The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PU(3318hit)

2721-2740hit(3318hit)

  • Floating-Point Divide Operation without Special Hardware Supports

    Takashi AMISAKI  Umpei NAGASHIMA  Kazutoshi TANABE  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E82-A No:1
      Page(s):
    173-177

    Three multiplicative algorithms for the floating-point divide operation are compared: the Newton-Raphson method, Goldschmidt's algorithm, and a naive method that simply calculates a form of the Taylor series expansion of a reciprocal. The series also provides a theoretical basis for Goldschmidt's algorithm. It is well known that, of the Newton-Raphson method and Goldschmidt's algorithm, the former is the more accurate while the latter is the faster on a pipelined unit. However, little is reported about the naive method. In this report, we analyze the speed and accuracy of each method and present the results of numerical tests, which we conducted to confirm the validity of the accuracy analysis. Basically, the comparison are made in the context of software implementation (e. g. , a macro library) and compliance with the IEEE Standard 754 rounding is not considered. It is shown that the naive method is useful in a realistic setting where the number of iterations is small and the method is implemented on a pipelined floating-point unit with a multiply-accumulate configuration. In such a situation, the naive method gives a more accurate result with a slightly lower latency, as compared with Goldschmidt's algorithm, and is much faster than but slightly inferior in accuracy to the Newton-Raphson method.

  • Monochromatic Visualization of Multimodal Images by Projection Pursuit

    Seiji HOTTA  Kiichi URAHAMA  

     
    LETTER-Image Theory

      Vol:
    E81-A No:12
      Page(s):
    2715-2718

    A method of visualization of multimodal images by one monochromatic image is presented on the basis of the projection pursuit approach of the inverse process of the anisotropic diffusion which is a method of image restoration enhancing contrasts at edges. The extension of the projection from a linear one to nonlinear sigmoidal functions enhances the contrast further. The deterministic annealing technique is also incorporated into the optimization process for improving the contrast enhancement ability of the projection. An application of this method to a pair of MRI images of brains reveals its promising performance of superior visualization of tissues.

  • Noncubic Cell Time-Domain Analysis of Scattering by Dielectric Cylinders

    Norihiko HARADA  Mitsuo HANO  

     
    PAPER

      Vol:
    E81-C No:12
      Page(s):
    1779-1783

    We have proposed an algorithm to apply perfectly matched layer (PML) absorbing boundary condition to the noncubic cell time-domain method. The extended method has a merit of flexibility in truncating the computational domain by the use of a curvilinear PML. In this paper we apply a circular PML for computing the scattered fields of a dielectric cylinder or cylindrical shell of arbitrary cross section shape. Numerical results are presented to demonstrate the accuracy of this method.

  • Shared Multi-Terminal Binary Decision Diagrams for Multiple-Output Functions

    Hafiz Md. HASAN BABU  Tsutomu SASAO  

     
    PAPER-Logic Synthesis

      Vol:
    E81-A No:12
      Page(s):
    2545-2553

    This paper describes a method to represent m output functions using shared multi-terminal binary decision diagrams (SMTBDDs). The SMTBDD(k) consists of multi-terminal binary decision diagrams (MTBDDs), where each MTBDD represents k output functions. An SMTBDD(k) is the generalization of shared binary decision diagrams (SBDDs) and MTBDDs: for k=1, it is an SBDD, and for k=m, it is an MTBDD. The size of a BDD is the total number of nodes. The features of SMTBDD(k)s are: 1) they are often smaller than SBDDs or MTBDDs; and 2) they evaluate k outputs simultaneously. We also propose an algorithm for grouping output functions to reduce the size of SMTBDD(k)s. Experimental results show the compactness of SMTBDD(k)s. An SMTBDDmin denotes the smaller SMTBDD which is either an SMTBDD(2) or an SMTBDD(3) with fewer nodes. The average relative sizes for SBDDs, MTBDDs, and SMTBDDs are 1. 00, 152. 73, and 0. 80, respectively.

  • Theoretical Transient Amplification Characteristics of Optical Waveguide Amplifiers Using Erbium Doped Garnet Crystalline Thin-Film

