The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] OMP(3945hit)

2241-2260hit(3945hit)

  • Complex Bandpass ΔΣAD Modulator Architecture without I, Q-Path Crossing Layout

    Hao SAN  Akira HAYAKAWA  Yoshitaka JINGU  Hiroki WADA  Hiroyuki HAGIWARA  Kazuyuki KOBAYASHI  Haruo KOBAYASHI  Tatsuji MATSUURA  Kouichi YAHAGI  Junya KUDOH  Hideo NAKANE  Masao HOTTA  Toshiro TSUKADA  Koichiro MASHIKO  Atsushi WADA  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    908-915

    This paper proposes a new architecture for multibit complex bandpass ΔΣAD modulators with built-in Switched-Capacitor (SC) circuits for application to Low-IF receivers such as used for Bluetooth and WLAN. In the realization of complex bandpass ΔΣAD modulators, we face the following problems: (i) SNR of AD converter is deteriorated by mismatches between internal analog I and Q paths. (ii) Layout design becomes complicated because of signal lines crossing by complex filter and feedback from DAC for I and Q paths in the complex modulator, and this increases required chip area. We propose a new structure for a complex bandpass ΔΣAD modulator which can be completely divided into two paths without layout crossing, and solves the problems mentioned above. The two parts of signal paths and circuits in the modulator are changed for I and Q while CLK is changed for High/Low by adding multiplexers. Symmetric circuits are used for I and Q paths at a certain timing, and they are switched by multiplexers to those used for Q and I paths at another timing. Therefore the influence from mismatches between I and Q paths is reduced by dynamic matching. As a result, the modulator is divided into two separate parts without crossing signal lines between I and Q paths and its layout design can be greatly simplified compared with conventional modulators. We have conducted MATLAB simulations to confirm the effectiveness of the proposed structure.

  • Frequency Offset Estimation for OFDM Systems with a Novel Frequency Domain Training Sequence

    Yanxiang JIANG  Xiqi GAO  Xiaohu YOU  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E89-B No:4
      Page(s):
    1194-1204

    A novel frequency domain training sequence and the corresponding carrier frequency offset (CFO) estimator are proposed for orthogonal frequency division multiplexing (OFDM) systems over frequency-selective fading channels. The proposed frequency domain training sequence comprises two types of pilot tones, namely distinctively spaced pilot tones with high energies and uniformly spaced ones with low energies. Based on the distinctively spaced pilot tones, integer CFO estimation is accomplished. After the subcarriers occupied by the distinctively spaced pilot tones and their adjacent subcarriers are nulled for the sake of interference cancellation, fractional CFO estimation is executed according to the uniformly spaced pilot tones. By exploiting a predefined lookup table making the best of the structure of the distinctively spaced pilot tones, computational complexity of the proposed CFO estimator can be decreased considerably. With the aid of the uniformly spaced pilot tones generated from Chu sequence with cyclically orthogonal property, the ability of the proposed estimator to combat multipath effect is enhanced to a great extent. Simulation results illustrate the good performance of the proposed CFO estimator.

  • Lower Bounds on Two-Dimensional Generalized Orthogonal Sequences

    Fanxin ZENG  Zhenyu ZHANG  Lijia GE  

     
    LETTER-Information Theory

      Vol:
    E89-A No:4
      Page(s):
    1140-1144

    For various applications in image, communications and signal processing, two-dimensional (2-D) generalized orthogonal (GO) sequences, that is, 2-D sequences with zero correlation zone (ZCZ) and 2-D complementary orthogonal (CO) sequences with ZCZ, are widely investigated. New lower bounds for 2-D GO sequences, based on matrix theory on rank, are derived and presented, some examples that attain these lower bounds are given. As a direct application to our results, upper bound on family size of 2-D mutually complementary orthogonal (MCO) codes defined by Luke [9] is proposed.

  • Bandwidth Efficient MC-CDMA Transmission over Frequency Selective Fading Channel in 1xEV-DV System

    Chanho YOON  Jaekwon KIM  Heejung YU  Suk-Kyu LEE  Joonhyuk KANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:4
      Page(s):
    1451-1454

    In this letter, we propose a cdma2000 based MC-CDMA scheme which inherits the same architecture and bandwidth of forward link packet data channel of cdma2000 1x EV-DV. The system utilizes no cyclic prefix, and it uses the bandwidth efficient iterative technique [6] to recover cyclicity of OFDM symbol of the MC-CDMA system to achieve backward compatibility with 1x EV-DV system. We report that the link-level performance of our proposed system is significantly better than previous equalizer-based scheme [7] in frequency selective fading channels.

