Kwisung YOO Hoon LEE Gunhee HAN
The cable length in wired serial data communication is limited because the limited bandwidth of a long cable introduces ISI (Inter Symbol Interference). A line equalizer can be used at the receiver to extend the channel bandwidth. This paper proposes a low-power and small-area analog adaptive line equalizer for 100-Mb/s operation on UTP (Unshielded Twisted Pair) cable up to 100 m. The proposed adaptive line equalizer is fabricated with 0.35-µm CMOS process, consumes 19 mW and occupies only 0.07 mm2 Measurement results show that the prototype can operate at data rate of 100 Mb/s on a 100-m cable and 155 Mb/s on a 50-m cable.
Yasuaki INOUE Saeko KUSANOBU Kiyotaka YAMAMURA Makoto ANDO
Finding DC operating points of transistor circuits is an important and difficult task. The Newton-Raphson method adopted in SPICE-like simulators often fails to converge to a solution. To overcome this convergence problem, homotopy methods have been studied from various viewpoints. For efficiency of globally convergent homotopy methods, it is important to give an appropriate initial solution as a starting point. However, there are few studies concerning such initial solution algorithms. In this paper, initial solution problems in homotopy methods are discussed, and an effective initial solution algorithm is proposed for globally convergent homotopy methods, which finds DC operating points of transistor circuits efficiently. Numerical examples using practical transistor circuits show the effectiveness of the proposed algorithm.
Zonghuang YANG Yoshifumi NISHIO Akio USHIDA
The paper discusses the spatio-temporal phenomena in autonomous two-layer Cellular Neural Networks (CNNs) with mutually coupled templates between two layers. By computer calculations, we show how pattern formations, autowaves and classical waves can be regenerated in the networks, and describe the properties of these phenomena in detail. In particular, we focus our discussion on the necessary conditions for generating these spatio-temporal phenomena. In addition, the influences of the template parameters and initial state conditions of CNNs on the spatio-temporal phenomena are investigated.
Watermarking schemes have been extensively discussed and developed recently. People are usually facing the dilemma of two factors, robustness and transparency. To achieve these requirements, embedding the watermark message in the transform domain or the spatial domain is usually considered. In this paper, we will propose a blind image watermarking scheme based on vector quantization. By exploiting a modified binary tree splitting method, a stable codebook could be generated so that the watermark message could be novelly embedded and survive the JPEG compression and the Gaussian noise addition. The embedded message could be extracted without referring the host image. It makes the scheme more practical.
Bongkarn HOMNAN Watit BENJAPOLAKUL Katsutoshi TSUKAMOTO Shozo KOMAKI
In order to benefit from the advantages of soft handoff (SHO), it is important that the SHO parameters (the SHO thresholds; T_ADD and T_DROP are well assigned. T_ADD is the threshold used for triggering a pilot with high strength to be added to the Active Set (AS) list. The AS means the pilots associated with the forward traffic channels assigned to mobile station. In contrast, T_DROP is the threshold used for triggering a pilot with low strength to be dropped from the AS list. This paper analyzes the effects of varying SHO thresholds in a cellular code division multiple access (CDMA) system on the blocking probability based on traffic load and geometrical distances in hexagonal layout of base stations (BSs). In addition, the previously proposed traffic load equation is applied to the proposed SHO model for balancing the numbers of new and handoff calls on the forward link capacity in case of uniform traffic load. The results show that the blocking probability is more sensitive to T_DROP than to T_ADD variations.
We investigated the accuracy of nickel-cadmium (Ni/Cd) battery degradation estimation by measuring the capacity of over 400 used cordless-telephone batteries using a discharge-current-pulse technique. The capacity is calculated from the change in battery voltage after the current pulse is applied, using an equation that we developed. Battery degradation is represented by a percentage of the capacity based on the nominal one. To estimate the accuracy of the degradation estimation, we compare capacity Qe estimated from the current pulse with the capacity Qa measured by discharging the batteries. The Qe estimated from the current pulse was within a range of 20% of error indicated by (Qe-Qa) for 47% of the tested batteries. The Qe of 51% of the batteries, however, was underestimated and exceeded lower limit (-20%) of the error. One reason for the discrepancy could be that the equation is inadequate for estimating the capacity from the current pulse. On the other hand, the capacity Qe of 1% of the batteries was overestimated and exceeded upper limit (+20%) of the error. An internal short is probably the main reason for this.
