The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] LER(1184hit)

721-740hit(1184hit)

  • Multi-rate VPG DS/CDMA Receiver with Interference Cancellation in a Multipath Fading Link

    Young-Hwan YOU  Won-Gi JEON  Hyeok-Koo JUNG  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:2
      Page(s):
    234-241

    In this paper, an interference cancellation (IC) scheme for a multirate VPG DS/CDMA system is evaluated in a multipath fading mobile channel and is designed to accommodate the multimedia sources of varying data-rate requirements. In the this scheme, the strongest user with high-rate transmission will benefit from the multiple access interference (MAI) reduction of the weaker users, which yields more clean estimates in the next cancellation stage. From the numerical results, the proposed scheme outperforms the conventional SIC scheme under the condition of the approximately identical decoding delay at the cost of the hardware burden.

  • Beamspace-Code Transmit Diversity for Two-Dimensional Spreading OFDM-CDM Systems

    Masaaki FUJII  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:2
      Page(s):
    257-265

    This paper presents a transmit diversity scheme that allocates space-time block codes (STBC) to beamspace and spreading codes for two-dimensional spreading orthogonal frequency-division multiplexing code-division multiplexing (OFDM-CDM) downlink transmission. In this scheme, the STBC output symbols are beam-steered using a pair of neighboring beams selected via closed-loop beam selection. The beam-steered symbols in two adjacent time slots are spread by two distinct spreading codes and multiplexed in the same spreading segment. User signals transmitted from different pairs of beams, but that share the same beam, interfere with each other when decoding STBC. Spreading codes are thus allocated to users according to beam pairs used. This is to suppress the interference in time-direction despreading that precedes decoding of STBC. Simulation results demonstrated that the proposed scheme provides beam gains or beam diversity gains or both and that it alleviates inter-code interference by spatially separating user signals by using transmit beam. The proposed scheme also provides high tolerance to large Doppler spread.

  • Design of SMIL Browser Functionality in Mobile Phones

    Satoshi HIEDA  Yoshinori SAIDA  Hiroshi CHISHIMA  Naoki SATO  Yukikazu NAKAMOTO  

     
    PAPER-Terminals

      Vol:
    E87-B No:2
      Page(s):
    342-349

    SMIL is a markup language which enables us to describe multimedia contents. This paper proposes a design model of SMIL browser functionality for mobile phones whose resources are limited. We introduce SMIL Component, which is based on attachable software architecture to a pre-installed generic web browser and an event-based SMIL scheduler, which is a part of SMIL Component, to provide the multimedia presentation scheduling functionality. These lead to reducing the memory amount that SMIL Component consumes and brings high portabilty of SMIL Component for various web browsers. We implement SMIL Component and evaluate RAM sizes and presentation delays. As a result, we conclude that SMIL Component is practical for MMS presentations on a mobile phone.

  • Computationally Efficient Time Delay and Doppler Estimation for LFM Signal

    Kyung-Sik YOON  Do-Hyun PARK  Chul-Mok LEE  Kyun-Kyung LEE  

     
    PAPER-Sensing

      Vol:
    E87-B No:2
      Page(s):
    335-341

    A computationally efficient time delay and Doppler estimation algorithm is proposed for active sonar with a Linear Frequency Modulated (LFM) signal. To reduce the computational burden of the conventional estimation algorithm, an algebraic equation is used which represents the relationship between the time delay and the Doppler in the cross-ambiguity function (CAF) of the LFM signal. The algebraic equation is derived based on the Fast Maximum Likelihood (FML) algorithm. The use of this algebraic relation enables the time delay and Doppler to be estimated with two 1-D searches instead of the conventional 2-D search.

  • FEXT Cancellation Techniques for Multiuser DMT-VDSL Systems

    Jung-Soo WOO  Gi-Hong IM  Kyu-Min KANG  

     
    PAPER-Transmission Systems and Transmission Equipment

      Vol:
    E87-B No:1
      Page(s):
    1-9

    This paper discusses far-end crosstalk (FEXT) cancellation methods for multicarrier transmission system. A system arrangement and its tap update method are proposed when FEXT cancelers and a frequency-domain equalizer (FEQ) are jointly adapted to combat channel intersymbol interference, FEXT, and other additive noise. We present mathematical formulation of minimum mean-square error (MSE) and the optimum tap coefficients for the FEXT cancelers and the FEQ when FEXT cancellation techniques are introduced for multiuser discrete multitone (DMT) based very high-speed digital subscriber line (VDSL) transmission. It is shown that FEXT cancellation enhances the achievable bit rate in FEXT-limited systems. Computer simulation and analytical results show that the performance of jointly adapted FEXT cancelers and an FEQ is better than that of separately adapted FEXT cancelers and an FEQ.

