We introduce an adaptive subchannel, bit, and power allocation (ASBPA) algorithm to maximize the bandwidth efficiency of the mobile communication system that use orthogonal frequency division multiplexing (OFDM). We propose a suboptimal rate adaptive ASBPA algorithm that guarantees fairness in resource allocation and overcomes inherent co-channel interference (CCI) in the cellular system. Furthermore, we evaluate the maximum possible bandwidth efficiency of the cellular OFDM system achieved by the ASBPA algorithm which is practical to implement. Our simulation results show that the proposed algorithm outperforms the existing ones and achieves the cellular bandwidth efficiency of up to 5 b/s/Hz/cell. We also investigate some of the conditions that govern the bandwidth efficiency of the cellular OFDM system using the proposed ASBPA algorithm.
Takayuki WATANABE Yuichi TANJI Hidemasa KUBOTA Hideki ASAI
This paper presents a fast transient simulation method for power distribution networks (PDNs) of the PCB/Package. Because these PDNs are modeled as large-scale linear circuits consisting of a large number of RLC elements, it takes large costs to solve by conventional circuit simulators, such as SPICE. Our simulation method is based on the leapfrog algorithm, and can solve RLC circuits of PDNs faster than SPICE. Actual PDNs have frequency-dependent dispersions such as the skin-effect of conductors and the dielectric loss. To model these dispersions, more number of RLC elements are required, and circuit structures of these dispersion models are hard to solve by using the leapfrog algorithm. This paper shows that the circuit structures of dispersion models can be converted to suitable structures for the leapfrog algorithm. Further, in order to reduce the simulation time, our proposed method exploits parallel computation techniques. Numerical results show that our proposed method using single processing element (PE) enables a speedup of 20-100 times and 10 times compared to HSPICE and INDUCTWISE with the same level of accuracy, respectively. In a large-scale example with frequency-dependent dispersions, our method achieves over 94% parallel efficiency with 5PEs.
Zaide LIU Nanning ZHENG Yuehu LIU Huub VAN DE WETERING
We present here a simple technique for parametrization of popular biorthogonal wavelet filter banks (BWFBs) having vanishing moments (VMs) of arbitrary multiplicity. Given a prime wavelet filter with VMs of arbitrary multiplicity, after formulating it as a trigonometric polynomial depending on two free parameters, we prove the existence of its dual filter based on the theory of Diophantine equation. The dual filter permits perfect reconstruction (PR) and also has VMs of arbitrary multiplicity. We then give the complete construction of two-parameter families of 17/11 and 10/18 BWFBs, from which any linear-phase 17/11 and 10/18 BWFB possessing desired features could be derived with ease by adjusting the free parameters. In particular, two previously unpublished BWFBs for embedded image coding are constructed, both have optimum coding gains and rational coef ficients. Extensive experiments show that our new BWFBs exhibit performance equal to Winger's W-17/11 and Villasenor's V-10/18 (superior to CDF-9/7 by Cohen et al. and Villasenor's V-6/10) for image compression, and yet require slightly lower computational costs.
Menger's sponge (MS) is a kind of three-dimensional fractal structure. To analyze non-resonant electromagnetic properties of MS composed of isotropic paraelectric material, a novel, high-speed computation method employing simple recursion equations in terms of scattering amplitudes for two MS's with adjacent stage numbers, which are the parameters describing structural differences of MS's, is formulated. Within the scope of non-resonant electromagnetic phenomena, scattering patterns, forward and backward scattering amplitudes, and total cross sections of MS are investigated as a function of stage number and incident plane waves, and behaviors typical to fractal structures are extracted from the numerical results of the above equations. In addition, scattering properties at infinite stage number are discussed.
Koji KIKUSHIMA Toshihito FUJIWARA Satoshi IKEDA
This paper starts by describing the advantages of cascaded modulation, i.e., using multiple concatenated external modulators to modulate CW (Continuous Wave) light. Next, the paper examines computer simulations of the resulting modulated light waveform shapes and intermodulation distortion values to elucidate the basic modulation characteristics of a cascaded modulation scheme. Examples of applying cascaded modulation to a multi-channel optical signal transmission system are shown, and the characteristics are clarified by optical transmission experiments. For example, the dependency of the signal quality on the modulation depth values of each external modulator is clarified. Moreover, experiments show that cascaded modulation permits the remote insertion of local broadcast programs into wide area broadcast programs. Last, the paper shows that cascaded modulation offers better modulation properties than the conventional single modulation approach.
Chester SHU Ka-Lun LEE Mable P. FOK
We report the generation of time- and wavelength-interleaved optical pulses using the principle of sub-harmonic pulse gating in a dispersion-managed fiber cavity. The pulsed source has been applied to the processing of electrical and optical signals including analog-to-digital conversion, wavelength multicast, and serial-to-parallel optical data conversion.
