The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

4961-4980hit(8214hit)

  • A Two-Dimensional Network of Analog Circuits for Motion Detection Based on the Frog Visual System

    Kimihiro NISHIO  Hiroo YONEZU  Yuzo FURUKAWA  

     
    PAPER

      Vol:
    E89-A No:2
      Page(s):
    428-438

    A two-dimensional network for motion detection constructed of simple analog circuits was proposed and designed based on the frog visual system. In the frog visual system, the two-dimensional motion of a moving object can be detected by performing simple information processing in the tectum and thalamus of the frog brain. The measured results of the test chip fabricated by a 1.2 µm complementary metal oxide semiconductor (CMOS) process confirmed the correct operation of the basic circuits in the network. The results obtained with the simulation program with integrated circuit emphasis (SPICE) showed that the proposed network can detect the motion direction and velocity of a moving object. Thus, a chip for two-dimensional motion detection was realized using the proposed network.

  • An Adjoint Network Approach for RLCG Interconnect Model Order Reductions

    Chia-Chi CHU  Herng-Jer LEE  Ming-Hong LAI  Wu-Shiung FENG  

     
    PAPER

      Vol:
    E89-A No:2
      Page(s):
    439-447

    This work proposes a new method for RLCG interconnect model-order reductions in consideration with the adjoint network. Relationships between an original MNA network and its corresponding adjoint MNA network will be explored first. It will be shown that the congruence transformation matrix used in the one-sided projection can be constructed by using the bi-orthogonal bases developed from the Lanczos-type algorithms. In particular, if the multi-port driving-point impedance of RLCG interconnect circuits is the main concern, the transfer functions and system moments of the adjoint network can be directly calculated from those of the original RLCG interconnect network by exploring symmetric properties of the MNA formulation. Therefore, the cost of constructing the congruence transformation matrix can be simplified by up to 50% of the previous methods. Comparative studies among various standard methods and the proposed methods are also investigated. Experimental results on large-scale RLCG interconnect circuits will demonstrate the accuracy and the efficiency of the proposed method.

  • Design Considerations for RC Polyphase Filters with Simultaneously Equal Ripple Both in Stopband and Passband

    Hiroaki TANABE  Hiroshi TANIMOTO  

     
    LETTER

      Vol:
    E89-A No:2
      Page(s):
    461-464

    This paper describes a numerical design procedure of element values of RC polyphase filters with equal minima in stopband and equal ripple in passband. Determination of element values of RC polyphase filters with equal-ripple characteristic have not been solved to the best knowledge of the authors. There found a paper tackling with the problem; however, it can only give sub-optimal solutions via numerical calculation [3]. We propose a numerical element value design procedure for RC polyphase filters with equi-ripple gain in both stopband and passband by using the coefficient matching method. Some design examples are given.

  • DRIC: Dependable Grid Computing Framework

    Hai JIN  Xuanhua SHI  Weizhong QIANG  Deqing ZOU  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    612-623

    Grid computing presents a new trend to distributed and Internet computing to coordinate large scale resources sharing and problem solving in dynamic, multi-institutional virtual organizations. Due to the diverse failures and error conditions in the grid environments, developing, deploying, and executing applications over the grid is a challenge, thus dependability is a key factor for grid computing. This paper presents a dependable grid computing framework, called DRIC, to provide an adaptive failure detection service and a policy-based failure handling mechanism. The failure detection service in DRIC is adaptive to users' QoS requirements and system conditions, and the failure-handling mechanism can be set optimized based on decision-making method by a policy engine. The performance evaluation results show that this framework is scalable, high efficiency and low overhead.

  • Decision Aided Hybrid MMSE/SIC Multiuser Detection: Structure and AME Performance Analysis

    Hoang-Yang LU  Wen-Hsien FANG  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E89-A No:2
      Page(s):
    600-610

