This letter describes unequal-power transmission for multiple-input and multiple-output (MIMO) systems with a parallel interference canceller (PIC) applied to a maximum likelihood detector (MLD) or complexity-reduced MLD at the receiver. Unequal-power transmission reduces the possibility that all substreams are incorrectly decoded. Canceling the correctly decoded substreams enables more reliable detection in the next stage. The simulation results demonstrated that unequal-power transmission improves the transmission performance of the PIC applied to MLDs or complexity-reduced MLDs, compared with equal-power transmission cases.
Yutaka MURAKAMI Kiyotaka KOBAYASHI Takashi FUKAGAWA Masayuki ORIHASHI
We propose a likelihood detection scheme that utilizes ordering and decision of partial bits in MIMO spatial multiplexing systems. We compute BER performance of the proposed detection scheme under Rayleigh fading channels in a 33 MIMO spatial multiplexing system and compare it with BER performance using MLD only and detection utilizing ZF or MMSE only. In addition, the computational complexity of the proposed detection scheme is compared with that of MLD and detection utilizing ZF or MMSE. The results of our investigation show that the proposed detection is a scheme achieves both good BER performance and low computational complexity.
Yunjian JIA Quoc Tuan TRAN Shinsuke HARA
We have proposed two space division multiple access (SDMA) approaches for OFDM signals: "Virtual Subcarrier Assignment (VISA)" and "Preamble Subcarrier Assignment (PASA)," both of which can enhance the system capacity without significant change of transmitter/receiver structures for already-existing OFDM-based standards such as IEEE802.11a. In order to investigate the performance of the proposed approaches in real wireless scenarios, we conducted a measurement campaign to obtain real channel state data at 5-GHz band in an indoor environment. Using the measured channel data, we can make the performance evaluation realistic. In this paper, after the brief overview of the two proposed SDMA approaches, we describe our measurement campaign in detail. Furthermore, we evaluate the performance of VISA-based system and PASA-based system by computer simulations using the measured channel state data and present a comparative study on the performance of the two proposed SDMA approaches in the realistic wireless environment.
Peng YUE Zeng-Ji LIU Bin ZHANG
In this paper, based on Equivalent Active Flow, we propose a novel technique called Approximate Fairness Dropping, which is able to approximate fairness by containing misbehaving flows' access queue opportunity with low time/space complexity. Unlike most of the existing Active Queue Management schemes (e.g., RED, BLUE, CHOKE), Approximate Fairness Dropping does not drop the packets whose arriving rate is within the maximum admitted rate, so it protects the well-behaving flows against misbehaving ones, moreover, improves the throughput and decreases the queuing delay. Our simulations and analyses demonstrate that this new technique outperforms the existing schemes and closely approximates the "ideal" case, where full state information is needed.
Hirohisa AMAN Naomi MOCHIDUKI Hiroyuki YAMADA
In software development, comprehensive software reviews and testings are important activities to preserve high quality and to control maintenance cost. However it would be actually difficult to perform comprehensive software reviews and testings because of a lot of components, a lack of manpower and other realistic restrictions. To improve performances of reviews and testings in object-oriented software, this paper proposes a novel model for detecting cost-prone classes; the model is based on Mahalanobis-Taguchi method--an extended statistical discriminant method merging with a pattern recognition approach. Experimental results using a lot of Java software are provided to statistically demonstrate that the proposed model has a high ability for detecting cost-prone classes.
Shin-ichiro MATSUZAWA Kazuo SATO Shuji ASO Atushi SANADA Hiroshi KUBO
A planar composite right/left-handed leaky wave antenna which operates at W-band is fabricated and its backward to forward beam scanning operation including broadside direction is confirmed experimentally. The scanning angle from 61 to 114 degrees with a frequency scanning range of 76 to 79 GHz is achieved.
Yu LIU Satoshi KOMATSU Masahiro FUJITA
Recently, system level design languages (SLDL), which can describe both hardware and software aspects of the design, are receiving attention. Mixed-signal extensions of SLDL enable current discrete-oriented SLDLs to describe and simulate not only digital systems but also digital-analog mixed-signal systems. The synchronization between discrete and continuous behaviors is widely regarded as a critical part in the extensions. In this paper, we present an event-driven synchronization mechanism for both timed and untimed system level designs through which discrete and continuous behaviors are synchronized via AD events and DA events. We also demonstrate how the synchronization mechanism can be incorporated into the kernel of SLDL, such as SpecC. In the extended kernel, a new simulation cycle, the AMS cycle, is introduced. Three case studies show that the extended SpecC-based system level design environment using our synchronization mechanism works well with timed/untimed mixed-signal system level description.
