The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

13121-13140hit(16314hit)

  • Traffic Measurement System with Trap and Polling Methods and Its Performance

    Ken'ichi KAWANISHI  Yoshitaka TAKAHASHI  Toyofumi TAKENAKA  

     
    PAPER-Communication Networks and Services

      Vol:
    E82-B No:10
      Page(s):
    1557-1565

    We propose a traffic measurement system which uses trap and polling methods. To obtain its performance we consider a queueing model with a single server and evaluate a packet delay. In our multi-cast traffic, packets are modeled as a batch with a batch size distribution {gk}. The batch arrival process is observed as two processes on the basis of batch size. For a batch whose size is more than or equal to a threshold L, the batch will be trapped by our traffic measurement system (in queueing model, it will enter a queue immediately after its arrival). For a batch whose size is less than L, it will be observed at a polling cycle T (in queueing model, it will be temporarily stored in a buffer and all these small batches will be cyclically noticed with a cycle T). We analyze this queueing model by a diffusion approximation and compare the packet delay observed by our traffic measurement system with the L=1 original batch arrival model. Evaluating the results of the diffusion approximation, we illustrate that our traffic measurement system has functions not only to give an accurate estimation of the mean waiting time but also reduce the number of measurements by choosing appropriate parameters L and T.

  • Comments on Simplification of the BCJR Algorithm Using the Bidirectional Viterbi Algorithm

    Masato TAJIMA  Keiji TAKIDA  Zenshiro KAWASAKI  

     
    LETTER-Information Theory and Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2306-2310

    In this paper, we state some noteworthy facts in connection with simplification of the BCJR algorithm using the bidirectional Viterbi algorithm (BIVA). That is, we clarify the necessity of metric correction in the case that the BIVA is applied to reliability estimation, where information symbols uj obey non-uniform probability distributions.

  • The Nature of Metallic Contamination on Various Silicon Substrates

    Geun-Min CHOI  Hiroshi MORITA  Jong-Soo KIM  Tadahiro OHMI  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E82-C No:10
      Page(s):
    1839-1845

    The growth behavior of copper particle on crystalline and amorphous silicon surfaces has been investigated. The study reveals that the growth behavior of copper particle depends on the substrate condition. When samples are intentionally contaminated in ultrapure water, both crystalline and amorphous silicon surfaces show no difference in their contamination levels. However, copper particles were not observed on an amorphous silicon surface except dipping in dilute CuCl2 solution. The copper concentration on an amorphous silicon surface after dipping in a 0.5% HF solution is similar to the level after contaminating in ultrapure water. The copper contamination level on a crystalline silicon surface, except from CuCl2 solution, decreased two orders of magnitude as compared with ultrapure water. The copper impurity level on crystalline silicon surface was reduced by two orders by cleaning in a sulfuric acid-hydrogen peroxide mixture. The sulfuric acid-hydrogen peroxide mixture cleaning was not effective on an amorphous silicon surface. When native oxide pre-existed on an amorphous silicon surface before contamination, however, the sulfuric acid-hydrogen peroxide mixture cleaning was effective for removing copper impurity. Our results suggest that copper contamination on an amorphous silicon surface have the characteristics of bonding directly with silicon and/or existing in the native oxide, in contrast with the situation on crystalline silicon surface. After contamination with 1000 ppm copper in CuF2 solution, the etch rate of an amorphous silicon film in a 0.5% HF solution was approximately one order of magnitude faster than that of crystalline silicon. This is attributed to the difference in crystalline structure between crystalline silicon and amorphous silicon.

  • Performance Evaluation of Reliable Multicast Communication Protocols under Heterogeneous Transmission Delay Circumstances

    Takashi HASHIMOTO  Miki YAMAMOTO  Hiromasa IKEDA  James F. KUROSE  

     
    PAPER-Signaling System and Communication Protocol

      Vol:
    E82-B No:10
      Page(s):
    1609-1617

    This paper presents a performance evaluation of NAK-based reliable multicast communication protocols operating in an environment where end-to-end delay are heterogeneous. In the case of heterogeneous delay, performance of a timer-based retransmission control scheme may become worse. We show that a counter-based retransmission control scheme works well in the case of heterogeneous transmission delay. We also compare two NAK-based protocols and show that a NAK-multicasting protocol outperforms a NAK-unicasting protocol from the viewpoint of scalability even when delays are heterogeneous.

