The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

13801-13820hit(20498hit)

  • Autonomous Step-by-Step System Construction Technique Based on Assurance Evaluation

    Kazuo KERA  Keisuke BEKKI  Kinji MORI  

     
    PAPER-Reliability and Availability

      Vol:
    E86-D No:10
      Page(s):
    2145-2153

    The recent real time systems have the needs of system expandability with heterogeneous functions and operations. High assurance system is very important for such systems. In order to realize the high assurance system, we research the autonomous step-by-step construction technique based on assurance evaluation. In this paper we propose the average functional reliability as the best index to indicate the assurance performance for system construction. We also propose the autonomous step-by-step construction technique to decide the construction sequence to maximize the assurance performance.

  • Stability and Adaptability of Autonomous Decentralized Flow Control in High-Speed Networks

    Chisa TAKANO  Masaki AIDA  

     
    PAPER-Network Control and Management

      Vol:
    E86-B No:10
      Page(s):
    2882-2890

    This paper focuses on flow control in high-speed networks. Each node in a network handles its local traffic flow on the basis of only the information it is aware of, but it is preferable that the decision-making of each node leads to high performance of the whole network. To this end, we investigate the relationship between the flow control mechanism of each node and network performance. We consider the situation in which the capacity of a link in the network is changed but individual nodes are not aware of this. Then we investigate the stability and adaptability of the network performance, and discuss an appropriate flow control model on the basis of simulation results.

  • Selection Method of Test Patterns in Soft-Decision Iterative Bounded Distance Decoding Algorithms

    Hitoshi TOKUSHIGE  Takuya KOUMOTO  Marc P.C. FOSSORIER  Tadao KASAMI  

     
    PAPER-Coding Theory

      Vol:
    E86-A No:10
      Page(s):
    2445-2451

    We consider a soft-decision iterative bounded distance decoding algorithm for binary linear block codes. In the decoding algorithm, bounded distance decodings are carried out with respect to successive input words, called the search centers. A search center is the sum of the hard-decision sequence of a received sequence and a sequence in a set of test patterns which are generated beforehand. This set of test patterns has influence on the error performance of the decoding algorithms as simulation results show. In this paper, we propose a construction method of a set of candidate test patterns and a selection method of test patterns based on an introduced measure of effectiveness of test patterns. For several BCH codes of lengths 127, 255 and 511, we show the effectiveness of the proposed method by simulation.

  • Implementation and Performance of Analog Quadrature Modulation Error Compensator for Digital Linearized Power Amplifier

    Jin-Seob MOON  Joo-Seong JEON  

     
    PAPER-Communication Devices/Circuits

      Vol:
    E86-B No:10
      Page(s):
    2975-2981

    Direct conversion techniques commonly used for the transmitter in basestation rely on analog performance of the quadrature modulator. In this paper, simulated results show that imperfections in analog quadrature modulation--gain and phase error and dc offset--have a devastating effect on digital predistortion for power amplifier linearization circuits. We construct compensation circuit to remove these errors, and conduct an experiment. The imbalance errors are compensated by using the output spectrum of modulator. The image spurious (-56.74 dBm) with gain, phase and the dc offset spurious (-43.83 dBm) are reduced to -93.21 dBm and -93.56 dBm, respectively. These experimental results illustrate that modulation errors can be eliminated.

  • The Theory of Software Reliability Corroboration

    Bojan CUKIC  Erdogan GUNEL  Harshinder SINGH  Lan GUO  

     
    PAPER-Testing

      Vol:
    E86-D No:10
      Page(s):
    2121-2129

    Software certification is a notoriously difficult problem. From software reliability engineering perspective, certification process must provide evidence that the program meets or exceeds the required level of reliability. When certifying the reliability of a high assurance system very few, if any, failures are observed by testing. In statistical estimation theory the probability of an event is estimated by determining the proportion of the times it occurs in a fixed number of trials. In absence of failures, the number of required certification tests becomes impractically large. We suggest that subjective reliability estimation from the development lifecycle, based on observed behavior or the reflection of one's belief in the system quality, be included in certification. In statistical terms, we hypothesize that a system failure occurs with the hypothesized probability. Presumed reliability needs to be corroborated by statistical testing during the reliability certification phase. As evidence relevant to the hypothesis increases, we change the degree of belief in the hypothesis. Depending on the corroboration evidence, the system is either certified or rejected. The advantage of the proposed theory is an economically acceptable number of required system certification tests, even for high assurance systems so far considered impossible to certify.

