The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

5761-5780hit(8214hit)

  • An FTP Proxy System to Assure Providing the Latest Version of Replicated Files

    Junichi FUNASAKA  Masato BITO  Kenji ISHIDA  Kitsutaro AMANO  

     
    PAPER-Network Systems and Applications

      Vol:
    E86-B No:10
      Page(s):
    2948-2956

    As so many software titles are now being distributed via the Internet, the number of accesses to file servers, such as FTP servers, is rapidly increasing. To prevent the concentration of accesses to the original file server, mirror servers are being introduced that contain the same directories and files as held by the original server. However, inconsistency among the mirror servers and the original server is often observed because of delivery latency, traffic congestion on the network, and management policies of the mirror servers. This inconsistency degrades the value of the mirror servers. Accordingly, we have developed an intermediate FTP proxy server system that guarantees the freshness of the files as well as preventing access concentration on the original FTP server. The system adopts per-file selection of the replicated files; most existing methods are based on per-host or per-directory selection. Therefore it can assure users of a quick, stable, and up-to-date FTP mirroring service even in the face of frequent content updates, which tend to degrade the homogeneity of services. Moreover, it can forward the retrieved files with little overhead. Tests confirmed that our system is comparable to existing systems from the viewpoint of actual retrieval time, required traffic, and load endurance. This technology can assure clients that they will receive the latest version of the file(s) desired. It well supports heterogeneous network environments such as the Internet.

  • Performance Evaluation of Instruction Set Architecture of MBP-Light in JUMP-1

    Noriaki SUZUKI  Hideharu AMANO  

     
    PAPER

      Vol:
    E86-D No:10
      Page(s):
    1996-2005

    The instruction set architecture of MBP-light, a dedicated processor for the DSM (Distributed Shared Memory) management of JUMP-1 is analyzed with a real prototype. The Buffer-Register Architecture proposed for MBP-core improves performance with 5.64% in the home cluster and 6.27% in a remote cluster. Only a special instruction for hashing cluster address is efficient and improves the performance with 2.80%, but other special instructions are almost useless. It appears that the dominant operations in the DSM management program were handling packet queues assigned into the local cluster. Thus, common RISC instructions, especially load/store instructions, are frequently used. Separating instruction and data memory improves performance with 33%. The results suggest that another alternative which provides separate on-chip cache and instructions dedicated for packet queue management is advantageous.

  • Itinerant Agents for Network Management

    Ichiro SATOH  

     
    PAPER-Network Control and Management

      Vol:
    E86-B No:10
      Page(s):
    2865-2873

    This paper proposes a framework for building a reusable mobile agent from two kinds of components: an itinerary component and an application-specific logic component. Both components are implemented as mobile agents. The former is a carrier of the latter over particular networks and the latter defines management tasks performed at each host independently of the network. This framework also provides a mechanism for matchmaking the two mobile agent-based components. Since the mechanism is formulated based on a process algebra approach, it can strictly select a suitable itinerary component to perform management tasks at the hosts that the tasks want to visit over the networks. A prototype implementation of this framework and its application were built on a Java-based mobile agent system. We summarize the lessons learned while formalizing and implementing the approach and we compare it to related work.

  • All-Optical Interconnection Device with Photorefractive Semi-Linear Resonator

    Satoshi HONMA  Atsushi OKAMOTO  

     
    PAPER-Optoelectronics

      Vol:
    E86-C No:10
      Page(s):
    2103-2110

    We propose and describe a free-space optical interconnection device with a photorefractive semi-linear resonator. The hologram in the photorefractive crystal is, in general, volatile and the erasing of it coincides with the diffraction of the signal beam. Therefore we have to reform the hologram again after several transmissions of the data or use some fixing techniques such as thermal fixing and electrical fixing. In our interconnection device, the hologram is enhanced by the feedback beam that is a part of the input signal divided by the beam splitter within semi-linear resonator, therefore the sustentation time of the connection can be extended. We explain the sustentation mechanism and investigate the optimum reflectivity of the beam splitters, which determine the feedback rate of the input signal, within feedback circuit for the high output conversion efficiency. We also analyze the coupling strength threshold for sustentation of the connection. We give a basic experiment on 33 interconnection by using BaTiO3 crystal and Ar+ laser whose wavelength is 514 [nm]. We show that the connections are held for long time without the continuous illumination of the control beam.

  • Ultrahigh-Speed InP/InGaAs DHBTs with Very High Current Density

    Minoru IDA  Kenji KURISHIMA  Noriyuki WATANABE  

     
    INVITED PAPER

      Vol:
    E86-C No:10
      Page(s):
    1923-1928

    We describe 150-nm-thick collector InP-based double heterojunction bipolar transistors with two types of thin pseudomorphic bases. The emitter and collector layers are designed for high collector current operation. The collector current blocking is suppressed by the compositionally step-graded collector structure even at JC of over 500 kA/cm2 with practical breakdown characteristics. An HBT with a 20-nm-thick base achieves a high fT of 351 GHz at high JC of 667 kA/cm2, and a 30-nm-base HBT achieves a high value of 329 GHz for both fT and fmax at JC of 583 kA/cm2. An equivalent circuit analysis suggests that the extremely small carrier-transit-delay contributes to the ultrahigh fT.

