The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

1521-1540hit(2307hit)

  • Reliable Decentralized Supervisory Control of Discrete Event Systems with the Conjunctive and Disjunctive Fusion Rules

    Shigemasa TAKAI  Toshimitsu USHIO  

     
    PAPER

      Vol:
    E86-A No:11
      Page(s):
    2731-2738

    In this paper, we study reliable decentralized supervisory control of discrete event systems with a control architecture where certain controllable events are controlled under the conjunctive fusion rule, and certain others are controlled under the disjunctive fusion rule. We first introduce a notion of reliable co-observability with respect to such a partition of the controllable event set. We then prove that reliable co-observability together with Lm(G)-closure and controllability is a necessary and sufficient condition for the existence of a reliable decentralized supervisor under a given partition. Moreover, we present necessary and sufficient conditions for the existence of a partition of the controllable event set under which a given specification language is reliably co-observable.

  • Motion Vector Re-Estimation Technique for Transcoding into Lower Spatial Resolution

    Kang-Seo PARK  Doo-Jin HAN  Tae-Yun CHUNG  Sang-Hui PARK  

     
    LETTER-Image Processing, Image Pattern Recognition

      Vol:
    E86-D No:11
      Page(s):
    2487-2489

    A novel motion vector re-estimation technique for transcoding into lower spatial resolution is proposed. This technique is based on the fact that the block matching error is proportional to the complexity of the reference block with Taylor series expansion. It is shown that the motion vectors re-estimated by the proposed method are closer to optimal ones and offer better quality than those of previous techniques.

  • Demodulation of Radio Frequency Interference in CMOS Operational Amplifiers

    Franco FIORI  Paolo S. CROVETTI  

     
    PAPER-Electronic Circuits

      Vol:
    E86-C No:11
      Page(s):
    2309-2319

    In this paper a second order Volterra series model of an operational amplifier (opamp) circuit is presented. Such a model is suitable to the investigation of the rectification and demodulation effects of radio frequency (RF) interference superimposed on the nominal input signals and on the power supply voltage of an opamp. On the basis of the new model, some design criteria to improve the immunity of opamps to RF interference are proposed. Model predictions are verified by comparison with experimental test results.

  • Characterization of 10 µm Thick Porous Silicon Dioxide Obtained by Complex Oxidation Process for RF Application

    Jeong-Yong PARK  Jong-Hyun LEE  

     
    LETTER-Semiconductor Materials and Devices

      Vol:
    E86-C No:11
      Page(s):
    2336-2340

    This paper proposes a 10 µm thick oxide layer structure, which can be used as a substrate for RF circuits. The structure has been fabricated by anodic reaction and complex oxidation, which is a combined process of low temperature thermal oxidation (500, for 1 hr at H2O/O2) and a rapid thermal oxidation (RTO) process (1050, for 1 min). The electrical characteristics of oxidized porous silicon layer (OPSL) were almost the same as those of standard thermal silicon dioxide. The leakage current through the OPSL of 10 µm was about 100-500 pA in the range of 0 V to 50 V. The average value of breakdown field was about 3.9 MV/cm. From the X-ray photo-electron spectroscopy (XPS) analysis, surface and internal oxide films of OPSL, prepared by complex process, were confirmed to be completely oxidized. Also the role of RTO was important for the densification of the porous silicon layer (PSL), oxidized at a lower temperature. For the RF test of Si substrate, with thick silicon dioxide layer, we have fabricated high performance passive devices such as coplanar waveguide (CPW) on OPSL substrate. The insertion loss of CPW on OPSL prepared by complex oxidation process was -0.39 dB at 4 GHz and similar to that of CPW on OPSL prepared at a temperature of 1050 (1 hr at H2O/O2). Also the return loss of CPW on OPSL prepared by complex oxidation process was -23 dB at 10 GHz which is similar to that of CPW on OPSL prepared by high temperature oxidation.

  • A Simplified Graph Model for User Interface Constraints

    Chuan-Chieh JUNG  Tze-Heng MA  Yue-Sun KUO  

     
    PAPER-Man-Machine Systems, Multimedia Processing

      Vol:
    E86-D No:11
      Page(s):
    2426-2432

    Constraints have been used extensively for the construction of graphical user interfaces. User interface constraints that are declarative are more favorable but require sophisticated constraint planning algorithms. Constraint planning algorithms proposed previously are getting more and more complicated as they were asked to handle more general requirements. We believe that the difficulty is mainly caused by the complicated data structure that is translated directly from the problem. By a transformation, we propose a simplified graph model for the problem and prove that the constraint planning problem can be reduced to finding feedback vertex sets on the simplified graph model. We also consider the general problem of handling non-uniform user interface constraints.

