The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Q(6809hit)

4521-4540hit(6809hit)

  • A Low Power and Small Area Analog Adaptive Line Equalizer for 100 Mb/s Data Rate on UTP Cable

    Kwisung YOO  Hoon LEE  Gunhee HAN  

     
    PAPER-Electronic Circuits

      Vol:
    E87-C No:4
      Page(s):
    634-639

    The cable length in wired serial data communication is limited because the limited bandwidth of a long cable introduces ISI (Inter Symbol Interference). A line equalizer can be used at the receiver to extend the channel bandwidth. This paper proposes a low-power and small-area analog adaptive line equalizer for 100-Mb/s operation on UTP (Unshielded Twisted Pair) cable up to 100 m. The proposed adaptive line equalizer is fabricated with 0.35-µm CMOS process, consumes 19 mW and occupies only 0.07 mm2 Measurement results show that the prototype can operate at data rate of 100 Mb/s on a 100-m cable and 155 Mb/s on a 50-m cable.

  • An Initial Solution Algorithm for Globally Convergent Homotopy Methods

    Yasuaki INOUE  Saeko KUSANOBU  Kiyotaka YAMAMURA  Makoto ANDO  

     
    PAPER

      Vol:
    E87-A No:4
      Page(s):
    780-786

    Finding DC operating points of transistor circuits is an important and difficult task. The Newton-Raphson method adopted in SPICE-like simulators often fails to converge to a solution. To overcome this convergence problem, homotopy methods have been studied from various viewpoints. For efficiency of globally convergent homotopy methods, it is important to give an appropriate initial solution as a starting point. However, there are few studies concerning such initial solution algorithms. In this paper, initial solution problems in homotopy methods are discussed, and an effective initial solution algorithm is proposed for globally convergent homotopy methods, which finds DC operating points of transistor circuits efficiently. Numerical examples using practical transistor circuits show the effectiveness of the proposed algorithm.

  • Generation of Various Types of Spatio-Temporal Phenomena in Two-Layer Cellular Neural Networks

    Zonghuang YANG  Yoshifumi NISHIO  Akio USHIDA  

     
    PAPER-Nonlinear Problems

      Vol:
    E87-A No:4
      Page(s):
    864-871

    The paper discusses the spatio-temporal phenomena in autonomous two-layer Cellular Neural Networks (CNNs) with mutually coupled templates between two layers. By computer calculations, we show how pattern formations, autowaves and classical waves can be regenerated in the networks, and describe the properties of these phenomena in detail. In particular, we focus our discussion on the necessary conditions for generating these spatio-temporal phenomena. In addition, the influences of the template parameters and initial state conditions of CNNs on the spatio-temporal phenomena are investigated.

  • A Robust Blind Image Watermarking Scheme Based on Vector Quantization

    Soo-Chang PEI  Jun-Horng CHEN  

     
    PAPER-Image

      Vol:
    E87-A No:4
      Page(s):
    912-919

    Watermarking schemes have been extensively discussed and developed recently. People are usually facing the dilemma of two factors, robustness and transparency. To achieve these requirements, embedding the watermark message in the transform domain or the spatial domain is usually considered. In this paper, we will propose a blind image watermarking scheme based on vector quantization. By exploiting a modified binary tree splitting method, a stable codebook could be generated so that the watermark message could be novelly embedded and survive the JPEG compression and the Gaussian noise addition. The embedded message could be extracted without referring the host image. It makes the scheme more practical.

  • The Effects of Varying Soft Handoff Thresholds in Cellular CDMA System

    Bongkarn HOMNAN  Watit BENJAPOLAKUL  Katsutoshi TSUKAMOTO  Shozo KOMAKI  

     
    PAPER-Fundamental Theories

      Vol:
    E87-B No:4
      Page(s):
    807-815

    In order to benefit from the advantages of soft handoff (SHO), it is important that the SHO parameters (the SHO thresholds; T_ADD and T_DROP are well assigned. T_ADD is the threshold used for triggering a pilot with high strength to be added to the Active Set (AS) list. The AS means the pilots associated with the forward traffic channels assigned to mobile station. In contrast, T_DROP is the threshold used for triggering a pilot with low strength to be dropped from the AS list. This paper analyzes the effects of varying SHO thresholds in a cellular code division multiple access (CDMA) system on the blocking probability based on traffic load and geometrical distances in hexagonal layout of base stations (BSs). In addition, the previously proposed traffic load equation is applied to the proposed SHO model for balancing the numbers of new and handoff calls on the forward link capacity in case of uniform traffic load. The results show that the blocking probability is more sensitive to T_DROP than to T_ADD variations.