    This paper presents a simple, yet effective hybrid of the minimum mean square error (MMSE) multi-user detection (MUD) and successive interference cancellation (SIC) for direct-sequence code division multiple access (DS-CDMA) systems. The proposed hybrid MUD first divides the users into groups, with each group consisting of users with a close power level. The SIC is then used to distinguish users among different groups, while the MMSE MUD is used to detect signals within each group. To further improve the performance impaired by the propagation errors, an information reuse scheme is also addressed, which can be used in conjunction with the hybrid MMSE/SIC MUD to adequately cancel the multiple access interferences (MAIs) so as to attain more accurate detections. Furthermore, the asymptotic multiuser efficiency (AME), a measure to characterize the near-far resistance capability, is also conducted to provide further insights into the new detectors. Furnished simulations, in both additive white Gaussian noise (AWGN) channels and slow flat Rayleigh fading channels, show that the performances of the proposed hybrid MMSE/SIC detectors, with or without the decision aided scheme, are superior to that of the SIC and, especially, the one with decision aided is close to that of the MMSE MUD but with substantially lower computational complexity.

  • Concurrent Error Detection in Montgomery Multiplication over GF(2m)

    Che-Wun CHIOU  Chiou-Yng LEE  An-Wen DENG  Jim-Min LIN  

     
    PAPER-Information Security

      Vol:
    E89-A No:2
      Page(s):
    566-574

    Because fault-based attacks on cryptosystems have been proven effective, fault diagnosis and tolerance in cryptography have started a new surge of research and development activity in the field of applied cryptography. Without magnitude comparisons, the Montgomery multiplication algorithm is very attractive and popular for Elliptic Curve Cryptosystems. This paper will design a Montgomery multiplier array with a bit-parallel architecture in GF(2m) with concurrent error detection capability to protect it against fault-based attacks. The robust Montgomery multiplier array with concurrent error detection requires only about 0.2% extra space overhead (if m=512 is as an example) and requires four extra clock cycles compared to the original Montgomery multiplier array without concurrent error detection.

  • Multimedia Quality Prediction Methodologies for Advanced Mobile and IP-Based Telephony Open Access

    Nobuhiko KITAWAKI  

     
    INVITED PAPER

      Vol:
    E89-B No:2
      Page(s):
    262-272

    This paper describes the author's perspective on multimedia quality prediction methodologies for multimedia communications in advanced mobile and internet protocol (IP)-based telephony, and reports related experiments and trials. First, the paper describes the need for perceptual QoS (Quality of Service) assessment in which various quality factors in multimedia communications for advanced mobile and IP-based telephony are analyzed. Then an objective quality prediction scheme is proposed from the viewpoints of quality measurement tools for each quality factor and an opinion model for compound quality factors in mobile and IP-based communications networks. Finally, the author's current trials of measurement tools and opinion models are described.

  • Performance of 2IMO Differentially Transmit-Diversity Block Coded OFDM Systems in Time-Varying Multipath Rayleigh Fading Channels

    Ping-Hung CHIANG  Ding-Bing LIN  Hsueh-Jyh LI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:2
      Page(s):
    518-530

    By applying the differential space-time block code (DSTBC) to wireless multicarrier transmission, Diggavi et al. were the first to propose the two-input-multiple-output (2IMO) differentially space-time-time block coded OFDM (TT-OFDM) system. In this paper, we propose three novel differentially transmit-diversity block coded OFDM (DTDBC-OFDM) systems, namely, the FT-, FF-, and TF-OFDM systems. For instance, the TF-OFDM stands for the differentially space-time-frequency block coded OFDM. Moreover, the noncoherent maximum-likelihood sequence detector (NSD), and its three special cases, namely, the noncoherent one-shot detector, the linearly predictive decision-feedback (DF) detector, and the linearly predictive Viterbi receiver are incorporated to the 2IMO DTDBC-OFDM systems. Furthermore, a simple closed-form BER expression for the systems utilizing the noncoherent one-shot detector in the time-varying multipath Rayleigh fading channels is given. Numerical results have revealed that 2IMO DTDBC-OFDM systems employing the noncoherent one-shot detector can obtain significant performance improvement. However, when few antennas are available, the implementation of the linearly predictive DF detector or the linearly predictive Viterbi receiver is necessary for achieving better performance.