  • The Performance Modeling Application of SIP-T Signaling System Based on Two-Class Priority Queueing Process in Carrier Class VoIP Network

    Peir-Yuan WANG  Jung-Shyr WU  

     
    PAPER

      Vol:
    E86-D No:11
      Page(s):
    2271-2290

    This paper presents the performance modeling application of SIP-T (Session Initiation Protocol for Telephones) signaling system based on two-class priority queueing process in carrier class VoIP (Voice over IP) network. The SIP-T signaling system defined in IETF (Internet Engineering Task Force) is a mechanism that uses SIP (Session Initiation Protocol) to facilitate the interconnection of existing PSTN (Public Switched Telephone Network) with carrier class VoIP network. One of the greatest challenges in the migration from PSTN toward NGN (Next Generation Networks) is to build a carrier class VoIP network that preserves the ubiquity, quality, and reliability of PSTN services while allowing the greatest flexibility for use of new VoIP technology. Based on IETF, the SIP-T signaling system not only promises scalability, flexibility, and interoperability with PSTN but also provides call control function of MGC (Media Gateway Controller) to set up, tear down, and manage VoIP calls in carrier class VoIP network. This paper presents the two class priority queueing model, performance analysis, and simulation of SIP-T signaling system in carrier class VoIP network focused on toll by-pass or tandem by-pass of PSTN. In this paper, we analyze the average queueing length, the mean of queueing delay, and the variance of queueing delay of SIP-T signaling system that are the major performance evaluation parameters for improving QoS (Quality of Service) and system performance of MGC in carrier class VoIP network. A mathematical model of the M/G/1 queue with two-class non-preemptive priority assignment is proposed to represent SIP-T signaling system. Then, the formulae of average queueing length, queueing delay, and delay variation for the non-preemptive priority queue are expressed respectively. Several significant numerical examples of average queueing length, queueing delay, and delay variation are presented as well. Finally, the two-class priority queueing model and performance analysis of SIP-T signaling system are shown the accuracy and robustness after the comparison between theoretical estimates and simulation results.

  • A Kalman-Filter Based Location Management Strategy for Cellular Networks

    Tracy TUNG  Abbas JAMALIPOUR  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E86-B No:11
      Page(s):
    3209-3216

    In this paper, we propose a new predictive location management strategy that reduces the update cost while restricting the paging load optimized for mobiles roaming with traceable patterns. Enhanced with directional predictive capabilities offered by Kalman filtering, new update boundaries are assigned to better reflect the movement patterns of individual mobiles upon location registration. Thus, while complying with the required delay constraints, QoS measures such as throughput will not need to be sacrificed as a result of increasing update threshold. The contribution of this paper is two-fold: (1) to propose a distribution model that is capable of describing a wide range of movement patterns with varying correlation between traveling directions and (2) to show the capabilities (in terms of reliable performances) of the Kalman filter in predicting future movement patterns. Simulation results have successfully demonstrated the ability of the Kalman filter in assigning update boundaries capable of reflecting a mobile's roaming characteristics. The performance gains achieved mainly through a significant reduction in the number of updates indicate its potential for promoting better bandwidth conservation.

  • A Layer-2 Extension to Hash-Based IP Traceback

    Hiroaki HAZEYAMA  Masafumi OE  Youki KADOBAYASHI  

     
    PAPER

      Vol:
    E86-D No:11
      Page(s):
    2325-2333

    Hash-based IP traceback is a technique to generate audit trails for traffic within a network. Using the audit trails, it reconstructs not only the true attack paths of a Distributed Denial of Service attack (DDoS attack), but also the true path of a single packet attack. However, hash-based IP traceback cannot identify attacker nodes themselves because it has no audit trail on the subnet's layer-2 network under the detected leaf router, which is the nearest node to an attacker node on a layer-3 network. We propose a layer-2 extension to hash-based IP traceback, which stores two identifiers with packets' audit trails while reducing the memory requirement for storing identifiers. One of these identifiers shows the leaf router's interface through which an attacking packet came, and the other represents the ingress port on a layer-2 switch through which the attacking packet came. We implement a prototype on FreeBSD and evaluate it in a preliminary experiment.