  • A Radial Line Slot Antenna Fed by a Rectangular Waveguide through a Crossed Slot

    Kaoru SUDO  Takuichi HIRANO  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antenna and Propagation

      Vol:
    E86-B No:10
      Page(s):
    3063-3070

    A rectangular-to-radial waveguide transformer through a crossed slot is proposed as a feeder of a radial line slot antenna (RLSA) for use in a system of solar power satellite (SPS). The transformer is analyzed and designed by using the MoM with numerical eigenmode basis functions. The measured ripple of the amplitude is 3.0 dB in the φ-direction and a 7.0% frequency bandwidth for rotating mode with the ripple below 6 dB is obtained. This bandwidth is wider than that of conventional ring slot or cavity resonator with a coaxial feeder. The antenna measurements at 5.8 GHz show reasonable rotational symmetry both in the near-field distribution and the far field radiation patterns. The reflection is -27.7 dB at the design frequency and below -15 dB in the 7.0% bandwidth. The gain of the antenna with the diameter of 300 mm is 22.7 dBi and the efficiency is 56%.

  • A Fuzzy Ranking Method for Fuzzy Numbers

    Jee-Hyong LEE  Kwan-Ho YOU  

     
    PAPER-Nonlinear Problems

      Vol:
    E86-A No:10
      Page(s):
    2650-2658

    Ranking fuzzy numbers is one of very important research topics in fuzzy set theory because it is a base of decision-making in applications. However, fuzzy numbers may not be easily ordered into one sequence according to their magnitudes because they represent uncertain values. When two fuzzy numbers overlap with each other, a fuzzy number may not be considered absolutely larger than the other. That is, even when a fuzzy number may be considered larger than the other, it may also be considered smaller than the other. It means that for a given set of fuzzy numbers, several ranking sequences possibly exist. However, most of the existing ranking methods produce only one ranking sequence. They ignore other possible sequences due to the overlap between fuzzy numbers. We propose a ranking method which generates possible ranking sequences of given fuzzy numbers. Our method takes a viewpoint from users, and uses it for evaluation of fuzzy numbers. Fuzzy numbers will be ranked based on the evaluations and a fuzzy set of sequences of fuzzy numbers will be produced as a ranking results. Numeric examples and comparisons with other methods are also presented.

  • An Efficient Algorithm for Detecting Singularity in Signals Using Wavelet Transform

    Huiqin JIANG  Takashi YAHAGI  Jianming LU  

     
    PAPER-Digital Signal Processing

      Vol:
    E86-A No:10
      Page(s):
    2639-2649

    Automatic image inspector inspects the quality of printed circuit boards using image-processing technology. In this study, we change an automatic inspection problem into a problem for detecting the signal singularities. Based on the wavelet theory that the wavelet transform can focus on localized signal structures with a zooming procedure, a novel singularity detection and measurement algorithm is proposed. Singularity positions are detected with the local wavelet transform modulus maximum (WTMM) line, and the Lipschitz exponent is estimated at each singularity from the decay of the wavelet transform amplitude along the WTMM line. According to the theoretical analysis and computer simulation results, the proposed algorithm is shown to be successful for solving the automatic inspection problem and calculating the Lipschitz exponents of signals. These Lipschitz exponents successfully characterize singular behavior of signals at singularities.

  • Normalizing Syntactic Structures Using Part-of-Speech Tags and Binary Rules

    Seongyong KIM  Kong-Joo LEE  Key-Sun CHOI  

     
    PAPER

      Vol:
    E86-D No:10
      Page(s):
    2049-2056

    We propose a normalization scheme of syntactic structures using a binary phrase structure grammar with composite labels. The normalization adopts binary rules so that the dependency between two sub-trees can be represented in the label of the tree. The label of a tree is composed of two attributes, each of which is extracted from each sub-tree, so that it can represent the compositional information of the tree. The composite label is generated from part-of-speech tags using an automatic labelling algorithm. Since the proposed normalization scheme is binary and uses only part-of-speech information, it can readily be used to compare the results of different syntactic analyses independently of their syntactic description and can be applied to other languages as well. It can also be used for syntactic analysis, which performs higher than the previous syntactic description for Korean corpus. We implement a tool that transforms a syntactic description into normalized one based on this proposed scheme. It can help construct a unified syntactic corpus and extract syntactic information from various types of syntactic corpus in a uniform way.