  • Almost Sure and Mean Convergence of Extended Stochastic Complexity

    Masayuki GOTOH  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Source Coding/Image Processing

      Vol:
    E82-A No:10
      Page(s):
    2129-2137

    We analyze the extended stochastic complexity (ESC) which has been proposed by K. Yamanishi. The ESC can be applied to learning algorithms for on-line prediction and batch-learning settings. Yamanishi derived the upper bound of ESC satisfying uniformly for all data sequences and that of the asymptotic expectation of ESC. However, Yamanishi concentrates mainly on the worst case performance and the lower bound has not been derived. In this paper, we show some interesting properties of ESC which are similar to Bayesian statistics: the Bayes rule and the asymptotic normality. We then derive the asymptotic formula of ESC in the meaning of almost sure and mean convergence within an error of o(1) using these properties.

  • Analysis of Optical PPM/CDMA System with M-Ary Convolutional Coding

    Hemali PASQUAL  Hiroyuki YASHIMA  

     
    PAPER-Optical Communication

      Vol:
    E82-B No:10
      Page(s):
    1618-1625

    Optical Code Division Multiple Access (OCD- MA) has been emerging as an attractive scheme in fiber optic communication systems as well as in space communication systems in past few years. In OCDMA systems, M-ary Pulse Position Modulation (PPM), has been regarded as an efficient signalling format which has the capability to reduce the channel interference caused by the other users and also to increase the number of simultaneous users. We apply error control coding to improve the system performance of pulse position modulated OCDMA (PPM/OCDMA) systems and this paper investigates the performance of M-ary PPM/OCDMA systems with M-ary convolutional coding. Dual-k code is used as the M-ary convolutional code and Optical Orthogonal Codes with the maximum cross correlation value of 1 and 2 are employed as the signature sequences. We derive an expression for the bit error probability of the new system and show that combining M-ary convolutional coding and M-ary PPM results in an improved error performance. Also it is shown that the number of simultaneous users can be significantly increased with the proposed system compared to the uncoded PPM/OCDMA system with the same bit error probability and with the same information bit rate. We also analyze the system with binary convolutional coding and a comparison with the proposed system is given.

  • Reliability-Based Information Set Decoding of Binary Linear Block Codes

    Marc P. C. FOSSORIER  Shu LIN  

     
    PAPER-Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2034-2042

    In this paper, soft decision decoding of linear block codes based on the reprocessing of several information sets is considered. These information sets are chosen according to the reliability measures of the received symbols and constructed from the most reliable information set, referred to as the most reliable basis. Each information set is then reprocessed by a multi-stage decoding algorithm until either the optimum error performance, or a desired level of error performance is achieved. General guidelines for the trade-offs between the number of information sets to be processed, the number of computations for reprocessing each information set, and the error performance to be achieved are provided. It is shown that with a proper selection of few information sets, low-complexity near-optimum soft decision decoding of relatively long block codes (64 N 128) can be achieved with significant reduction in computation complexity with respect to other known algorithms. This scheme, which generalizes the reprocessing of the most reliable basis with the ordered statistic algorithm proposed by Fossorier and Lin, is particularly efficient for codes with rate R 1/2.

  • New Subliminal Channel Embedded in the ESIGN

    Hidenori KUWAKADO  Hatsukazu TANAKA  

     
    PAPER-Security

      Vol:
    E82-A No:10
      Page(s):
    2167-2171

    The subliminal channel is one of the methods for hiding a message in other messages. Simmons has shown conjectures on the upper bound to the bandwidth of a subliminal channel. This paper proposes a new broad-band subliminal channel embedded in the ESIGN. The bandwidth of the proposed subliminal channel is wider than that of the previous one, and it exceeds the upper bound that Simmons has conjectured. Namely, we disprove the conjectures due to Simmons. We also show that it is possible to construct the subliminal channel even if the transmitter and the subliminal receiver do not have any key in common.

  • Universal Variable-to-Fixed Length Codes Achieving Optimum Large Deviations Performance for Empirical Compression Ratio

    Tomohiko UYEMATSU  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2246-2250

    This paper clarifies two variable-to-fixed length codes which achieve optimum large deviations performance of empirical compression ratio. One is Lempel-Ziv code with fixed number of phrases, and the other is an arithmetic code with fixed codeword length. It is shown that Lempel-Ziv code is asymptotically optimum in the above sense, for the class of finite-alphabet and finite-state sources, and that the arithmetic code is asymptotically optimum for the class of finite-alphabet unifilar sources.

