The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

1181-1200hit(2307hit)

  • Multiuser Detection Based on Particle Swarm Optimization Algorithm over Multipath Fading Channels

    Zhen-qing GUO  Yang XIAO  Moon Ho LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:2
      Page(s):
    421-424

    The Multiple Access Interference (MAI) and the Multipath Fading (MPF) restrict the performance of Code-Division Multiple-Access (CDMA) systems. The Multiuser Detection (MUD) based on Particle Swarm Optimization algorithm (PSO) with Rake processing is proposed in this paper to overcome these obstacles, followed by full details of how to apply the Binary PSO MUD (BPSO-MUD) on a CDMA system. Simulations show that the BPSO-MUD has significantly better performance than the Conventional Detection (CD).

  • Distortion Reduction Filters for Radio-on-Fiber System

    Shingo TANAKA  Noritaka TAGUCHI  Tsuneto KIMURA  Yasunori ATSUMI  

     
    PAPER

      Vol:
    E90-C No:2
      Page(s):
    365-372

    Three distortion reduction filters for radio-on-fiber systems are proposed and evaluated from the standpoint of improvements in in-band third order intermodulation (IM3) components (spurious components), insertion loss, temperature stability and so on. The basic filter configuration includes optical comb filter, RF (radiowave frequency) comb filter, and RF dual band rejection filter (DBRF). Experiments are conducted at 2 GHz band for frequency separation Δf=5 MHz and 100 MHz in the temperature range of -10 to +50. These filters can reduce IM3 components even in the saturation region, unlike conventional linearizers. An optical comb filter can reduce IM3 components more than 20 dB and noise level around 10 dB if its polarization controller is properly adjusted, but its insertion loss is large and stability against vibration is very poor. The proposed RF comb filter and RF-DBRF can reduce IM3 components by more than 20 dB and noise level by more than 3 dB. Their stability against vibration and temperature change is good, and insertion losses are 1-2 dB for Δf=100 MHz.

  • Switching-Wavelength Pulsed Source and Its Applications in Parallel Processing of High-Speed Signals

    Chester SHU  Ka-Lun LEE  Mable P. FOK  

     
    INVITED PAPER

      Vol:
    E90-C No:2
      Page(s):
    397-404

    We report the generation of time- and wavelength-interleaved optical pulses using the principle of sub-harmonic pulse gating in a dispersion-managed fiber cavity. The pulsed source has been applied to the processing of electrical and optical signals including analog-to-digital conversion, wavelength multicast, and serial-to-parallel optical data conversion.

  • Crosstalk Analysis for Two Bent Lines Using Circuit Model

    Sang Wook PARK  Fengchao XIAO  Dong Chul PARK  Yoshio KAMI  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E90-B No:2
      Page(s):
    323-330

    The crosstalk phenomenon, wich occurs between transmission lines, is caused by electromagnetic fields of currents flowing through the lines. Crosstalk between two bent lines is studied by using a set of solutions of modified telegrapher's equations. By expressing electromagnetic fields in terms of voltages and currents in the line ends, the resultant network function in the form of an ABCD matrix is obtained. Electromagnetic fields caused by currents flowing in risers at transmission line ends are taken into account in addition to those fields in line sections. The validity of the proposed approach was confirmed by comparing experimental results with computed results and those simulated by a commercial electromagnetic solver for some bent-line models.

  • Pulse Shaping for a Long-Distance Optical Synchronization System

    Fatih Omer ILDAY  Axel WINTER  Franz X. KARTNER  Miltcho B. DANAILOV  

     
    INVITED PAPER

      Vol:
    E90-C No:2
      Page(s):
    450-456

    Next generation free electron lasers aim to generate x-ray pulses with pulse durations down to 30 fs, and possibly even sub-fs. Synchronization of various stages of the accelerator and the probe laser system to the x-ray pulses with stability on the order of the pulse width is necessary to make maximal use of this capability. We are developing an optical timing synchronization system in order to meet this challenge. The scheme is based on generating a train of short optical pulses, with a precise repetition frequency, from a mode-locked laser oscillator and distributed via length-stabilized optical fibers to points requiring synchronization. The timing information is embedded in the repetition frequency and its harmonics. A significant advantage of the optical synchronization system is that multiple mode-locked Ti:sapphire seed oscillators typically present in an accelerator facility can be replaced by the master mode-locked fiber laser. In this paper, we briefly review progress on the development of the synchronization system and then discuss the implementation of this new possibility. Several technical issues related to this approach are analyzed.