  • Software Implementation of a Secure Socket Layer (SSL) Accelerator Based on Kernel Thread

    Euiseok NAHM  Byungjo MIN  Jinbae PARK  Hagbae KIM  

     
    LETTER-Software Engineering

      Vol:
    E87-D No:1
      Page(s):
    244-245

    We implement an efficient Secure Socket Layer (SSL) accelerator, which is embedded in the kernel level and utilizes kernel threads as the same number of CPUs. In comparison with the conventional Apache with/without our SSL accelerator, the SSL accelerator significantly improves the web-server performance by up to 200%.

  • An Equalization Technique for High-Speed-Mobile OFDM Systems in Rayleigh Multipath Channels

    Dongguo LI  Katsumi YAMASHITA  

     
    LETTER-Fundamental Theories

      Vol:
    E87-B No:1
      Page(s):
    158-160

    In mobile OFDM systems, sub-carriers orthogonality will be broken due to Doppler shift, and this results in inter-carrier interference (ICI). Many methods have been proposed to compensate for this, however, these methods won't be suitable for fast fading caused by high mobile speed. In this letter, we propose a novel sampling theorem based pilot symbol-aided technique which can not only estimate the channel fading envelope (CFE) accurately under high relative Doppler frequency (RDF) but also achieve lower BER than conventional methods. The validity of the proposed method is demonstrated by computer simulations.

  • Determining Consistent Global Checkpoints of a Distributed Computation

    Dakshnamoorthy MANIVANNAN  

     
    PAPER-Computer Systems

      Vol:
    E87-D No:1
      Page(s):
    164-174

    Determining consistent global checkpoints of a distributed computation has applications in the areas such as rollback recovery, distributed debugging, output commit and others. Netzer and Xu introduced the notion of zigzag paths and presented necessary and sufficient conditions for a set of checkpoints to be part of a consistent global checkpoint. This result also reveals that determining the existence of zigzag paths between checkpoints is crucial for determining consistent global checkpoints. Recent research also reveals that determining zigzag paths on-line is not possible. In this paper, we present an off-line method for determining the existence of zigzag paths between checkpoints.

  • Beam-Space Adaptive Array Antenna for Suppressing the Doppler Spread in OFDM Mobile Reception

    Pubudu Sampath WIJESENA  Yoshio KARASAWA  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:1
      Page(s):
    20-28

    This paper examines the Inter Carrier Interference (ICI) due to Doppler spread in OFDM mobile reception and proposes the use of Beam-Space Adaptive Array Antennas for moving receivers. In the proposed system, firstly we separate the multi-path signals into multi-beams according to their incident directions, then correct the frequency shift of each beam signal, considering the beam direction, and finally combine the corrected signals based on Maximal Ratio Combining (MRC). Further this paper clarifies the excellent performance of the proposed system in suppressing the influence of Doppler spread by carrying out computer simulation. Particularly, it was certified that it is possible to suppress the influence of the Doppler spread efficiently for all the receiving directions by using eight-element beam-space array antenna with element spacing of (3/8)λ, and referring three past symbol data when calculating the weight vector of MRC.

  • A Test Plan Grouping Method to Shorten Test Length for RTL Data Paths under a Test Controller Area Constraint

    Toshinori HOSOKAWA  Hiroshi DATE  Masahide MIYAZAKI  Michiaki MURAOKA  Hideo FUJIWARA  

     
    PAPER-Test

      Vol:
    E86-D No:12
      Page(s):
    2674-2683

    This paper proposes a test generation method using several partly compacted test plan tables for RTL data paths. Combinational modules in data paths are tested using several partly compacted test plan tables. Each partly compacted test plan table is generated from each grouped test plan set and is used to test combinational modules corresponding to the grouped test plans. The values of control signals in a partly compacted test plan table are supplied by a test controller. This paper also proposes the architecture of a test controller which can be synthesized in a reasonable amount of time, and proposes a test plan grouping method to shorten test length for data paths under a test controller area constraint. Experimental results for benchmarks show that the test lengths are shortened by 4 to 36% with -9 to 8% additional test controller area compared with the test generation method using test plans.

