The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

18781-18800hit(20498hit)

  • A Constructing Method of Functional Model by Integrated Learning from Examples of Software Modification

    Hiroyuki YAMADA  Tetsuo KOBASHI  Tsunehiro AIBARA  

     
    PAPER-Models

      Vol:
    E78-D No:9
      Page(s):
    1133-1141

    One approach to develop software efficiently is to reuse existing software by modifying a part of it. However, modifying software will often introduce unexpected side effects into other parts of it. As a result, it costs much time and care to modify the software. So, in order to modify software efficiently, we have proposed a functional model to represent information about side effects caused by modification and a model based supporting system for modifying software. So far, however, an expert software developer must describe the entire functional model of the target software through the analysis of practical modifying processes. This will be an unnecessary burden on him. Moreover, the larger target software becomes, the harder the model construction becomes. Therefore, an automatic constructing method of the functional model is needed in order to solve this problem. So, this paper considers a method of acquiring useful interaction information by learning from training examples of modification. However, in our application domain, it seems that it is impossible to make complete domain theory and to prepare a large number or training examples in advance. Therefore, our learning method involves an integration of explanation-based learning (EBL) from positive examples of modification generated by the user and Similarity-based learning (SBL) from positive or negative examples generated by the user and the learning system. As a result, our method can acquire valid knowledge about the interaction from not so many examples under incomplete theory. Then, this paper presents a constructing method, in which our proposed learning method is incorporated, of a functional model. Finally, this paper demonstrates construction of the functional model in the domain of an event-driven queueing simulation program according to our learning method.

  • Two-Dimensional Discrete Orthogonal Transforms by Means of Two-Dimensional LMS Adaptive Algorithms

    Tokunbo OGUNFUNMI  Michael AU  

     
    LETTER-Digital Signal Processing

      Vol:
    E78-A No:9
      Page(s):
    1247-1252

    This paper establishes a general relation between the two-dimensional Least Mean Square (2-D LMS) algorithm and 2-D discrete orthogonal transforms. It is shown that the 2-D LMS algorithm can be used to compute the forward as well as the inverse 2-D orthogonal transforms in general for any input by suitable choice of the adaptation speed. Simulations are presented to verify the general relationship results.

  • On p-Ary Bent Sequences

    Shinya MATSUFUJI  Kyoki IMAMURA  

     
    LETTER-Information Theory and Coding Theory

      Vol:
    E78-A No:9
      Page(s):
    1257-1260

    It is known that a family of p-ary bent sequences, whose elements take values of GF (p) with a prime p, possesses low periodic correlation properties and high linear span. Firstly such a family is shown to consist of balanced sequences in the sense that the frequency of appearances in one period is the same for each nonzero element and once less for zero element. Secondly the exact distribution of the periodic correlation values is given for the family.

  • Scattering of Electromagnetic Plane Waves by a Perfectly Conducting Wedge: The Case of E Polarization

    Michinari SHIMODA  Tokuya ITAKURA  Yuko YAMADA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E78-C No:9
      Page(s):
    1298-1305

    The two-dimensional scattering problem of electromagnetic waves by a perfectly conducting wedge is analyzed by means of the Wiener-Hopf technique together with the formulation using the partition of scatterers. The Wiener-Hopf equations are derived on two complex planes. Investigating the mapping between these complex planes and introducing the appropriate functions which satisfy the edge condition of the wedge, the solutions of these equations are obtained by the decomposition procedure of functions. By deforming the integration path of the Fourier inverse transform, it is found that the representation of the scattered wave is in agreement with the integral representation using the Sommerfeld contours.

  • Strategies of Channel Allocation in Developing Radio Networks with Intersite and Cosite Constraints

    Vladimir LYANDRES  

     
    LETTER-Mobile Communication

      Vol:
    E78-B No:9
      Page(s):
    1344-1347

    The influence of cochannel, adjacent channel and intermodulation constraints on the capacity of the frequency band in the dynamic channel allocation problem is estimated. Algorithms including a backtracking phase with partial reassignment of currently assigned requirements are proposed. Numerical examples show a strong possibility of a 20% capacity improvement compared to the conventional strategies.

