The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

941-960hit(2307hit)

  • High-Speed Frequency Modulated DBR Lasers for Long-Reach Transmission Open Access

    Takaaki KAKITSUKA  Shinji MATSUO  

     
    INVITED PAPER

      Vol:
    E92-C No:7
      Page(s):
    929-936

    We present a novel high-speed transmitter consisting of a frequency modulated DBR laser and optical filters. The refractive index modulation in the phase control region of the DBR laser allows high-speed frequency modulation. The generated frequency modulated signal is converted to an intensity modulated signal using the edge of the optical filter pass band. We present theoretical simulations of high-speed modulation characteristics and extension of transmission reach. With the proposed transmitter, we review the experimental demonstration of 180-km transmission of a 10-Gb/s signal with a tuning range of 27 nm and 60-km transmission of a 20-Gb/s signal.

  • Antenna-Permutation Channel-Vector Quantization for Finite Rate Feedback in Zero-Forcing Beamforming Multiuser MIMO-OFDM Systems

    Masaaki FUJII  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:7
      Page(s):
    2442-2451

    An antenna-permutation (AP) scheme is described for channel-vector quantization (CVQ) in zero-forcing beamforming (ZFBF) multiuser multiple-input and multiple-output orthogonal frequency-division multiplexing systems with multiple receive antennas. Different sets of multiple channel sub-matrices are selected for different subcarriers and then quantized to multiple quantization vectors for finite rate feedback. Based on the quantization vectors, ZFBF provides a single stream or multiple streams to users while increasing frequency selectivity. Simulation results demonstrate that AP-CVQ with four-bit quantization that incorporates with pre-whitening maximum likelihood detection for two stream reception achieved better average packet error rates than minimum mean square error receive beamforming for single stream reception when the frequency selectivity was not severe.

  • Optimal Number of Active Users for Minimizing Average Data Delivery Delay in People-Centric Urban Sensing

    ShanGuo QUAN  YoungYong KIM  

     
    LETTER-Networks

      Vol:
    E92-D No:7
      Page(s):
    1466-1469

    We present a numerical analysis of the optimal number of active mobile users for minimizing average data delivery delay in intelligent people-centric urban sensing, in which context-aware mobile devices act as sensor-data carriers and sensor nodes act as data accumulators within CDMA cellular networks. In the analysis, we compute the optimal number of mobile users for different environmental conditions and then investigate the minimum average data delivery delay for this optimal number of mobile users.

  • Improving the Performance of P2P Content Distribution Systems by Choosing Proper Content Providers

    Yi WAN  Takuya ASAKA  Tatsuro TAKAHASHI  

     
    LETTER-Network

      Vol:
    E92-B No:7
      Page(s):
    2500-2502

    Searching mechanisms employed in unstructured overlay networks typically hit multiple peers for the desired content. We propose the use of a simple method that raises the hit rates of unpopular contents and balances the loads by choosing the peer holding the least contents as the provider when multiple candidates exist.

  • Performability Modeling for Software System with Performance Degradation and Reliability Growth

    Koichi TOKUNO  Shigeru YAMADA  

     
    PAPER

      Vol:
    E92-A No:7
      Page(s):
    1563-1571

    In this paper, we discuss software performability evaluation considering the real-time property; this is defined as the attribute that the system can complete the task within the stipulated response time limit. We assume that the software system has two operational states from the viewpoint of the end users: one is operating with the desirable performance level according to specification and the other is with degraded performance level. The dynamic software reliability growth process with performance degradation is described by the extended Markovian software reliability model with imperfect debugging. Assuming that the software system can process the multiple tasks simultaneously and that the arrival process of the tasks follows a nonhomogeneous Poisson process, we analyze the distribution of the number of tasks whose processes can be completed within the processing time limit with the infinite server queueing model. We derive several software performability measures considering the real-time property; these are given as the functions of time and the number of debugging activities. Finally, we illustrate several numerical examples of the measures to investigate the impact of consideration of the performance degradation on the system performability evaluation.

  • Performance Evaluation of Multiuser MIMO E-SDM Systems in Time-Varying Fading Environments

    Huu Phu BUI  Yasutaka OGAWA  Toshihiko NISHIMURA  Takeo OHGANE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:7
      Page(s):
    2374-2388

    In this paper, the performance of multiuser MIMO E-SDM systems in downlink transmission is evaluated in both uncorrelated and correlated time-varying fading environments. In the ideal case, using the block diagonalization scheme, inter-user interference can be completely eliminated at each user; and using the E-SDM technique for each user, optimal resource allocation can be achieved, and spatially orthogonal substreams can be obtained. Therefore, a combination of the block diagonalization scheme and the E-SDM technique applied to multiuser MIMO systems gives very good results. In realistic environments, however, due to the dynamic nature of the channel and processing delay at both the transmitter and the receiver, the channel change during the delay may cause inter-user interference even if the BD scheme is used. In addition, the change may also result in large inter-substream interference and prevent optimal resource allocation from being achieved. As a result, system performance may be degraded seriously. To overcome the problem, we propose a method of channel extrapolation to compensate for the channel change. Applying our proposed method, simulation results show that much better system performance can be obtained than the conventional case. Moreover, it also shows that the system performance in the correlated fading environments is much dependent on the antenna configuration and the angle spread from the base station to scatterers.