  • Estimation of Degradation of Nickel-Cadmium Batteries for Cordless Telephones by a Discharge-Current-Pulse Technique

    Toshiro HIRAI  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E87-B No:4
      Page(s):
    984-989

    We investigated the accuracy of nickel-cadmium (Ni/Cd) battery degradation estimation by measuring the capacity of over 400 used cordless-telephone batteries using a discharge-current-pulse technique. The capacity is calculated from the change in battery voltage after the current pulse is applied, using an equation that we developed. Battery degradation is represented by a percentage of the capacity based on the nominal one. To estimate the accuracy of the degradation estimation, we compare capacity Qe estimated from the current pulse with the capacity Qa measured by discharging the batteries. The Qe estimated from the current pulse was within a range of 20% of error indicated by (Qe-Qa) for 47% of the tested batteries. The Qe of 51% of the batteries, however, was underestimated and exceeded lower limit (-20%) of the error. One reason for the discrepancy could be that the equation is inadequate for estimating the capacity from the current pulse. On the other hand, the capacity Qe of 1% of the batteries was overestimated and exceeded upper limit (+20%) of the error. An internal short is probably the main reason for this.

  • Joint Space-Time Transmit Diversity and Minimum Mean Square Error Equalization for MC-CDMA with Antenna Diversity Reception

    Deepshikha GARG  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:4
      Page(s):
    849-857

    In this paper, the space time transmit diversity (STTD) decoding combined with minimum mean square error (MMSE) equalization is presented for MC-CDMA downlink and uplink in the presence of multiple receive antennas. The equalization weights that minimize the MSE for each subcarrier are derived. From computer simulation, it was found that the BER performance of STTD decoding combined with MMSE equalization and Mr-antenna diversity reception using the weights derived in this paper provides the same diversity order as 2Mr-antenna receive diversity with MMSE equalization but with 3 dB performance penalty and is always better than that with no diversity. The uplink BER performance can also be improved with STTD, but the error floor still exists. However, with 2-receive antennas in addition to 2-antenna STTD, the BER floor can be reduced to around 10-5 even for the uplink.

  • Influence of the Timeslot Interchange Mechanism on the Buffer Behavior of an Integrated Switching Element

    Bart de SCHEPPER  Bart STEYAERT  Sabine WITTEVRONGEL  Herwig BRUNEEL  

     
    PAPER-Switching

      Vol:
    E87-B No:4
      Page(s):
    909-917

    Classical studies of Asynchronous Transfer Mode (ATM) switching elements and in particular the buffer behavior of the Shared Buffer Memory (SBM), assume that all read and write operations of cells to, respectively from, the SBM are executed simultaneously. However, in a real switching element, the inlets (outlets) are scanned sequentially for arriving (departing) cells during the so-called input (output) cycle. Furthermore, the input and output cycles are intermingled, each read operation being followed by a write operation. This is referred to as the Timeslot Interchange Mechanism (TIM). In this paper, we present the analysis of a queueing model that includes the TIM. We model the cell arrival processes on the inlets of the switching element as independent Bernoulli arrival processes. Moreover, we assume that cells are routed from the inlets to the outlets of the switching element according to an independent and uniform process, i.e., the destinations of consecutive cell arrivals on any given inlet are independent and for a given cell all destinations are equiprobable. Under these assumptions, we will derive expressions for the probability generating functions of the queue length in an individual routing group (a logical queue that contains all cells scheduled for the same destination), the (total) queue length in the SBM, and the cell waiting time. From these results, expressions for the mean values and the tail distributions of these quantities are calculated, and the influence of the TIM on the buffer behavior is studied through comparison with a model where all read and write operations occur simultaneously.

  • A Proposal of a Hybrid RSVP/COPS Protocol for End-to-End QoS Delivery in IntServ and DiffServ Connected Architecture

    Chin-Ling CHEN  

     
    PAPER-Network

      Vol:
    E87-B No:4
      Page(s):
    926-931

    The issue of scalable Differentiated Services (DiffServ) admission control now is still an open research problem. We propose a new admission control model that can not only provide coarse grain Quality of Services (QoS), but also guarantee end-to-end QoS for assured service without per-flow state management at core routers within DiffServ domain. Associated with flow aggregation model, a hybrid signaling protocol is proposed to select the route satisfying the end-to-end QoS requirements. Simulation result shows that the proposed model can accurately manage resource, leading to much better performance when compared to other schemes.

