The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

10461-10480hit(16314hit)

  • Wide-Band Dispersion Compensation for 1000-km Single-Mode Fiber by Midway Spectral Inversion Using Cascaded Nonlinearities in LiNbO3 Waveguide

    Xiaomin WANG  Daisuke KUNIMATSU  Tatsushi HASEGAWA  Akira SUZUKI  

     
    LETTER

      Vol:
    E87-C No:7
      Page(s):
    1097-1099

    We demonstrate the wide-band (> 25-nm) long-distance (> 1000-km) chromatic dispersion compensation by midway spectral inversion (MSI) using a periodically-polled LiNbO3 device. In order to achieve a flat zero net dispersion, the fourth order dispersion of the single-mode fibers is canceled by MSI, while the third order dispersion is compensated for by the negative slope dispersion compensation fiber (NS-DCF). The second order dispersion is canceled out by both. The long distance propagation is realized by a double recirculation-loop system. A very flat zero dispersion is measured for the first time for over 1000-km single-mode fiber propagation with MSI dispersion compensation.

  • Tunable Dispersion and Dispersion Slope Compensator Based on Two Twin Chirped FBGs with Temperature Gradient for 160 Gbit/s Transmission

    Shin-ichi WAKABAYASHI  Asako BABA  Hitomi MORIYA  Xiaomin WANG  Tatsushi HASEGAWA  Akira SUZUKI  

     
    PAPER

      Vol:
    E87-C No:7
      Page(s):
    1100-1105

    We have developed the tunable dispersion compensator based on two twin linearly chirped fiber Bragg gratings with various temperature gradients. Controlling the temperature gradient over one of the twin fiber Bragg gratings by Peltier elements, the dispersion and the dispersion slope were changed independently and continuously. The dispersion and dispersion slope compensator has a large bandwidth of 8 nm and low group-delay ripple of < 4 ps in its chirped fiber Bragg gratings. We experimentally demonstrated a precise controllability of the dispersion and the dispersion slope using linear and parabolic temperature gradient. The dispersion and the dispersion slope changes were achieved continuously with -0.67 ps/nm/ and -0.14 ps/nm2/. The transmission characteristics of the dispersion slope compensation were examined using ultra short pulses in the fiber link. When the total dispersion was zero, the distorted pulse was restored back and the tail was significantly suppressed. 160 Gbit/s signals were also demonstrated over 140 km within 1 dB power penalty by using the dispersion slope compensator.

  • Joint Use of Frequency-Domain Equalization and Transmit/Receive Antenna Diversity for Single-Carrier Transmissions

    Kazuaki TAKEDA  Takeshi ITAGAKI  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:7
      Page(s):
    1946-1953

    The joint use of frequency-domain equalization and antenna diversity is presented for single-carrier (SC) transmission in a frequency-selective fading channel. Frequency-domain equalization techniques using minimum mean square error (MMSE), orthogonal restoration combining (ORC) and maximum ratio combining (MRC), those used in multi-carrier code division multiple access (MC-CDMA), are considered. As antenna diversity techniques, receive diversity and delay transmit diversity (DTD) are considered. Bit error rate (BER) performance achievable with the joint use of frequency-domain equalization and antenna diversity is evaluated by computer simulation.

  • Hybrid Method for Solving Dual-Homing Cell Assignment Problem on Two-Level Wireless ATM Network

    Der-Rong DIN  

     
    PAPER-Network Theory

      Vol:
    E87-A No:7
      Page(s):
    1664-1671

    In this paper, the optimal assignment problem which assigns cells in PCS (Personal Communication Service) to switches on ATM (Asynchronous Transfer Mode) network is investigated. The cost considered in this paper has two components: one is the cost of handoff that involves two switches, and the other is the cost of cabling. This problem assumes that each cell in PCS can be assigned to two switches in ATM network. This problem is modelled as dual-homing cell assignment problem, which is a complex integral linear programming (ILP) problem. Since finding an optimal solution of this problem is NP-hard, a hybrid method which combines several heuristics and a stochastic search method (based on a simulated annealing(SA) approach) is proposed to solve this problem. The solution method consists of three phases: Primary Assignment Decision Phase (PADP), Secondary Assignment Decision Phase (SADP) and Refinement Phase (RP). The PADP and SADP are used to find good initial assignment, then domain-dependent heuristics are encoded into perturbations of SA in Refinement Phase to improve the result. Simulation results show that the proposed hybrid method is robust for this problem.

