The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] POS(1110hit)

681-700hit(1110hit)

  • A Robust Detection Scheme of Orthogonal Space-Time Block Codes over Very Fast Fading Channels

    Donghun YU  Jae Hong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:1
      Page(s):
    171-175

    This letter proposes a robust detection scheme of orthogonal space-time block codes that face very fast fading channels. The proposed detection scheme employs a QR decomposition on the channel matrix and minimizes noise enhancement and impact of channel estimation errors which occur in a conventional detection scheme. It is shown by simulations that the proposed detection scheme outperforms the conventional detection scheme when the channel fading is very fast.

  • A PC-Based Logic Simulator Using a Look-Up Table Cascade Emulator

    Hiroki NAKAHARA  Tsutomu SASAO  Munehiro MATSUURA  

     
    PAPER-Simulation and Verification

      Vol:
    E89-A No:12
      Page(s):
    3471-3481

    This paper represents a cycle-based logic simulation method using an LUT cascade emulator, where an LUT cascade consists of multiple-output LUTs (cells) connected in series. The LUT cascade emulator is an architecture that emulates LUT cascades. It has a control part, a memory for logic, and registers. It connects the memory to registers through a programmable interconnection circuit, and evaluates the given circuit stored in the memory. The LUT cascade emulator runs on an ordinary PC. This paper also compares the method with a Levelized Compiled Code (LCC) simulator and a simulator using a Quasi-Reduced Multi-valued Decision Diagram (QRMDD). Our simulator is 3.5 to 10.6 times faster than the LCC, and 1.1 to 3.9 times faster than the one using a QRMDD. The simulation setup time is 2.0 to 9.8 times shorter than the LCC. The necessary amount of memory is 1/1.8 to 1/5.5 of the one using a QRMDD.

  • Improvement of Paging Extensions in Mobile Internet Protocol Based on Post Registration

    Kortong CHIRATANA  Watit BENJAPOLAKUL  

     
    PAPER

      Vol:
    E89-D No:12
      Page(s):
    2848-2855

    Paging extensions for Mobile Internet Protocol (P-MIP) decreases only the number of registration, but it does not much improve the method of registration, which still gives rise to a lot of lost packets and long handoff latency, and may also waste the data buffering and time during registration. In the active state, P-MIP behaves in the same way as Mobile Internet Protocol (MIP), thus, in this state, the packet loss rate of P-MIP is the same as that of MIP. However, the packet loss rate of P-MIP is lower than that of MIP, when changing from idle state to active state, because P-MIP buffers packets at the registered FA. We propose an improvement method for the registration delay, while the mobile node is entering the active state to decrease the mobile node waiting time for data packets. The proposed method can reduce the requirement of data buffering and also improve the method of registration to decrease lost packets and handoff latency when the mobile node moves across the cell in the same paging area during active state.

  • Recognizing and Analyzing of User's Continuous Action in Mobile Systems

    Jonghun BAEK  Ik-Jin JANG  Byoung-Ju YUN  

     
    PAPER-Human-computer Interaction

      Vol:
    E89-D No:12
      Page(s):
    2957-2963

    As a result of the growth of sensor-enabled mobile devices, in recent years, users can utilize diverse digital contents everywhere and anytime. However, the interfaces of mobile applications are often unnatural due to limited computational capability, miniaturized input/output controls, and so on. To complement the poor user interface (UI) and fully utilize mobility as feature of mobile devices, we explore possibilities for a new UI of mobile devices. This paper describes the method for recognizing and analyzing a user's continuous action including the user's various gestures and postures. The application example we created is mobile game called AM-Fishing game on mobile devices that employ the accelerometer as the main interaction modality. The demonstration shows the evaluation for the system usability.

  • A Compact Implementation Scheme of 1-Dimensional PSDs with Double-Resolution Interpolation

    Kunil CHOE  Gunhee HAN  

     
    LETTER-Integrated Electronics

      Vol:
    E89-C No:12
      Page(s):
    1958-1961

    This paper proposes a compact interpolation scheme dedicated to a 1-dimensional position sensitive detector (PSD) with an optical sensing pixel array. The pixels are divided into even- and odd-numbered groups and winner take all (WTA) circuits are provided to each of the groups. The simulated results show that the detecting step-width is reduced to the half of the original one after applying the interpolation scheme.