  • Selective Low-Care Coding: A Means for Test Data Compression in Circuits with Multiple Scan Chains

    Youhua SHI  Nozomu TOGAWA  Shinji KIMURA  Masao YANAGISAWA  Tatsuo OHTSUKI  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    996-1004

    This paper presents a test input data compression technique, Selective Low-Care Coding (SLC), which can be used to significantly reduce input test data volume as well as the external test channel requirement for multiscan-based designs. In the proposed SLC scheme, we explored the linear dependencies of the internal scan chains, and instead of encoding all the specified bits in test cubes, only a smaller amount of specified bits are selected for encoding, thus greater compression can be expected. Experiments on the larger benchmark circuits show drastic reduction in test data volume with corresponding savings on test application time can be indeed achieved even for the well-compacted test set.

  • A Linear Time Algorithm for Binary Fingerprint Image Denoising Using Distance Transform

    Xuefeng LIANG  Tetsuo ASANO  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E89-D No:4
      Page(s):
    1534-1542

    Fingerprints are useful for biometric purposes because of their well known properties of distinctiveness and persistence over time. However, owing to skin conditions or incorrect finger pressure, original fingerprint images always contain noise. Especially, some of them contain useless components, which are often mistaken for the terminations that are an essential minutia of a fingerprint. Mathematical Morphology (MM) is a powerful tool in image processing. In this paper, we propose a linear time algorithm to eliminate impulsive noise and useless components, which employs generalized and ordinary morphological operators based on Euclidean distance transform. There are two contributions. The first is the simple and efficient MM method to eliminate impulsive noise, which can be restricted to a minimum number of pixels. We know the performance of MM is heavily dependent on structuring elements (SEs), but finding an optimal SE is a difficult and nontrivial task. So the second contribution is providing an automatic approach without any experiential parameter for choosing appropriate SEs to eliminate useless components. We have developed a novel algorithm for the binarization of fingerprint images [1]. The information of distance transform values can be obtained directly from the binarization phase. The results show that using this method on fingerprint images with impulsive noise and useless components is faster than existing denoising methods and achieves better quality than earlier methods.

  • Complex Antenna Factors of Resistor Loaded Dipole Antennas with Coaxial Cable Balun

    Ki-Chai KIM  Takashi IWASAKI  

     
    LETTER-Antennas and Propagation

      Vol:
    E89-B No:4
      Page(s):
    1467-1471

    This letter presents the characteristics of complex antenna factors of a resistor loaded dipole antenna with a balun consisting of two coaxial feeders (coaxial cable balun). The resistor loading is used to realize dipole antennas with higher fidelity than unloaded dipole equivalents. The complex antenna factor for a resistor loaded dipole antenna with coaxial cable balun is derived by extending the power loss concepts. The numerical results show that the series resistor loaded dipole antenna offers higher fidelity than the unloaded dipole. The result of the calculated complex antenna factors are in good agreement with that of the measured results.

  • Analysis of Automation Surprises in Human-Machine Systems with Time Information

    Masakazu ADACHI  Toshimitsu USHIO  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    1027-1034

    This paper analyzes automation surprises in human-machine systems with time information. Automation surprises are phenomena such that the underlying machine's behavior diverges from user's intention and may lead to critical situations. Thus, designing human-machine systems without automation surprises is one of fundamental issues to achieve reliable user interaction with the machines. In this paper, we focus on timed human-machine interaction and address their formal aspects. The presented framework is essentially an extension of untimed human-machine interaction and will cover the previously proposed methodologies. We employ timed automata as a model of human-machine systems with time information. Modeling the human-machine systems as timed automata enables one to deal with not only discrete behavior but also time constraints. Then, by introducing the concept of timed simulation of the machine model and the user model, conditions which guarantee the nonexistence of automation surprises are derived. Finally, we construct a composite model in which a machine model and a user model evolve concurrently and show that automation surprises can be detected by solving a reachability problem in the composite model.

  • A Flexible Connection Model for Software Components

    Hironori WASHIZAKI  Daiki HOSHI  Yoshiaki FUKAZAWA  

     
    PAPER

      Vol:
    E89-D No:4
      Page(s):
    1421-1431

    A component connection enables a component to use the functionality of other components directly, without generating adapters or other mechanisms at run-time. In conventional component connection models, the connection between components, particularly third-party components, is very costly for code reuse because the component source code must be modified if the types of requester-side and provider-side are different. This paper proposes a new component model, built upon an existing component architecture, which abandons a component service type and connects components based on a method type collection of the provider and requester components. Our model enables flexible connections owing to relaxed component matching, in which the system that implements our model automatically converts values of parameters, return values, and exceptions between required methods and provided ones within a well-defined range. As a result of experimental evaluations, it is found that our model is superior to conventional models in terms of the component-use cost and the capability of changing connections.