  • Dependability Evaluation with Fault Injection Experiments

    Piotr GAWKOWSKI  Janusz SOSNOWSKI  

     
    PAPER-Verification and Dependability Analysis

      Vol:
    E86-D No:12
      Page(s):
    2642-2649

    In the paper we evaluate program susceptibility to hardware faults using fault injector. The performed experiments cover many applications with different features. The effectiveness of software techniques improving system dependability is analyzed. Practical aspects of embedding these techniques in real programs are discussed. They have significant impact on the final fault robustness.

  • A Transparent Transient Faults Tolerance Mechanism for Superscalar Processors

    Toshinori SATO  

     
    PAPER-Dependable Systems

      Vol:
    E86-D No:12
      Page(s):
    2508-2516

    In this paper, we propose a fault-tolerance mechanism for microprocessors, which detects transient faults and recovers from them. The investigation of fault-tolerance techniques for microprocessors is driven by two issues: One regards deep submicron fabrication technologies. Future semiconductor technologies could become more susceptible to alpha particles and other cosmic radiation. The other is the increasing popularity of mobile platforms. Cellular telephones are currently used for applications which are critical to our financial security, such as mobile banking, mobile trading, and making airline ticket reservations. Such applications demand that computer systems work correctly. In light of this, we propose a mechanism which is based on an instruction reissue technique for incorrect data speculation recovery and utilizes time redundancy, and evaluate our proposal using a timing simulator.

  • Synthesis of Serial Local Clock Controllers for Asynchronous Circuit Design

    Nattha SRETASEREEKUL  Hiroshi SAITO  Euiseok KIM  Metehan OZCAN  Masashi IMAI  Hiroshi NAKAMURA  Takashi NANYA  

     
    PAPER-IP Design

      Vol:
    E86-A No:12
      Page(s):
    3028-3037

    Asynchronous controllers effectively control high concurrence of datapath operations for high speed. Signal Transition Graphs (STGs) can effectively represent these concurrent events. However, highly concurrent STGs cause the state explosion problem in asynchronous synthesis tools. Many small but highly concurrent STGs cannot be synthesized to obtain control circuits. Moreover, STGs also lead to some control-time overhead of the four-phase handshake protocol. In this paper, we propose a method for deriving the serial control nodes from Control Data Flow Graphs (CDFGs) such that the concurrence of datapath operations is still preserved. The STGs derived from the serialized control nodes are serial STGs which are simpler for synthesis than the concurrent STGs. We also propose an implementation using these serialized controllers to generate local clocks at any necessary times. The implementation results in very small control-time overhead. The experimental results show that the number of synthesis states is proportional to the number of control signals, and the circuits with satisfiable small control-time overhead are obtained.

  • Consideration of Fault Tolerance in Autonomic Computing Environment

    Yoshihiro TOHMA  

     
    INVITED PAPER

      Vol:
    E86-D No:12
      Page(s):
    2503-2507

    Since the characteristic to current information systems is the dynamic and concurrent change of their configurations and scales with non-stop provision of their services, the system management should inevitably rely on autonomic computing. Since fault tolerance is the one of important system management issues, it should also be incorporated in autonomic computing environment. This paper argues what should be taken into consideration and what approach could be available to realize the fault tolerance in such environments.

  • Space-Code Transmit Diversity for OFDM-CDM Systems

    Masaaki FUJII  

     
    PAPER

      Vol:
    E86-B No:12
      Page(s):
    3468-3475

    This paper presents a transmit diversity scheme that uses space-time block codes (STBC) in space-spreading code dimensions for time-direction spreading or two-dimensional spreading orthogonal frequency-division multiplexing code-division multiplexing (OFDM-CDM) downlink transmission. The STBC output symbols in two adjacent time slots are spread by two distinctive spreading codes and multiplexed in the same spreading segment. At a receiver, the received subcarrier signals are despread with the two spreading codes in the direction of time, space-time decoded, and then combined in the direction of frequency. Simulation results demonstrated that the proposed scheme provided high tolerance to Doppler spread and outperformed space-time transmit diversity (STTD) for high-mobility users.