  • Fast Acquisition of PN Sequences in DS-CDMA Systems with Incoherent Demodulator

    Sergei BYCHENKOV  Vladimir MIKHAILOV  Kohichi SAKANIWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:12
      Page(s):
    3319-3334

    DS-CDMA systems employing long-period PN sequences are becoming a widespread standard of wireless communication systems. However, fast acquisition of long-period PN sequences at a low hardware cost is conventionally a difficult problem. This paper examines a recently proposed fast acquisition algorithm for a class of PN sequences, which includes m and GMW sequences as special cases, under conditions of unknown received RF phase and chip boundary timing. The result shows that under low input (chip) SNR and the required delay estimation accuracy of Tc/Δ, Δ=2,3,…, the mean acquisition time can be considerably reduced compared to other known representative acquisition schemes. Its fast acquisition capability is based on a decomposition of long PN sequences into a number of short ones and achieves a significantly reduced code phase uncertainty of acquisition at relatively small hardware cost, estimated as 2/3 of the equivalent parallel correlators system. It can be applied as a (part of) acquisition scheme of a DS-CDMA system instead of a slow sliding correlator or a costly matched filter schemes.

  • 2D Beam Scanning Planar Antenna Array Using Composite Right/Left-Handed Leaky Wave Antennas

    Tokio KANEDA  Atsushi SANADA  Hiroshi KUBO  

     
    PAPER-Planar Antennas

      Vol:
    E89-C No:12
      Page(s):
    1904-1911

    A novel two-dimensional (2D) beam scanning antenna array using composite right/left-handed (CRLH) leaky-wave antennas (LWAs) is proposed. The antenna array consists of a set of CRLH LWAs and a Butler matrix (BM) feeding network. The direction of the beam can be scanned two-dimensionally in one plane by changing frequency and in the other plane by switching the input ports of the BM. A four-element antenna array in the microstrip line configuration operating at 10.5 GHz is designed with the assistance of full-wave simulations based on the method of moment (MoM) and the finite-element method (FEM). The antenna array is fabricated and radiation characteristics are measured. The wide range 2D beam scanning operation with the angle from -30 deg to +25 deg in one plane by sweeping frequency from 10.25 GHz to 10.7 GHz and with four discrete angles of -46 deg, -15 deg, +10 deg, and +35 deg in the other plane by switching the input port is achieved.

  • Minimum Variance Multi-User Detection with Optimum Subband Decomposition over Multipath Channels

    Wan-Shing YANG  Wen-Hsien FANG  Che-Yu LIN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:11
      Page(s):
    3075-3082

    This paper presents a linear constrained minimum variance multiuser detection (MUD) scheme for DS-CDMA systems, which makes full use of the available spreading sequences of the users as well as the relevant channel information of the incoming rays in the construction of the constraint matrix. To further enhance the performance, a statistical optimum filter bank in combination with the developed minimum variance MUD with the partitioned linear interference canceller (PLIC) as the underlying structure is also addressed. The determination of the filter bank coefficients, however, calls for computationally demanding nonlinear programming. To alleviate the computational overhead, an iterative procedure is also proposed, which solves the Rayleigh quotient in each iteration. Furthermore, the expressions of the output signal to interference plus noise ratio (SINR) are also determined to provide further insights into the proposed approach. Conducted simulations validate the new scheme.

  • On the Maximum Throughput of a Combined Input-Crosspoint Queued Packet Switch

    Roberto ROJAS-CESSA  Zhen GUO  Nirwan ANSARI  

     
    LETTER-Switching for Communications

      Vol:
    E89-B No:11
      Page(s):
    3120-3123

    Combined input-crosspoint buffered (CICB) packet switches have been of research interest in the last few years because of their high performance. These switches provide higher performance than input-buffered (IB) packet switches while requiring the crosspoint buffers run at the same speed as that of the input buffers in IB switches. Recently, it has been shown that CICB switches with one-cell crosspoint buffers, virtual output queues, and simple input and output arbitrations, provide 100% throughput under uniform traffic. However, it is of general interest to know the maximum throughput that a CICB switch, with no speedup, can provide under admissible traffic. This paper analyzes the throughput performance of a CICB switch beyond uniform traffic patterns and shows that a CICB switch with one-cell crosspoint buffers can provide 100% throughput under admissible traffic while using no speedup.

  • Doubly Stochastic Processing on Jacket Matrices

    Jia HOU  Moon Ho LEE  Kwangjae LEE  

     
    LETTER-General Fundamentals and Boundaries

      Vol:
    E89-A No:11
      Page(s):
    3368-3372

    In this letter, we define the generalized doubly stochastic processing via Jacket matrices of order-2n and 2n with the integer, n≥2. Different from the Hadamard factorization scheme, we propose a more general case to obtain a set of doubly stochastic matrices according to decomposition of the fundaments of Jacket matrices. From order-2n and order-2n Jacket matrices, we always have the orthostochastoc case, which is the same as that of the Hadamard matrices, if the eigenvalue λ1 = 1, the other ones are zeros. In the case of doubly stochastic, the eigenvalues should lead to nonnegative elements in the probability matrix. The results can be applied to stochastic signal processing, pattern analysis and orthogonal designs.

