could control the target system at their own will, and thus the proposed interface could be considered a potential alternative for the interaction of the severely handicapped with electronic systems.

  • Investigation of Cell-Gap Defects Using Gap Simulation

    Seiko ICHIKAWA  Katsumi SUEKUNI  Masatoshi ISHIMARU  Hiroyuki NAKATANI  Takao UNATE  Akira NAKASUGA  

     
    INVITED PAPER

      Vol:
    E89-C No:10
      Page(s):
    1390-1394

    Large liquid crystal display (LCD) panels have several cell-gap problems. For example, gravity defects are observed as thicker cell-gap areas at the bottom of an LCD panel at a high temperature, and cold-bubble defects are observed as bubbles in an LCD panel at a low temperature. We have developed a gap simulation to investigate these problems. The calculation was carried out for both column and ball spacers. It was shown that gap defects can be substantially reduced using ball spacers.

  • A New Evolutionary Approach for the Optimal Communication Spanning Tree Problem

    Sang-Moon SOAK  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E89-A No:10
      Page(s):
    2882-2893

    This paper deals with the Optimum Communication Spanning Tree Problem (OCST) which is well known as an NP-hard problem. For solving the problem, we uses an evolutionary approach. This paper presents a new effective tree encoding and proposes a tree construction routine (TCR) to generate a tree from the encoding. The basic principle is to break a cycle. We also propose a new crossover operator that focuses on the inheritance of parental information and the use of network information. Consequently, we confirm that the proposed algorithm is superior to other algorithms applied to the OCST problem or other tree problems. Moreover, our method can find a better solution than the solution which was previously known as the best solution. In addition, we analyzed the locality and diversity property of encoding and observed that the proposed method has high locality and at the same time it preserves population diversity for many generations. Finally, we conclude that these properties are the main reasons why the proposed method outperforms the other encodings.

  • Image-Dependent Code Optimization to Improve Motion Picture Quality of Plasma Displays

    Jong Suk LEE  Bong Seok KANG  Young Hwan KIM  

     
    LETTER

      Vol:
    E89-C No:10
      Page(s):
    1400-1405

    This letter proposes an efficient method to find the optimum subfield code, which minimizes the visual artifacts on the motion pictures of the plasma display panel (PDP). Existing codes were constructed to reduce dynamic false contour (DFC) only, and they are fixed codes used for every image. In contrast, the proposed method aims to minimize the total artifacts by DFC and halftone noise (HN), and it finds the best code for a given image, dynamically. First, this letter presents the novel models to estimate the effect of DFC and HN for given codewords and a given image. Then, it presents an efficient method that finds the optimum code for a given image using the well-known shortest-path algorithm. Experimental results, using 459 HDTV images, illustrated that the proposed approach improved the average PSNR by 0.713 dB and 7.004 dB in DFC and HN, respectively, when compared with Gravity Centre Code [1].

  • Detecting Distributed Denial-of-Service Attacks by Analyzing TCP SYN Packets Statistically

    Yuichi OHSITA  Shingo ATA  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E89-B No:10
      Page(s):
    2868-2877

    Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services will not be interrupted, we need faster and more accurate defense mechanisms against malicious traffic, especially SYN Floods. One of the problems in detecting SYN Flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from those of SYN Flood attack. Moreover, since the rate of normal network traffic may vary, we cannot use an explicit threshold of SYN arrival rates to detect SYN Flood traffic. In this paper we introduce a mechanism for detecting SYN Flood traffic more accurately by taking into consideration the time variation of arrival traffic. We first investigate the statistics of the arrival rates of both normal TCP SYN packets and SYN Flood attack packets. We then describe our new detection mechanism based on the statistics of SYN arrival rates. Our analytical results show that the arrival rate of normal TCP SYN packets can be modeled by a normal distribution and that our proposed mechanism can detect SYN Flood traffic quickly and accurately regardless of time variance of the traffic.

  • A Hardware Algorithm for Integer Division Using the SD2 Representation

    Naofumi TAKAGI  Shunsuke KADOWAKI  Kazuyoshi TAKAGI  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E89-A No:10
      Page(s):
    2874-2881

    A hardware algorithm for integer division is proposed. It is based on the radix-2 non-restoring division algorithm. Fast computation is achieved by the use of the radix-2 signed-digit (SD2) representation. The algorithm does not require normalization of the divisor, and hence, does not require an area-consuming leading-one (or zero) detection nor shifts of variable-amount. Combinational (unfolded) implementation of the algorithm yields a regularly structured array divider, and sequential implementation yields compact dividers.

11181-11200hit(20498hit)