  • An Error Detection Method Based on Coded Block Pattern Information Verification for Wireless Video Communication

    Yu CHEN  XuDong ZHANG  DeSheng WANG  

     
    LETTER-Multimedia Systems for Communications" Multimedia Systems for Communications

      Vol:
    E89-B No:2
      Page(s):
    629-632

    A novel error detection method based on coded block pattern (CBP) information verification is proposed for error concealment of inter-coded video frames transmitted in wireless channel. This method firstly modifies the original video stream structure by the aggregation of certain important information, and then inserts some error verification bits into the video stream for each encoded macro block (MB), these bits can be used as reference information to determine whether each encoded MB is corrupted. Experimental results on additive Gauss white noise simulation wireless channel and H.263+ baseline codec show that the proposed method can outperform other reference approaches on error detection performance. In addition, it can preserve the original video quality with a small coding overhead increase.

  • Channel Estimation with Selective Superimposed Pilot Sequences under Fast Fading Environments

    Fumiaki TSUZUKI  Tomoaki OHTSUKI  

     
    PAPER-Antennas and Propagation

      Vol:
    E89-B No:2
      Page(s):
    556-563

    Recently, superimposed pilot channel estimation has been proposed for wireless communications, where the pilot symbol sequence is superimposed on a data symbol sequence and transmitted together, and thus there is no drop in information rate. In this scheme, the receiver correlates the received signal sequence with the pilot symbol sequence, and obtains the channel estimate. However, the correlation between the pilot symbol sequence and the data symbol sequence deteriorates the channel estimation accuracy. The use of the longer frame leads to the lower correlation, but also to the lower channel tracking capability. In this paper, we propose a selective superimposed pilot channel estimation scheme with selecting a pilot sequence that has a low correlation with a data symbol sequence from the set of the pilot sequences assigned to the transmitter. Note that the superimposed channel estimation scheme with one pilot sequence assigned to the transmitter is the conventional superimposed channel estimation scheme. We show that the proposed channel estimation scheme is superior to the conventional superimposed channel estimation scheme (pilot sequence = 1). We also show that the proposed channel estimation scheme can achieve the good channel estimate even under fast fading environments. Moreover, we show that the proposed channel estimation scheme is superior to the pilot assisted channel estimation scheme, although pilot symbol power is a deterioration factor in the proposed channel estimation scheme.

  • Entropy Based Evaluation of Communication Predictability in Parallel Applications

    Alex K. JONES  Jiang ZHENG  Ahmed AMER  

     
    PAPER-Performance Evaluation

      Vol:
    E89-D No:2
      Page(s):
    469-478

    The performance of parallel computing applications is highly dependent on the efficiency of the underlying communication operations. While often characterized as dynamic, these communication operations frequently exhibit spatial and temporal locality as well as regularity in structure. These characteristics can be exploited to improve communication performance if the correct prediction model is selected to a suitable communication topology. In this paper we describe an entropy based methodology for quantifying and evaluating the success of different prediction models on actual workloads drawn from representative parallel benchmarks. We evaluate two different prediction criteria and combinations thereof: (1) Messages are partitioned by source node. (2) Use of a first order context model. We also describe the threshold for predication designed to largely avoid incorrect predication overheads. Our results show for simple predication models, even on highly dynamic benchmark applications, predictability can be improved by several orders of magnitude. In fact, using simple prediction techniques, over 75% of the communication volume is accurately predictable.

  • Bi-Connectivity Augmentation for Specified Vertices of a Graph with Upper Bounds on Vertex-Degree Increase

    Toshiya MASHIMA  Takanori FUKUOKA  Satoshi TAOKA  Toshimasa WATANABE  

     
    PAPER-Graph Algorithm

      Vol:
    E89-D No:2
      Page(s):
    751-762

    The 2-vertex-connectivity augmentation problem for a specified set of vertices of a graph with degree constraints, 2VCA-SV-DC, is defined as follows: "Given an undirected graph G = (V,E), a specified set of vertices S ⊆V with |S|3 and a function g:V→Z+∪{∞}, find a smallest set E' of edges such that (V,E ∪E') has at least two internally-disjoint paths between any pair of vertices in S and such that vertex-degree increase of each v ∈V by the addition of E' to G is at most g(v), where Z+ is the set of nonnegative integers." This paper shows a linear time algorithm for 2VCA-SV-DC.