  • VLSI Design for Embedded Digital Watermarking JPEG Encoder Based on Digital Camera System

    Tsung-Han TSAI  Chrong-Yi LU  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E87-A No:7
      Page(s):
    1772-1780

    In this paper a new watermarking technique which is combined with joint photographic experts group (JPEG) encoding system is presented. This method operates in the frequency domain by embedding a pseudo-random sequence of real numbers in a selected set of discrete cosine transform (DCT) coefficients. The embedded sequence is extracted without restoring the original image to fit the trend in the digital still camera (DSC) system. The proposed technique represents a major improvement on methods relying on the comparison between the watermarked and original images. Experimental results show that the proposed watermarking method is robust to several common image processing techniques, including JPEG compression, noise, and blurring. We also implement the whole design by synthesizing with TSMC 1P4M 0.35 µm standard cell. The chip size is 3.0643.064 mm2 for 46374 gate counts. The simulation speed can reach 50 MHz. The power dissipation is 69 mW at 3.3 V 50 MHz.

  • Joint Frequency-Domain Equalization and Antenna Diversity Combining for Orthogonal Multicode DS-CDMA Signal Transmissions in a Frequency-Selective Fading Channel

    Takeshi ITAGAKI  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:7
      Page(s):
    1954-1963

    Orthogonal multicode direct sequence code division multiple access (DS-CDMA) has the flexibility in offering various data rate services. However, in a frequency-selective fading channel, the bit error rate (BER) performance is severely degraded since the othogonality among spreading codes is partially lost. In this paper, we apply frequency-domain equalization and antenna diversity combining, used in multi-carrier CDMA (MC-CDMA), to orthogonal multicode DS-CDMA in order to restore the code othogonality while achieving frequency and antenna diversity effect. It is found by computer simulations that the joint use of frequency-domain equalization and antenna diversity combining can significantly improve the BER performance of orthogonal multicode DS-CDMA in a frequency-selective fading channel.

  • Robust Watermarking Based on Time-spread Echo Method with Subband Decomposition

    Byeong-Seob KO  Ryouichi NISHIMURA  Yoiti SUZUKI  

     
    LETTER-Information Security

      Vol:
    E87-A No:6
      Page(s):
    1647-1650

    A robust watermarking scheme based on the time-spread echo method is proposed in this letter. The embedding process is achieved by subband decomposition of a host signal and by controlling the amount of distortion, i.e., power of watermark, of each subband according to the Signal to Mask Ratio (SMR) calculated from MPEG psychoacoustic model. The decoding performance and robustness of the proposed method were evaluated.

  • The Structures of CPW PHEMT's for Applications of Millimeter-Waves

    Byeong-Ok LIM  Tae-Shin KANG  Bok-Hyung LEE  Mun-Kyo LEE  Jin-Koo RHEE  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1323-1329

    The parasitic capacitances induced in the spaces between an air-bridge interconnection and a drain pad (Cad), and between an air-bridge interconnection and a gate head (Cag) from a power CPW PHEMT are not negligible. In this paper, a modified equivalent circuit model for a CPW PHEMT and an improved CPW PHEMT for millimeter-wave applications are proposed. These were proved by measuring the fabricated CPW PHEMT and improved CPW PHEMT. These capacitances were confirmed by measuring the gate-source coupling using CPW PHEMT patterns without an active layer. From the measurements, the improved CPW PHEMT has the lowest coupling (loss) and the highest S21 gain among four different types tested at 60 GHz. And the improved CPW PHEMT is a feasible device which can be directly applied in millimeter-waves as a power device.