  • Railways and Space -- Their Assurance System

    Shuichiro YAMANOUCHI  

     
    INVITED PAPER

      Vol:
    E86-D No:10
      Page(s):
    2063-2069

    Assurance improvement is the most challenging task both in railway and space areas, even though their required technologies are different. It can be said that the railways have been achieving the extremely high assurance level through their long history and experience, while the space area has not accumulated enough experience in addition to their requirement of highly advanced technology. As a result, the latter places more emphasis on theoretical analyses for ensuring the assurance. This paper introduces the two different approaches of railway and space areas toward assurance, and compares the two methods.

  • Assuring Communications by Balancing Cell Load in Cellular Network

    Xiaoxin WU  Biswanath MUKHERJEE  S.-H. Gary CHAN  Bharat BHARGAVA  

     
    PAPER-Mobile Ad Hoc Networks

      Vol:
    E86-B No:10
      Page(s):
    2912-2921

    In a fixed-channel-allocation (FCA) cellular network, a fixed number of channels are assigned to each cell. However, under this scheme, the channel usage may not be efficient because of the variability in the offered traffic. Different approaches such as channel borrowing (CB) and dynamic channel allocation (DCA) have been proposed to accommodate variable traffic. Our work expands on the CB scheme and proposes a new channel-allocation scheme--called mobile-assisted connection-admission (MACA) algorithm--to achieve load balancing in a cellular network, so as to assure network communication. In this scheme, some special channels are used to directly connect mobile units from different cells; thus, a mobile unit, which is unable to connect to its own base station because it is in a heavily-loaded "hot" cell, may be able to get connected to its neighboring lightly-loaded cold cell's base station through a two-hop link. Research results show that MACA can greatly improve the performance of a cellular network by reducing blocking probabilities.

  • High-Assurance Video Conference System over the Internet

    Masayuki ARAI  Hitoshi KUROSU  Mamoru OHARA  Ryo SUZUKI  Satoshi FUKUMOTO  Kazuhiko IWASAKI  

     
    PAPER-Network Systems and Applications

      Vol:
    E86-B No:10
      Page(s):
    2940-2947

    In video conference systems over the Internet, audio and video data are often lost due to UDP packet losses, resulting in degradation of assurance. In this paper we describe a high-assurance video conference system applying the following two techniques: (1) packet loss recovery using convolutional codes, which improves the assurance of communication; and (2) Xcast, a multicast scheme that is designed for relatively small groups, reducing the bandwidth required for a multi-point conference. We added these functions to a GateKeeper (GK), a device used in conventional conference systems. Encoding/decoding and Xcast routing were then implemented as the upper layer for the UDP. We examined the functions of the system over the Internet in a multi-point conference between three sites around Tokyo, as well as a conference between Tokyo and Korea. We also investigated the effectiveness of the proposed system in experiments using an Internet simulator. Experimental results showed that the quality of received picture was improved in comparison with the case where no encoding schemes were applied.

  • REX: A Reconfigurable Experimental System for Evaluating Parallel Computer Systems

    Yuetsu KODAMA  Toshihiro KATASHITA  Kenji SAYANO  

     
    PAPER

      Vol:
    E86-D No:10
      Page(s):
    2016-2024

    REX is a reconfigurable experimental system for evaluating and developing parallel computer systems. It consists of large-scale FPGAs, and enables the systems to be reconfigured from their processors to the network topology in order to support their evaluation and development. We evaluated REX using several implementations of parallel computer systems, and showed that it had enough scalability of gates, memory throughput and network throughput. We also showed that REX was an effective tool because of its emulation speed and reconfigurability to develop systems.

  • Over 40-Gbit/s InP HEMT ICs for Optical Communication Systems

    Toshihide SUZUKI  Yasuhiro NAKASHA  Hideki KANO  Masaru SATO  Satoshi MASUDA  Ken SAWADA  Kozo MAKIYAMA  Tsuyoshi TAKAHASHI  Tatsuya HIROSE  Naoki HARA  Masahiko TAKIGAWA  

     
    INVITED PAPER

      Vol:
    E86-C No:10
      Page(s):
    1916-1922

    In this paper, we describe the operation of circuits capable of more than 40-Gbit/s that we have developed using InP HEMT technology. For example, we succeeded in obtaining 43-Gbit/s operation for a full-rate 4:1Multiplier (MUX), 50-Gbit/s operation for a Demultiplexer (DEMUX), 50-Gbit/s operation for a D-type flip-flop (D-FF), and a preamplifier with a bandwidth of 40 GHz. In addition, the achievement of 90-Gbit/s operation for a 2:1MUX and a distributed amplifier with over 110-GHz bandwidth indicates that InP HEMT technology is promising for system operations of over 100 Gbit/s. To achieve these results, we also developed several design techniques to improve frequency response above 80 GHz including a symmetric and separated layout of differential elements in the basic SCFL gate and inverted microstrip.