    Rakkappan BALASUBRAMANIAN  Yasumitsu MIYAZAKI  

     
    PAPER-Opto-Electronics

      Vol:
    E81-C No:12
      Page(s):
    1926-1935

    A thin-film waveguide amplifier based on Er-doped Garnet crystals is proposed and transient amplification characteristics, studied numerically using time-dependent rate equations and mode evolution equations, are presented. The potential of the amplifier for integration with active devices operating at the present communication wavelength of 1. 53 µm band is revealed. Pump wavelengths in the visible and near infrared lead to excited state absorption, and will affect the gain characteristics, which has been included in the present study. Steady state response of the Er doped Garnet crystal waveguide amplifiers has been analyzed in order to optimize the gain characteristics, which are further used in the dynamic response analysis. Accordingly, it is shown that a high gain of 20 dB/cm is possible to be achieved. Experimentally determined parameters such as waveguide loss, absorption and emission cross-sections have been used for the simulations. Comparisons of the present simulation results with our earlier reported results of quasi-two-level laser model and other reported results are also presented. Understanding the dynamic characteristics of the integrated optic waveguide amplifiers is necessary when the input signal is modulated in various formats. Because of the slower gain dynamics of the Er doped Garnet amplifier medium, it is shown that the longer signal input pulses are observed to be distorted upon amplification. Very short single pulse of nano- and pico-second duration are amplified without change in the pulse shape. Input pulses of square, Gaussian and Lorentzian shapes have been considered for the numerical examples.

  • Pragmatic Trellis Coded MPSK with Bandwidth Expansion on Rayleigh Fading Channel

    Hirokazu TANAKA  Shoichiro YAMASAKI  

     
    PAPER-Transmission and Modulation

      Vol:
    E81-B No:12
      Page(s):
    2276-2282

    A Pragmatic Trellis Coded MPSK on a Rayleigh fading channel is analyzed. This scheme allows bandwidth expansion ratio to be varied aiming at an optimization between complexity of the system design and improvement of coding gain. In order to vary the bandwidth expansion ratio, a punctured convolutional code is used. The performance of the proposed TC-2mPSK on a Rayleigh fading channel is theoretically analyzed. In the test examples, the BER performances of TC-QPSK and TC-8PSK are evaluated by theoretical analyses and computer simulations at the encoder parameters of K3 and r3/4. The results show that the proposed scheme can attain better performance not only over the uncoded scheme but over the conventional Pragmatic TCM.

  • Input Current Controlled DC Interconnection Converter for Fuel Cell Systems

    Yutaka KUWATA  Tadatoshi BABASAKI  

     
    PAPER-Power Supply

      Vol:
    E81-B No:12
      Page(s):
    2553-2558

    A fuel cell energy system is under development for supply of generated electrical energy to telecommunications equipment. It is a cogeneration system; the heat energy recovered is used to cool the telecommunications equipment. For this system, a method is described for controlling a new DC interconnection converter. Its DC interconnection characteristics are also discussed. The new converter controls its input current to the fuel cell rated current at maximum and can operate stably even when the fuel cell voltage decreases. This allows good DC interconnection characteristics to be obtained in both the steady state and the transient state.

  • A 250 MHz Dual Port Cursor RAM Using Dynamic Data Alignment Architecture

    Yasunobu NAKASE  Hiroyuki KONO  Yoshio MATSUDA  Hisanori HAMANO  

     
    PAPER-Electronic Circuits

      Vol:
    E81-C No:11
      Page(s):
    1750-1756

    Cursor RAMs have been composed of two memory planes. A cursor pattern is stored in these planes with 2-bit data depth. While the pixel port requires data from both planes at the same time, the MPU port accesses either one of the planes at a time. Since the address space is defined differently between the ports, conventional cursor RAMs could not have dealt with these different access ways at real time. This paper proposes a dual port cursor RAM with a dynamic data alignment architecture. The architecture processes the different access ways at real time, and reduces a large amount of control circuitry. Conventional cursor RAMs have been organized with a single port memory because dual port memory cells have been large. We have applied the port swap architecture which has reduced the cell size. The control block is further simplified because the controller no longer emulate a dual port memory. The cursor RAM with these architectures is fabricated with a double metal 0. 5 µm CMOS process technology. The active area is 1. 51. 6 mm2 including a couple of shift registers and a control block. It operates up to 263 MHz at the supply voltage of 3. 3 V.

  • Initial Leveling of Strapdown Inertial Navigation System with an On-Line Robust Input Estimator

    Sou-Chen LEE  Cheng-Yu LIU  

     
    PAPER-Digital Signal Processing

      Vol:
    E81-A No:11
      Page(s):
    2383-2390

    Initial leveling of strapdown inertial navigation system is a prerequisite work for distinguishing between gravity and acceleration effects in the accelerometer sensing's. This study presents an on-line methodology to resolve the initial leveling problem of a vehicle, which is subject to a large, long duration, and abrupt disturbance input with a deterministic nature under noisy circumstances. The developed method herein is the Kalman filter based scheme with a robust input estimator, generalized M estimator, and a testing criterion. The generalized M estimator identifies the unexpected disturbance inputs in real time. In addition, hypothetical testing based on the least-squares estimator is devised to detect the input's onset and presence. A required regression equation between the observed value of the residual sequence with an unknown input and theoretical residual sequence of the Kalman filter with no input is formulated. Input estimation and detection are then provided on the basis of the derived regression equation. Moreover, Monte Carlo simulations are performed to assess the superior capabilities of the proposed method in term of rapid responses, accuracy, and robustness. The efficient initial leveling can facilitate the entire alignment of the inertial system.