Tsuyoshi KONISHI Takashi NISHITANI Kazuyoshi ITOH
Performance analysis of ultra-fast all-optical analog-to-digital converter using optical multiple-level thresholding module based on self-frequency shift in fiber is described. In analog-to-digital conversion, the purposes of optical sampling and optical quantization are in the possibility of the speed-up of sampling and quantization processes using various ultra-fast nonlinear phenomena depending on an intensity of a light. The result of analysis indicates that the number of achievable quantized levels of the proposed approach is in the increasing tendency with an increase in the peak power of an input pulse.
This paper presents an admission control technique for multi-carrier systems with an FRF(frequency reuse factor) of 1. The FRF of 1 is very attrative for more improved channel throughput but the forward link capacity is rapidly decreased at the cell boundary region due to the increase in the ICI(InterCell Interference). By measuring a region-based channel capacity and deriving a closed form of blocking probability, a QoS(Quality of Service) maintenance technique and mobility model can be acquired. In the simulation, the proposed scheme demonstrates a blocking probability reduction of up to 40% compared to the cell-based link capacity scheme.
We propose a model for constructing a multilayered boundary in an information system to defend against intrusive anomalies by correlating a number of parametric anomaly detectors. The model formulation is based on two observations. First, anomaly detectors differ in their detection coverage or blind spots. Second, operating environments of the anomaly detectors reveal different information about system anomalies. The correlation among observation-specific anomaly detectors is first formulated as a Partially Observable Markov Decision Process, and then a policy-gradient reinforcement learning algorithm is developed for an optimal cooperation search, with the practical objectives being broader overall detection coverage and fewer false alerts. A host-based experimental scenario is developed to illustrate the principle of the model and to demonstrate its performance.
Takashi NISHITANI Tsuyoshi KONISHI Kazuyoshi ITOH
We propose and demonstrate the all-optical analog-to-digital conversion (ADC) using optical delay line encoders. Experimental results show that input analog signals are successfully converted into 3-bit digital signals at a bit rate of 40 Gb/s.
Junichi YAMAGISHI Takao KOBAYASHI
In speaker adaptation for speech synthesis, it is desirable to convert both voice characteristics and prosodic features such as F0 and phone duration. For simultaneous adaptation of spectrum, F0 and phone duration within the HMM framework, we need to transform not only the state output distributions corresponding to spectrum and F0 but also the duration distributions corresponding to phone duration. However, it is not straightforward to adapt the state duration because the original HMM does not have explicit duration distributions. Therefore, we utilize the framework of the hidden semi-Markov model (HSMM), which is an HMM having explicit state duration distributions, and we apply an HSMM-based model adaptation algorithm to simultaneously transform both the state output and state duration distributions. Furthermore, we propose an HSMM-based adaptive training algorithm to simultaneously normalize the state output and state duration distributions of the average voice model. We incorporate these techniques into our HSMM-based speech synthesis system, and show their effectiveness from the results of subjective and objective evaluation tests.
Hiroaki YAMAMOTO Takashi MIYAZAKI Masayuki OKAMOTO
The aim of the paper is to design efficient bit-parallel algorithms for translating regular expressions into nondeterministic finite automata (NFAs). Let r be a regular expression over an alphabet Σ, and let n be the length of r and let m be the number of symbols of Σ occurring in r. Then we present bit-parallel algorithms for translating regular expressions into Glushkov automata (position automata) and follow automata using Thompson automata. For Glushkov automata, we will give an algorithm which runs in O(n+mm/W) time and space. For follow automata, we will give a randomized algorithm which runs in O(n+mm/W) expected time and O(n+mm/W) space. We rely on a W-bit uniform RAM for estimating the complexities of algorithms. Since the best known algorithms for these automata runs in O(n+m2) time and space, our algorithms achieve an almost W-fold speed-up.
Simultaneous all-optical frequency up/downconversion technique utilizing a single semiconductor optical amplifier Mach-Zehnder interferometer (SOA-MZI) for full-duplex WDM radio over fiber (RoF) applications is presented. Using this technique, error-free simultaneous upconversion and downconversion of RoF signals with a finite-length single mode fiber were experimentally demonstrated. The results show the potential of the proposed scheme for use in a cost-effective full-duplex WDM RoF link.
Masatsune TAMURA Tatsuya MIZUTANI Takehiko KAGOSHIMA
We have previously developed a concatenative speech synthesizer based on the plural speech unit selection and fusion method that can synthesize stable and human-like speech. In this method, plural speech units for each speech segment are selected using a cost function and fused by averaging pitch-cycle waveforms. This method has a large computational cost, but some platforms require a speech synthesis system that can work within limited hardware resources. In this paper, we propose an offline unit fusion method that reduces the computational cost. In the proposed method, speech units are fused in advance to make a pre-fused speech unit database. At synthesis time, a speech unit for each segment is selected from the pre-fused speech unit database and the speech waveform is synthesized by applying prosodic modification and concatenation without the computationally expensive unit fusion process. We compared several algorithms for constructing the pre-fused speech unit database. From the subjective and objective evaluations, the effectiveness of the proposed method is confirmed by the results that the quality of synthetic speech of the offline unit fusion method with 100 MB database is close to that of the online unit fusion method with 93 MB JP database and is slightly lower to that of the 390 MB US database, while the computational time is reduced by 80%. We also show that the frequency-weighted VQ-based method is effective for construction of the pre-fused speech unit database.