  • Adaptive Terminal Middleware for Seamless Session Mobility

    Ken OHTA  Takashi YOSHIKAWA  Tomohiro NAKAGAWA  Shoji KURAKAKE  

     
    PAPER

      Vol:
    E86-D No:11
      Page(s):
    2343-2351

    Various network resources, including wireless access services and multimedia appliances (device) are expected to be available in ubiquitous computing environments. Since resource availability can change when a user migrates from one place to another, functions to monitor the availability of resources in use and, if necessary, switch from obsolete resources to new ones are necessary for continuous service provision. This paper proposes adaptive terminal middleware called AMID that performs policy-based dynamic resource selection and host-based session management to ease network administrative tasks, and hide session failures and resource changes from applications and a user. AMID supports two kinds of mobility; session maintenance on vertical handoff and device handoff (service mobility). By AMID, a mobile host keeps entire handoff control and session state to eliminate the need for network-layer or intermediate-node mobility support, and mitigate responsibility of devices for session management. AMID realizes a Reliable Virtual Socket (RVS), on top of real sockets, which employs a seamless session handoff mechanism for resource changes, and a reliable session resume mechanism against unplanned disconnection of a wireless link. It achieves seamless session handoff through a proactive soft handoff method; to conceal setup and signaling latency, it initiates setup procedures with neighbor resources in advance of actual handoff and utilizes multiple wireless interfaces and devices redundantly. We implemented AMID and a follow-me audio application on top of it to evaluate the performance. Redirection of audio streams from built-in speakers to external ones, and handoff between 802.11b and Cellular are autonomously performed when a user migrates in the house. We confirmed that AMID achieved reliable session maintenance against wireless link failure, concealed latency of handoff management, and prevented packet loss during handoff.

  • Asymmetric Characteristics of Internet Based on Traffic Measurement and Analysis

    Satoshi KATSUNO  Kiminori SUGAUCHI  Osamu TSUNEHIRO  Katsuyuki YAMAZAKI  Kenichi YOSHIDA  Hiroshi ESAKI  

     
    PAPER

      Vol:
    E86-D No:11
      Page(s):
    2300-2309

    This paper presents measurement and analysis of various networks and applications using a high-speed IP meter. The authors have developed a high-speed IP meter with a GPS timestamp component, which enables precise measurement of packet delay and jitter in various networks. Measurement of the following networks was performed, 1) Measurement of traffic in a commercial IPv6 access service on ADSL, as a typical broadband access service network. 2) Measurement of traffic in the 54th IETF meeting in Yokohama, as a typical high-speed Internet backbone network. This paper reports the characteristics identified in these networks, e.g. asymmetricities of one-way packet delay over an ADSL access network and the difference in TCP/UDP packet delay over a high-speed backbone network. It also presents the analysis results of some multimedia applications in the Internet, and discusses the quality of service on Internet access service networks.

  • On-Line Writer Recognition for Thai Numeral

    Pitak THUMWARIN  Takenobu MATSUURA  

     
    PAPER-Source Coding/Image Processing

      Vol:
    E86-A No:10
      Page(s):
    2535-2541

    In this paper, we propose an on-line writer recognition method for Thai numeral. A handwriting process is characterized by a change of numeral's shape, which is represented by two features, a displacement of pen-point position and an area of triangle determined from the two adjacent points of pen-point position and the origin. First, the above two features are expanded into Fourier series. Secondly, in order to describe feature of handwriting, FIR (Finite impulse response) system having the above Fourier coefficients as input and output of the system is introduced. The impulse response of the FIR system is used as the feature of handwriting. Furthermore, K-L expansion of the obtained impulse response is used to recognize writer. Writer recognition experiments are performed by using 3,770 data collected by 54 Thai writers for one year. The average of Type I (false rejection) error rate and Type II (false acceptance) error rate were 2.16% and 1.12%, respectively.

  • QoS Certification of Real-Time Distributed Computing Systems: Issues and Promising Approaches

    K.H. (Kane) KIM  

     
    INVITED PAPER

      Vol:
    E86-D No:10
      Page(s):
    2077-2086

    The general public is expected to demand in not too distant future instituting more stringent certification procedures for computing parts of traditional and new-generation safety-critical application systems. Such quality-of-service (QoS) certification processes will not and can not rely solely on the testing approach. Design-time guaranteeing of timely service capabilities of various subsystems is an inevitable part of such processes. Although some promising developments in this area have been occurring in recent years, the technological challenges yet to be overcome are enormous. This paper is a summary of the author's perspective on the remaining challenges and promising directions for tackling them.