Deepshikha GARG Fumiyuki ADACHI
In this paper, the space time transmit diversity (STTD) decoding combined with minimum mean square error (MMSE) equalization is presented for MC-CDMA downlink and uplink in the presence of multiple receive antennas. The equalization weights that minimize the MSE for each subcarrier are derived. From computer simulation, it was found that the BER performance of STTD decoding combined with MMSE equalization and Mr-antenna diversity reception using the weights derived in this paper provides the same diversity order as 2Mr-antenna receive diversity with MMSE equalization but with 3 dB performance penalty and is always better than that with no diversity. The uplink BER performance can also be improved with STTD, but the error floor still exists. However, with 2-receive antennas in addition to 2-antenna STTD, the BER floor can be reduced to around 10-5 even for the uplink.
Bart de SCHEPPER Bart STEYAERT Sabine WITTEVRONGEL Herwig BRUNEEL
Classical studies of Asynchronous Transfer Mode (ATM) switching elements and in particular the buffer behavior of the Shared Buffer Memory (SBM), assume that all read and write operations of cells to, respectively from, the SBM are executed simultaneously. However, in a real switching element, the inlets (outlets) are scanned sequentially for arriving (departing) cells during the so-called input (output) cycle. Furthermore, the input and output cycles are intermingled, each read operation being followed by a write operation. This is referred to as the Timeslot Interchange Mechanism (TIM). In this paper, we present the analysis of a queueing model that includes the TIM. We model the cell arrival processes on the inlets of the switching element as independent Bernoulli arrival processes. Moreover, we assume that cells are routed from the inlets to the outlets of the switching element according to an independent and uniform process, i.e., the destinations of consecutive cell arrivals on any given inlet are independent and for a given cell all destinations are equiprobable. Under these assumptions, we will derive expressions for the probability generating functions of the queue length in an individual routing group (a logical queue that contains all cells scheduled for the same destination), the (total) queue length in the SBM, and the cell waiting time. From these results, expressions for the mean values and the tail distributions of these quantities are calculated, and the influence of the TIM on the buffer behavior is studied through comparison with a model where all read and write operations occur simultaneously.
The issue of scalable Differentiated Services (DiffServ) admission control now is still an open research problem. We propose a new admission control model that can not only provide coarse grain Quality of Services (QoS), but also guarantee end-to-end QoS for assured service without per-flow state management at core routers within DiffServ domain. Associated with flow aggregation model, a hybrid signaling protocol is proposed to select the route satisfying the end-to-end QoS requirements. Simulation result shows that the proposed model can accurately manage resource, leading to much better performance when compared to other schemes.
In this letter, a receive frequency diversity technique is proposed to improve the performance of a multiplexed STBC OFDM system. Frequency diversity in the multiplexed STBC OFDM system is obtained by introducing frequency shifter in the successive STBC symbols and applying MRRC technique to regenerated and subtracted signals of the predecoded data from multiplexed STBC decoder. It is shown by computer simulation that the performance of the proposed multiplexed STBC OFDM systems with frequency diversity is improved by 5 dB at the BER of 10-3 over the existing multiplexed STBC OFDM systems with the same data rate.
Sooyoung KIM Jae Moung KIM Sung Pal LEE
Rate compatible (RC) codes are used for adaptive coding schemes or hybrid ARQ schemes in order to adapt varying channel conditions. This can improve overall service quality or the system throughput. Conventional RC codes have usually been designed on the basis of convolutional codes. This letter proposes an efficient RC code based on block codes. We use a high dimensional product code and divide it into the information block and a number of parity blocks. We form RC product codes using various combinations of these blocks. Because we can decode the RC product codes iteratively, these result in block turbo codes and they can be used efficiently for hybrid ARQ schemes.
Guo-rui FENG Ling-ge JIANG Chen HE
A watermarking system is secure as long as it satisfies Kerckhoffs principle according to the cryptography. In this letter, two novel techniques named the encrypted orthogonal transformation and its improved scheme as useful preprocessing methods are presented to apply to the watermarking field, which can enhance the security of the watermarking scheme. Compared to discrete cosine transform watermarking algorithms, this method has similar robustness but higher security.
Kenji TAKATSUKASA Shinya MATSUFUJI Yoshihiro TANADA
This paper formulates functions generating four kinds of binary sequence sets of length 2n with zero correlation zone, which have been discussed for approximately synchronized CDMA systems without co-channel interference nor influence of multipath. They are logic functions of a binary vector of order n, expressed by EXOR and AND operations.