Shinya TAKEDA Takeshi HIGASHINO Katsutoshi TSUKAMOTO Shozo KOMAKI
This paper proposes a two-dimensional self-matching receiver for Free Space Optics (FSO) communication system using chaotic spatial synchronization. This system is able to obtain the information of two-dimensional code from received pattern. This paper considers that proposed system is applied to two applications. The first application is image transmission. This paper shows that applying proposed system to image transmission enables to restore the desired image, which doesn't require strict alignment of receiver, and evaluates transmission optical power. The second application is Code Division Multiplexing (CDM). This paper shows that applying proposed system to CDM system enables to demodulate desired digital signals regardless of the uncertainty of received position. Moreover, the required transmission optical power and bit error rate performance are obtained by computer simulation.
Yu SASAKI Yusuke NAITO Noboru KUNIHIRO Kazuo OHTA
At Eurocrypt'05, Wang et al. presented efficient collision attacks on MD5 and MD4 hash functions. They found a collision of MD5 with a complexity of less than 237 MD5 hash operations, and a collision of MD4 with complexity less than 28 MD4 hash operations. In their attack, the procedure to generate a collision is divided into 4 steps. First, they determine the message differential and output differentials of chaining variables in each step, which generates a collision with small complexity. Second, they construct sufficient conditions that guarantee that the desired differential is always calculated. Third, they find a message modification that can satisfy the sufficient conditions with high probability. Finally, they search for a message that satisfies all sufficient conditions. In this paper, we focus on the message modification of MD5 and MD4, and propose a new message modification. Using our message modification, a collision of MD5 can be found with complexity less than 229 MD5 hash operations, and a collision of MD4 can be found with complexity less than 3 MD4 hash operations. To improve the complexity from previous attacks, we mainly use two ideas. The first idea is to use message modification that can satisfy more sufficient conditions in the second round than in previous attacks. The second idea is to use message modification that can enable us to search for a collision starting from an intermediate step.
Chih-Hung LIN Wen-Shyong HSIEH
This paper presents a secure and simple content-based digital signature method for verifying the image authentication under JPEG, JPEG2000 compression and scaling based on a novel concept named lowest authenticable difference (LAD). The whole method, which is extended from the crypto-based digital signature scheme, mainly consists of statistical analysis and signature generation/verification. The invariant features, which are generated from the relationship among image blocks in the spatial domain, are coded and signed by the sender's private key to create a digital signature for each image, regardless of the image size. The main contributions of the proposed scheme are: (1) only the spatial domain is adopted during feature generation and verification, making domain transformation process unnecessary; (2) more non-malicious manipulated images (JPEG, JPEG2000 compressed and scaled images) than related studies can be authenticated by LAD, achieving a good trade-off of image authentication between fragile and robust under practical image processing; (3) non-malicious manipulation is clearly defined to meet closely the requirements of storing images or sending them over the Internet. The related analysis and discussion are presented. The experimental results indicate that the proposed method is feasible and effective.
Viet-Hoang LE Trung-Kien NGUYEN Seok-Kyun HAN Sang-Gug LEE
This letter presents a 900 MHz ZigBee RF transmitter front-end with on-chip LO suppression circuit at the output. To suppress the LO leakage at the RF output, a novel LO suppression circuit is adopted at the up-conversion mixer. The RF transmitter implemented in 0.18 µm CMOS shows more than 28 dB of LO suppression over a wide range of the baseband signal power variation.
Wei ZHANG Jun SUN Jing LIU Haibin ZHANG
This letter presents a clear and more accurate analytical model to evaluate the IEEE 802.11e enhanced distributed channel access (EDCA) protocol. The proposed model distinguishes internal collision from external collision. It also differentiates the two cases when the backoff counter decreases, i.e. an arbitration interframe space (AIFS) period after a busy duration and a time slot after the AIFS period. The analytical model is validated through simulation.
Kwan-Joo MYOUNG Soo-Young SHIN Hong-Seong PARK Wook-Hyun KWON
In this paper, the performance of IEEE 802.11b WLAN under the interference of IEEE 802.15.4 WPAN is analyzed. An analytic model for the coexistence of IEEE 802.15.4 and IEEE 802.11b is presented. Packet error rate, average transmission time, and throughput are evaluated.