  • Ultra-Stable Regeneratively Mode-Locked Laser as an Opto-Electronic Microwave Oscillator and Its Application to Optical Metrology

    Masataka NAKAZAWA  Masato YOSHIDA  Toshihiko HIROOKA  

     
    INVITED PAPER

      Vol:
    E90-C No:2
      Page(s):
    443-449

    Ultrahigh-speed fiber lasers operating at up to 40 GHz offer a clean longitudinal comb and a narrow linewidth. This makes them suitable for applications including optical comb generation, ultrahigh-speed optical pulse transmission including PSK, and as opto-microwave oscillators. In this paper, we describe recent progress on ultrafast fiber lasers and their applications to optical metrology.

  • Low Complexity Scheduling Algorithms for Downlink Multiuser MIMO System

    Jinfan ZHANG  Yunzhou LI  Shidong ZHOU  Jing WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:2
      Page(s):
    358-363

    Downlink multiuser MIMO system has attracted considerable attention recently for its potential to increase the system capacity. However, due to the limitation on the number of transmit antennas, when there are more users than can be supported simultaneously in a cell, other multiple access schemes, such as TDMA, must be applied in combination with multiuser MIMO. In this paper, we aim to design practical user scheduling algorithms to maximize the system capacity. Because the brute-force search for optimal user allocation is computationally prohibitive, we propose three low complexity suboptimal scheduling algorithms that offer both low complexity and high performance.

  • Current Sensorless Regulation for Converters via Integral Fuzzy Control

    Kuang-Yow LIAN  Hui-Wen TU  Chi-Wang HONG  

     
    PAPER-Electronic Circuits

      Vol:
    E90-C No:2
      Page(s):
    507-514

    In this paper, we propose an integral-type T-S fuzzy control scheme to deal with the regulation problem of buck converters without current sensors. This current sensorless control of converters provides the output voltage to achieve zero steady-state error and is with high robust performance. The stability of the overall closed-loop system is rigorously analyzed by using Lyapunov's method. Based on an appropriate assumption, the separation principle can still succeed in the control problems. Hence, the controller and observer gains can be separately obtained by solving LMIs via Matlab's toolbox. The observer-based controller is realized with Simulink and digital signal processors (DSPs). The simulation and experimental results verify the feasibility of the proposed schemes and show the satisfactory performance for the power converters.

  • Partitioning a Multi-Weighted Graph to Connected Subgraphs of Almost Uniform Size

    Takehiro ITO  Kazuya GOTO  Xiao ZHOU  Takao NISHIZEKI  

     
    PAPER-Graph Algorithms

      Vol:
    E90-D No:2
      Page(s):
    449-456

    Assume that each vertex of a graph G is assigned a constant number q of nonnegative integer weights, and that q pairs of nonnegative integers li and ui, 1 ≤ i ≤ q, are given. One wishes to partition G into connected components by deleting edges from G so that the total i-th weights of all vertices in each component is at least li and at most ui for each index i, 1 ≤ i ≤ q. The problem of finding such a "uniform" partition is NP-hard for series-parallel graphs, and is strongly NP-hard for general graphs even for q = 1. In this paper we show that the problem and many variants can be solved in pseudo-polynomial time for series-parallel graphs and partial k-trees, that is, graphs with bounded tree-width.

  • Adaptive Tuning of Buffer Pool Size in Database Server Based on Iterative Algorithm

    Junya SHIMIZU  Yixin DIAO  Maheswaran SURENDRA  

     
    LETTER-System Programs

      Vol:
    E90-D No:2
      Page(s):
    594-597

    One of the system greatly affecting the performance of a database server is the size-division of buffer pools. This letter proposes an adaptive control method of the buffer pool sizes. This method obtains the nearly optimal division using only observed response times in a comparatively short duration.