  • Checking Connectivity in Mobile System Ambients with the Temporal Logic of Actions

    Tatjana KAPUS  

     
    PAPER-Concurrent Systems

      Vol:
    E89-A No:11
      Page(s):
    3333-3340

    This paper considers systems consisting of communicating processes which can move between specified locations. Mobile telephone systems and intelligent transport systems are examples of them. The processes can exchange data as well as channels (e.g. frequencies) to be used in further communication. It may happen that two processes (e.g. telephones or cars) in different locations could communicate directly because they share a communication channel, but they cannot as there is a physical obstacle between the locations. A possible solution is to allow one process to send a message to another one through other processes and locations. To see if this is possible, a notion of connectivity of processes has been devised in the literature. A process was defined to be connectable to another one if a message from the first one could reach the other one by using any existing communication actions, allowed locations, and process moves in the system. A process-algebraic approach for checking connectivity was proposed. In this paper, it is shown how the temporal logic of actions (TLA) can be employed for the same purpose. In both approaches, connectivity of a process with another one is basically checked as follows. The first process includes a marking message in all its sending actions. Every process that receives this message gets marked and includes it in its own sending actions. The first process is connectable to the second one if there exists such a system execution sequence that the latter gets marked in it. Since TLA is a linear-time temporal logic, it can generally not express such a property. This paper, however, shows that it can be expressed and verified for a given TLA system specification. It also shows how to specify the marking operations and provides an example of connectivity checking.

  • MAP Detectors for Differential Pulse-Position Modulation over Indoor Optical Wireless Communications

    Ubolthip SETHAKASET  T. Aaron GULLIVER  

     
    LETTER

      Vol:
    E89-A No:11
      Page(s):
    3148-3151

    In this letter, it is shown that a MAP detector can be employed with differential pulse-position modulation (L-DPPM) in an indoor optical wireless system. The MAP detector error performance is evaluated and compared with that of a hard-decision detector and MLSD over an intersymbol interference channel. It is shown that a MAP detector provides superb performance even in a dispersive channel with high DT.

  • A Decomposition-Technique-Based Algorithm for Nonlinear Large Scale Mesh-Interconnected System and Application

    Shieh-Shing LIN  Huay CHANG  

     
    PAPER-Systems and Control

      Vol:
    E89-A No:10
      Page(s):
    2847-2856

    In this paper, we propose two techniques to solve the nonlinear constrained optimization problem in large scale mesh-interconnected system. The first one is a diagram-method-based decomposition technique which decomposes the large scale system into some small subsystems. The second technique is a projected-Jacobi-based parallel dual-type method which can solve the optimization problems in the decomposed subsystems efficiently. We have used the proposed algorithm to solve numerous examples of large scale constrained optimization problems in power system. The test results show that the proposed algorithm has computational efficiency with respect to the conventional approach of the centralized Newton method and the state-of-the-art Block-Parallel Newton method.

  • Adomian Decomposition for Studying Hyperchaotic 2D-Scroll Attractors with Application to Synchronization

    Donato CAFAGNA  Giuseppe GRASSI  

     
    PAPER-Oscillation, Dynamics and Chaos

      Vol:
    E89-A No:10
      Page(s):
    2752-2758

    In this paper the attention is focused on the numerical study of hyperchaotic 2D-scroll attractors via the Adomian decomposition method. The approach, which provides series solutions of the system equations, is first applied to weakly-coupled Chua's circuits with Hermite interpolating polynomials. Then the method is successfully utilized for achieving hyperchaos synchronization of two coupled Chua's circuits. The reported examples show that the approach presents two main features, i.e., the system nonlinearity is preserved and the chaotic solution is provided in a closed form.

  • Self-Organizing Location Estimation Method Using Received Signal Strength

    Yasuhisa TAKIZAWA  Peter DAVIS  Makoto KAWAI  Hisato IWAI  Akira YAMAGUCHI  Sadao OBANA  

     
    PAPER

      Vol:
    E89-B No:10
      Page(s):
    2687-2695

    The location information of ubiquitous objects is one of the key issues for context-aware systems. Therefore, several positioning systems to obtain precise location information have been researched. However, they have scalability and flexibility problems because they need completely configured space with a large number of sensors. To avoid the problems, we proposed a self-organizing location estimation method that uses ad hoc networks and Self-Organizing Maps and needs no prepared space with a large number of sensors. But, as in other similar precise localization methods, the proposed method needs advanced distance measurements unavailable to conventional wireless communication systems. In this paper, the self-organizing location estimation method's modification for distance measurement that uses received signal strength available to conventional wireless communication systems but which fluctuates uncertainly, is described and location estimation accuracy with the modified method is shown.