Fanxin ZENG Zhenyu ZHANG Lijia GE
For various applications in image, communications and signal processing, two-dimensional (2-D) generalized orthogonal (GO) sequences, that is, 2-D sequences with zero correlation zone (ZCZ) and 2-D complementary orthogonal (CO) sequences with ZCZ, are widely investigated. New lower bounds for 2-D GO sequences, based on matrix theory on rank, are derived and presented, some examples that attain these lower bounds are given. As a direct application to our results, upper bound on family size of 2-D mutually complementary orthogonal (MCO) codes defined by Luke [9] is proposed.
In this paper, an entropy based associative memory model will be proposed and applied to memory retrievals with an orthogonal learning model to compare with the conventional model based on the quadratic Lyapunov functional to be minimized. In the present approach, the updating dynamics will be constructed on the basis of the entropy minimization strategy which may be reduced asymptotically to the above-mentioned autocorrelation dynamics as a special case. From numerical results, it will be found that the presently proposed novel approach realizes twice of the memory capacity in comparison with the autocorrelation based dynamics such as associatron.
Yasutaka IGARASHI Hiroyuki YASHIMA
We theoretically analyze the performance of coherent ultrashort light pulse code-division multiple-access (CDMA) communication systems with a nonlinear optical thresholder. The coherent ultrashort light pulse CDMA is a promising system for an optical local area network (LAN) due to its advantages of asynchronous transmission, high information security, multiple access capability, and optical processing. The nonlinear optical thresholder is based on frequency chirping induced by self-phase modulation (SPM) in optical fiber, and discriminates an ultrashort pulse from multiple access interference (MAI) with picosecond duration. The numerical results show that the thermal noise caused in a photodetector dominates the bit error rate (BER). BER decreases as the fiber length in the nonlinear thresholder and the photocurrent difference in the photodetector increase. Using the nonlinear optical thresholder allows for the response time of the photodetector to be at least 100 times the duration of the ultrashort pulses. We also show that the optimum cut-off frequency at the nonlinear thresholder to achieve the minimum BER increases with fiber length, the total number of users, and the load resistance in the photodetector.
Tung-Sheng CHIANG Chian-Song CHIU Peter LIU
This paper proposes a robust fuzzy integral controller for output regulating a class of affine nonlinear systems subject to a bias reference to the origin. First, a common biased fuzzy model is introduced for a class of continuous/discrete-time affine nonlinear systems, such as dc-dc converters, robotic systems. Then, combining an integrator and parallel distributed compensators, the fuzzy integral regulator achieves an asymptotic regulation. Moreover, when considering disturbances or unstructured certainties, a virtual reference model is presented and provides a robust gain design via LMI techniques. In this case, H∞ performances is guaranteed. Note that the information regarding the operational point and bias terms are not required during the controller implementation. Thus, the controller can be applied to a multi-task regulation. Finally, three numerical simulations show the expected results.
Kazunori SHIMIZU Tatsuyuki ISHIKAWA Nozomu TOGAWA Takeshi IKENAGA Satoshi GOTO
In this paper, we propose a partially-parallel LDPC decoder which achieves a high-efficiency message-passing schedule. The proposed LDPC decoder is characterized as follows: (i) The column operations follow the row operations in a pipelined architecture to ensure that the row and column operations are performed concurrently. (ii) The proposed parallel pipelined bit functional unit enables the column operation module to compute every message in each bit node which is updated by the row operations. These column operations can be performed without extending the single iterative decoding delay when the row and column operations are performed concurrently. Therefore, the proposed decoder performs the column operations more frequently in a single iterative decoding, and achieves a high-efficiency message-passing schedule within the limited decoding delay time. Hardware implementation on an FPGA and simulation results show that the proposed partially-parallel LDPC decoder improves the decoding throughput and bit error performance with a small hardware overhead.
In recent years, digital watermarking has become a popular technique for labeling digital images by hiding secret information which can protect the copyright. The goal of this paper is to develop a DCT-based watermarking algorithm for low power and high performance. Our energy-efficient technique focuses on reducing computation required on block-based permutation. Instead of using spacial coefficients proposed by Hsu and Wu's algorithm [1], we use DCT coefficients to pair blocks directly. The approach is implemented by C language and estimated power dissipation using Wattch toolset. The experimental results show that our approach not only reduces 99% energy consumption of pairing mechanism, but also increase the PSNR by 0.414 db for the best case. Moreover, the proposed approach is robust to a variety of signal distortions, such as JPEG, image cropping, sharpening, blurring, and intensity adjusting.