  • Automated Edge Detection by a Fuzzy Morphological Gradient

    Sathit INTAJAG  Kitti PAITHOONWATANAKIJ  

     
    PAPER-Image

      Vol:
    E86-A No:10
      Page(s):
    2678-2689

    Edge detection has been an essential step in image processing, and there has been much work undertaken to date. This paper inspects a fuzzy mathematical morphology in order to reach a higher-level of edge-image processing. The proposed scheme uses a fuzzy morphological gradient to detect object boundaries, when the boundaries are roughly defined as a curve or a surface separating homogeneous regions. The automatic edge detection algorithm consists of two major steps. First, a new version of anisotropic diffusion is proposed for edge detection and image restoration. All improvements of the new version use fuzzy mathematical morphology to preserve the edge accuracy and to restore the images to homogeneity. Second, the fuzzy morphological gradient operation detects the step edges between the homogeneous regions as object boundaries. This operation uses geometrical characteristics contained in the structuring element in order to extract the edge features in the set of edgeness, a set consisting of the quality values of the edge pixels. This set is prepared with fuzzy logic for decision and selection of authentic edge pixels. For experimental results, the proposed method has been tested successfully with both synthetic and real pictures.

  • A Novel Pt-AlGaN/GaN Heterostructure Schottky Diode Gas Sensor on Si

    Guangyuan ZHAO  William SUTTON  Dimitris PAVLIDIS  Edwin L. PINER  Johannes SCHWANK  Seth HUBBARD  

     
    PAPER

      Vol:
    E86-C No:10
      Page(s):
    2027-2031

    Schottky gas sensors of CO were fabricated using high quality AlGaN/GaN/Si heterostructures. The CO sensors show good sensitivity in the temperature range of 250 to 300 (530%, at 160 ppm CO in N2) and fast response comparable with SnO2 sensors. A two-region linear regime was observed for the dependence of sensitivity on CO concentration. GaN sensors on Si substrate offer the possibility of integration with Si based electronics. The gas sensors show slow response with time, the change of material properties possibly in the presence of large thermal stress.

  • A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized c-Secure CRT Code

    Hajime WATANABE  Takashi KITAGAWA  

     
    PAPER-Information Security

      Vol:
    E86-A No:10
      Page(s):
    2589-2595

    In digital content distribution systems, digital watermarking (fingerprinting) technique provides a good solution to avoid illegal copying and has been studied very actively. c-Secure CRT Code is one of the most practical ID coding schemes for such fingerprinting since it is secure against collusion attacks and also secure even though random errors are furthermore added. But its usefulness is decreased in the case that random errors are added because the code length will be longer. In this paper, a new collusion attack with addition of random errors is introduced and show that c-Secure CRT Code is not sufficiently secure against the attack at first. Next, we analyze the problem and propose a new ID coding scheme, Randomized c-Secure CRT Code which overcomes the problem. As a result, this new scheme improves the error tracing probabilities against the proposed attack drastically. This new scheme has the same code length, so this is one of the most responsible fingerprinting codes for content distribution systems.

  • Conditional Lempel-Ziv Complexity and Its Application to Source Coding Theorem with Side Information

    Tomohiko UYEMATSU  Shigeaki KUZUOKA  

     
    LETTER-Source Coding/Image Processing

      Vol:
    E86-A No:10
      Page(s):
    2615-2617

    This paper proposes the conditional LZ complexity and analyzes its property. Especially, we show an inequality corresponding to Ziv's inequality concerning a distinct parsing of a pair of sequences. Further, as a byproduct of the result, we show a simple proof of the asymptotical optimality of Ziv's universal source coding algorithm with side information.

  • Testing for High Assurance System by FSM

    Juichi TAKAHASHI  Yoshiaki KAKUDA  

     
    PAPER-Testing

      Vol:
    E86-D No:10
      Page(s):
    2114-2120

    Software and its systems are more complicated than a decade ago, and the systems are used for mission critical business, flight control and so on which often require high assurance systems. In this circumstance, we often use black-box testing. The question now arises that black-box testing does not generate numerical value of testing result but empirical. Thus, in this research, we develop and enhance FSM (Finite State Machine) testing method which can produce code coverage rate as numerical value. Our developed FSM testing by code coverage focuses on not only software system behavior but also data. We found higher code coverage rate, which indicates quality of system, by this method than existing black box testing method.