  • Systolic Implementations of Modified Gaussian Eliminations for the Decoding of Reed-Solomon Codes

    Chih-Wei LIU  Li-Lien LIN  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2251-2258

    Systolic array implementations of modified Gaussian eliminations for the decoding of an (n, n-2t) RS code, including the Hong-Vetterli algorithm and the FIA proposed by Feng and Tzeng, are designed in this paper. These modified Gaussian eliminations are more easily understanding than the classical Berlekamp-Massey algorithm and, in addition, are efficient to decode RS codes for small e or e <

  • Unified Fully-Pipelined VLSI Implementations of the One- and Two-Dimensional Real Discrete Trigonometric Transforms

    Wen-Hsien FANG  Ming-Lu WU  

     
    PAPER-Digital Signal Processing

      Vol:
    E82-A No:10
      Page(s):
    2219-2230

    This paper presents unified VLSI architectures which can efficiently realize some widespread one-dimensional (1-D) and two-dimensional (2-D) real discrete trigonometric transforms, including the discrete Hartley transform (DHT), discrete sine transform (DST), and discrete cosine transform (DCT). First, succinct and unrestrictive Clenshaw's recurrence formula along with the inherent symmetry of the trigonometric functions are adequately employed to render efficient recurrences for computing these 1-D RDTT. By utilizing an appropriate row-column decomposition approach, the same set of recurrences can also be used to compute both of the row transform and column transform of the 2-D RDTT. Array architectures, basing on the developed recurrences, are then introduced to implement these 1-D and 2-D RDTT. Both architectures provide substantial hardware savings as compared with previous works. In addition, they are not only applicable to the 1-D and 2-D RDTT of arbitrary size, but they can also be easily adapted to compute all aforementioned RDTT with only minor modifications. A complete set of input/output (I/O) buffers along with a bidirectional circular shift matrix are addressed as well to enable the architectures to operate in a fully-pipelined manner and to rectify the transformed results in a natural order. Moreover, the resulting architectures are both highly regular, modular, and locally-connected, thus being amenable to VLSI implementations.

  • Simple Computation Method of Soft Value for Iterative Decoding for Product Code Composed of Linear Block Code

    Toshiyuki SHOHON  Yoshihiro SOUTOME  Haruo OGIWARA  

     
    LETTER-Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2199-2203

    Simple computation method of soft value, that is used in iterative soft decision decoding, is proposed. For the product code composed of BCH(63, 57) and that composed of BCH(63, 45), computation time with the proposed method is 1/15-1/6 as that with a method based on the Chase algorithm. Bit error rate (BER) performance with the proposed method is within 0.8 [dB] inferior to that with the method based on the Chase algorithm at BER=10-5.

  • New Methods of Generating Primes Secure against Both P-1 and P+1 Methods

    Yoshizo SATO  Yasuyuki MURAKAMI  Masao KASAHARA  

     
    PAPER-Security

      Vol:
    E82-A No:10
      Page(s):
    2161-2166

    Since cryptosystem based on the problem of factoring the composite number N can be attacked with P-1 and P+1 methods, it is required that P-1 and P+1 should be difficult to be factored into many small primes, where we assume that the P is a factor of N. In this paper, first, we consider the distribution of secure primes against both P-1 and P+1 methods. Second, we propose two efficient algorithms for generating secure primes against both P-1 and P+1 methods by extending the trial division method.

  • Timing Jitter Characteristics of RZ Pulse Nonlinear Transmission on Dispersion Managed Fiber Link

    Kazuho ANDO  Masanori HANAWA  Mikio TAKAHARA  

     
    PAPER-Communication Systems

      Vol:
    E82-A No:10
      Page(s):
    2081-2088

    One of the limitation factors on the achievable distance for long-haul nonlinear Return-to-Zero (RZ)-Gaussian pulse transmission on optical fiber links is timing jitter. Although it is well known that the dispersion management technique is very effective to reduce the timing jitter, comparisons among some dispersion management methods based on the timing jitter reduction have not been reported yet. In this paper, timing jitter reduction by some dispersion management methods in nonlinear RZ-Gaussian pulse transmission systems are discussed. Moreover, we will report that the amount of timing jitter at the receiver side drastically changes depending on the configuration of dispersion managed optical fiber transmission line.

  • A Method for Obtaining the Optimum Sectionalization of the RMLD Algorithm for Non-Linear Rectangular Codes

    Yasuhiro MATSUMOTO  Toru FUJIWARA  

     
    PAPER-Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2052-2060

    A recursive maximum likelihood decoding (RMLD) algorithm is more efficient than the Viterbi algorithm. The decoding complexity of the RMLD algorithm depends on the recursive sectionalization. The recursive sectionalization which minimizes the decoding complexity is called the optimum sectionalization. In this paper, for a class of non-linear codes, called rectangular codes, it is shown that a near optimum sectionalization can be obtained with a dynamic programming approach. Furthermore, for a subclass of rectangular codes, called C-rectangular codes, it is shown that the exactly optimum sectionalization can be obtained with the same approach. Following these results, an efficient algorithm to obtain the optimum sectionalization is proposed. The optimum sectionalizations for the minimum weight subcode of some Reed-Muller codes and of a BCH code are obtained with the proposed algorithm.