Scenarios that describe concrete situations of software operation play an important role in software development and especially in requirements engineering. Scenario details should vary in content when described from different viewpoints, but this presents a difficulty, because an informal scenario from one viewpoint can not easily be transformed into a scenario from another viewpoint with consistency and assurance. This paper describes (1) a language for describing scenarios in which simple action traces are embellished to include typed frames based on a simple case grammar of actions, and (2) a method to accomplish the transformation between scenarios from different viewpoints based on the scenario description language.
Goal-oriented analysis and use case analysis are well known requirements analysis methods and are putting into practice. Roughly speaking, goal-oriented methods are suitable for eliciting constraints to a system and use case analysis methods elicit concrete system behavior. Thus these methods are complementary and their integration into a new method allows us to get a more powerful requirements elicitation method. This paper proposes a new method where both of the methods are amalgamated. In our method, constraints to the system are refined by goal-oriented style, while system behavior are described with hierarchical use cases. Since a use case is made relate to goals during our elicitation processes, the decomposition of goals and use cases are complementally supported. Furthermore we applied our method to a couple of development projects and assessed its effectiveness.
This letter presents a novel quandtree-based image authentication technique especially suitable for the content authentication of high quality required digital images. The host image and the hiding marks generate quadtrees which record the information of host images. Any malicious tamper to the image is reflected from the recovered marks. Compared to other authentication schemes based on the fragile watermarking technique, the host image is not at all modified and the detection to malicious tamper is sensitive.
In this paper we study a classical firing squad synchronization problem on a model of fault-tolerant cellular automata that have possibly some defective cells. Several fault-tolerant time-efficient synchronization algorithms are developed based on a simple freezing-thawing technique. It is shown that, under some constraints on the distribution of defective cells, any cellular array of length n with p defective cell segments can be synchronized in 2n - 2 + p steps.
The descriptional complexity of iterative arrays (IAs) is studied. Iterative arrays are a parallel computational model with a sequential processing of the input. It is shown that IAs when compared to deterministic finite automata or pushdown automata may provide savings in size which are not bounded by any recursive function, so-called non-recursive trade-offs. Additional non-recursive trade-offs are proven to exist between IAs working in linear time and IAs working in real time. Furthermore, the descriptional complexity of IAs is compared with cellular automata (CAs) and non-recursive trade-offs are proven between two restricted classes. Finally, it is shown that many decidability questions for IAs are undecidable and not semidecidable.
Tomoyuki YOSHIE Oleg B. SHCHEKIN Hao CHEN Dennis G. DEPPE Axel SCHERER
We have demonstrated low-threshold two-dimensional photonic crystal lasers with self-assembled InAs/GaAs quantum dots. Coupled cavity designs of whispering gallery modes are defined in square lattice photonic crystal slabs. Our lasers showed a small 120 µW input pumping power threshold. Actual absorption power is evaluated to be less than 20 µW. Our lasers show high spontaneous emission coupling (β) factors0.1. The mode volumes are expected to be 0.7-1.2 times cubed wavelength by our modelling. Based on threshold analysis, 80 QDs are the effective number of QDs defined as the number of QDs needed to make PC cavities transparent if they are on maximum optical field points. Using the same analysis we found that single quantum dot lasing is likely to occur both by proper alignment of the single quantum dot relative to geometries of photonic crystals and by using sharp QD emission lines in high-Q localized modes.
Satoshi IWAMOTO Yasuhiko ARAKAWA
We discuss photonic crystals (PhCs) with advanced micro/nano-structres which are semiconductor quantum dots (QDs) and micro electro-mechanical systems (MEMS) for the purpose of realizing novel classes of PhC devices in future photonic network system. After brief introduction on advantages to implement QDs and MEMS with PhCs, we discuss optical characterization of PhC microcavity containing self-assembled InAs QDs. Modification of emission spectrum of a QD ensemble due to the resonant cavity modes is demonstrated. We also point out the feasibility of low-threshold PhC lasers with QD active media in numerical analysis. A very low threshold current of 10 µA is numerically obtained for lasing action in the multi dimensional distributed feedback mode by using realistic material parameters. Then, the basic concept for MEMS-controlled PhC slab devices is described. We show numerical results that demonstrate some of interesting functions such as the intensity modulation and the tuning of resonant frequency of cavity mode. Finally, a preliminary experiment of MEMS-based switching operation in a PhC line-defect waveguide is demonstrated.