  • High-Speed EA-DFB Laser for 40-G and 100-Gbps Open Access

    Shigeki MAKINO  Kazunori SHINODA  Takeshi KITATANI  Hiroaki HAYASHI  Takashi SHIOTA  Shigehisa TANAKA  Masahiro AOKI  Noriko SASADA  Kazuhiko NAOE  

     
    INVITED PAPER

      Vol:
    E92-C No:7
      Page(s):
    937-941

    We have developed a high-speed electroabsorption modulator integrated distributed feedback (EA/DFB) lasers. Transmission performance over 10 km was investigated under 25 Gbps and 43 Gbps modulation. In addition, the feasibility of wide temperature range operation was also investigated. An uncooled EA/DFB laser can contribute to the realization of low-power-consumption, small-footprint and cost-effective transceiver module. In this study, we used the temperature-tolerant InGaAlAs materials in an EA modulator. A wide temperature ranged 12 km transmission with over 9.6 dB dynamic extinction ratio was demonstrated under 25 Gbps modulation. A 43 Gbps 10 km transmission was also demonstrated. The laser achieved a clear, opened eye diagram with a dynamic extinction ratio over 7 dB from 25 to 85. The modulated output power was more than +2.9 dBm even at 85. These devices are suitable for next-generation, high-speed network systems, such as 40 Gbps and 100 Gbps Ethernet.

  • Two-Quadrant Compact CMOS Current Divider

    Kuo-Jen LIN  

     
    LETTER-Circuit Theory

      Vol:
    E92-A No:7
      Page(s):
    1713-1715

    A two-quadrant CMOS current divider using a two-variable second-order Taylor series approximation is proposed. The approximation divider is realized with a compact circuit. The simulation results indicate that the compact divider has with sufficient accuracy, small distortion, and high bandwidth for only 1.8 V supply voltage.

  • Estimation of a Long-Term Variation of a Magnetic-Storm Index Using the Merging Particle Filter

    Shin'ya NAKANO  Tomoyuki HIGUCHI  

     
    PAPER

      Vol:
    E92-D No:7
      Page(s):
    1382-1387

    The Dst index is the most popular measure of a scale of magnetic storms, and it is widely used as a monitor of the conditions of the Earth's magnetosphere. Since the Dst index contains contributions from multiple magnetospheric phenomena, it is important to distinguish each of the contributions in order to obtain meaningful information about the conditions of the magnetosphere. There have been several efforts which modeled temporal evolution of the Dst index empirically, and these empirical models considers some contributions separately. However, they take only short-term varations into accout, and contributions from phenomena which show long-term variations are neglected. In the present study, we have developed a technique for estimating the component of long-term variations of the Dst index using solar wind data and a nonlinear empirical model. The newly-developed technique adopts an algorithm which is similar to the particle filter. This algorithm allows an on-line processing of a long sequence of Dst data, which would enable a real-time estimation of system variables in a nonlinear system model. The estimates of the long-term variations can be used for accurate estimation of other contributions to the Dst index, which would provide credible information about the conditions of the magnetosphere. The framework proposed in the present study could be applied for the purpose of continuous real-time monitoring of the environment of the magnetosphere.

  • M-Ary Substitution/Deletion/Insertion/Adjacent-Symbol-Transposition Error Correcting Codes for Data Entry Systems

    Haruhiko KANEKO  Eiji FUJIWARA  

     
    PAPER-Coding Theory

      Vol:
    E92-A No:7
      Page(s):
    1668-1676

    Nonbinary M-ary data processed by data entry systems, such as keyboard devices and character recognition systems, often have various types of error, such as symbol-substitution errors, deletion errors, insertion errors, and adjacent-symbol-transposition errors. This paper proposes nonsystematic M-ary codes capable of correcting these errors. The code is defined as a set of codewords that satisfy three conditions required to correct substitution, deletion/insertion, and adjacent-symbol-transposition errors. Since symbol-substitution errors in data entry systems are usually asymmetric, this paper also presents asymmetric-symbol-substitution error correcting codes capable of correcting deletion, insertion, and adjacent-symbol-transposition errors. For asymmetric-symbol-substitution error correction, we employ a mapping derived from the vertex coloring in an error directionality graph. The evaluation shows that the asymmetric codes have three to five times larger number of codewords than the symmetric codes.

