The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

1241-1260hit(2307hit)

  • Self-Starting Pulse Generation from Cooled Erbium-Doped Fiber Ring Laser

    Kazuhiko SUMIMURA  Hidetsugu YOSHIDA  Hisanori FUJITA  Masahiro NAKATSUKA  Minoru YOSHIDA  

     
    LETTER-Lasers, Quantum Electronics

      Vol:
    E89-C No:7
      Page(s):
    1106-1107

    A self-starting pulse laser with an erbium-doped fiber cooled at liquid-nitrogen temperature was demonstrated. The self-starting-pulse fiber-ring laser can produce an approximately 1 ns pulse train without the need for devices for polarization control and compensation of birefringence.

  • Self-Controlled Short Pulse Generator from All-Fiber Coupled Fabry-Perot Cavity

    Kazuhiko SUMIMURA  Hidetsugu YOSHIDA  Hisanori FUJITA  Masahiro NAKATSUKA  Hisashi SAWADA  

     
    LETTER-Lasers, Quantum Electronics

      Vol:
    E89-C No:7
      Page(s):
    1112-1114

    Self-controlled sub-nanosecond pulse generator was demonstrated with an ytterbium-doped fiber. This fiber laser consisted simply of all non-polarization fiber without any devices for polarization control and birefringence compensation. The self-pulse operation system gave an average output power of 0.9 mW in 800-ps duration pulses.

  • Extraction of Semantic Text Portion Related to Anchor Link

    Bui Quang HUNG  Masanori OTSUBO  Yoshinori HIJIKATA  Shogo NISHIDA  

     
    PAPER-Language

      Vol:
    E89-D No:6
      Page(s):
    1834-1847

    Recently, semantic text portion (STP) is getting popular in the field of Web mining. STP is a text portion in the original page which is semantically related to the anchor pointing to the target page. STPs may include the facts and the people's opinions about the target pages. STPs can be used for various upper-level applications such as automatic summarization and document categorization. In this paper, we concentrate on extracting STPs. We conduct a survey of STP to see the positions of STPs in original pages and find out HTML tags which can divide STPs from the other text portions in original pages. We then develop a method for extracting STPs based on the result of the survey. The experimental results show that our method achieves high performance.

  • Interference Effect Measurements of UWB Devices on Broadcasting System and SDMB System

    Hong Jong SONG  Dong Ku KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:6
      Page(s):
    1926-1930

    This letter describes experiments conducted to measure the interference effects of two kinds of UWB sources, which are OFDM UWB source and pulse radio UWB source, to broadcasting relay system and SDMB system. The received power degradation of a broadcasting system is presented. experimental results show that UWB system can coexist 35 m distance as close as to in-band broadcasting network and can also coexist 1.8 m as close as with the SDMB terminal without causing any dangerous interference.

  • Power and Spreading Gain Allocation in CDMA Networks for Prioritized Data Services under Power Constraints

    Bo-Hwan JUNG  Sun-Mog HONG  Kwang-Seop JUNG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:6
      Page(s):
    1807-1814

    A power and spreading gain allocation strategy is considered for effectively providing data services for mobile users with different levels of priorities in a DS-CDMA system supporting real-time and non-real-time services. Specifically, the uplink in the DS-CDMA system is considered subject to a constraint on total power received at the base station caused by non-real-time data services. The constraint is imposed to meet QoS requirements of real-time services. The priority level of a data user is specified by the weighting factor assigned to the data throughput of the user. Our strategy implements a relative prioritization that affords a trade-off between spectral efficiency and strict prioritization.