  • Scattering of Electromagnetic Waves by Multilayered Inhomogeneous Columnar Dielectric Gratings Loaded Rectangular Dielectric Constant

    Ryosuke OZAKI  Tsuneki YAMASAKI  Takashi HINATA  

     
    PAPER-Periodic Structures

      Vol:
    E90-C No:2
      Page(s):
    295-303

    In this paper, we propose a new technique for the scattering problems of multilayered inhomogeneous columnar dielectric gratings loaded rectangular dielectric constant both TM and TE waves using the combination of improved Fourier series expansion method, the multilayer method, and the eigenvalue matrix method. Numerical results are given for the power transmission coefficients in the parameters ε 3 /ε 0 , c/p, and b/d of rectangular cylinders to obtain the basic characteristic of the power transmission coefficients and reflection coefficients switching or frequency selective devices for both TM and TE waves. The influence of the incident angle and frequency of the transmitted power are also discussed in the connection with the propagation constant β in the free mode.

  • On the Equivalent of Structure Preserving Reductions Approach and Adjoint Networks Approach for VLSI Interconnect Reductions

    Ming-Hong LAI  Chia-Chi CHU  Wu-Shiung FENG  

     
    LETTER

      Vol:
    E90-A No:2
      Page(s):
    411-414

    Two versions of Krylov subspace order reduction techniques for VLSI interconnect reductions, including structure preserving reductions approach and adjoint networks approach, will be comparatively investigated. Also, we will propose a modified structure preserving reduction algorithm to speed up the projection construction in a linear order. The numerical experiment shows the high accuracy and low computational consumption of the modified method. In addition, it will be shown that the projection subspace generated from the structure-preserving approach and those from the adjoint networks approach are equivalent. Therefore, transfer functions of both reduced networks are identical.

  • Spice-Oriented Frequency-Domain Analysis of Nonlinear Electronic Circuits

    Junji KAWATA  Yousuke TANIGUCHI  Masayoshi ODA  Yoshihiro YAMAGAMI  Yoshifumi NISHIO  Akio USHIDA  

     
    LETTER

      Vol:
    E90-A No:2
      Page(s):
    406-410

    Distortion analysis of nonlinear circuits is very important for designing analog integrated circuits and communication systems. In this letter, we propose an efficient frequency-domain approach for calculating frequency response curves, which is based on HB (harmonic balance) method combining with ABMs (Analog Behavior Models) of Spice. Firstly, nonlinear devices such as bipolar transistors and MOSFETs are transformed into the HB device modules executing the Fourier transformations. Using these modules, the determining equation of the HB method is formed by the equivalent sine-cosine circuit in the schematic form or net-list. It consists of the coupled resistive circuits, so that it can be efficiently solved by the DC analysis of Spice. In our algorithm, we need not to derive any troublesome circuit equations, and any kinds of the transformations.

  • Transfer Function Preserving Transformations on Equal-Ripple RC Polyphase Filters for Reducing Design Efforts

    Hiroaki TANABE  Hiroshi TANIMOTO  

     
    PAPER

      Vol:
    E90-A No:2
      Page(s):
    333-338

    Element value spread of an equal-ripple RC polyphase filter depends heavily on the order of zero assignment. To find the optimum design, we must conduct exhaustive design for all the possible zero assignments. This paper describes two circuit transformations on equal-ripple RC polyphase filters, which preserve their transfer functions, for reducing circuit design efforts. Proposed Method I exchanges (R,C) values to (1/C,1/R) for each stage. This gives a new circuit with different zero assignment for each stage of its original circuit. Method II flips over the original circuit and exchanges the resulting (Ri,Ci) values for (Cn-i+1,Rn-i+1) for each i-th stage. Those circuit transformations can reduce a number of circuit designs down to 1/4 of the straight-forward method. This considerably reduces a burden for exhaustive design for searching the minimum element value spread condition. Some design examples are given to illustrate the proposed methods.