  • Growth of 100-mm-Diameter AlGaN/GaN Heterostructures on Sapphire Substrates by MOVPE

    Makoto MIYOSHI  Masahiro SAKAI  Hiroyasu ISHIKAWA  Takashi EGAWA  Takashi JIMBO  Mitsuhiro TANAKA  Osamu ODA  

     
    PAPER

      Vol:
    E86-C No:10
      Page(s):
    2077-2081

    For the mass production of GaN-based electronic devices, growth of AlGaN/GaN heterostructures on substrates larger than 100 mm in diameter is indispensable. In this study, we demonstrate the growth of 100-mm-diameter Al0.26Ga0.74N/GaN heterostructures on sapphire substrates by metalorganic vapor phase epitaxy (MOVPE). The obtained films have specular surfaces, good crystal quality and good uniformity of alloy composition across the entire 100-mm-diameter epitaxial wafer. The bowing value of the 100-mm-diameter epitaxial wafer on c-face sapphire substrates is about 40 µm. This bowing value seems to be preferable for electronic device fabrication processes. These epitaxial wafers show good electrical properties.

  • All-Optical Interconnection Device with Photorefractive Semi-Linear Resonator

    Satoshi HONMA  Atsushi OKAMOTO  

     
    PAPER-Optoelectronics

      Vol:
    E86-C No:10
      Page(s):
    2103-2110

    We propose and describe a free-space optical interconnection device with a photorefractive semi-linear resonator. The hologram in the photorefractive crystal is, in general, volatile and the erasing of it coincides with the diffraction of the signal beam. Therefore we have to reform the hologram again after several transmissions of the data or use some fixing techniques such as thermal fixing and electrical fixing. In our interconnection device, the hologram is enhanced by the feedback beam that is a part of the input signal divided by the beam splitter within semi-linear resonator, therefore the sustentation time of the connection can be extended. We explain the sustentation mechanism and investigate the optimum reflectivity of the beam splitters, which determine the feedback rate of the input signal, within feedback circuit for the high output conversion efficiency. We also analyze the coupling strength threshold for sustentation of the connection. We give a basic experiment on 33 interconnection by using BaTiO3 crystal and Ar+ laser whose wavelength is 514 [nm]. We show that the connections are held for long time without the continuous illumination of the control beam.

  • A Zone-Based Data Placement and Retrieval Scheme for Video-on-Demand Applications Regardless of Video Popularity

    Ming-Jen CHEN  Chwan-Chia WU  

     
    PAPER-Multimedia Systems

      Vol:
    E86-B No:10
      Page(s):
    3094-3102

    This paper presents a novel data placement and retrieval scheme for video-on-demand systems. In particular, a zone-based data placement scheme is employed to reduce the average seek time of the disk array storage system and thus increase the disk access bandwidth to allow the video server provide more services of video programs concurrently. Furthermore, due to the inherent nature of video access, a popular program always requires more accesses and therefore occupies more disk I/O bandwidth as request for serving such program increases. A new retrieval strategy is proposed to maintain a single copy of each video program disregarding the popularity of the video programs, and to achieve maximum I/O throughput of the video server.

  • A New Provably Secure Signature Scheme

    Chik-How TAN  Xun YI  Chee-Kheong SIEW  

     
    LETTER-Information Security

      Vol:
    E86-A No:10
      Page(s):
    2633-2635

    In this paper, we construct a new signature scheme which is provably secure against adaptive chosen message attack in the standard model under the strong RSA assumption. The proposed scheme is different from Cramer-Shoup scheme and Camenisch-Lysyanskaya scheme and is more efficient than them. The tradeoff of the proposed scheme is a slight increase of the secret key.

  • Two-Dimensional Device Simulation of 0.05 µm-Gate AlGaN/GaN HEMT

    Yoshifumi KAWAKAMI  Naohiro KUZE  Jin-Ping AO  Yasuo OHNO  

     
    PAPER

      Vol:
    E86-C No:10
      Page(s):
    2039-2042

    DC and RF performances of AlGaN/GaN HEMTs are simulated using a two-dimensional device simulator with the material parameters of GaN and AlGaN. The cut-off frequency is estimated as 205 GHz at the gate length of 0.05 µm and the drain breakdown voltage at this gate length is over 10 V. The values are satisfactory for millimeter wavelength power applications. The use of thin AlGaN layers has key importance to alleviate gate parasitic capacitance effects at this gate length.

13801-13820hit(20498hit)