  • A Three-tier Active Replication Protocol for Large Scale Distributed Systems

    Carlo MARCHETTI  Sara Tucci PIERGIOVANNI  Roberto BALDONI  

     
    PAPER-Dependable Software

      Vol:
    E86-D No:12
      Page(s):
    2544-2552

    The deployment of server replicas of a service across an asynchronous distributed system (e.g., Internet) is a real practical challenge. This target cannot be indeed achieved by classical software replication techniques (e.g., passive and active replication) as these techniques usually rely on group communication toolkits that require server replicas to run over a partially synchronous distributed system to solve the underlying agreement problem. This paper proposes a three-tier architecture for software replication that encapsulates the need of partial synchrony in a specific software component of a mid-tier to free replicas and clients from the need of underlying partial synchrony assumptions. Then we propose how to specialize the mid-tier in order to manage active replication of server replicas.

  • Formal Verification of an Intrusion-Tolerant Group Membership Protocol

    HariGovind V. RAMASAMY  Michel CUKIER  William H. SANDERS  

     
    PAPER-Verification and Dependability Analysis

      Vol:
    E86-D No:12
      Page(s):
    2612-2622

    The traditional approach for establishing the correctness of group communication protocols is through rigorous arguments. While this is a valid approach, the likelihood of subtle errors in the design and implementation of such complex distributed protocols is not negligible. The use of formal verification methods has been widely advocated to instill confidence in the correctness of protocols. In this paper, we describe how we used the SPIN model checker to formally verify a group membership protocol that is part of an intrusion-tolerant group communication system. We describe how we successfully tackled the state-space explosion problem by determining the right abstraction level for formally specifying the protocol. The verification exercise not only formally showed that the protocol satisfies its correctness claims, but also provided information that will help us make the protocol more efficient without violating correctness.

  • An Efficiently Self-Reconstructing Array System Using E-1-Track Switches

    Tadayoshi HORITA  Itsuo TAKANAMI  

     
    PAPER-Fault Tolerance

      Vol:
    E86-D No:12
      Page(s):
    2743-2752

    The E-1-track switch torus array model and the "EAR" reconfiguration method are proposed for fault tolerance of mesh or torus-connected processor arrays, where the original idea of EAR is in EAM. The comparison among these and others is described in terms of the (run-time) array reliability, hardware overhead, and/or reconfiguration time. When a designer chooses one among fault tolerant methods, he should consider their features synthetically case by case, and we consider that the results given by this paper are useful for the choice.

  • A Novel Learning Algorithm Which Makes Multilayer Neural Networks Multiple-Weight-Fault Tolerant

    Itsuo TAKANAMI  Yasuhiro OYAMA  

     
    PAPER-Dependable Systems

      Vol:
    E86-D No:12
      Page(s):
    2536-2543

    We propose an efficient algorithm for making multi-layered neural networks (MLN) fault-tolerant to all multiple weight faults in a multi-dimensional interval by injecting intentionally two extreme multi-dimensional values in the interval into the weights of the selected multiple links in a learning phase. The degree of fault-tolerance to a multiple weight fault is measured by the number of essential multiple links. First, we analytically discuss how to choose effectively the multiple links to be injected, and present a learning algorithm for making MLNs fault tolerant to all multiple (i.e., simultaneous) faults in the interval defined by two multi-dimensional extreme points. Then it is proved that after the learning algorithm successfully finishes, MLNs become fault tolerant to all multiple faults in the interval. It is also shown that the time in a weight modification cycle depends little on multiplicity of faults k for small k. These are confirmed by simulation.

  • PREGMA: A New Fault Tolerant Cluster Using COTS Components for Internet Services

    Takeshi MISHIMA  Takeshi AKAIKE  

     
    PAPER-Dependable Systems

      Vol:
    E86-D No:12
      Page(s):
    2517-2526

    We propose a new dependable system called PREGMA (Platform for Reliable Environment based on a General-purpose Machine Architecture). PREGMA aims to meet two requirements -- fault tolerance and low cost -- for Internet services. It can provide fault tolerance, so we can avoid system failure and prevent data corruption, even if faults occur. That is, it masks the faults by running multiple replicated servers, each possessing its own data, in a loosely synchronized manner and delivering the majority vote as output to clients. Moreover, PREGMA is composed of COTS (Commercial Off-The-Shelf) components without modification, which makes it possible to offer the services at a low cost. We investigated two approaches for achieving redundancy of the Coordinator, which is the core of PREGMA: using the primary backup method and the active replication method. We evaluated the effectiveness of PREGMA in terms of throughput overhead, data integrity and recovery time. The results for a prototype show that PREGMA using the Coordinator with the primary backup method outperforms that with the active replication method and has throughput only 3% lower than a non-redundant system. The results also show that, in the event of failure, the recovery time is only less than one second and no data corruption occurs.

721-740hit(1184hit)