  • Internal-State Reconstruction of a Stream Cipher RC4

    Yoshiaki SHIRAISHI  Toshihiro OHIGASHI  Masakatu MORII  

     
    LETTER-Information Security

      Vol:
    E86-A No:10
      Page(s):
    2636-2638

    Knudsen et al. proposed an efficient method based on a tree-search algorithm with recursive process for reconstructing the internal state of RC4 stream cipher. However, the method becomes infeasible for word size n > 5 because its time complexity to reconstruct the internal state is too large. This letter proposes a more efficient method than theirs. Our method can reconstruct the internal state by using the pre-known internal-state entries, which are fewer than their method.

  • JR East Contact-less IC Card Automatic Fare Collection System "Suica"

    Yasutomo SHIRAKAWA  Akio SHIIBASHI  

     
    INVITED PAPER

      Vol:
    E86-D No:10
      Page(s):
    2070-2076

    Suica is our contact-less IC card's nickname: Super Urban Intelligent CArd. There are two types of IC Card: One for Suica IO (SF) Card and the other for Suica Commuter Pass, which has a function of stored fare card and commuter pass. There are 6.54 million Suica holders (about 3.33 million Suica Season Pass holders and 3.21 million Suica IO Card holders) as of 16, June 2003.

  • Method to Generate Images for a Motion-Base in an Immersive Display Environment

    Toshio MORIYA  Haruo TAKEDA  

     
    PAPER-Image Processing, Image Pattern Recognition

      Vol:
    E86-D No:10
      Page(s):
    2231-2239

    We propose an image generation method for an immersive multi-screen environment that contains a motion ride. To allow a player to look around freely in a virtual world, a method to generate an arbitrary direction image is required, and this technology has already been established. In our environment, displayed images must also be updated according to the movement of the motion ride in order to keep a consistency between the player's viewpoint and the virtual world. In this paper, we indicate that this updating process can be performed by the similar method to generate looking-around images and the same data format can be applicable. Then we discuss the format in terms of the data size and the amount of calculations need to consider the performance in our display environment, and we propose new image formats which improve on the widely-used formats such as the perspective, or the fish-eye format.

  • Calculation of Sommerfeld Integrals for Modeling Vertical Dipole Array Antenna for Borehole Radar

    Satoshi EBIHARA  Weng Cho CHEW  

     
    PAPER-Electromagnetic Theory

      Vol:
    E86-C No:10
      Page(s):
    2085-2096

    This paper describes a method for the fast evaluation of the Sommerfeld integrals for modeling a vertical dipole antenna array in a borehole. When we analyze the antenna inside a medium modeled by multiple cylindrical layers with the Method of Moment (MoM), we need a Green's function including the scattered field from the cylindrical boundaries. We focus on the calculation of Green's functions under the condition that both the detector and the source are situated in the innermost layer, since the Green's functions are used to form the impedance matrix of the antenna. Considering bounds on the location of singularities on a complex wave number plane, a fast convergent integration path where pole tracking is unnecessary is considered for numerical integration. Furthermore, as an approximation of the Sommerfeld integral, we describe an asymptotic expansion of the integrals along the branch cuts. The pole contribution of TM01 and HE11 modes are considered in the asymptotic expansion. To obtain numerical results, we use a fast convergent integration path that always proves to be accurate and efficient. The asymptotic expansion works well under specific conditions. The Sommerfeld integral values calculated with the fast evaluation method is used to model the array antenna in a borehole with the MoM. We compare the MoM data with experimental data, and we show the validity of the fast evaluation method.

  • Iterative Wavelet-Based Feature Extraction for Texture Segmentation

    Jing-Wein WANG  

     
    LETTER-Source Coding/Image Processing

      Vol:
    E86-A No:10
      Page(s):
    2628-2632

    A new algorithm for texture segmentation, called iterative feature extraction (IFE), is proposed to iteratively search and select for an overcomplete wavelet feature vector based on aspect ratio of extrema number (AREN) with a desired window that provides optimal classification accuracy.

  • First Microwave Characteristics of InGaAlAs/GaAsSb/InP Double HBTs

    Xin ZHU  Dimitris PAVLIDIS  Guangyuan ZHAO  Philippe BOVE  Hacene LAHRECHE  Robert LANGER  

     
    PAPER

      Vol:
    E86-C No:10
      Page(s):
    2010-2014

    We report for the first time the design, process and characterization of InP-based micrometer emitter InGaAlAs/GaAsSb/InP Double HBTs (DHBTs) and their microwave performance. The layer structure not only allows the implementation of InP collector free of current blocking, but also enables small turn-on voltage and ballistic launching of electrons due to the positive conduction band discontinuity of emitter to base. The DHBT structure was grown on nominal (001) InP substrates using MBE. Solid Si and CBr4 gas were used for n-type and p-type doing respectively. Fabricated large DHBTs showed high DC gain (> 80), small turn-on voltage 0.62 V, almost zero offset voltage, and nearly ideal base and collector current characteristics (ideality factors 1.0 for both B-E and B-C junctions). Small DHBTs demonstrated VCEO > 8 V and stable operation at high current density exceeding 100 kA/cm2. Maximum fT of 57 GHz and maximum fmax of 66 GHz were achieved from 1 20 µm2 devices at similar bias condition: JC = 8.0 104 A/cm2 and VCE =3.5 V. The InGaAlAs/GaAsSb/InP DHBTs appear to be a very promising HBT solution having simultaneous excellent RF and DC performances.