Jaehak CHUNG Seung Hoon NAM Chan-Soo HWANG
A differential detection Space-Time Block Code (STBC) is proposed with a high transmission rate, allowing a trade-off between diversity and multiplexing gain with low encoding and decoding complexity. The proposed method offers multiplexing gain by doubling the transmission rate for three and four transmission antennas. Computer simulations demonstrate that the proposed STBC can achieve a 5.8 dB Eb/N0 gain at BER = 10-3 compared with a conventional differential detection STBC for four transmission and two receiving antennas.
Yoshinori ROKUGO Kazushi TAHARA Joji MAEDA Susumu ITOH
When digital broadcasting services are provided through cable television (CATV) networks, viewers watching interactive programs such as quizzes or auctions may respond to the program within a short period. If these responses are transmitted in the upstream channel of the CATV networks using TCP/IP, they will result in burst traffic. The numerous TCP connections will trigger congestion in the upstream transmission facilities and will cause a significant delay in conventional Internet services such as web-browsing. The present paper proposes a new method of controlling the CATV upstream channel to avoid such congestion. We introduce class-based queues at each cable TV station, in which each service class is related to a type of interactive service. The status of the queue is relayed to the cable modems of subscribers using a CATV-specific MAC protocol. This queue-status information is used to suspend further initiation of TCP connections at cable modems. As a result, the TCP connections will be arbitrated in the CATV network, while the delay of the response transmission is traded for smoothing of the burst traffic. We numerically evaluate the effect of the proposed method using the time distribution of responses to an actual quiz program. The results show that the proposed method successfully suppresses interference of the burst traffic with conventional best-effort services.
Daisuke TAKASE Tomoaki OHTSUKI
We propose optical wireless multiple-input multiple-output (OMIMO) communications to achieve high speed transmission with a compact transmitter and receiver. In OMIMO, by using zero forcing (ZF), minimum mean square error (MMSE) or other detection techniques, we can eliminate the interference from the other optical transmit antennas. In this paper, we employ ZF as the detection technique. We analyze the signal-to-interference-plus-noise ratio (SINR) and the bit error rate (BER) of the proposed OMIMO with a linear array and a square array of optical transmit and receive antennas, where we employ subcarrier multiplexing (SCM) for each optical transmit antenna. Note that the proposed OMIMO is applicable to other arrangements of optical transmit and receive antennas. We show that the proposed OMIMO system can realize MIMO multiplexing and achieve high speed transmission by correctly aligning the optical transmit and receive antennas and the transmitter semiangle.
Isao NAKANISHI Hiroyuki SAKAMOTO Naoto NISHIGUCHI Yoshio ITOH Yutaka FUKUI
In order to reduce the computational complexity of the DWT domain on-line signature verification, the authors propose to utilize the pen-movement vector as an input parameter. Experimental results indicate that the verification rate obtained using the pen-movement vector parameter is equivalent to that obtained by the conventional method, although the computational complexity of the proposed method is approximately half that of the conventional method.
Temperature-tracking is becoming of paramount importance in modern electronic design automation tools. In this paper, we present a deterministic thermal placement algorithm for standard cell based layout which can lead to a smooth temperature distribution over the die. It is mainly based on Fiduccia-Mattheyses partition scheme and a former substrate thermal model that can convert the known temperature constraints into the corresponding power distribution constraints. Moreover, a kind of force-directed heuristic based on cells' power consumption is introduced in the above process. Experimental results demonstrate a comparatively uniform temperature distribution and show a reduction of the maximal temperature on the die.
ChoonKi AHN SooHee HAN WookHyun KWON
This letter presents robustness bounds (RBs) for receding horizon controls (RHCs) of uncertain systems. The proposed RBs are obtained easily by solving convex problems represented by linear matrix inequalities (LMIs). We show, by numerical examples, that the RHCs can guarantee robust stabilization for a larger class of uncertain systems than conventional linear quadratic regulators (LQRs).
Moon Ho LEE Valery KORZHIK Guillermo MORALES-LUNA Sergei LUSSE Evgeny KURBATOV
We consider a watermark application to assist in the integrity maintenance and verification of the associated images. There is a great benefit in using WM in the context of authentication since it does not require any additional storage space for supplementary metadata, in contrast with cryptographic signatures, for instance. However there is a fundamental problem in the case of exact authentication: How to embed a signature into a cover message in such a way that it would be possible to restore the watermarked cover image into its original state without any error? There are different approaches to solve this problem. We use the watermarking method consisting of modulo addition of a mark and investigate it in detail. Our contribution lies in investigating different modified techniques of both watermark embedding and detection in order to provide the best reliability of watermark authentication. The simulation results for different types of embedders and detectors in combination with the pictures of watermarked images are given.