The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

6341-6360hit(8214hit)

  • Scaling Limit of the MOS Transistor--A Ballistic MOSFET--

    Kenji NATORI  

     
    INVITED PAPER

      Vol:
    E84-C No:8
      Page(s):
    1029-1036

    The current voltage characteristics of the ballistic metal oxide semiconductor field effect transistor (MOSFET) is reviewed. Reducing the carrier scattering by employing e.g. the intrinsic channel structure and the low temperature operation, nanometer to sub-0.1 µm size MOSFETs operation approaches the ballistic transport. The drain current is derived by analyzing the carrier behavior in the vicinity of the potential maximum in the channel. The carrier degeneracy and the predominant carrier distribution in the lowest subband around the maximum point have critical effects on the current value. A convenient approximation of the current in terms of terminal voltages is given. The current control mechanism is discussed with use of the "Injection velocity," with which carriers are injected from the source to the channel. An index to represent the ballisticity is given, and some published experimental data are analyzed. Transport of the quasi-ballistic MOSFET is discussed.

  • Associative-Memory-Based Human Face Detection

    Mu-Chun SU  Chien-Hsing CHOU  

     
    PAPER-Pattern Recognition

      Vol:
    E84-D No:8
      Page(s):
    1067-1074

    In this paper, we explore the possibility of applying associative memories for locating frontal views of human faces in complex scenes. An appealing property of the associative-memory-based face detection system is that learning of the associative memory may be achieved by using a simple Hebbian learning rule. In addition, a simple heuristic rule is used to quickly filter a certain amount of nonface images at the very beginning of the whole detection procedure. By using the rule, we won't waste unnecessary computational resources on those nonface images. A database consisting of 74 images was used to test the performance of our associative-memory-based human face detection system.

  • Numerical Characterization of Optically Controlled MESFETs Using an Energy-Dependent Physical Simulation Model

    Mohamad A. ALSUNAIDI  Tatsuo KUWAYAMA  Shigeo KAWASAKI  

     
    PAPER-Modeling of Nonlinear Microwave Circuits

      Vol:
    E84-C No:7
      Page(s):
    869-874

    This paper presents the characterization and validation of a time-domain physical model for illuminated high-frequency active devices and shows the possibility of use of the electromagnetic analysis of FDTD not only for electromagnetic interaction and scattering but also for the device simulation as a good candidate for a microwave simulator. The model is based on Boltzmann's Transport Equation, which accurately accounts for carrier transport in microwave and millimeter wave devices with sub-micrometer gate lengths. Illumination effects are accommodated in the model to represent carrier density changes inside the illuminated device. The simulation results are compared to available experimental records for a typical MESFET for validation purposes. Simulation results show that the microscopic as well as the macroscopic characteristics of the active device are altered by the light energy. This fact makes the model an important tool for the active device design method under illumination control.

  • Image Reconstruction of Multiple Conductors

    Chien-Ching CHIU  Ching-Lieh LI  Wei CHAN  

     
    PAPER-Applications of Electromagnetics Simulators

      Vol:
    E84-C No:7
      Page(s):
    961-966

    The genetic algorithm is used to reconstruct the shapes of multiple perfectly conducting cylinders. Based on the boundary condition and the measured scattered field, a set of nonlinear integral equations is derived and the imaging problem is reformulated into an optimization problem. The genetic algorithm is then employed to find out the global extreme solution of the object function. Numerical examples are given to demonstrate the capability of the inverse algorithm. Good reconstruction is obtained even when the multiple scattering between two conductors is serious. In addition, the effect of Gaussian noise on the reconstruction results is investigated.

  • Estimation of Complex Permittivity Using Rectangular Waveguide with Flange by FDTD Method

    Kouji SHIBATA  Osamu HASHIMOTO  Kouji WADA  

     
    LETTER

      Vol:
    E84-C No:7
      Page(s):
    977-980

    A method for estimating complex permittivity of a material using a rectangular waveguide with a flange is presented by the finite difference time domain (FDTD) method. An advantage of the present method is that it is not necessary to vary the material structure in order to insert it into the waveguide. Therefore estimation errors related to the dimensions of the material are almost negligible. In this case, fluoridated rubber is chosen as the low-loss material. The comparison of the complex permittivity of the material determined by the present method with FDTD and the conventional waveguide method at 10 GHz is performed. It was confirmed that the present method is effective for estimating the complex permittivity under the condition that the length of the flange is about 50 mm (1.7λ) square.