  • Design and Implementation of a Metadata Management Scheme for Large Distributed File Systems

    Jong Hyeon YUN  Yong Hun PARK  Dong Min SEO  Seok Jae LEE  Jae Soo YOO  

     
    LETTER-Dependable Computing

      Vol:
    E92-D No:7
      Page(s):
    1475-1478

    Most large-scale distributed file systems decouple a metadata operation from read and write operations for a file. In the distributed file systems, a certain server named a metadata server (MDS) is responsible for maintaining the metadata information of the file systems. In this paper, we propose a new metadata management scheme in order to provide the high metadata throughput and scalability for a cluster of MDSs. First, we derive a new metadata distribution technique. Then, we present a load balancing technique based on the distribution technique. Several experiments show that our scheme outperforms existing metadata management scheme in terms of scalability and load balancing.

  • Robust Reduced Order Observer for Lipschitz Nonlinear Systems

    Sungryul LEE  

     
    LETTER-Systems and Control

      Vol:
    E92-A No:6
      Page(s):
    1530-1534

    This paper presents a robust reduced order observer for a class of Lipschitz nonlinear systems with external disturbance. Sufficient conditions on the existence of the proposed observer are characterized by linear matrix inequalities. It is also shown that the proposed observer design can reduce the effect on the estimation error of external disturbance up to the prescribed level. Finally, a numerical example is provided to verify the proposed design method.

  • Performance Analysis of the ertPS Algorithm and Enhanced ertPS Algorithm for VoIP Services in IEEE 802.16e Systems

    Bong Joo KIM  Gang Uk HWANG  

     
    PAPER-Network

      Vol:
    E92-B No:6
      Page(s):
    2000-2007

    In this paper, we analyze the extended real-time Polling Service (ertPS) algorithm in IEEE 802.16e systems, which is designed to support Voice-over-Internet-Protocol (VoIP) services with data packets of various sizes and silence suppression. The analysis uses a two-dimensional Markov Chain, where the grant size and the voice packet state are considered, and an approximation formula for the total throughput in the ertPS algorithm is derived. Next, to improve the performance of the ertPS algorithm, we propose an enhanced uplink resource allocation algorithm, called the e 2rtPS algorithm, for VoIP services in IEEE 802.16e systems. The e 2rtPS algorithm considers the queue status information and tries to alleviate the queue congestion as soon as possible by using remaining network resources. Numerical results are provided to show the accuracy of the approximation analysis for the ertPS algorithm and to verify the effectiveness of the e 2rtPS algorithm.

  • Finite Input-Memory Automaton Based Checker Synthesis of SystemVerilog Assertions for FPGA Prototyping

    Chengjie ZANG  Shinji KIMURA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E92-A No:6
      Page(s):
    1454-1463

    Checker synthesis for assertion based verification becomes popular because of the recent progress on the FPGA prototyping environment. In the paper, we propose a checker synthesis method based on the finite input-memory automaton suitable for embedded RAM modules in FPGA. There are more than 1 Mbit memories in medium size FPGA's and such embedded memory cells have the capability to be used as the shift registers. The main idea is to construct a checker circuit using the finite input-memory automata and implement shift register chain by logic elements or embedded RAM modules. When using RAM module, the method does not consume any logic element for storing the value. Note that the shift register chain of input memory can be shared with different assertions and we can reduce the hardware resource significantly. We have checked the effectiveness of the proposed method using several assertions.

  • Reduced Constraint Set Linear Program for Tone Reservation in Multicarrier Modulation

    Abolfazl GHASSEMI  T. Aaron GULLIVER  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E92-B No:6
      Page(s):
    2231-2234

    Tone reservation (TR) has been proposed for peak to average power reduction (PAPR) in real-baseband multicarrier systems [1]. In this technique, the peak reduction signal is computed by optimization via linear programming (LP). As shown in [1], the computational complexity of the LP optimization is largely determined by the complexity of the inverse fast Fourier transform (IFFT) algorithm. In this paper, we use submatrices of the inverse fast Fourier transform (IFFT) to reduce the number of constraints in the LP-based optimization. We show that a significant complexity reduction can be achieved compared to the conventional TR algorithm, with similar PAPR reduction.