  • Dead Problem of Program Nets

    Shingo YAMAGUCHI  Kousuke YAMADA  Qi-Wei GE  Minoru TANAKA  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    887-894

    In this paper, we discuss a new property, named dead, of (dataflow) program nets. We say that a node of a program net is dead iff the node cannot fire once in any possible firing sequence, and furthermore the program net is partially dead. We tackle a problem of deciding whether a given program net is partially dead, named dead problem. Program nets can be classified into four subclasses: general, acyclic, SWITCH-less, and acyclic SWITCH-less nets. For each subclass, we give a method of solving dead problem and its computation complexity. Our results show that (i) acyclic SWITCH-less nets are not partially dead; (ii) for SWITCH-less nets, dead problem can be solved in polynomial time; (iii) for acyclic nets and general nets, dead problem is intractable.

  • Performance Evaluation and Comparison of Transport Protocols for Fast Long-Distance Networks

    Masayoshi NABESHIMA  Kouji YATA  

     
    PAPER-Internet

      Vol:
    E89-B No:4
      Page(s):
    1273-1283

    It is well known that TCP does not fully utilize the available bandwidth in fast long-distance networks. To solve this scalability problem, several high speed transport protocols have been proposed. They include HighSpeed TCP (HS-TCP), Scalable TCP (S-TCP), Binary increase control TCP (BIC-TCP), and H-TCP. These protocols increase (decrease) their window size more aggressively (slowly) compared to standard TCP (STD-TCP). This paper aims at evaluating and comparing these high speed transport protocols through computer simulations. We select six metrics that are important for high speed protocols; scalability, buffer requirement, TCP friendliness, TCP compatibility, RTT fairness, and responsiveness. Simulation scenarios are carefully designed to investigate the performance of these protocols in terms of the metrics. Results clarify that each high speed protocol successfully solves the problem of STD-TCP. In terms of the buffer requirement, S-TCP and BIC-TCP have better performance. For TCP friendliness and compatibility, HS-TCP and H-TCP offer better performance. For RTT fairness, BIC-TCP and H-TCP are superior. For responsiveness, HS-TCP and H-TCP are preferred. However, H-TCP achieves a high degree of fairness at the expense of the link utilization. Thus, we understand that all the proposed high speed transport protocols have their own shortcomings. Thus, much more research is needed on high speed transport protocols.

  • DWT Domain On-Line Signature Verification Using the Pen-Movement Vector

    Isao NAKANISHI  Hiroyuki SAKAMOTO  Naoto NISHIGUCHI  Yoshio ITOH  Yutaka FUKUI  

     
    LETTER-Information Security

      Vol:
    E89-A No:4
      Page(s):
    1129-1131

    In order to reduce the computational complexity of the DWT domain on-line signature verification, the authors propose to utilize the pen-movement vector as an input parameter. Experimental results indicate that the verification rate obtained using the pen-movement vector parameter is equivalent to that obtained by the conventional method, although the computational complexity of the proposed method is approximately half that of the conventional method.

  • A W-Band Microstrip Composite Right/Left-Handed Leaky Wave Antenna

    Shin-ichiro MATSUZAWA  Kazuo SATO  Shuji ASO  Atushi SANADA  Hiroshi KUBO  

     
    LETTER-Antennas and Propagation

      Vol:
    E89-B No:4
      Page(s):
    1464-1466

    A planar composite right/left-handed leaky wave antenna which operates at W-band is fabricated and its backward to forward beam scanning operation including broadside direction is confirmed experimentally. The scanning angle from 61 to 114 degrees with a frequency scanning range of 76 to 79 GHz is achieved.

  • Fast Multiple Reference Frame Selection Method Using Correlation of Sequence in JVT/H.264

    Jae-Sik SOHN  Duk-Gyoo KIM  

     
    LETTER-Image/Vision Processing

      Vol:
    E89-A No:3
      Page(s):
    744-746

    H.264 video coding standard has a significant performance better than the other standards are the adoption of variable block sizes, multiple reference frames, and the consideration of rate distortion optimization within the codec. However, these features incur a considerable complexity in the encoder for motion estimation. As for the multiple reference frames motion estimation, the increased computation is in proportion to the number of searched reference frames. In this paper, a fast multiple frame reference frames selection method is proposed for H.264 video coding. The proposed algorithm can efficiently determine the best reference frame from the allowed five reference frames. As determine the number of reference frames to search the motion using the correlation of the different block between the block of current frame and that of previous frame, this scheme can efficiently reduce the computational cost while keeping the similar quality and bit-rate. Simulation results show that the speed of the proposed method is faster than that of the original scheme adapted in JVT reference software JM95 while keeping the similar video quality and bit-rate.