  • Increasing the Edge-Connectivity by Contracting a Vertex Subset in Graphs

    Hiroshi NAGAMOCHI  

     
    PAPER-Graph Algorithm

      Vol:
    E89-D No:2
      Page(s):
    744-750

    Let G = (V,E) be an edge weighted graph with n vertices and m edges. For a given integer p with 1 < p < n, we call a set X V of p vertices a p-maximizer if X has a property that the edge-connectivity of the graph obtained by contracting X into a single vertex is no less than that of the graph obtained by contracting any other subset of p vertices. In this paper, we first show that there always exists an ordering v1,v2,...,vn of vertices in V such that, for each i = 2,3,...,n - 1, set {v1,v2,...,vi} is an i-maximizer. We give an O(mn + n2log n) time algorithm for finding such an ordering and then show an application to the source location problem.

  • Proactive Desk: New Haptic Interface and Its Experimental Evaluation

    Shunsuke YOSHIDA  Kenji SUSAMI  Haruo NOMA  Kenichi HOSAKA  

     
    PAPER

      Vol:
    E89-B No:2
      Page(s):
    320-325

    The "Proactive Desk" is a new human-machine interface for the desktop operations of computers. It provides users with tactile sensation in addition to visual sensation. Two linear induction motors underneath the desk generate a two-dimensional force to move objects and control their positions on the desktop using feedback control, and users feel tactile sensation while handling those objects. In this paper, we examined the effects of adding haptic information to simple mouse operation using the Proactive Desk. In our experiment, we used a button-type visual stimulus with and without haptic information. When using haptic conditions, three types of force feedback pattern were displayed: "Edge," "Resistance to motion" and "Attractive force," and each had three force strength conditions: no, half and full. The subject was asked to push buttons twenty times as the buttons were shown one after the other on the desk as quickly as possible. Consequently, the reaction times for pushing the button for all haptic conditions, except for the half-force condition of "Attractive force," were significantly faster than no-force (without haptic information) condition. This result shows that the haptic information was advantageous for easy operation.

  • Forward Error Correction for Visual Communication Systems Using VBR Codec

    Konomi MOCHIZUKI  Yasuhiko YOSHIMURA  Yoshihiko UEMATSU  Ryoichi SUZUKI  

     
    PAPER

      Vol:
    E89-B No:2
      Page(s):
    334-341

    Packet loss and delay cause degradation in the quality of real-time, interactive applications such as video conferencing. Forward error correction (FEC) schemes have been proposed to make the applications more resilient to packet loss, because the time required to recover the lost packets is shorter than that required to retransmit the lost packets. On the other hand, the codec generally used in real-time applications like MPEG4 has the feature that the sending bit rate and the packet size of the traffic vary significantly according to the motion of an object in a video. If the traditional FEC coding, which is calculated on the basis of a fixed-size block, is applied to such applications, a waste of bandwidth and a delay variation are caused and the quality is degraded. In this paper, we propose suitable FEC schemes for visual communication systems using variable bit-rate (VBR) codec and evaluate the effectiveness of these schemes using our prototype implementation and experimental network.

  • Opinion Model Using Psychological Factors for Interactive Multimodal Services

    Kazuhisa YAMAGISHI  Takanori HAYASHI  

     
    PAPER

      Vol:
    E89-B No:2
      Page(s):
    281-288

    We propose the concept of an opinion model for interactive multimodal services and apply it to an audiovisual communication service. First, psychological factors of an audiovisual communication service were extracted by using the semantic differential (SD) technique and factor analysis. Forty subjects participated in subjective tests and performed point-to-point conversational tasks on a PC-based video phone that exhibited various network qualities. The subjects assessed those qualities on the basis of 25 pairs of adjectives. Two psychological factors, i.e., an aesthetic feeling and a feeling of activity, were extracted from the results. Then, quality impairment factors affecting these two psychological factors were analyzed. We found that the aesthetic feeling was affected by IP packet loss and video coding bit rate, and the feeling of activity depended on delay time, video packet loss, video coding bit rate, and video frame rate. Using this result, we formulated an opinion model derived from the relationships among quality impairment factors, psychological factors, and overall quality. The validation test results indicated that the estimation error of our model was almost equivalent to the statistical reliability of the subjective score.