  • MTRMCC: A Congestion Control Mechanism for Many-to-Many Tree-Based Reliable Multicast Protocols

    Kyungran KANG  Dongman LEE  Je-young YOU  

     
    PAPER-Internet

      Vol:
    E87-B No:6
      Page(s):
    1601-1609

    As the Internet proliferates, there has been a growing interest in supporting multiparty collaborative applications. It has led to the emergence of many-to-ma ny reliable multicast. Congestion control is a key task in reliable multicast along with error control. However, existing tree-based congestion control schemes such as TRAMCC and MTCP are designed for one-to-many reliable multicast and have some drawbacks when they are used for many-to-many reliable multicast. We propose an efficient congestion control mechanism, MTRMCC, for tree-based many-to-many reliable multicast protocols. The proposed scheme is based on the congestion windowing mechanism and a rate controller is used in addition. The feedback for error recovery is exploited for congestion control as well to minimize the overhead at the receivers. The ACK timer and the NACK timers are set dynamically reflecting the network traffic changes. The rate regulation algorithm in the proposed scheme is designed to help the flows sharing the same link to achieve the fair share quickly. The performance of the proposed scheme is evaluated using network simulator ns-2. The simulation results show that the proposed scheme outperforms TRAMCC in terms of intra-session fairness and supports responsiveness, TCP-friendliness, and scalability.

  • Bit Error Correctable Multiple Description Coding

    Kwang-Pyo CHOI  Chang-su HAN  Keun-Young LEE  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1433-1440

    This paper proposes a new method, EC-MDC that can detect and correct bit errors in the bitstream generated by multiple description coding. The proposed method generates two sub-bitstreams having a few redundancies as much as conventional multiple description coding. If a sub-bitstream at one side has bit error, the bit error can be corrected by using sub-bitstream of the other side. In BER-SNR experiments, reconstruction quality of the proposed method shows about 11dB higher than that of the conventional MDC at BER < 10-3 when a sub-bitstream is corrupted.

  • Self-Organizing Map-Based Analysis of IP-Network Traffic in Terms of Time Variation of Self-Similarity: A Detrended Fluctuation Analysis Approach

    Masao MASUGI  

     
    PAPER-Nonlinear Problems

      Vol:
    E87-A No:6
      Page(s):
    1546-1554

    This paper describes an analysis of IP-network traffic in terms of the time variation of self-similarity. To get a comprehensive view in analyzing the degree of long-range dependence (LRD) of IP-network traffic, this paper used a self-organizing map, which provides a way to map high-dimensional data onto a low-dimensional domain. Also, in the LRD-based analysis, this paper employed detrended fluctuation analysis (DFA), which is applicable to the analysis of long-range power-law correlations or LRD in non-stationary time-series signals. In applying this method to traffic analysis, this paper performed two kinds of traffic measurement: one based on IP-network traffic flowing into NTT Musashino R&D center (Tokyo, Japan) from the Internet and the other based on IP-network traffic flowing through at an interface point between an access provider (Tokyo, Japan) and the Internet. Based on sequential measurements of IP-network traffic, this paper derived corresponding values for the LRD-related parameter α of measured traffic. As a result, we found that the characteristic of self-similarity seen in the measured traffic fluctuated over time, with different time variation patterns for two measurement locations. In training the self-organizing map, this paper used three parameters: two α values for different plot ranges, and Shannon-based entropy, which reflects the degree of concentration of measured time-series data. We visually confirmed that the traffic data could be projected onto the map in accordance with the traffic properties, resulting in a combined depiction of the effects of the degree of LRD and network utilization rates. The proposed method can deal with multi-dimensional parameters, projecting its results onto a two-dimensional space in which the projected data positions give us an effective depiction of network conditions at different times.

  • Conservative Extension of Connection Retrieval Time for Wireless Packet Service

    Cheon Won CHOI  Woo Cheol SHIN  Jin Kyung PARK  Jun HA  Ho-Kyoung LEE  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1417-1425

    In provisioning packet data service on wireless cellular networks, a scheme of altering connection status between mobile and base stations appeared intending to efficiently utilize resource during idle periods. In such a scheme, connection components are sequentially released as an idle period persists, while the transmitting station converts to an transmission activity mode as the station is loaded with packets. However, actual resume of transmission activity is postponed by connection retrieval time to restore lost connection components. In general, an idle period affects the following connection retrieval time, which in turn produces an impact on the forthcoming idle period. Such chain reaction also makes a significant influence on overall packet delay performance. In this paper, as a way of improving packet delay performance, we propose two schemes identified as conservative extension and load threshold schemes. In the conservative extension scheme, we intentionally extend connection retrieval times so that each connection retrieval time is guaranteed not to be lower than a certain value. On the other hand, according to the load threshold scheme, a retrieval of lost connection components is postponed until packets are accumulated at the transmitting station up to a prescribed threshold. An increase in the value and threshold incurs an additional stand-by before resuming transmission activity in both proposed schemes. In turn, such intentional stand-by may contribute to regulating the length of idle period and connection retrieval time, and subsequently improving packet delay performance. To inspect the impact of conservative extension and load threshold schemes on packet delay performance, we first investigate the properties of idle periods. Secondly, for Poisson packet arrivals, we present an analytical method to exactly calculate the moments of packet delay time (at steady state) in each scheme. From numerical examples, we confirm the existence of non-trivial optimal value and threshold minimizing average packet delay or packet delay variation and conclude that conservative extension and load threshold schemes are able to enhance packet delay performance in various environments.