  • Integrated Person Identification and Expression Recognition from Facial Images

    Dadet PRAMADIHANTO  Yoshio IWAI  Masahiko YACHIDA  

     
    PAPER

      Vol:
    E84-D No:7
      Page(s):
    856-866

    In this paper we propose an integration of face identification and facial expression recognition. A face is modeled as a graph where the nodes represent facial feature points. This model is used for automatic face and facial feature point detection, and facial feature points tracked by applying flexible feature matching. Face identification is performed by comparing the graphs representing the input face image with individual face models. Facial expression is modeled by finding the relationship between the motion of facial feature points and expression change. Individual and average expression models are generated and then used to identify facial expressions under appropriate categories and the degree of expression changes. The expression model used for facial expression recognition is chosen by the results of face identification.

  • Transmit Diversity Scheme with Power Control for Wireless Communications

    Pingyi FAN  Jianjun LI  Zhigang CAO  

     
    PAPER-Adaptive Algorithms and Experiments

      Vol:
    E84-B No:7
      Page(s):
    1720-1726

    In this paper, we present a new transmit diversity scheme with power control by using two transmit antennas in which the power control unit is added to adaptively suit the channel fading variation. Compared to the transmit diversity scheme (STD, one space time coding scheme) proposed by Alamouti and the traditional maximal ratio combining (MRC) diversity scheme employed at the receiver, simulation results indicate that the new scheme has considerable performance gain. We also discuss the effects of the imperfect channel parameter estimation on the performance of the system. Simulation results show that the new system is more robust to the estimation error of channel fading parameters than the STD. As the signal to noise ratio is relatively high, the diversity scheme with power control is more sensitive to the channel estimation error compared to the MRC. But when the channel estimation accuracy is relatively high, the diversity scheme with power control still has better performance than the ideal MRC as the BER is about 1 10-3.

  • Optimal Antenna Selection in MIMO Systems with Space-Time Block Coding

    Arogyaswami PAULRAJ  Dhananjay GORE  

     
    INVITED PAPER

      Vol:
    E84-B No:7
      Page(s):
    1713-1719

    Optimum antenna sub-set selection in MIMO systems is an attractive cost reducing technique. In this paper we develop an optimal antenna sub-set selection technique to be used in conjunction with space-time block codes over a MIMO link to optimize link error performance over a fading channel. We study the case when antenna sub-set selection is applied either at the transmitter or the receiver. We provide analytical results for substantial improvement in average SNR and outage capacity when antenna sub-set selection is used. Simulation results that verify our analytical prediction are also presented.

  • Achieving High Interactivity and Stability of a Videoconferencing System over ATM Networks

    Ting-Chao HOU  Chorng-Horng YANG  Kim-Joan CHEN  

     
    PAPER-Multimedia Systems

      Vol:
    E84-B No:7
      Page(s):
    1926-1935

    A model of interactive videoconference is proposed for investigating the interactivity of the videoconference. Through running a prototype videoconferencing system over ATM networks, we observed that the system stability would degrade abruptly if the interaction demand from conferees exceeds what the system control can support. By using the proposed model, we formulate the problem of achieving high interactivity and stability as maximizing interactivity by tuning system parameters subject to some stability constraints. Solving the problem is non-trivial since it involves unpredictable network delays. We thus develop practical approaches that can choose and dynamically adjust, according to the network condition, the values of system parameters to meet the stability constraints and improve the interactivity. Finally, we validate our approaches and provide guidelines on choosing the parameter values by conducting experiments and simulations.

  • Adaptive Beamforming of ESPAR Antenna Based on Steepest Gradient Algorithm

    Jun CHENG  Yukihiro KAMIYA  Takashi OHIRA  

     
    PAPER-Beamformer Techniques

      Vol:
    E84-B No:7
      Page(s):
    1790-1800

    Conventional adaptive array antenna processing must access signals on all of the array antenna elements. However, because the low-cost electronically steerable passive array radiator (ESPAR) antenna only has a single-port output, all of the signals on the antenna elements cannot be observed. In this paper, a technique for adaptively controlling the loaded reactances on the passive radiators, thus forming both beam and nulls, is presented for the ESPAR antenna. The adaptive algorithm is based on the steepest gradient theory, where the reactances are sequentially perturbed to determine the gradient vector. Simulations show that the ESPAR antenna can be adaptive. The statistical performance of the output SIR of the ESPAR antenna is also given.