  • A Parallel Downloading Method to Utilize Variable Bandwidth

    Junichi FUNASAKA  Nozomi NAKAWAKI  Kenji ISHIDA  Kitsutaro AMANO  

     
    PAPER-Network Control and Management

      Vol:
    E86-B No:10
      Page(s):
    2874-2881

    As a lot of programs and contents such as movie files are being delivered via the Internet, and copies are often stored in distributed servers in order to reduce the load on the original servers, to ease network congestion, and to decrease response time. To retrieve an object file, existing methods simply select one or more servers. Such methods divide a file into equal pieces whose size is determined a priori. This approach is not practical for networks that offer variable bandwidth. In order to more utilize variable bandwidth, we propose an adaptive downloading method. We evaluate it by experiments conducted on the Internet. The results show that the new method is effective and that it will become an important network control technology for assurance.

  • Adaptive On-Line Frequency Stabilization System for Laser Diodes Based on Genetic Algorithm

    Shintaro HISATAKE  Naoto HAMAGUCHI  Takahiro KAWAMOTO  Wakao SASAKI  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E86-C No:10
      Page(s):
    2097-2102

    We propose a frequency stabilization system for laser diodes (LDs), in which the electrical feedback loop response can be determined using an on-line genetic algorithm (GA) so as to attain lower LD frequency noise power within the specific Fourier frequency range of interest. At the initial stage of the stabilization, the feedback loop response has been controlled through GA, manipulating the proportional gain, integration time, and derivative time of conventional analog PID controller. Individuals having 12-bit chromosomes encoded by combinations of PID parameters have converged evolutionarily toward an optimal solution providing a suitable feedback loop response. A fitness function has been calculated for each individual in real time based on the power spectral density (PSD) of the frequency noise. The performance of this system has been tested by stabilizing a 50 mW visible LD. Long-term (τ > 0.01 s) frequency stability and its repeatability have been improved.

  • Design Development of SPARC64 V Microprocessor

    Mariko SAKAMOTO  Akira KATSUNO  Aiichiro INOUE  Takeo ASAKAWA  Kuniki MORITA  Tsuyoshi MOTOKURUMADA  Yasunori KIMURA  

     
    INVITED PAPER

      Vol:
    E86-D No:10
      Page(s):
    1955-1965

    We developed a SPARC-V9 processor, the SPARC64 V. It has an operating frequency of 1.35 GHz and contains 191 million transistors fabricated using 0.13-µm CMOS technology with eight-layer copper metallization. SPECjbb2000 (CPU# 32) is 492683, highest on the market and 42% higher than the next highest system. SPEC CPU2000 performance is 858 for SPECint and 1228 for SPECfp. The processor is designed to provide the high system performance and high reliability required of enterprise server systems. It is also designed to address the performance requirements of high-performance computing. During our development of several generations of mainframe processors, we conducted many related experiments, and obtained enterprise server system (EPS) development skills, an understanding of EPS workload characteristics, and technology that provides high reliability, availability, and serviceability. We used those as bases of the new processor development. The approach quite effectively moves beyond differences between mainframe and SPARC systems. At the beginning of development and before the start of hardware design, we developed a software performance simulator so we could understand the performance impacts of created specifications, thereby enabling us to make appropriate decisions about hardware design. We took this approach to solve performance problems before tape-out and avoid spending additional time on design update and physical machine reconstruction. We were successful, completing the high-performance processor development on schedule and in a short time. This paper describes the SPARC64 V microprocessor and performance analyses for development of its design.

  • Scenario-Based Web Services Testing with Distributed Agents

    Wei-Tek TSAI  Ray PAUL  Lian YU  Akihiro SAIMI  Zhibin CAO  

     
    PAPER-Testing

      Vol:
    E86-D No:10
      Page(s):
    2130-2144

    Web Services (WS) have received significant attention recently. Delivering Quality of Service (QoS) on the Internet is a critical and significant challenge for WS community. This article proposes a Web Services Testing Framework (WSTF) for WS participates to perform WS testing. WSTF provides three main distributed components: test master, test agents and test monitor. Test master manages scenarios and generates test scripts. It initiates WS testing by sending test scripts to test agents. Test agents dynamically bind and invoke the WS. Test monitors capture synchronous/asynchronous messages sent and received, attach timestamp, and trace state change information. The benefit to use WSTF is that the user only needs to specify system scenarios based on the system requirements without needing to write test code. To validate the proposed approach, this paper used the framework to test a supply-chain system implemented using WS.