  • Bidirectional Path Setup Scheme Using on Upstream Label Set in Optical GMPLS Networks

    Eiji OKI  Nobuaki MATSUURA  Kohei SHIOMOTO  Naoaki YAMANAKA  

     
    PAPER-Network

      Vol:
    E87-B No:6
      Page(s):
    1569-1576

    Generalized Multi-Protocol Label Switching (GMPLS) is being developed in the Internet Engineering Task Force (IETF). In GMPLS-based wavelength-division-multiplexing (WDM) optical networks, a wavelength in a fiber is used as a label. In the existing GMPLS signaling protocol for bidirectional paths in WDM networks with the wavelength continuity constraint, bidirectional path setup fails with high probability because the upstream label allocated by the previous hop node may not be accepted at the transit node. To solve this problem, this paper proposes an efficient bidirectional label switched path (LSP) setup scheme based on an upstream label set. Called the Upstream Label Set (ULS) scheme, it is an extension of the existing GMPLS signaling protocol. The ULS scheme is consistent with the existing GMPLS signaling procedure and so offers backward compatibility. The numerical results suggest that when the number of the LSP setup retries is limited, the ULS scheme offers lower blocking probability than the existing GMPLS signaling scheme which uses only with the upstream label (UL). In addition, under the condition that the constraint of the number of LSP setup retries is relaxed, the LSP setup time of the ULS scheme is faster than that of the existing scheme. Furthermore, by using our developed prototype of the GMPLS control system, in which the ULS scheme was installed, we demonstrated that the ULS scheme successfully setup bidirectional LSPs.

  • An Improved Artificial Immune Network Model

    Wei-Dong SUN  Zheng TANG  Hiroki TAMURA  Masahiro ISHII  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E87-A No:6
      Page(s):
    1632-1640

    It is generally believed that one major function of the immune system is helping to protect multicellular organisms from foreign pathogens, especially replicating pathogens such as viruses, bacteria and parasites. The relevant events in the immune system are not only the molecules, but also their interactions. The immune cells can respond either positively or negatively to the recognition signal. A positive response would result in cell proliferation, activation and antibody secretion, while a negative response would lead to tolerance and suppression. Depending upon these immune mechanisms, an immune network model (here, we call it the binary immune network) based on the biological immune response network was proposed in our previous work. However, there are some problems like that input and memory were all binary and it did not consider the antigen diversity of immune system. To improve these problems, in this paper we propose a fuzzy immune network model by considering the antigen diversity of immune system that is the most important property to be exhibited in the immune system. As an application, the proposed fuzzy immune network is applied to pattern recognition problem. Computer simulations illustrate that the proposed fuzzy immune network model not only can improve the problems existing in the binary immune network but also is capable of clustering arbitrary sequences of large-scale analog input patterns into stable recognition categories.

  • Dialogue Languages and Persons with Disabilities

    Akira ICHIKAWA  

     
    INVITED PAPER

      Vol:
    E87-D No:6
      Page(s):
    1312-1319

    Any utterances of dialogue, spoken language or sign language, have functions that enable recipients to achieve real-time and easy understanding and to control conversation smoothly in spite of its volatile characteristics. In this paper, we present evidence of these functions obtained experimentally. Prosody plays a very important role not only in spoken language (aural language) but also in sign language (visual language) and finger braille (tactile language). Skilled users of a language may detect word boundaries in utterances and estimate sentence structure immediately using prosody. The gestures and glances of a recipient may influence the utterances of the sender, leading to amendments of the contents of utterances and smooth exchanges in turn. Individuality and emotion in utterances are also very important aspects of effective communication support systems for persons with disabilities even more so than for those non-disabled persons. The trials described herein are universal in design. Some trials carried out to develop these systems are also reported.