  • Impact of Timing Jitter on DS-UWB and Hybrid DS-Multiband-UWB Systems with Rake Reception over Multipath Environment

    Chin Sean SUM  Shigenobu SASAKI  Hisakazu KIKUCHI  

     
    PAPER

      Vol:
    E89-A No:6
      Page(s):
    1657-1667

    In this paper, the impact of timing jitter in direct sequence ultra wideband (DS-UWB) system is investigated over multipath fading channel. Also, a novel hybrid direct sequence multiband UWB (DS-MB-UWB) system is proposed to mitigate the impact of timing jitter. We analyze and compare the system performance for conventional DS-UWB and hybrid DS-MB-UWB with Rake receiver in the presence of timing jitter over additive white Gaussian noise (AWGN) and multipath channel. Theoretical framework is developed to calculate the amount of average energy captured in the multipath profiles and symbol error rate (SER) considering the presence of timing jitter. It is found that DS-MB-UWB system, which employs multiple sub-bands is more jitter-robust than conventional DS-UWB systems. Besides, timing jitter is found to have different impacts on DS-UWB and DS-MB-UWB systems corresponding to different parameters such as number of sub-bands employed, pulse shape, center frequency, bandwidth, number of combined paths in Rake receiver and channel power delay profile (PDP). These different impacts are analyzed and discussed in the paper.

  • Design of Analog Current-Mode Loser-Take-All Circuit

    Mohsen ASLONI  Abdollah KHOEI  Khayrollah HADIDI  

     
    LETTER

      Vol:
    E89-C No:6
      Page(s):
    819-822

    A CMOS circuit is proposed which takes multiple analog input currents and extracts minimum input current at the output. It is very fast and requires no subtraction from the constant current source. It exhibits O(N) complexity and uses only 4N MOS transistors where N is the number of system inputs. This circuit consumes very little power and very small area. The substrate bias affects the threshold voltage of transistors and improves performance of the structure.

  • A Novel Intelligent Intrusion Detection, Decision, Response System

    Hongmei KAI  Hongbing ZHU  Kei EGUCHI  Ningping SUN  Toru TABATA  

     
    PAPER

      Vol:
    E89-A No:6
      Page(s):
    1630-1637

    This paper proposed a novel intelligent intrusion detection, decision, response system with fuzzy theory. This system utilized the two essential informations: times and time, of the failed login to decide automatically whether this login is a misuse user as alike as experienced system/security administrators. The database of this system isn't preestablished before working but is built and updated automatically during working. And this system is not only notification system but gives the exact and rapid decision and response to a misuse.

  • Mobile Information Service Adapted to Subjective Situational Requirements of Individuals

    Sineenard PINYAPONG  Hiroko SHOJI  Akihiro OGINO  Toshikazu KATO  

     
    PAPER-Service and System

      Vol:
    E89-D No:6
      Page(s):
    1868-1876

    The most of conventional information services are based on the implicit premise that the users has already defined their desired information. This study proposes a mobile information service that allows the users who have not yet defined their desired information or whose desired information varies according to the situation to get appropriate information. When the user can specify their desired information to the system explicitly, the authors develop a "Pull" service. Conversely, when the user cannot verbally specify their desired information to the system, this study provides "Push" service and "Don't disturb" option for the user who does not welcome this service. This study considers the characteristics of the environment of mobile terminal to focus on "Time", "Place" and user's "Preference": long term and short term preference. This study also creates rules, algorithms and filtering to the service. Furthermore, the results of experiments have been discussed to verify the idea that different of user desired requires different information services.

  • Multiuser Temporal Resource Allocation Scheme Using Link Layer Effective Capacity for QoS Provisioning Systems

    Si-Hwan SUNG  Won-Cheol LEE  

     
    LETTER

      Vol:
    E89-A No:6
      Page(s):
    1761-1765

    The explosive growth of wireless network users and the existence of various wireless services have demanded high throughput as well as user's quality-of-service (QoS) guarantees. In accordance with, this paper proposes a novel resource allocation scheme improving both the capability of QoS-provisioning for multiple users and the overall data throughput. Towards this, the modified resource allocation technique combined with the modified largest weighted delay first (M-LWDF) scheme will be exploited upon considering statistical channel behavior as well as real time queuing analysis connected to resource allocation. In order to verify the validity of the proposed resource allocation scheme, the time division multiple access (TDMA) system will be considered as a target application. The simulation results confirm that the proposed scheme gives rise to superior performance in a way of showing results of several performance measures under time-varying wireless fading channel.