  • Long-Term Reliability of Plastic Ferrules for Single-Mode Fiber-Optic Connectors

    Yoshito SHUTO  Shuichi YANAGI  Masayoshi OHNO  Hirotsugu SATO  Shin SUMIDA  Shunichi TOHNO  

     
    PAPER-Optoelectronics

      Vol:
    E84-C No:7
      Page(s):
    1002-1009

    We examined the creep properties and hazard rates of plastic ferrules to ensure the long-term reliablity of optical fiber connections. The endface deformation ΔL had to be smaller than 3 µm to keep the insertion-loss and return-loss fluctuation to acceptable levels in the worst case of random concatenation of similarly deformed plastic ferrules. From the fluctuation data, we estimated the time-to-failure tf at which the ΔL value became 3 µm. We estimated the acceleration parameters, median lifetimes ξ, and hazard rates λ by using tf values based on Weibull statistics. The ξ values decreased rapidly with increasing temperature and relative humidity. We found we could expect small λ values of < 0.1 FIT (FIT=10-9/hour) and of 1 FIT for 20 years in a normal atmosphere (25C/50%RH) and in a more severe case of 25C/90%RH, respectively.

  • Average SNR of Generalized Selection Combining over Nakagami-m Fading Channels

    Chi Ming LO  Wong-Hing LAM  

     
    LETTER-Wireless Communication Technology

      Vol:
    E84-B No:7
      Page(s):
    1952-1955

    Using moment generating function (MGF) of generalized selection combining (GSC) output signal-to-noise ratio (SNR), we derive closed-form expressions for average combined SNR at the output of GSC, which optimally combines the N largest out of L available diversity signals, over Nakagami-m fading channels for N = 2, 3 and L = 4. The Nakagami-m fading statistics on each diversity branch are assumed to be independent and identically distributed (i.i.d.). The average combined SNRs at the outputs of GSC receivers are also compared with the average combined SNRs at the outputs of conventional maximal ratio combining (MRC) and selection combining (SC).

  • An Unwrapping of Signals in Transform Domain and Its Application in Signal Reconstruction

    Pavol ZAVARSKY  Nobuo FUJII  Noriyoshi KAMBAYASHI  Masahiro IWAHASHI  Somchart CHOKCHAITAM  

     
    PAPER-Image

      Vol:
    E84-A No:7
      Page(s):
    1765-1771

    An unwrapping of signal coefficients in transform domain is proposed for applications in which a lossy operation is performed on the coefficients between analysis and synthesis. It is shown that the unwrapping-based modification of signal-to-additive-signal ratio can employ the fact that an implementation of a biorthogonal decomposition is characterized by a mutually orthogonal eigenvectors. An example to illustrate the benefits of the presented approach in lossy image compression applications is shown.

  • Gain Scheduling Technique for Tracking Perturbed Equilibrium Points in Uncertain Nonlinear Systems

    Seon-Ho LEE  Jong-Tae LIM  

     
    LETTER-Systems and Control

      Vol:
    E84-A No:7
      Page(s):
    1784-1788

    Most of the previous controllers proposed for output regulation problems on uncertain nonlinear systems tried to keep the state variables to the nominal equilibrium points. In this letter, however, the dynamic state feedback controller makes the state variables follow the perturbed equilibrium points computed from an equilibrium-estimator.

  • A Design of Self-Tuning Predictive PID Controllers

    Masako ASANO  Toru YAMAMOTO  

     
    LETTER-Systems and Control

      Vol:
    E84-A No:7
      Page(s):
    1779-1783

    PID control schemes based on the classical control theory, have been widely used for various real control systems. However, in practice, since it is considerably difficult to determine the PID parameters suitably, lots of researches have been reported with respect to tuning schemes of PID parameters. Furthermore, several self-tuning and auto-tuning techniques in the PID control have been reported for systems with unknown or slowly time-varying parameters. On the other hand, so-called a generalized predictive control (GPC) scheme has been reported as a useful self-tuning control technique for unknown and/or time variant delay systems. In this paper, a new self-tuning predictive PID control algorithm based on a GPC criterion is proposed.