  • User and Device Adaptation in Summarizing Sports Videos

    Naoko NITTA  Noboru BABAGUCHI  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E92-D No:6
      Page(s):
    1280-1288

    Video summarization is defined as creating a video summary which includes only important scenes in the original video streams. In order to realize automatic video summarization, the significance of each scene needs to be determined. When targeted especially on broadcast sports videos, a play scene, which corresponds to a play, can be considered as a scene unit. The significance of every play scene can generally be determined based on the importance of the play in the game. Furthermore, the following two issues should be considered: 1) what is important depends on each user's preferences, and 2) the summaries should be tailored for media devices that each user has. Considering the above issues, this paper proposes a unified framework for user and device adaptation in summarizing broadcast sports videos. The proposed framework summarizes sports videos by selecting play scenes based on not only the importance of each play itself but also the users' preferences by using the metadata, which describes the semantic content of videos with keywords, and user profiles, which describe users' preference degrees for the keywords. The selected scenes are then presented in a proper way using various types of media such as video, image, or text according to device profiles which describe the device type. We experimentally verified the effectiveness of user adaptation by examining how the generated summaries are changed by different preference degrees and by comparing our results with/without using user profiles. The validity of device adaptation is also evaluated by conducting questionnaires using PCs and mobile phones as the media devices.

  • Analytical Solution for Two Parallel Traces on PCB in the Time Domain with Application to Hairpin Delay Lines

    Fengchao XIAO  Kimitoshi MURANO  Yoshio KAMI  

     
    PAPER

      Vol:
    E92-B No:6
      Page(s):
    1953-1959

    In this paper the time-domain analysis of two parallel traces is investigated. First, the telegrapher's equations for transmission line are applied to the parallel traces on printed circuit board (PCB), and are solved by using the mode decomposition technique. The time-domain solutions are then obtained by using the inverse Laplace transform. Although the Fourier-transform technique is also applicable for this problem, the solution is given numerically. Contrarily, the inverse Laplace transform successfully leads to an analytical expression for the transmission characteristics. The analytical expression is represented by series, which clearly explains the coupling mechanism. The analytical expression for the fundamental section of a meander delay line is investigated in detail. The analytical solution is validated by measurements, and the characteristics of the distortions in the output waveforms of meander delay lines due to the crosstalk are also investigated.

  • Cross-Domain Service Composition in OSGi Environments

    Choonhwa LEE  Seungjae LEE  Eunsam KIM  Wonjun LEE  

     
    LETTER-System Programs

      Vol:
    E92-D No:6
      Page(s):
    1316-1319

    This letter presents a new approach to provide inter-domain service compositions for OSGi environments. Our proposal of remote wire objects extends OSGi's wiring capability across the framework boundaries, so that even remote services can join in the composition. Hence, a better composition is made possible with a richer set of candidate services from foreign domains.

  • A Multi-Stage Hybrid Scheduler for Codebook-Based MU-MIMO System

    Jingxiu LIU  Xiaoming SHE  Lan CHEN  Hidekazu TAOKA  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:6
      Page(s):
    2303-2307

    In this paper, we propose a multi-stage hybrid scheduling scheme for codebook-based precoding systems, which provides a framework to apply different scheduling criterions at different scheduling stages for selecting user equipment (UEs). Numerical simulation results show that the proposed scheme effectively fills the performance gap between maximum carrier-to-interference (Max C/I) power ratio and Proportional Fairness (PF) methods, and provides an important means at the media access control (MAC) layer to lever between aggregate cellular throughput and geometry-specific per-user fairness, in order to meet the requirements of more precise quality of service (QoS) provision for future mobile communication systems.

  • Development of Single Sign-On System with Hardware Token and Key Management Server

    Daiki NOBAYASHI  Yutaka NAKAMURA  Takeshi IKENAGA  Yoshiaki HORI  

     
    PAPER-Authentication and Authorization Techniques

      Vol:
    E92-D No:5
      Page(s):
    826-835

    With the growth of the Internet, various types of services are rapidly expanding; such services include the World Wide Web (WWW), the File Transfer Protocol (FTP), and remote login. Consequently, managing authentication information, e.g., user ID/password pairs, keys, and certificates- is difficult for users, since the amount of required authentication information has been increased. To address this problem, researchers have developed a Single Sign-On (SSO) system that makes all the services available for a user via a one-time authentication: however, existing authentication systems cannot provide such SSO services for all kind of services on the Internet, even if the service provider deploys the SSO server. Further, existing systems also cannot provide the SSO service which does not make it conscious of a network domain to a user on secure network environment. Therefore, in this paper, we propose a new SSO system with a hardware token and a key management server to improve the safety, ubiquity, and adaptability of services. Further, we implement the proposed system and show its effectiveness through evaluation. Adding any functions for this system provides various conveniences to us. We also explore the ability to add functions to this system; for example, we add high trust connection functionality for a Web server and show its effectiveness.

941-960hit(2307hit)