  • SDRP: A Service Discovery with Routing Protocol for MANETs

    Shi SHUO  Kyu Min LEE  Dong-Ryeol SHIN  

     
    LETTER

      Vol:
    E89-A No:6
      Page(s):
    1746-1748

    In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. In addition, the nodes included in the reply path also cache the advertisement information. We compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  • Reduction of the Intensity Noise by Electric Positive and Negative Feedback in Blue-Violet InGaN Semiconductor Lasers

    Minoru YAMADA  Kazushi SAEKI  Eiji TERAOKA  Yuji KUWAMURA  

     
    LETTER-Lasers, Quantum Electronics

      Vol:
    E89-C No:6
      Page(s):
    858-860

    Reduction of the intensity noise in semiconductor lasers is important subject to extend application range of the device. Blue-violet InGaN laser reveals high quantum noise when the laser is operated with low output power. The authors proposed a new scheme of noise reduction both for the optical feedback noise and the quantum noise by applying electric feedback which is positive type at a high frequency and negative type for lower frequency range. Noise reduction effect down to a level lower than the quantum noise was experimentally confirmed even under the optical feedback.

  • Combined MMSE-SIC Multiuser Detection for STBC-OFDM Systems

    Xuan Nam TRAN  Anh Tuan LE  Tadashi FUJINO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:5
      Page(s):
    1696-1699

    In this letter, we propose a combined scheme of minimum mean square error (MMSE) detection and successive interference cancellation (SIC) for multiuser space-time block coded orthogonal frequency division multiplexing (STBC-OFDM) systems. With the same complexity order, the proposed scheme provides significant bit error rate (BER) performance improvement over the linear MMSE multiuser detector.

  • Framework for Personalized User Interface by Sharing User-Centric Context between Real and Virtual Environments

    Seiie JANG  Woontack WOO  

     
    PAPER-Human-computer Interaction

      Vol:
    E89-D No:5
      Page(s):
    1694-1701

    In this paper, we propose a framework that provides users with personalized interfaces by sharing user-centric context between real and virtual environments. The proposed framework consists of ubi-UCAM for generating user's contexts, NAVER for managing virtual environment, and rv-Interface for linking ubi-UCAM with NAVER. Firstly, personalized interface helps users to concentrate on their tasks of interest by reducing burdensome menu selections according to user's context. In addition, user-adaptive contents based on user's preferences allow more pleasure personal experiences. Finally, personalized interface with context hand-over mechanism enables users to continuously interact with virtual environments, even if the users move around. According to experimental results, we expect that the proposed framework can play an important role for realizing user-centric VR applications by exploiting personalized interface that adapts to user-centric context.

  • Fuzzy Inference System for Multiuser Detection in CDMA Systems

    Yalcn IIK  Necmi TAPINAR  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:5
      Page(s):
    1692-1695

    In this letter, multi user detection process in Code Division Multiple Access (CDMA) is performed by fuzzy inference system (FIS) and the bit error rate (BER) performance was compared with the single user bound, the matched filter receiver and neural network receiver. The BER performance of the matched filter receiver degrades as the number of the active users and the power level differences among the users increase. The neural network receiver needs the training process. Optimal receiver that has the best BER performance is too complex for practical application. The BER performance near the optimal case was obtained with the proposed receiver. The proposed receiver uses the FIS without training process and it has lower time complexity than the optimal receiver.

  • Suboptimal Decoding of Vector Quantization over a Frequency-Selective Rayleigh Fading CDMA Channel

    Son X. NGUYEN  Ha H. NGUYEN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:5
      Page(s):
    1688-1691

    The complexity of the optimal decoding for vector quantization (VQ) in code-division multiple access (CDMA) communications prohibits implementation. It was recently shown in [1] that a suboptimal scheme that combines a soft-output multiuser detector and individual VQ decoders provides a flexible tradeoff between decoder's complexity and performance. The work in [1], however, only considers an AWGN channel model. This paper extends the technique in [1] to a frequency-selective Rayleigh fading channel. Simulation results indicate that such a suboptimal decoder also performs very well over this type of channel.

