Zhen-qing GUO Yang XIAO Moon Ho LEE
The Multiple Access Interference (MAI) and the Multipath Fading (MPF) restrict the performance of Code-Division Multiple-Access (CDMA) systems. The Multiuser Detection (MUD) based on Particle Swarm Optimization algorithm (PSO) with Rake processing is proposed in this paper to overcome these obstacles, followed by full details of how to apply the Binary PSO MUD (BPSO-MUD) on a CDMA system. Simulations show that the BPSO-MUD has significantly better performance than the Conventional Detection (CD).
Shingo TANAKA Noritaka TAGUCHI Tsuneto KIMURA Yasunori ATSUMI
Three distortion reduction filters for radio-on-fiber systems are proposed and evaluated from the standpoint of improvements in in-band third order intermodulation (IM3) components (spurious components), insertion loss, temperature stability and so on. The basic filter configuration includes optical comb filter, RF (radiowave frequency) comb filter, and RF dual band rejection filter (DBRF). Experiments are conducted at 2 GHz band for frequency separation Δf=5 MHz and 100 MHz in the temperature range of -10 to +50. These filters can reduce IM3 components even in the saturation region, unlike conventional linearizers. An optical comb filter can reduce IM3 components more than 20 dB and noise level around 10 dB if its polarization controller is properly adjusted, but its insertion loss is large and stability against vibration is very poor. The proposed RF comb filter and RF-DBRF can reduce IM3 components by more than 20 dB and noise level by more than 3 dB. Their stability against vibration and temperature change is good, and insertion losses are 1-2 dB for Δf=100 MHz.
Chester SHU Ka-Lun LEE Mable P. FOK
We report the generation of time- and wavelength-interleaved optical pulses using the principle of sub-harmonic pulse gating in a dispersion-managed fiber cavity. The pulsed source has been applied to the processing of electrical and optical signals including analog-to-digital conversion, wavelength multicast, and serial-to-parallel optical data conversion.
Sang Wook PARK Fengchao XIAO Dong Chul PARK Yoshio KAMI
The crosstalk phenomenon, wich occurs between transmission lines, is caused by electromagnetic fields of currents flowing through the lines. Crosstalk between two bent lines is studied by using a set of solutions of modified telegrapher's equations. By expressing electromagnetic fields in terms of voltages and currents in the line ends, the resultant network function in the form of an ABCD matrix is obtained. Electromagnetic fields caused by currents flowing in risers at transmission line ends are taken into account in addition to those fields in line sections. The validity of the proposed approach was confirmed by comparing experimental results with computed results and those simulated by a commercial electromagnetic solver for some bent-line models.
Fatih Omer ILDAY Axel WINTER Franz X. KARTNER Miltcho B. DANAILOV
Next generation free electron lasers aim to generate x-ray pulses with pulse durations down to 30 fs, and possibly even sub-fs. Synchronization of various stages of the accelerator and the probe laser system to the x-ray pulses with stability on the order of the pulse width is necessary to make maximal use of this capability. We are developing an optical timing synchronization system in order to meet this challenge. The scheme is based on generating a train of short optical pulses, with a precise repetition frequency, from a mode-locked laser oscillator and distributed via length-stabilized optical fibers to points requiring synchronization. The timing information is embedded in the repetition frequency and its harmonics. A significant advantage of the optical synchronization system is that multiple mode-locked Ti:sapphire seed oscillators typically present in an accelerator facility can be replaced by the master mode-locked fiber laser. In this paper, we briefly review progress on the development of the synchronization system and then discuss the implementation of this new possibility. Several technical issues related to this approach are analyzed.
Masataka NAKAZAWA Masato YOSHIDA Toshihiko HIROOKA
Ultrahigh-speed fiber lasers operating at up to 40 GHz offer a clean longitudinal comb and a narrow linewidth. This makes them suitable for applications including optical comb generation, ultrahigh-speed optical pulse transmission including PSK, and as opto-microwave oscillators. In this paper, we describe recent progress on ultrafast fiber lasers and their applications to optical metrology.