  • Preparation of Double-Sided YBCO Films on LaAlO3 by MOD Using Commercially Available Coating Solution

    Takaaki MANABE  Jun Hyun AHN  Iwao YAMAGUCHI  Mitsugu SOHMA  Wakichi KONDO  Ken-ichi TSUKADA  Kunio KAMIYA  Susumu MIZUTA  Toshiya KUMAGAI  

     
    PAPER

      Vol:
    E89-C No:2
      Page(s):
    186-190

    The 5-cm-diameter double-sided YBa2Cu3O7 (YBCO) films were prepared by metal organic deposition (MOD) using a commercially available metal-naphthenate coating solution. Firstly, YBCO film was prepared by MOD on one side of a double-side-polished 5-cm-diameter LaAlO3 substrate. Secondly, another side was similarly coated with YBCO by MOD. After the latter processing, degradation of average Jc value in the first side was not observed; but the fluctuation of critical current density Jc slightly increased. The double-sided YBCO films showed average Jc values of 0.8-1.0 MA/cm2 at 77 K and microwave surface resistances Rs(12 GHz) of 0.86-1.07 mΩ at 70 K.

  • Progress in THz Generation Using Josephson Fluxon Dynamics in Intrinsic Junctions

    Myung-Ho BAE  Hu-Jong LEE  

     
    INVITED PAPER

      Vol:
    E89-C No:2
      Page(s):
    106-112

    Collective transverse plasma modes in Bi2Sr2CaCu2O8+x intrinsic Josephson junctions (IJJs) can be excited by the moving fluxon lattices. Progressive transformation of the standing-wave-like fluxon-lattice configuration from a triangular lattice to a rectangular lattice takes place as the dynamic fluxon-lattice modes are in resonance with the collective transverse plasma modes. In this paper, we review the progress in terahertz-frequency-range electromagnetic wave generation from the IJJs using the resonance between moving fluxon lattice and the collective transverse plasma modes.

  • Subjective Quality Assessment of the H.264/AVC In-Loop De-Blocking Filter Open Access

    Matthew D. BROTHERTON  Damien BAYART  David S. HANDS  

     
    INVITED PAPER

      Vol:
    E89-B No:2
      Page(s):
    273-280

    Next generation codecs, benchmarked by the H.264/AVC standard, are providing substantial compression efficiency for the coding and transmission of video. Coupled with technologies offering larger transmission bandwidths over DSL, wireless and satellite networks, the capability of delivering high quality video services to the home is now a reality. The perceptual quality of the content delivered over communications networks will be crucial in ensuring a first-class customer experience. It is therefore important to assess the advantages and disadvantages of the optional features offered by next generation codecs. This paper describes a subjective assessment that was carried out to investigate the perceptual effects of switching the in loop de-blocking filter within the H.264/ AVC CODEC on or off. Although the filter is believed to substantially improve the perceptual quality of video, it has been suggested that in some cases negative perceptual effects can be produced. The H.264/AVC architecture allows de-blocking to be switched off in cases where there are limited processing resources or it is considered a negative perceptual effect may be introduced. This paper describes a study that examined the perceptual effects of de-blocking by employing a standardised subjective assessment methodology. The Absolute Category Rating (ACR) method was used to capture Difference Mean Opinion Scores (DMOS) for a range of video. Content was selected to span a wide and representative range of coding complexity. This content was then encoded at a variety of bit-rates to represent high, medium and low qualities. Results were used to examine the end-user perception of video quality when the de-blocking filter is switched on or off. The experimental design allowed the overall effects of the de-blocking filter to be examined and additionally the relationship between content and quality on the filter performance. The experiment found that the performance of the de-blocking filter was content-dependent. Results were used to discuss the advantages and disadvantages of in-loop de-blocking and there is an examination of content properties (e.g. spatial and temporal complexity) that influence the performance of de-blocking.

  • A New Asymmetric Watermarking Scheme for Copyright Protection

    Guo-fu GUI  Ling-ge JIANG  Chen HE  

     
    LETTER-Digital Signal Processing

      Vol:
    E89-A No:2
      Page(s):
    611-614

    This letter proposes a new asymmetric watermarking scheme. In the proposed scheme, a non-full rank matrix is applied to an embedded watermark to form an asymmetric detection watermark. To detect the embedded watermark, the watermarked signal is transformed through the matrix firstly. Then a correlation test between the detection watermark and the transformed signal is performed. This scheme allows for the public release of all information, except for the embedded watermark. The performance of the scheme is analyzed, and the simulation results demonstrate that the proposed scheme is secure and robust to some common attacks.

4961-4980hit(8214hit)