  • A Technique for Constructing Dependable Internet Server Cluster

    Mamoru OHARA  Masayuki ARAI  Satoshi FUKUMOTO  Kazuhiko IWASAKI  

     
    PAPER-Fault Tolerance

      Vol:
    E86-D No:10
      Page(s):
    2198-2208

    An approach is proposed for constructing a dependable server cluster composed only of server nodes with all nodes running the same algorithm. The cluster propagates an IP multicast address as the server address, and clients multicast requests to the cluster. A local proxy running on each client machine enables conventional client software designed for unicasting to communicate with the cluster without having to be modified. Evaluation of a prototype system providing domain name service showed that a cluster using this technique has high dependability with acceptable performance degradation.

  • Autonomous Integration and Optimal Allocation of Heterogeneous Information Services for High-Assurance in Distributed Information Service System

    Xiaodong LU  Kinji MORI  

     
    PAPER-Agent-Based Systems

      Vol:
    E86-D No:10
      Page(s):
    2087-2094

    Information service provision and utilization is an important infrastructure in the high-assurance distributed information service system. In order to cope with the rapidly evolving situations of providers' and users' heterogeneous requirements, one autonomous information service system has been proposed, called Faded Information Field (FIF). FIF is a distributed information service system architecture, sustained by push/pull mobile agents, through a recursive demand-oriented provision of the most popular information closer to the users to make a tradeoff between the cost of service allocation and access. In this system, users' requests are autonomously driven by pull mobile agents in charge of finding the relevant service. In the case of a mono-service request, the system is designed to reduce the time needed for users to access the information and to preserve the consistency of the replicas. However, when the user requests joint selection of multiple services, synchronization of atomic actions and timeliness have to be assured by the system. In this paper, the relationship that exists among the contents, properties and access ratios of information services is clarified. Based on these factors, the ratio of correlation and degree of satisfaction are defined and the autonomous integration and optimal allocation of information services for heterogeneous FIFs to provide one-stop service for users' multi-service requirements are proposed. The effectiveness of the proposed technology is shown through evaluation and the results show that the integrated services can reduce the total users access time and increase services consumption compared with separate systems.

  • An FTP Proxy System to Assure Providing the Latest Version of Replicated Files

    Junichi FUNASAKA  Masato BITO  Kenji ISHIDA  Kitsutaro AMANO  

     
    PAPER-Network Systems and Applications

      Vol:
    E86-B No:10
      Page(s):
    2948-2956

    As so many software titles are now being distributed via the Internet, the number of accesses to file servers, such as FTP servers, is rapidly increasing. To prevent the concentration of accesses to the original file server, mirror servers are being introduced that contain the same directories and files as held by the original server. However, inconsistency among the mirror servers and the original server is often observed because of delivery latency, traffic congestion on the network, and management policies of the mirror servers. This inconsistency degrades the value of the mirror servers. Accordingly, we have developed an intermediate FTP proxy server system that guarantees the freshness of the files as well as preventing access concentration on the original FTP server. The system adopts per-file selection of the replicated files; most existing methods are based on per-host or per-directory selection. Therefore it can assure users of a quick, stable, and up-to-date FTP mirroring service even in the face of frequent content updates, which tend to degrade the homogeneity of services. Moreover, it can forward the retrieved files with little overhead. Tests confirmed that our system is comparable to existing systems from the viewpoint of actual retrieval time, required traffic, and load endurance. This technology can assure clients that they will receive the latest version of the file(s) desired. It well supports heterogeneous network environments such as the Internet.

  • Advanced RF Characterization and Delay-Time Analysis of Short Channel AlGaN/GaN Heterojunction FETs

    Takashi INOUE  Yuji ANDO  Kensuke KASAHARA  Yasuhiro OKAMOTO  Tatsuo NAKAYAMA  Hironobu MIYAMOTO  Masaaki KUZUHARA  

     
    PAPER

      Vol:
    E86-C No:10
      Page(s):
    2065-2070

    High-frequency characterization and delay-time analysis have been performed for a short channel AlGaN/GaN heterojunction FET. The fabricated device with a short gate length (Lg) of 0.07 µm exhibited an extrinsic current gain cutoff frequency of 81 GHz and a maximum frequency of oscillation of 190 GHz with a maximum stable gain (MSG) of 8.2 dB at 60 GHz. A new scheme for the delay-time analysis was proposed, in which the effects of rather large series resistance RS + RD are properly taken into account. By applying the new scheme to a device with Lg=0.25 µm, we obtained an effective high-field electron velocity of 1.75107 cm/s, which is consistent with our previous results calculated using Monte Carlo simulation.

1521-1540hit(2307hit)