  • Expressive Power of Quantum Pushdown Automata with Classical Stack Operations under the Perfect-Soundness Condition

    Masaki NAKANISHI  Kiyoharu HAMAGUCHI  Toshinobu KASHIWABARA  

     
    PAPER-Computation and Computational Models

      Vol:
    E89-D No:3
      Page(s):
    1120-1127

    One important question for quantum computing is whether a computational gap exists between models that are allowed to use quantum effects and models that are not. Several types of quantum computation models have been proposed, including quantum finite automata and quantum pushdown automata (with a quantum pushdown stack). It has been shown that some quantum computation models are more powerful than their classical counterparts and others are not since quantum computation models are required to obey such restrictions as reversible state transitions. In this paper, we investigate the power of quantum pushdown automata whose stacks are assumed to be implemented as classical devices, and show that they are strictly more powerful than their classical counterparts under the perfect-soundness condition, where perfect-soundness means that an automaton never accepts a word that is not in the language. That is, we show that our model can simulate any probabilistic pushdown automata and also show that there is a non-context-free language which quantum pushdown automata with classical stack operations can recognize with perfect soundness.

  • An Audio-Video Multipath Streaming Scheme for Ad Hoc Networks: The Effect of Node Mobility

    Toshiro NUNOME  Shuji TASAKA  

     
    LETTER-Network

      Vol:
    E89-B No:3
      Page(s):
    974-977

    This letter studies the effect of node mobility on application-level QoS of audio-video multipath streams in wireless ad hoc networks. The audio-video streams are transmitted with the MultiPath streaming scheme with Media Synchronization control (MPMS), which was previously proposed by the authors. We perform computer simulation with a grid topology network of IEEE 802.11b including two mobile nodes. The simulation results show that MPMS is effective in achieving high application-level QoS in mobile networks as well.

  • A Compact CORDIC Algorithm for Synchronization of Carrier Frequency Offset in OFDM Modems

    Kyu In LEE  Jonghan KIM  Jaekon LEE  Yong Soo CHO  

     
    LETTER-Devices/Circuits for Communications

      Vol:
    E89-B No:3
      Page(s):
    952-954

    In this letter, a compact CORDIC algorithm is proposed to efficiently implement a synchronization block for carrier frequency offset (CFO) in OFDM modems. The compact CORDIC algorithm allows us to combine a CFO estimation block and a CFO compensation block into a single CFO synchronization block. It is shown by FPGA implementation results that the compact CORDIC algorithm can achieve a significant reduction in hardware complexity and latency for implementing the synchronization block in OFDM modems.

  • Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes

    Hong WANG  Gang QIU  Deng-Guo FENG  Guo-Zhen XIAO  

     
    LETTER-Information Security

      Vol:
    E89-A No:3
      Page(s):
    822-825

    In PKC'01, Tzeng et al. proposed two robust forward-secure signature schemes with proactive security: one is an efficient scheme, but it requires a manager; the other scheme is a new construction based on distributed multiplication procedures. In this paper, we point out their new distributed multiplication procedure is not secure, thus making the whole new construction insecure. Finally, we present an improved forward-secure signature scheme without a manager.

  • Separation of Mixed Audio Signals by Decomposing Hilbert Spectrum with Modified EMD

    Md. Khademul Islam MOLLA  Keikichi HIROSE  Nobuaki MINEMATSU  

     
    PAPER-Speech/Audio Processing

      Vol:
    E89-A No:3
      Page(s):
    727-734

    The Hilbert transformation together with empirical mode decomposition (EMD) produces Hilbert spectrum (HS) which is a fine-resolution time-frequency representation of any nonlinear and non-stationary signal. The EMD decomposes the mixture signal into some oscillatory components each one is called intrinsic mode function (IMF). Some modification of the conventional EMD is proposed here. The instantaneous frequency of every real valued IMF component is computed with Hilbert transformation. The HS is constructed by arranging the instantaneous frequency spectra of IMF components. The HS of the mixture signal is decomposed into subspaces corresponding to the component sources. The decomposition is performed by applying independent component analysis (ICA) and Kulback-Leibler divergence based K-means clustering on the selected number of bases derived from HS of the mixture. The time domain source signals are assembled by applying some post processing on the subspaces. We have produced experimental results using the proposed separation technique.

  • A Flow-Based Media Access Control (F-MAC) for Wireless Ad-Hoc Networks

    Tran Minh TRUNG  Jeonghoon MO  Seong-Lyun KIM  

     
    PAPER-Network

      Vol:
    E89-B No:3
      Page(s):
    756-763

    In this paper, we propose simple but effective modifications of 802.11 MAC (media access control) to resolve efficiency and fairness issues, in wireless ad-hoc networks [2]. Our proposal, based on the flow concept, incorporated faster end-to-end forwarding by assigning higher priority to a node that has packets to relay than others. After completion of end-to-end transmission, the node will be assigned a lower priority level to yield to other nodes. Simulation results show that the proposed scheme (F-MAC) significantly enhances the throughput of ad-hoc networks, while keeping fair sharing of bandwidth among mobile nodes.

2241-2260hit(3945hit)