  • Capacity Analysis of Multiuser Diversity Combined with Dual MIMO Systems

    Myoung-Won LEE  Cheol MUN  Jong-Gwan YOOK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:2
      Page(s):
    397-400

    In this letter, the system capacity of multiuser diversity combined with spatial multiplexing schemes is analyzed. An analytic expression is derived for the ergodic system capacity with multiuser scheduling and dual multi-input multi-output (MIMO) systems by using a tight lower bound of the link capacity. The proposed analytic approach is verified through comparisons between analytic and simulated results, and is shown to make fairly precise predictions of the ergodic system capacity and the scheduling gains even when the numbers of antennas and users are small.

  • Stability-Guaranteed Horizon Size for Receding Horizon Control

    Zhonghua QUAN  Soohee HAN  Wook Hyun KWON  

     
    LETTER-Systems and Control

      Vol:
    E90-A No:2
      Page(s):
    523-525

    We propose a stability-guaranteed horizon size (SgHS) for stabilizing receding horizon control (RHC). It is shown that the proposed SgHS can be represented explicitly in terms of the known parameters of the given system model and is independent of the terminal weighting matrix in the cost function. The proposed SgHS is validated via a numerical example.

  • A Pragmatic Adaptive Transmission Scheme with Low-Rate Feedback Using Two-Step Partial CQI for Multiuser OFDMA Systems

    Joong Hyung KWON  Duho RHEE  Younghoon WHANG  Kwang Soon KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:2
      Page(s):
    405-407

    In this paper, we investigate an efficient user selection and sub-band allocation algorithm in which each user transmits two-step partial CQI to reduce the amount of feedback in multi-user downlink OFDMA systems. Simulation results show that we can greatly reduce the feedback rate at the expense of negligible performance degradation compared to the full CQI feedback schemes or that we can greatly improve the performance with slightly reduced feedback rate compared to conventional partial CQI feedback schemes.

  • Performance Analysis of CDMA Mobile System Employing LPA Smart Antenna

    Seokjin SUNG  Hyunduk KANG  Vladimir KATKOVNIK  Kiseon KIM  

     
    LETTER-Antennas and Propagation

      Vol:
    E90-B No:1
      Page(s):
    184-188

    We investigate the performance of a code division multiple access (CDMA) system employing local polynomial approximation (LPA) smart antenna under moving user scenario. A closed form for average signal to interference plus noise power ratio (SINR) is derived, where the angular velocity of a target user is invariant during an observation interval. This SINR is independent of user velocity, and consequently it induces the independence of bit error rate (BER) with respect to the user velocity, while the use of conventional smart antenna shows significant degradation in the system performance by moving user.

  • Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards

    Junghyun NAM  Seungjoo KIM  Sangjoon PARK  Dongho WON  

     
    LETTER-Information Security

      Vol:
    E90-A No:1
      Page(s):
    299-302

    A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. Recently, Lee et al. have proposed an efficient nonce-based scheme for remote user authentication using smart cards. This work reviews Lee et al.'s authentication scheme and provides a security analysis on the scheme. Our analysis shows that Lee et al.'s scheme does not achieve its basic aim of authenticating remote users and furthermore has a very hazardous method for changing passwords. In addition, we recommend some changes to the scheme so that it can attain at least its main security goal.

  • A Private and Consistent Data Retrieval Scheme with Log-Squared Communication

    Satoshi NAKAYAMA  Maki YOSHIDA  Shingo OKAMURA  Toru FUJIWARA  

     
    PAPER-Application

      Vol:
    E90-A No:1
      Page(s):
    204-215

    Data retrieval is used to obtain a particular data item from a database. A user requests an item in the database from a database server by sending a query, and obtains the item from an answer to the query. Security requirements of data retrieval include protecting the privacy of the user, the secrecy of the database, and the consistency of answers. In this paper, a data retrieval scheme which satisfies all the security requirements is defined and an efficient construction is proposed. In the proposed construction, the size of a query and an answer is O((log N)2), and the size of data published by the database server when the database is updated is only O(1). The proposed construction uses the Merkle tree, a commitment scheme, and Oblivious Transfer. The proof of the security is given under the assumption that the used cryptographic schemes are secure.

1181-1200hit(2307hit)