  • Bounds on the Client-Server Incremental Computing

    Cho-chin LIN  Da-wei WANG  Tsan-sheng HSU  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1198-1206

    We discuss the problem of finding a dominant sequence for sending input data items from a low-end client to a server for computational intensive tasks under the realistic assumption of unpredictable communication behavior. Under this assumption, the client has to send the input data items using a specified sequence to maximize the number of computations performed by the server at any time. The sequence-finding problem is NP-hard for the general case. In this paper, we address three fundamental and useful applications: the product of two polynomials, matrices multiplication and Fast Fourier Transform. We show that the sequence-finding problems of the three applications can be solved optimally in linear time. However, we also show counter examples to rule out any possibility of finding a dominant sequence for sparse cases of the three applications. Finally, a simulation is conducted to show the usefulness of our method.

  • Competitive Analysis of Multi-Queue Preemptive QoS Algorithms for General Priorities

    Toshiya ITOH  Noriyuki TAKAHASHI  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1186-1197

    The recent burst growth of the Internet use overloads networking systems and degrades the quality of communications, e.g., bandwidth loss, packet drops, delay of responses, etc. To overcome such degradation of communication quality, the notion of Quality of Service (QoS) has received attention in practice. In general, QoS switches have several queues and each queue has several slots to store arriving packets. Since network traffic changes frequently, QoS switches need to control arriving packets to maximize the total priorities of transmitted packets, where the priorities are given by nonnegative values and correspond to the quality of service required to each packet. In this paper, we first derive the upper bounds for the competitive ratio of multi-queue preemptive QoS problem with priority between 1/α and 1, i.e., for any α ≥ 1, the algorithm TLH is (3-1/α)-competitive. This is a generalization of known results--for the case that packets have only priority 1 (α =1), the algorithm GREEDY (or TLH) is 2-competitive; for the case that packets have priorities between 0 and 1 (α = ∞), the algorithm TLH is 3-competitive. Then we consider the lower bounds for the competitive ratio of multi-queue preemptive QoS problem with priority between 0 and 1, and show that the competitive ratio of any multi-queue preemptive QoS algorithm is at least 1.514.

  • Performance Analysis of Reliable Multicast Protocols Using Transparent Proxy Servers on Wired and Wireless Networks

    Sung-Kwan Youm  Meejoung KIM  Chul-Hee KANG  

     
    PAPER

      Vol:
    E89-B No:4
      Page(s):
    1059-1069

    This paper considers the reliable multicast transport protocols used in hybrid networks that include wired and wireless networks and transparent proxy servers. We present four analytic performance models of two extreme reliable multicast transport protocols, sender-initiated and receiver-initiated, and supported and unsupported by transparent proxy servers are considered in each reliable multicast protocol. We analyze the throughputs of these four different models mathematically. Numerical results show that transparent proxy servers give good effects to overall performance. Furthermore, the receiver-initiated reliable multicast supported by transparent proxy servers gives better performances of total throughput than sender-initiated reliable multicast supported by transparent proxy servers. We provide efficiency criterion of the optimal number of transparent proxy servers for each protocol under varying wireless loss probabilities. Numerical results are verified by simulations.

  • Block Iterative CM-Based Blind Multiuser Detector

    Seungjae BAHNG  Seokjoo SHIN  Anders HØST-MADSEN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:4
      Page(s):
    1443-1446

    Motivated by the result in [12] we present a new block iterative multiuser detection algorithm utilizing the constant modulus (CM) property of data symbols. The proposed iterative detector is developed based on a constrained least square (LS) cost function and CM projection. It can be seen as an extension of least squares constant modulus algorithm [1] in a sense that it minimizes the CM and the LS cost functions iteratively. Simulation study shows that even for a reasonably small number of symbols, say around 100 received symbols, the proposed iterative detector approaches the performance of ideal MMSE detector and considerably outperforms the conventional blind detectors, such as subspace blind method [7] or MOE detector [5].

1241-1260hit(2307hit)