  • Performance Comparison of Two Retransmission Control Schemes for Slow-Frequency-Hopped Communication Systems

    Katsumi SAKAKIBARA  Kazushi MOTONAGA  Yoshiharu YUBA  

     
    LETTER

      Vol:
    E81-A No:11
      Page(s):
    2346-2349

    This letter proposes a new retransmission control scheme for slow-frequency-hopped communication systems, in which the number of (re)transmitted packets is adaptively decreased in a certain period. Performance of the proposed scheme is analyzed and compared with that of the conventional scheme in terms of the normalized throughput and the 98% packet transmission delay. The numerical results show the superiority of the proposed scheme.

  • Efficient Implementation of Multi-Dimensional Array Redistribution

    Minyi GUO  Yoshiyuki YAMASHITA  Ikuo NAKATA  

     
    PAPER-Sofware System

      Vol:
    E81-D No:11
      Page(s):
    1195-1204

    Array redistribution is required very often in programs on distributed memory parallel computers. It is essential to use efficient algorithms for redistribution, otherwise the performance of programs may degrade considerably. In this paper, we focus on automatic generation of communication routines for multi-dimensional redistribution. The principal advantage of this work is to gain the ability to handle redistribution between arbitrary source and destination processor sets and between arbitrary source and destination distribution schemes. We have implemented these algorithms using Parallelware communication library. Some experimental results show the efficiency and flexibility of our techniques compared to the other redistribution works.

  • Analysis of a Partial Buffer Sharing Scheme for a Finite Buffer with Batch Poisson Inputs

    Shuichi SUMITA  

     
    PAPER-Communication Networks and Services

      Vol:
    E81-B No:11
      Page(s):
    2110-2120

    A partial buffer sharing scheme is proposed as loss-priority control for a finite buffer with batch inputs. A partial batch acceptance strategy is used for a batch arriving at a finite buffer. Customer loss probabilities for high- and low-priority customers are derived under this batch acceptance strategy, using a supplementary variable method that is a standard tool for queueing analysis. A comparison of the partial buffer sharing scheme and a system without loss-priority control is made in terms of admissible offered load.

  • ABR Traffic Control Scheme for Bursty Traffic Considering the Number of Hops

    Siriporn PISANPATTANAKUL  Miki YAMAMOTO  Hiromasa IKEDA  

     
    PAPER-ATM Networks

      Vol:
    E81-B No:11
      Page(s):
    2056-2063

    One of the objectives of ABR traffic control is a fair allocation of transmission rate to every connection. Algorithms which have been proposed can achieve the fair allocation of transmission rate in persistent traffic, even though the connections have different number of hops. In bursty traffic, however, the transmission rate during the burst period, called average burst throughput, may become degraded when the number of hops increases. In this paper, we evaluate the average burst throughput characteristics of ERICA switch algorithm and investigate the effect of the number of hops. We propose a new bandwidth allocation method which can improve the performance degradation by taking the number of hops into account. The effectiveness of our method is evaluated by computer simulation.

  • A Vehicular Driving Assistant System Using Spread Spectrum Techniques

    Ari WIDODO  Takaaki HASEGAWA  

     
    PAPER

      Vol:
    E81-A No:11
      Page(s):
    2334-2340

    In the ITS (Intelligent Transport Systems), it is an essential condition (mixed environment) that vehicles that have communication equipment and vehicles that do not have it simultaneously run in the same road. In this paper, a vehicular driving assistant system that is applicable to the mixed environment is proposed. The proposed system uses spread spectrum techniques and consists of several new systems such as a PN code assignment system, new vehicle position systems, and a vehicle map update system. In the proposed system, the wireless broadcast CDMA is used for inter-vehicle communications. This paper also shows preexaminations of the proposed system by using an autonomous traffic flow simulator including inter-vehicle communications. It is shown that the traffic safety can be improved by using inter-vehicle communications.