Jinfan ZHANG Yunzhou LI Shidong ZHOU Jing WANG
Downlink multiuser MIMO system has attracted considerable attention recently for its potential to increase the system capacity. However, due to the limitation on the number of transmit antennas, when there are more users than can be supported simultaneously in a cell, other multiple access schemes, such as TDMA, must be applied in combination with multiuser MIMO. In this paper, we aim to design practical user scheduling algorithms to maximize the system capacity. Because the brute-force search for optimal user allocation is computationally prohibitive, we propose three low complexity suboptimal scheduling algorithms that offer both low complexity and high performance.
Kuang-Yow LIAN Hui-Wen TU Chi-Wang HONG
In this paper, we propose an integral-type T-S fuzzy control scheme to deal with the regulation problem of buck converters without current sensors. This current sensorless control of converters provides the output voltage to achieve zero steady-state error and is with high robust performance. The stability of the overall closed-loop system is rigorously analyzed by using Lyapunov's method. Based on an appropriate assumption, the separation principle can still succeed in the control problems. Hence, the controller and observer gains can be separately obtained by solving LMIs via Matlab's toolbox. The observer-based controller is realized with Simulink and digital signal processors (DSPs). The simulation and experimental results verify the feasibility of the proposed schemes and show the satisfactory performance for the power converters.
Takehiro ITO Kazuya GOTO Xiao ZHOU Takao NISHIZEKI
Assume that each vertex of a graph G is assigned a constant number q of nonnegative integer weights, and that q pairs of nonnegative integers li and ui, 1 ≤ i ≤ q, are given. One wishes to partition G into connected components by deleting edges from G so that the total i-th weights of all vertices in each component is at least li and at most ui for each index i, 1 ≤ i ≤ q. The problem of finding such a "uniform" partition is NP-hard for series-parallel graphs, and is strongly NP-hard for general graphs even for q = 1. In this paper we show that the problem and many variants can be solved in pseudo-polynomial time for series-parallel graphs and partial k-trees, that is, graphs with bounded tree-width.
Junya SHIMIZU Yixin DIAO Maheswaran SURENDRA
One of the system greatly affecting the performance of a database server is the size-division of buffer pools. This letter proposes an adaptive control method of the buffer pool sizes. This method obtains the nearly optimal division using only observed response times in a comparatively short duration.
Ryosuke OZAKI Tsuneki YAMASAKI Takashi HINATA
In this paper, we propose a new technique for the scattering problems of multilayered inhomogeneous columnar dielectric gratings loaded rectangular dielectric constant both TM and TE waves using the combination of improved Fourier series expansion method, the multilayer method, and the eigenvalue matrix method. Numerical results are given for the power transmission coefficients in the parameters ε 3 /ε 0 , c/p, and b/d of rectangular cylinders to obtain the basic characteristic of the power transmission coefficients and reflection coefficients switching or frequency selective devices for both TM and TE waves. The influence of the incident angle and frequency of the transmitted power are also discussed in the connection with the propagation constant β in the free mode.
Ming-Hong LAI Chia-Chi CHU Wu-Shiung FENG
Two versions of Krylov subspace order reduction techniques for VLSI interconnect reductions, including structure preserving reductions approach and adjoint networks approach, will be comparatively investigated. Also, we will propose a modified structure preserving reduction algorithm to speed up the projection construction in a linear order. The numerical experiment shows the high accuracy and low computational consumption of the modified method. In addition, it will be shown that the projection subspace generated from the structure-preserving approach and those from the adjoint networks approach are equivalent. Therefore, transfer functions of both reduced networks are identical.
Junji KAWATA Yousuke TANIGUCHI Masayoshi ODA Yoshihiro YAMAGAMI Yoshifumi NISHIO Akio USHIDA
Distortion analysis of nonlinear circuits is very important for designing analog integrated circuits and communication systems. In this letter, we propose an efficient frequency-domain approach for calculating frequency response curves, which is based on HB (harmonic balance) method combining with ABMs (Analog Behavior Models) of Spice. Firstly, nonlinear devices such as bipolar transistors and MOSFETs are transformed into the HB device modules executing the Fourier transformations. Using these modules, the determining equation of the HB method is formed by the equivalent sine-cosine circuit in the schematic form or net-list. It consists of the coupled resistive circuits, so that it can be efficiently solved by the DC analysis of Spice. In our algorithm, we need not to derive any troublesome circuit equations, and any kinds of the transformations.