  • A Combined Approach to Integrity Protection and Verification of Palette Images Using Fragile Watermarks and Digital Signatures

    Chih-Hsuan TZENG  Wen-Hsiang TSAI  

     
    PAPER-Image

      Vol:
    E87-A No:6
      Page(s):
    1612-1619

    Conventional authentication methods, proposed mainly for gray-scale and color images, are not appropriate for palette images, which usually contain simple contents with a limited number of colors. In this paper, a new approach is proposed to verify the integrity of palette images and to locate tampered regions without re-quantization and re-indexing processes. The proposed approach is based on a combined use of both the fragile watermarking and the digital signature approaches, taking the advantages of both approaches and avoiding their drawbacks. To protect a block of an image, authentication signals are first generated according to a secret key. Based on an embeddability property defined in the study, the pixels of each block are classified as embeddable or non-embeddable. Only the former ones are used to embed the authentication signals. A corresponding digital signature is generated as well to compensate the possibly limited embedding capacity of the embeddable pixels that are insufficient in number. To authenticate a block, the recovered authentication signals, yielded from the extracted watermark and the received digital signature, are compared with the one generated according to the correct secret key, to prove the block's legitimacy. The effectiveness and the security of the proposed method are analyzed and tested with a variety of palette images. The results indicate that the proposed method can offer high authentication accuracy as well as maintain a good tradeoff between the authentication signal portability and the resulting image quality.

  • Design of Decoupled Wrapper for Globally Asynchronous Locally Synchronous Systems

    Myeong-Hoon OH  Seok-Jae PARK  Dong-Ik LEE  Ho-Yong CHOI  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1338-1346

    In this paper, we propose an advanced structure of the interface circuit, called a wrapper, for Globally Asynchronous Locally Synchronous (GALS) systems. The proposed wrapper is composed of a sender module and a receiver module. The sender module carries out data transfers in an efficient way by decoupling dependency between an external handshake protocol and an internal clock. The decoupling effect allows the external handshake protocol and the internal clock to be executed in a concurrent way and hence allows the wrapper to show better performance. We have designed our wrapper at the transistor level with 0.35-µm technology. When we compare our decoupled wrapper with two conventional wrappers based on pausible clocking scheme, our simulation results show that performance improvement is about 8-13% and 13-56%, respectively.

  • RF-CMOS Comes of Age

    Asad A. ABIDI  

     
    INVITED PAPER

      Vol:
    E87-C No:6
      Page(s):
    840-853

    All-CMOS radio transceivers and systems-on-a-chip are rapidly making inroads on a wireless market that for years was dominated by bipolar and BiCMOS solutions. It is not a matter of replacing bipolar transistors in known circuit topologies with FETs; the wave of RF-CMOS brings with it new architectures and unprecedented levels of integration. What are its origins? What is the commercial impact? How will RF-CMOS evolve in the future? This paper offers a retrospective and a perspective.

  • Modeling Email Communications

    Yihjia TSAI  Ching-Chang LIN  Ping-Nan HSIAO  

     
    PAPER

      Vol:
    E87-D No:6
      Page(s):
    1438-1445

    Recently, the small-world network model has been popular to describe a wide range of networks such as human social relations and networks formed by biological entities. The network model achieves a small diameter with relatively few links as measured by the ratio of clustering coefficient and the number of links. It is quite natural to consider email communication similar to social network patterns. Quite surprisingly, we find from our empirical study that local email networks follow a different type of network model that falls into the category of scale-free network. We propose new network models to describe such communication structure.

  • Lead Open Detection Based on Supply Current of CMOS LSIs

    Masao TAKAGI  Masaki HASHIZUME  Masahiro ICHIMIYA  Hiroyuki YOTSUYANAGI  Takeomi TAMESADA  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1330-1337

    In this paper, a test method is proposed to detect lead opens in CMOS LSIs. The test method is based on supply current which flows when test input vectors and AC electric field are provided from the outside of the ICs. Also, an application method of the test input vectors is proposed in this paper. It is shown experimentally that lead opens of SSIs and LSIs will be detected by providing each of the test input vectors per the period of AC electric field applied.

10461-10480hit(16314hit)