  • Design of the Basic Cell and Metallized RAM for 0.5 µm CMOS Gate Array

    Yoji NISHIO  Hideo HARA  Masahiro IWAMURA  Yasuo KAMINAGA  Katsunori KOIKE  Kosaku HIROSE  Takayuki NOTO  Satoshi OGUCHI  Yoshihiko YAMAMOTO  Takeshi ONO  

     
    PAPER-Integrated Electronics

      Vol:
    E78-C No:9
      Page(s):
    1255-1262

    A 0.5 µm CMOS embedded function type gate array family with high speed modules was developed. This family has: an effective basic cell; high speed, compiled type metallized and diffused RAMs; PLL (Phase Locked Loop); and GTL (Gunning Transceiver Logic) to realize operation of over 100 MHz at 3.3 V. This paper describes the basic cell architecture and the compiled type metallized RAM. A divided MOS transistor type basic cell is effective for metallized modules such as metallized RAM and internal logic circuits. The appropriate basic cell size (height) can be decided from the viewpoints of the relationship between the number of usable basic cells and the basic cell height, and the logic circuit speed. Propagation delay time of the 2-input NAND is 200 ps at a standard load of fan out=2 and metal length=1.4 mm. For the universal ASIC, the compiled RAM is indispensable. Single port and multi-port metallized RAMs which are structured by using the basic cells are discussed. The new single port memory cell circuit which has a differential write and single end read operating method is introduced. This memory cell circuit can be realized using one basic cell. The diffused layer region of the NMOS transfer gates for the read operation is shared between neighbor memory cells. So, the capacitance of the bit line becomes smaller, and a high speed access time can be achieved. The measured access time of 1 kbits is 4.2 ns. The new multi-port memory cell circuits which have a single end write and single end read operating method are introduced. The read operating method is the same as that of the single port memory cell circuit. The access time shows very high speed operation comparable to that of the single port memory. This 3F (Flexible, Fast, and Friendly) ASIC family can be applied to high speed processors in workstations and graphics equipment.

  • A 0.1 µm Au/WSiN Gate GaAs MESFET with New BP-LDD Structure and Its Applications

    Masami TOKUMITSU  Kazumi NISHIMURA  Makoto HIRANO  Kimiyoshi YAMASAKI  

     
    PAPER

      Vol:
    E78-C No:9
      Page(s):
    1189-1194

    A 0.1-µm gate-length GaAs MESFET technology is reported. A 48.3-GHz dynamic-frequency divider, and an amplifier with 20-dB gain and 17.5-GHz bandwidth are successfully fabricated by integrating over-100-GHz-cut-off frequency MESFETs using a new lightly-doped drain structure with a buried p-layer (BP-LDD) device structure.

  • Analysis of Neural Network Routing Scheme for Telecommunication Network

    Wei LU  Ismail ISHAK  

     
    LETTER-Communication Networks and Service

      Vol:
    E78-B No:9
      Page(s):
    1326-1329

    In this paper, a description of the Hopfield/Tank model used for the telecommunication network routing problem is given at first. And then through the "static" (i.e. the eigenvalue and the eigenspace of the connection matrix) and the dynamic analysis of the model, it has been found that the model has the faster rate to converge to the optimal or sub-optimal solutions from an initial value. Therefore the quality of the final solutions can be guaranteed. The influence of the initial value to the final solutions is also concerned in this paper. The simulation results are given at the end of this paper.

  • A Requirement Description Approach in Natural Language Based on Communication Service Knowledge

    Yoshizumi KOBAYASHI  Tadashi OHTA  Nobuyoshi TERASHIMA  

     
    PAPER-Applications

      Vol:
    E78-D No:9
      Page(s):
    1156-1163

    This paper proposes a requirement description and elicitation approach for communication services. Requirements are described in natural language, refined with a knowledge base, and converted to a formal language for program generation. A model for communication services is made as a set of three items: terminal state, terminal action and the response of the communication system to the action. This set, in turn, corresponds to natural language syntax that expresses two conditions (terminal state and action) and their result. These conditions and result are expressed as a sequence of simple sentences that describe the relationship between a terminal and a communication system. Thus, by defining such a description style to reflect the features of communication services, it should be possible to achieve both a high level of description and mechanical processing capabilities at the same time. However, requirement descriptions usually include omission and inconsistency. This problem cannot be solved by merely introducing natural language for the descriptions. Knowledge about the target domain of requirements is needed to resolve it. This paper reports on a knowledge base that stores constraints existing between conditions and results in communication services. This knowledge base is shown to be effective in supplementing omissions and resolving inconsistency. This paper also presents a technique for converting the elicited requirements in natural language to descriptions in a formal language that can be used to generate a program.

  • High Rate Binary Coset Code Used for Inner Code

    Tadashi WADAYAMA  Koichiro WAKASUGI  Masao KASAHARA  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1071-1076

    High rate binary coset codes are investigated. The binary coset (BC) code is a binary convolutional code with parallel path. In our previous research of concatenated trelliscoded modulation (TCM) scheme, we have found that the effective minimum distance of inner code is more important than the minimum free distance when TCM is used as inner code. In this paper, for inner code, we construct the high rate BC codes by maximizing the effective minimum distance. With the new inner codes, we can decrease the decoding complexity of the inner code compared with conventional best convolutional code while maintaining the overall decoding performance.