  • An RTSD System against Various Attacks for Low False Positive Rate Based on Patterns of Attacker's Behaviors

    Joong-seok SONG  Yong-jin KWON  

     
    PAPER-Application Information Security

      Vol:
    E89-D No:10
      Page(s):
    2637-2643

    There is a certain level of requirements for system performance that intrusion detection systems on the Internet need. One of them is to lower the rate of "False Positive" and "False Negative." Another one is to have a convenient user interface so that users can manage system security easily with the detection systems. However, scan detection systems on public domain show a high rate of false detection and have difficulty in detecting various scanning techniques. In addition, since current scan detection systems are based on the command interface, the systems have been poor at user interface and therefore it is difficult to apply them to system security management. Hence, we first propose a set of new filter rules, which detect various scan attacks based on port scanning techniques. Secondly, a set of ABP-Rules derived from attacker's behavioral patterns is proposed in order to minimize the False Positive rate. With these methods, we implement a new real-time scan detection system, overcoming the limitations of current real-time scan detection systems. Also the implemented system contains a GUI interface for user's convenience of managing the network security, which was developed with Tcl/Tk.

  • On the S-Box Architectures with Concurrent Error Detection for the Advanced Encryption Standard

    Shee-Yau WU  Huang-Ting YEN  

     
    PAPER-Cryptography

      Vol:
    E89-A No:10
      Page(s):
    2583-2588

    In this paper, we present a new low-cost concurrent error detection (CED) S-Box architecture for the Advanced Encryption Standard (AES). Because the complexity and the nonlinearity, it is difficult to develop error detection algorithms for the S-Box. Conventionally, a parity checked S-Box is implemented with ROM (read only memory). In some applications, for example, smart cards, both chip size and fault detection are demanded seriously. ROM-based parity checking cannot meet the demands. We propose our CED S-Box (CEDSB) architecture for two reasons. The first is to design a S-Box without ROM. The second is to obtain a compact S-Box with real time error detection. Based on the composite field, we develop the CEDSB architecture to implement the fault detection for the S-Box. The overhead of the CED for the S-Boxes in GF((24)2) and in GF(((22)2)2) are 152 and 132 NAND gates respectively. The amount of extra gates used for the CEDSB is nearly equal to that of the ROM-based CED S-Box (131 NAND gates). The chip area of the ROM-based CED S-Box, the CEDSBs in GF((24)2), and in GF(((22)2)2) are 2996, 558, and 492 NAND gates separately. The chip area of the CEDSB is more compact than a ROM-based CED S-Box.

  • Node-Disjoint Paths Algorithm in a Transposition Graph

    Yasuto SUZUKI  Keiichi KANEKO  Mario NAKAMORI  

     
    PAPER-Algorithm Theory

      Vol:
    E89-D No:10
      Page(s):
    2600-2605

    In this paper, we give an algorithm for the node-to-set disjoint paths problem in a transposition graph. The algorithm is of polynomial order of n for an n-transposition graph. It is based on recursion and divided into two cases according to the distribution of destination nodes. The maximum length of each path and the time complexity of the algorithm are estimated theoretically to be O(n7) and 3n - 5, respectively, and the average performance is evaluated based on computer experiments.

  • A Note on Error Correction Schemes with a Feedback Channel

    Naoto KOBAYASHI  Daiki KOIZUMI  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Coding Theory

      Vol:
    E89-A No:10
      Page(s):
    2475-2480

    We propose a new fixed-rate error correction system with a feedback channel. In our system, the receiver transmits a list of positions of unreliable information bits based on the log a-posteriori probability ratios by outputs of a soft-output decoder to the transmitter. This method is just like that of the reliability-based hybrid ARQ scheme. To dynamically select an appropriate interleaving function with feedback information is a key feature of our system. By computer simulations, we show that the performance of a system with a feedback channel is improved by dynamically selecting an appropriate interleaving function.

  • Novel Planar Composite Right/Left-Handed Transmission Line with Double-Sided Metal Patterns

    Shuji ASOU  Atsushi SANADA  Hiroshi KUBO  

     
    PAPER

      Vol:
    E89-C No:9
      Page(s):
    1299-1305

    A novel planar composite right/left handed (CRLH) transmission line (TL) with double-sided metal patterns, which is advantageous in high scalability and low-cost fabrication, is proposed. Fundamental characteristics of the unbalanced and balanced CRLH TLs are confirmed numerically and theoretically both by full-wave finite-element method (FEM) simulations and the equivalent circuit analysis in terms of dispersion characteristics and characteristic impedances for the periodic structure. It is also shown that the relations between the left-handed circuit parameters and the geometrical parameters of the unit cell are simple and intuitive, which is useful for designing the CRLH TL. Experiments on 10-cell unbalanced and balanced CRLH TLs are carried out and the left-handed and right-handed wave propagations are confirmed by scattering parameter and near field measurements.

681-700hit(1110hit)