  • A Receive Frequency Diversity Technique for Multiplexed STBC OFDM Systems

    Hyeok Koo JUNG  Yong Soo CHO  

     
    LETTER-Wireless Communication Technology

      Vol:
    E87-B No:4
      Page(s):
    1030-1033

    In this letter, a receive frequency diversity technique is proposed to improve the performance of a multiplexed STBC OFDM system. Frequency diversity in the multiplexed STBC OFDM system is obtained by introducing frequency shifter in the successive STBC symbols and applying MRRC technique to regenerated and subtracted signals of the predecoded data from multiplexed STBC decoder. It is shown by computer simulation that the performance of the proposed multiplexed STBC OFDM systems with frequency diversity is improved by 5 dB at the BER of 10-3 over the existing multiplexed STBC OFDM systems with the same data rate.

  • Rate Compatible Block Turbo Codes for Hybrid ARQ Schemes

    Sooyoung KIM  Jae Moung KIM  Sung Pal LEE  

     
    LETTER-Fundamental Theories

      Vol:
    E87-B No:4
      Page(s):
    999-1001

    Rate compatible (RC) codes are used for adaptive coding schemes or hybrid ARQ schemes in order to adapt varying channel conditions. This can improve overall service quality or the system throughput. Conventional RC codes have usually been designed on the basis of convolutional codes. This letter proposes an efficient RC code based on block codes. We use a high dimensional product code and divide it into the information block and a number of parity blocks. We form RC product codes using various combinations of these blocks. Because we can decode the RC product codes iteratively, these result in block turbo codes and they can be used efficiently for hybrid ARQ schemes.

  • Orthogonal Transformation to Enhance the Security of the Still Image Watermarking System

    Guo-rui FENG  Ling-ge JIANG  Chen HE  

     
    LETTER-Digital Signal Processing

      Vol:
    E87-A No:4
      Page(s):
    949-951

    A watermarking system is secure as long as it satisfies Kerckhoffs principle according to the cryptography. In this letter, two novel techniques named the encrypted orthogonal transformation and its improved scheme as useful preprocessing methods are presented to apply to the watermarking field, which can enhance the security of the watermarking scheme. Compared to discrete cosine transform watermarking algorithms, this method has similar robustness but higher security.

  • Formalization of Binary Sequence Sets with Zero Correlation Zone

    Kenji TAKATSUKASA  Shinya MATSUFUJI  Yoshihiro TANADA  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E87-A No:4
      Page(s):
    887-891

    This paper formulates functions generating four kinds of binary sequence sets of length 2n with zero correlation zone, which have been discussed for approximately synchronized CDMA systems without co-channel interference nor influence of multipath. They are logic functions of a binary vector of order n, expressed by EXOR and AND operations.

  • Transformation between Scenarios from Different Viewpoints

    HongHui ZHANG  Atsushi OHNISHI  

     
    PAPER-Requirement Engineering

      Vol:
    E87-D No:4
      Page(s):
    801-810

    Scenarios that describe concrete situations of software operation play an important role in software development and especially in requirements engineering. Scenario details should vary in content when described from different viewpoints, but this presents a difficulty, because an informal scenario from one viewpoint can not easily be transformed into a scenario from another viewpoint with consistency and assurance. This paper describes (1) a language for describing scenarios in which simple action traces are embellished to include typed frames based on a simple case grammar of actions, and (2) a method to accomplish the transformation between scenarios from different viewpoints based on the scenario description language.

  • Combining Goal-Oriented Analysis and Use Case Analysis

    Kenji WATAHIKI  Motoshi SAEKI  

     
    PAPER-Requirement Engineering

      Vol:
    E87-D No:4
      Page(s):
    822-830

    Goal-oriented analysis and use case analysis are well known requirements analysis methods and are putting into practice. Roughly speaking, goal-oriented methods are suitable for eliciting constraints to a system and use case analysis methods elicit concrete system behavior. Thus these methods are complementary and their integration into a new method allows us to get a more powerful requirements elicitation method. This paper proposes a new method where both of the methods are amalgamated. In our method, constraints to the system are refined by goal-oriented style, while system behavior are described with hierarchical use cases. Since a use case is made relate to goals during our elicitation processes, the decomposition of goals and use cases are complementally supported. Furthermore we applied our method to a couple of development projects and assessed its effectiveness.