  • Adaptive Video Frame Rate Control over Explicit Rate Networks Based on Channel Rate Prediction

    Myeong-jin LEE  Jae-kyoon KIM  

     
    PAPER-Multimedia Systems

      Vol:
    E84-B No:7
      Page(s):
    1915-1925

    In this paper, we propose an adaptive video frame rate control method, called AFCON, that video encoders use in conjunction with explicit rate based congestion control in the network. First, an encoder buffer constraint which guarantees the end-to-end delay of video frames is derived under the assumption of bounded network transmission delay for every frame data. AFCON is based on the constraint and consists of future channel rate prediction, frame discarding, and frame skipping. Recursive Least-Squares (RLS) is used to predict the low-frequency component of the channel rate. Frame discarding prevents the delay violation of frames due to the prediction error of the channel rate. Frame skipping adapts the encoder output rate to the channel rate while avoiding abrupt quality degradation during the congestion period. From the simulation results, it is shown that AFCON can adapt to the time-varying rate channel with less degradation in temporal resolution and in PSNR performance compared to the conventional approach.

  • Scale Invariant Face Detection and Classification Method Using Shift Invariant Features Extracted from Log-Polar Image

    Kazuhiro HOTTA  Taketoshi MISHIMA  Takio KURITA  

     
    PAPER

      Vol:
    E84-D No:7
      Page(s):
    867-878

    This paper presents a scale invariant face detection and classification method which uses shift invariant features extracted from a Log-Polar image. Scale changes of a face in an image are represented as shift along the horizontal axis in the Log-Polar image. In order to obtain scale invariant features, shift invariant features are extracted from each row of the Log-Polar image. Autocorrelations, Fourier spectrum, and PARCOR coefficients are used as shift invariant features. These features are then combined with simple classification methods based on Linear Discriminant Analysis to realize scale invariant face detection and classification. The effectiveness of the proposed face detection method is confirmed by experiments using face images captured under different scales, backgrounds, illuminations, and dates. To evaluate the proposed face classification method, we performed experiments using 2,800 face images with 7 scales under 2 different backgrounds and face images of 52 persons.

  • A Learning Algorithm with Activation Function Manipulation for Fault Tolerant Neural Networks

    Naotake KAMIURA  Yasuyuki TANIGUCHI  Yutaka HATA  Nobuyuki MATSUI  

     
    PAPER-Fault Tolerance

      Vol:
    E84-D No:7
      Page(s):
    899-905

    In this paper we propose a learning algorithm to enhance the fault tolerance of feedforward neural networks (NNs for short) by manipulating the gradient of sigmoid activation function of the neuron. We assume stuck-at-0 and stuck-at-1 faults of the connection link. For the output layer, we employ the function with the relatively gentle gradient to enhance its fault tolerance. For enhancing the fault tolerance of hidden layer, we steepen the gradient of function after convergence. The experimental results for a character recognition problem show that our NN is superior in fault tolerance, learning cycles and learning time to other NNs trained with the algorithms employing fault injection, forcible weight limit and the calculation of relevance of each weight to the output error. Besides the gradient manipulation incorporated in our algorithm never spoils the generalization ability.

  • Multi-Band Wavelet-Packet Spreading Codes with Intra-Code Subband Diversity for Communications in Multipath Fading Channels

    Hsiao-Hwa CHEN  

     
    PAPER-Wireless Communication Technology

      Vol:
    E84-B No:7
      Page(s):
    1876-1884

    Mobile communication channels always suffer serious frequency-selective fading due to multipath effect. Traditional spreading codes are characterized by the fact that their time-domain orthogonality is based on fixed chip width across a code period. They often fail to perform well under frequency-selective fading. This paper proposes a new class of CDMA codes, wavelet-packet orthogonal codes capable to retain time-domain orthogonality as well as to offer intra-code subband diversity to mitigate frequency-selective fading. The new codes are constructed by congregating several wavelets with various dilations and shifts. The combination of the wavelets in different nodes in a wavelet-packet full binary tree enables frequency diversity capability. Owing to the even code length, they can be easily used in mobile communications for multi-rate streaming and multi-code spreading. The performance study is carried out using correlation statistics distribution convolution algorithm and the results reveal that wavelet-packet codes, combined with RAKE receiver, perform better than traditional spreading codes in frequency-selective fading channels.

  • Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards

    Shuichi ISHIDA  Masahiro MIMURA  Yoichi SETO  

     
    PAPER

      Vol:
    E84-D No:7
      Page(s):
    812-818

    Smart cards and biometrics can be effectively combined for personal authentication over an open network. The combination is achieved as two-step authentication in which the smart card is authenticated based on a public key infrastructure, and the card holder is authenticated using the template stored in the smart card based on the biometric data. The biometric verification has to be executed in the card for security purposes. This paper describes a fingerprint verification method based on a popular biometric verification technique that can be embedded in a smart card. The prototype system that uses this verification method can verify fingerprints in a few seconds by using the data stored on the smart card.

6341-6360hit(8214hit)