Hiroaki TANABE Hiroshi TANIMOTO
Element value spread of an equal-ripple RC polyphase filter depends heavily on the order of zero assignment. To find the optimum design, we must conduct exhaustive design for all the possible zero assignments. This paper describes two circuit transformations on equal-ripple RC polyphase filters, which preserve their transfer functions, for reducing circuit design efforts. Proposed Method I exchanges (R,C) values to (1/C,1/R) for each stage. This gives a new circuit with different zero assignment for each stage of its original circuit. Method II flips over the original circuit and exchanges the resulting (Ri,Ci) values for (Cn-i+1,Rn-i+1) for each i-th stage. Those circuit transformations can reduce a number of circuit designs down to 1/4 of the straight-forward method. This considerably reduces a burden for exhaustive design for searching the minimum element value spread condition. Some design examples are given to illustrate the proposed methods.
Myoung-Won LEE Cheol MUN Jong-Gwan YOOK
In this letter, the system capacity of multiuser diversity combined with spatial multiplexing schemes is analyzed. An analytic expression is derived for the ergodic system capacity with multiuser scheduling and dual multi-input multi-output (MIMO) systems by using a tight lower bound of the link capacity. The proposed analytic approach is verified through comparisons between analytic and simulated results, and is shown to make fairly precise predictions of the ergodic system capacity and the scheduling gains even when the numbers of antennas and users are small.
Zhonghua QUAN Soohee HAN Wook Hyun KWON
We propose a stability-guaranteed horizon size (SgHS) for stabilizing receding horizon control (RHC). It is shown that the proposed SgHS can be represented explicitly in terms of the known parameters of the given system model and is independent of the terminal weighting matrix in the cost function. The proposed SgHS is validated via a numerical example.
Joong Hyung KWON Duho RHEE Younghoon WHANG Kwang Soon KIM
In this paper, we investigate an efficient user selection and sub-band allocation algorithm in which each user transmits two-step partial CQI to reduce the amount of feedback in multi-user downlink OFDMA systems. Simulation results show that we can greatly reduce the feedback rate at the expense of negligible performance degradation compared to the full CQI feedback schemes or that we can greatly improve the performance with slightly reduced feedback rate compared to conventional partial CQI feedback schemes.
Seokjin SUNG Hyunduk KANG Vladimir KATKOVNIK Kiseon KIM
We investigate the performance of a code division multiple access (CDMA) system employing local polynomial approximation (LPA) smart antenna under moving user scenario. A closed form for average signal to interference plus noise power ratio (SINR) is derived, where the angular velocity of a target user is invariant during an observation interval. This SINR is independent of user velocity, and consequently it induces the independence of bit error rate (BER) with respect to the user velocity, while the use of conventional smart antenna shows significant degradation in the system performance by moving user.
Junghyun NAM Seungjoo KIM Sangjoon PARK Dongho WON
A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. Recently, Lee et al. have proposed an efficient nonce-based scheme for remote user authentication using smart cards. This work reviews Lee et al.'s authentication scheme and provides a security analysis on the scheme. Our analysis shows that Lee et al.'s scheme does not achieve its basic aim of authenticating remote users and furthermore has a very hazardous method for changing passwords. In addition, we recommend some changes to the scheme so that it can attain at least its main security goal.
Satoshi NAKAYAMA Maki YOSHIDA Shingo OKAMURA Toru FUJIWARA
Data retrieval is used to obtain a particular data item from a database. A user requests an item in the database from a database server by sending a query, and obtains the item from an answer to the query. Security requirements of data retrieval include protecting the privacy of the user, the secrecy of the database, and the consistency of answers. In this paper, a data retrieval scheme which satisfies all the security requirements is defined and an efficient construction is proposed. In the proposed construction, the size of a query and an answer is O((log N)2), and the size of data published by the database server when the database is updated is only O(1). The proposed construction uses the Merkle tree, a commitment scheme, and Oblivious Transfer. The proof of the security is given under the assumption that the used cryptographic schemes are secure.