  • Bifurcation Analysis of Nonlinear Resistive Circuits by Curve Tracing Method

    Lingge JIANG  Akio USHIDA  

     
    PAPER-Nonlinear Problems

      Vol:
    E78-A No:9
      Page(s):
    1225-1232

    In this paper, we discuss computational methods for obtaining the bifurcation points and the branch directions at branching points of solution curves for the nonlinear resistive circuits. There are many kinds of the bifurcation points such as limit point, branch point and isolated point. At these points, the Jacobian matrix of circuit equation becomes singular so that we cannot directly apply the usual numerical techniques such as Newton-Raphson method. Therefore, we propose a simple modification technique such that the Newton-Raphson method can be also applied to the modified equations. On the other hand, a curve tracing algorithm can continuously trace the solution curves having the limit points and/or branching points. In this case, we can see whether the curve has passed through a bifurcation point or not by checking the sign of determinant of the Jacobian matrix. We also propose two different methods for calculating the directions of branches at branching point. Combining these algorithms, complicated solution curves will be easily traced by the curve tracing method. We show the example of a Hopfield network in Sect.5.

  • TDM Intercell Connection Fiber-Optic Bus Link for Personal Radio Communication Systems

    Hiroshi HARADA  Satoshi KAJIYA  Katsutoshi TSUKAMOTO  Shozo KOMAKI  Norihiko MORINAGA  

     
    PAPER-Optical Communication

      Vol:
    E78-B No:9
      Page(s):
    1287-1294

    To connect among many radio base stations by using optical fiber bus link in microcellular system, subcarrier multiplexing (SCM) is excellent in simplicity and flexibility. But performance degradation due to optical beat noises is severe problem. To solve this problems, this paper proposes a new type of intercell connection bus fiber-optic link (ICBL) using time division multiplexing, called TDM-ICBL. This paper also analyzes transmission performance of TDM-ICBL theoretically and compares with SCM-ICBL. The analysis clarifies that while the number of RBSs connected to SCM-ICBL is severely restricted by beat noises, TDM-ICBL is more useful than SCM-ICBL when there are many number of connected RBSs.

  • Average Complexity Evaluation of an MLD Algorithm Using the Trellis Structure for a Linear Block Code

    Hidehisa NAGANO  Toru FUJIWARA  Tadao KASAMI  

     
    LETTER

      Vol:
    E78-A No:9
      Page(s):
    1209-1214

    This letter is concerned with the evaluation of the average computational complexity of the maximum likelihood decoding of a linear block code using its trellis diagram. Each section of the L-section minimal trellis diagram for a linear block code consists of parallel components which are structurally identical subgraphs without cross connection between them. A parallel component is also known to be decomposed into subgraphs, and a decoding algorithm by using the structure of the subgraphs of parallel components was proposed, and an upper bound on the worst case computational complexity was derived. In this letter, the average computational complexity of the decoding algorithm is evaluated by computer simulation. We evaluated the average numbers of additions and comparisons performed in the decoding algorithm for example codes, (64,45) extended and permuted binary primitive BCH code, the third order Reed-Muller (64,42) code and its (64,40) subcode. It is shown that the average numbers are much smaller than those for the worst case, and hence the decoding algorithm is efficient when the number of sections, L, is small, say 4 or 8, for the example codes. Especially, for the (64,45) extended binary primitive BCH code with L4, the average numbers of additions and comparisons in the decoding algorithm for finding the survivor's metric of each state after finding the smallest metric among parallel branches are about 1/50 and 17/100 of those in the conventional exhaustive search, respectively. The number of additions and comparisons by the conventional search for all the example codes is smallest when L is 4. As a result, the decoding algorithm with L4 gives the smallest number of operations among those decoding methods considered here.

  • A Universal Data-Base for Data Compression

    Jun MURAMATSU  Fumio KANAYA  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1057-1062

    A data-base for data compression is universal if in its construction no prior knowledge of the source distribution is assumed and is optimal if, when we encode the reference index of the data-base, its encoding rate achieves the optimal encoding rate for any given source: in the noiseless case the entropy rate and in the semifaithful case the rate-distortion function of the source. In the present paper, we construct a universal data-base for all stationary ergodic sources, and prove the optimality of the thus constructed data-base for two typical methods of referring to the data-base: one is a block-shift type reference and the other is a single-shift type reference.