  • Quadtrees-Based Image Authentication Technique

    Hongxia WANG  Chen HE  Ke DING  

     
    LETTER-Digital Signal Processing

      Vol:
    E87-A No:4
      Page(s):
    946-948

    This letter presents a novel quandtree-based image authentication technique especially suitable for the content authentication of high quality required digital images. The host image and the hiding marks generate quadtrees which record the information of host images. Any malicious tamper to the image is reflected from the recovered marks. Compared to other authentication schemes based on the fragile watermarking technique, the host image is not at all modified and the detection to malicious tamper is sensitive.

  • A Simple Design of Time-Efficient Firing Squad Synchronization Algorithms with Fault-Tolerance

    Hiroshi UMEO  

     
    PAPER

      Vol:
    E87-D No:3
      Page(s):
    733-739

    In this paper we study a classical firing squad synchronization problem on a model of fault-tolerant cellular automata that have possibly some defective cells. Several fault-tolerant time-efficient synchronization algorithms are developed based on a simple freezing-thawing technique. It is shown that, under some constraints on the distribution of defective cells, any cellular array of length n with p defective cell segments can be synchronized in 2n - 2 + p steps.

  • On the Descriptional Complexity of Iterative Arrays

    Andreas MALCHER  

     
    PAPER

      Vol:
    E87-D No:3
      Page(s):
    721-725

    The descriptional complexity of iterative arrays (IAs) is studied. Iterative arrays are a parallel computational model with a sequential processing of the input. It is shown that IAs when compared to deterministic finite automata or pushdown automata may provide savings in size which are not bounded by any recursive function, so-called non-recursive trade-offs. Additional non-recursive trade-offs are proven to exist between IAs working in linear time and IAs working in real time. Furthermore, the descriptional complexity of IAs is compared with cellular automata (CAs) and non-recursive trade-offs are proven between two restricted classes. Finally, it is shown that many decidability questions for IAs are undecidable and not semidecidable.

  • Planar Photonic Crystal Nanolasers (II): Low-Threshold Quantum Dot Lasers

    Tomoyuki YOSHIE  Oleg B. SHCHEKIN  Hao CHEN  Dennis G. DEPPE  Axel SCHERER  

     
    INVITED PAPER

      Vol:
    E87-C No:3
      Page(s):
    300-307

    We have demonstrated low-threshold two-dimensional photonic crystal lasers with self-assembled InAs/GaAs quantum dots. Coupled cavity designs of whispering gallery modes are defined in square lattice photonic crystal slabs. Our lasers showed a small 120 µW input pumping power threshold. Actual absorption power is evaluated to be less than 20 µW. Our lasers show high spontaneous emission coupling (β) factors0.1. The mode volumes are expected to be 0.7-1.2 times cubed wavelength by our modelling. Based on threshold analysis, 80 QDs are the effective number of QDs defined as the number of QDs needed to make PC cavities transparent if they are on maximum optical field points. Using the same analysis we found that single quantum dot lasing is likely to occur both by proper alignment of the single quantum dot relative to geometries of photonic crystals and by using sharp QD emission lines in high-Q localized modes.

  • Photonic Crystal with Advanced Micro/Nano-Structures: Quantum Dots and MEMS

    Satoshi IWAMOTO  Yasuhiko ARAKAWA  

     
    INVITED PAPER

      Vol:
    E87-C No:3
      Page(s):
    343-350

    We discuss photonic crystals (PhCs) with advanced micro/nano-structres which are semiconductor quantum dots (QDs) and micro electro-mechanical systems (MEMS) for the purpose of realizing novel classes of PhC devices in future photonic network system. After brief introduction on advantages to implement QDs and MEMS with PhCs, we discuss optical characterization of PhC microcavity containing self-assembled InAs QDs. Modification of emission spectrum of a QD ensemble due to the resonant cavity modes is demonstrated. We also point out the feasibility of low-threshold PhC lasers with QD active media in numerical analysis. A very low threshold current of 10 µA is numerically obtained for lasing action in the multi dimensional distributed feedback mode by using realistic material parameters. Then, the basic concept for MEMS-controlled PhC slab devices is described. We show numerical results that demonstrate some of interesting functions such as the intensity modulation and the tuning of resonant frequency of cavity mode. Finally, a preliminary experiment of MEMS-based switching operation in a PhC line-defect waveguide is demonstrated.

4521-4540hit(6809hit)