  • Automated Edge Detection by a Fuzzy Morphological Gradient

    Sathit INTAJAG  Kitti PAITHOONWATANAKIJ  

     
    PAPER-Image

      Vol:
    E86-A No:10
      Page(s):
    2678-2689

    Edge detection has been an essential step in image processing, and there has been much work undertaken to date. This paper inspects a fuzzy mathematical morphology in order to reach a higher-level of edge-image processing. The proposed scheme uses a fuzzy morphological gradient to detect object boundaries, when the boundaries are roughly defined as a curve or a surface separating homogeneous regions. The automatic edge detection algorithm consists of two major steps. First, a new version of anisotropic diffusion is proposed for edge detection and image restoration. All improvements of the new version use fuzzy mathematical morphology to preserve the edge accuracy and to restore the images to homogeneity. Second, the fuzzy morphological gradient operation detects the step edges between the homogeneous regions as object boundaries. This operation uses geometrical characteristics contained in the structuring element in order to extract the edge features in the set of edgeness, a set consisting of the quality values of the edge pixels. This set is prepared with fuzzy logic for decision and selection of authentic edge pixels. For experimental results, the proposed method has been tested successfully with both synthetic and real pictures.

  • Concurrency Control for Read-Only Client Transactions in Broadcast Disks

    Haengrae CHO  

     
    PAPER-Broadcast Systems

      Vol:
    E86-B No:10
      Page(s):
    3114-3122

    Broadcast disks are suited for disseminating information to a large number of clients in mobile computing environments. In broadcast disks, the server continuously and repeatedly broadcasts all data items in the database to clients without specific requests. The clients monitor the broadcast channel and read data items as they arrive on the broadcast channel. The broadcast channel then becomes a disk from which clients can read data items. In this paper, we propose a cache conscious concurrency control (C4) algorithm to preserve the consistency of read-only client transactions, when the values of broadcast data items are updated at the server. The C4 algorithm is novel in the sense that it can reduce the response time of client transactions with minimal control information to be broadcast from the server. This is achieved by the judicious caching strategy of the client and by adjusting the currency of data items read by the client.

  • Autonomous Step-by-Step System Construction Technique Based on Assurance Evaluation

    Kazuo KERA  Keisuke BEKKI  Kinji MORI  

     
    PAPER-Reliability and Availability

      Vol:
    E86-D No:10
      Page(s):
    2145-2153

    The recent real time systems have the needs of system expandability with heterogeneous functions and operations. High assurance system is very important for such systems. In order to realize the high assurance system, we research the autonomous step-by-step construction technique based on assurance evaluation. In this paper we propose the average functional reliability as the best index to indicate the assurance performance for system construction. We also propose the autonomous step-by-step construction technique to decide the construction sequence to maximize the assurance performance.

  • Field Configurable Self-Assembly: A New Heterogeneous Integration Technology

    Alan O'RIORDAN  Gareth REDMOND  Thierry DEAN  Mathias PEZ  

     
    INVITED PAPER

      Vol:
    E86-C No:10
      Page(s):
    1977-1984

    Field Configurable Self-assembly is a novel programmable force field based heterogeneous integration technology. Herein, we demonstrate application of the method to rapid, parallel assembly of similar and dissimilar sub-200 µm GaAs-based light emitting diodes at silicon chip substrates. We also show that the method is compatible with post-process collective wiring techniques for fully planar hybrid integration of active devices.

  • Media Synchronization Quality of Reactive Control Schemes

    Yutaka ISHIBASHI  Shuji TASAKA  Hiroki OGAWA  

     
    PAPER-Multimedia Systems

      Vol:
    E86-B No:10
      Page(s):
    3103-3113

    This paper assesses the media synchronization quality of recovery control schemes from asynchrony, which are referred to as reactive control schemes here, in terms of objective and subjective measures. We deal with four reactive control techniques: skipping, discarding, shortening and extension of output duration, and virtual-time contraction and expansion. We have carried out subjective and objective assessment of the media synchronization quality of nine schemes which consist of combinations of the four techniques. The paper makes a comparison of media synchronization quality among the schemes. It also clarifies the relations between the two kinds of quality measures.

5761-5780hit(8214hit)