  • A Proposal of Multiple Optical Wideband Frequency Modulation System and Its Phase Noise Insensitivity

    Toshiaki KURI  Katsutoshi TSUKAMOTO  Norihiko MORINAGA  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1136-1141

    This paper proposes a multiple optical wideband frequency modulation system and clarifies its phase noise insensitivity. In this system, an optical carrier is phase-modulated by a conventional FM signal to generate many sidebands in optical frequency band. The n-th order sideband component yields also FM signal with frequency deviation of n times the one of original FM signal. Therefore, by selecting the high order optical sideband, the wideband optical FM signal can be obtained. Moreover, if some sidebands are simultaneously extracted and multiplied at the receiver, a wideband FM signal with larger frequency deviation and no laser phase noise can be obtained, and FM threshold extension can be realized.

  • A Modified Spherical Method for Tracing Solution Curves

    Kiyotaka YAMAMURA  Tooru SEKIGUCHI  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E78-A No:9
      Page(s):
    1233-1238

    Tracing solution curves of nonlinear equations is an important problem in circuit simulation. In this paper, simple techniques are proposed for improving the computational efficiency of the spherical method, which is a method for tracing solution curves. These techniques are very effective in circuit simulation where solution curves often turn very rapidly. Moreover, they can be easily performed with little computational effort.

  • Reconstructing Data Flow Diagrams from Structure Charts Based on the Input and Output Relationship

    Shuichiro YAMAMOTO  

     
    PAPER-Methodologies

      Vol:
    E78-D No:9
      Page(s):
    1118-1126

    The traceability of data flow diagrams against structure charts is very important for large software development. Specifying if there is a relationship between a data flow diagram and a structure chart is a time consuming task. Existing CASE tools provide a way to maintain traceability. If we can extract the input-output relationship of a system from a structure chart, the corresponding data flow diagram can be automatically generated from the relationship. For example, Benedusi et al. proposed a reverse engineering methodology to reconstruct a data flow diagram from existing code. The methodology develops a hierarchical data flow diagram from dependency relationships between the program variables. The methodology, however, transforms each module in structure charts into a process in data flow diagrams. The reconstructed diagrams may have different processes with the same name. This paper proposes a transformation algorithm that solves these problems. It analyzes the structure charts and extracts the input and ouput relationships, then determines how the set of outputs depends on the set of inputs for the data flow diagram process. After that, it produces a data flow diagram based on the include operation between the sets of output items. The major characteristics of the algorithm are that it is simple, because it only uses the basic operations of sets, it generates data flow diagrams with deterministic steps, and it can generate minimal data flow diagrams. This process will reduce the cost of traceability between data flow diagrams and structure charts.

  • Design of a Novel MOS VT Extractor Circuit

    Koichi TANNO  Okihiko ISHIZUKA  Zhen TANG  

     
    LETTER-Electronic Circuits

      Vol:
    E78-C No:9
      Page(s):
    1306-1310

    This paper describes a novel input-free MOS VT extractor circuit. The circuit consists of a bias voltage block and a novel VT extractor block. The proposed VT extractor block has the advantages of the ground-referenced output, low influence of the nonideality, few numbers of transistors and no influence of the PMOS process. The PSpice simulations show the supply voltage range and the bias voltage range of the proposed circuit are wider than those of Johnson's or Wang's.

  • Image Decomposition by Answer-in-Weights Neural Network

    Iren VALOVA  Keisuke KAMEYAMA  Yukio KOSUGI  

     
    LETTER-Image Processing, Computer Graphics and Pattern Recognition

      Vol:
    E78-D No:9
      Page(s):
    1221-1224

    We propose an algorithm for image decomposition based on Hadamard functions, realized by answer-in-weights neural network, which has simple architecture and is explored with steepest decent method. This scheme saves memory consumption and it converges fast. Simulations with least mean square (LMS) and absolute mean (AM) errors on a 128128 image converge within 30 training epochs.

  • GaInAsP/InP Square Buried-Heterostructure Surface-Emitting Lasers Regrown by MOCVD

    Seiji UCHIYAMA  Susumu KASHIWA  

     
    LETTER-Opto-Electronics

      Vol:
    E78-C No:9
      Page(s):
    1311-1314

    Mesa structures have been investigated to optimize a buried-heterostructure (BH) for a GaInAsP/InP surface-emitting (SE) laser regrown by metalorganic chemical vapor deposition (MOCVD), and it has been found that a square mesa top pattern of which the sides are at an angle of 45 to the 011 orientation is suitable. A 1.3-µm GaInAsP/InP square buried heterostructure (SBH) SE laser with this mesa structure has been demonstrated and low-threshold CW oscillation (threshold current Ith=0.45 mA) at 77 K and low-threshold room-temperature pulsed oscillation (Ith=12 mA) have been obtained.

18781-18800hit(20498hit)