  • A Context-Dependent Sequential Decision for Speaker Verification

    Hideki NODA  Katsuya HARADA  Eiji KAWAGUCHI  

     
    LETTER-Speech Processing and Acoustics

      Vol:
    E82-D No:10
      Page(s):
    1433-1436

    This paper presents an improved method of speaker verification using the sequential probability ratio test (SPRT), which can treat the correlation between successive feature vectors. The hidden Markov model with the mean field approximation enables us to consider the correlation in the SPRT, i. e. , using the mean field of previous state, probability computation can be carried out as if input samples were independent each other.

  • Newly Found Visual Illusions and 3-D Display

    Masanori IDESAWA  Qi ZHANG  

     
    REVIEW PAPER

      Vol:
    E82-C No:10
      Page(s):
    1823-1830

    Human visual system can perceive 3-D structure of an object by binocular disparity, gradient of illumination (shading), occlusion, textures, perspective and so forth. Among them, binocular disparity seems to be the essentially important cues for the 3-D space perception and it is used widely for displaying 3-D visual circumstances such as in VR (virtual reality) system or 3-D TV. Visual illusions seem to be one of the phenomena which are purely reflecting the mechanism of human visual system. In the recent several years, the authors found several new types of 3-D visual illusions with binocular viewing. Entire 3-D illusory object including volume perception, transparency, dynamic illusions can be perceived only from the visual stimuli of disparity given by some inducing objects arranged with suitable relations. In this report, the authors introduced these newly found visual illusions and made some considerations on the human visual mechanism of 3-D perception and on their exploitation for new effective techniques in 3-D display. They introduced especially on the visual effect in two kinds of arrangement with occlusion and sustaining relationship between the illusory object and inducing objects. In the former case, the inducing objects which provide the stimuli were named as occlusion cues and classified into two types: contour occlusion cues and bulky occlusion cues. In the later case, those inducing objects were named as sustaining cues and a 3-D fully transparent illusory object was perceived. The perception was just like imagined from the scenes of the actions and positions of the pantomimists; then this phenomena was named as "Mime (Pantomime) Effect. " According to the positions of sustaining cues, they played different actions in this perception, and they are classified into three types: front sustaining cues, side sustaining cues and back sustaining cues. In addition, dynamic fusion and separation of volumetrical illusory objects were perceived when the visual stimuli were moving continuously between two structurally different conditions. Then the hysteresis was recognized in geometrical position between the fusion and separation. The authors believe that the occlusion cues and sustaining cues introduced in this paper could be effective clues for exploiting the new techniques for 3-D display.

  • Hysteresis Neural Networks for N-Queens Problems

    Toshiya NAKAGUCHI  Kenya JIN'NO  Mamoru TANAKA  

     
    PAPER

      Vol:
    E82-A No:9
      Page(s):
    1851-1859

    We propose a hysteresis neural network system solving NP-Hard optimization problems, the N-Queens Problem. The continuous system with binary outputs searches a solution of the problem without energy function. The output vector corresponds to a complete solution when the output vector becomes stable. That is, this system does never become stable without satisfying the constraints of the problem. Though it is very hard to remove limit cycle completely from this system, we can propose a new method to reduce the possibility of limit cycle by controlling time constants.

  • Pattern Formation in Reaction-Diffusion Enzyme Transistor Circuits

    Masahiko HIRATSUKA  Takafumi AOKI  Tatsuo HIGUCHI  

     
    PAPER

      Vol:
    E82-A No:9
      Page(s):
    1809-1817

    This paper explores a possibility of constructing massively parallel molecular computing systems using molecular electronic devices called enzyme transistors. The enzyme transistor is, in a sense, an artificial catalyst which selects a specific substrate molecule and transforms it into a specific product. Using this primitive function, various active continuous media for signal transfer/processing can be realized. Prominent examples discussed in this paper are: (i) Turing pattern formation and (ii) excitable wave propagation in a two-dimensional enzyme transistor array. This paper demonstrates the potential of enzyme transistors for creating reaction-diffusion dynamics that performs useful computations in a massively parallel fashion.

  • Robust Stabilization of Uncertain Linear System with Distributed State Delay

    Suthee PHOOJARUENCHANACHAI  Kamol UAHCHINKUL  Jongkol NGAMWIWIT  Yothin PREMPRANEERACH  

     
    PAPER-Systems and Control

      Vol:
    E82-A No:9
      Page(s):
    1911-1918

    In this paper, we present the theoretical development to stabilize a class of uncertain time-delay system. The system under consideration is described in state space model containing distributed delay, uncertain parameters and disturbance. The main idea is to transform the system state into an equivalent one, which is easier to analyze its behavior and stability. Then, a computational method of robust controller design is presented in two parts. The first part is based on solving a Riccati equation arising in the optimal control theory. In the second part, the finite dimensional Lyapunov min-max approach is employed to cope with the uncertainties. Finally, we show how the resulting control law ensures asymptotic stability of the overall system.

13121-13140hit(16314hit)