  • QoS Evaluation of a Multimedia Interactive Satellite Communications System

    Manabu NAKAGAWA  Yoichi HASHIMOTO  Noriyuki IKEUCHI  

     
    PAPER-Satellite and Wireless Networks

      Vol:
    E81-B No:11
      Page(s):
    2034-2040

    QoS of a multimedia interactive satellite communications system, which uses a satellite circuit for downlinks and a terrestrial network for uplinks, has been measured and evaluated under inferior satellite circuit conditions. Our attention in this paper is focused on TCP throughput as the most significant QoS, and experiments and analysis on TCP throughput were performed. The measured results are in good agreement with theoretical values calculated by taking congestion avoidance algorithms of TCP into consideration. As a result, we were able to verify that the TCP throughput declines radically when the low signal quality of a satellite circuit causes packet retransmission to occur. In this case, congestion avoidance works to reduce network congestion. The congestion avoidance increases the value of a retransmission timer and decreases the window size even if the network is not congested. Assuming that throughput deterioration is caused by rain fade, the total time when the throughput declines is less than 4 hours a year in Tokyo, and the results show the system can be put to practical use.

  • Minimax Geometric Fitting of Two Corresponding Sets of Points and Dynamic Furthest Voronoi Diagrams

    Keiko IMAI  Shigeo SUMINO  Hiroshi IMAI  

     
    PAPER-Algorithm and Computational Complexity

      Vol:
    E81-D No:11
      Page(s):
    1162-1171

    This paper formulates problems of fitting two corresponding sets of points by translation, rotation and scaling, and proposes efficient algorithms for the fitting. The algorithms are based on the theory of lower envelopes, or Davenport-Schinzel sequences, and linearization techniques in computational geometry, and are related to dynamic furthest Voronoi diagrams.

  • Construction Method of UEP Convolutional Codes Based on Conditional Weight Distributions

    Kazuhiko YAMAGUCHI  Toshiaki WATANABE  Kingo KOBAYASHI  

     
    PAPER-Coding Theory

      Vol:
    E81-A No:10
      Page(s):
    2019-2024

    In this paper, we study unequal error protection (UEP) capabilities of punctured convolutional codes. For constructing the good UEP convolutional codes, the conditional weight distributions of UEP convolutional codes are defined and evaluated. The conditional weight distributions are computed by using the transfer functions of time-varying trellis structures of punctured convolutional codes. The best UEP convolutional codes from the viewpoint of the weight distributions are listed.

  • Application of Turbo TCM Codes for Impulsive Noise Channel

    Kiyoyuki KOIKE  Haruo OGIWARA  

     
    PAPER-Coded Modulation

      Vol:
    E81-A No:10
      Page(s):
    2032-2039

    A turbo TCM system is applied to a channel with overall noise which is equal to the additive combination of impulsive Gaussian noise and Additive White Gaussian Noise (AWGN). By taking the distribution of the previously mentioned overall noise into account, a decoding algorithm for Poisson occurrence impulsive noise is derived as an extension of that for AWGN. A simulation result shows that Eb/N0 difference from Shannon limit to realize BER=10-4 is 0. 493 dB. To investigate the effect of burst noise, we discuss the case of additive impulsive noise with Markovian occurrence which is represented by Hidden Markov Model. A decoding algorithm for Markovian noise is proposed. In the iterative decoding for the Markovian channel, the decoding algorithms for Markovian and Poisson noise are applied separately to the two component decoders. The decoding algorithm for Markovian noise is used in the component decoder wherein received signal is directly fed, while the decoding algorithm for Poisson noise is used in the component decoder wherein received signal is fed after passing an interleaver. This paper also shows simulation results that include the effects of varying the noise parameters in the decoding. In the Markovian case, when smaller value of variance of impulsive noise is used, the observed flattening of BER performance is more serious compared to the effect in the Poisson noise channel. No flattening is observed when large value is used.

  • On the Security of the Improved Knapsack Cryptosystem

    Hidenori KUWAKADO  Hatsukazu TANAKA  

     
    LETTER-Coded Modulation/Security

      Vol:
    E81-A No:10
      Page(s):
    2184-2185

    We discuss the security of the improved knapsack cryptosystem that Kobayashi and Kimura have proposed. Two attacking methods for their cryptosystem are proposed; one is the method for obtaining secret keys from public keys by using the continued fraction, and the other is for decrypting the ciphertext without knowing secret keys. We show that their cryptosystem is not secure against these attacks.

  • Output Process of Shaper and Switch with Self-Similar Traffic in ATM Networks

    Chikara OHTA  Fumio ISHIZAKI  

     
    LETTER-Switching and Communication Processing

      Vol:
    E81-B No:10
      Page(s):
    1936-1940

    This paper studies how the self-similarity of traffic changes through shaper (buffered leaky bucket) and switch in ATM networks by numerical experiments. Further the applicability of CAC algorithm to shaped self-similar traffic is also investigated. Numerical experiments show self-similarity of total output traffic from shapers and switch is kept while connection-wise self-similarity is broken.

2721-2740hit(3318hit)