The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SiON(4624hit)

2381-2400hit(4624hit)

  • Complexity-Reduced Adaptive Subchannel, Bit, and Power Allocation Algorithm and Its Throughput Analysis for Cellular OFDM System

    Kwang Man OK  Chung Gu KANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:2
      Page(s):
    269-276

    We introduce an adaptive subchannel, bit, and power allocation (ASBPA) algorithm to maximize the bandwidth efficiency of the mobile communication system that use orthogonal frequency division multiplexing (OFDM). We propose a suboptimal rate adaptive ASBPA algorithm that guarantees fairness in resource allocation and overcomes inherent co-channel interference (CCI) in the cellular system. Furthermore, we evaluate the maximum possible bandwidth efficiency of the cellular OFDM system achieved by the ASBPA algorithm which is practical to implement. Our simulation results show that the proposed algorithm outperforms the existing ones and achieves the cellular bandwidth efficiency of up to 5 b/s/Hz/cell. We also investigate some of the conditions that govern the bandwidth efficiency of the cellular OFDM system using the proposed ASBPA algorithm.

  • Fast Transient Simulation of Power Distribution Networks Containing Dispersion Based on Parallel-Distributed Leapfrog Algorithm

    Takayuki WATANABE  Yuichi TANJI  Hidemasa KUBOTA  Hideki ASAI  

     
    PAPER

      Vol:
    E90-A No:2
      Page(s):
    388-397

    This paper presents a fast transient simulation method for power distribution networks (PDNs) of the PCB/Package. Because these PDNs are modeled as large-scale linear circuits consisting of a large number of RLC elements, it takes large costs to solve by conventional circuit simulators, such as SPICE. Our simulation method is based on the leapfrog algorithm, and can solve RLC circuits of PDNs faster than SPICE. Actual PDNs have frequency-dependent dispersions such as the skin-effect of conductors and the dielectric loss. To model these dispersions, more number of RLC elements are required, and circuit structures of these dispersion models are hard to solve by using the leapfrog algorithm. This paper shows that the circuit structures of dispersion models can be converted to suitable structures for the leapfrog algorithm. Further, in order to reduce the simulation time, our proposed method exploits parallel computation techniques. Numerical results show that our proposed method using single processing element (PE) enables a speedup of 20-100 times and 10 times compared to HSPICE and INDUCTWISE with the same level of accuracy, respectively. In a large-scale example with frequency-dependent dispersions, our method achieves over 94% parallel efficiency with 5PEs.

  • Optimization Design of Biorthogonal Wavelets for Embedded Image Coding

    Zaide LIU  Nanning ZHENG  Yuehu LIU  Huub VAN DE WETERING  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E90-D No:2
      Page(s):
    569-578

    We present here a simple technique for parametrization of popular biorthogonal wavelet filter banks (BWFBs) having vanishing moments (VMs) of arbitrary multiplicity. Given a prime wavelet filter with VMs of arbitrary multiplicity, after formulating it as a trigonometric polynomial depending on two free parameters, we prove the existence of its dual filter based on the theory of Diophantine equation. The dual filter permits perfect reconstruction (PR) and also has VMs of arbitrary multiplicity. We then give the complete construction of two-parameter families of 17/11 and 10/18 BWFBs, from which any linear-phase 17/11 and 10/18 BWFB possessing desired features could be derived with ease by adjusting the free parameters. In particular, two previously unpublished BWFBs for embedded image coding are constructed, both have optimum coding gains and rational coef ficients. Extensive experiments show that our new BWFBs exhibit performance equal to Winger's W-17/11 and Villasenor's V-10/18 (superior to CDF-9/7 by Cohen et al. and Villasenor's V-6/10) for image compression, and yet require slightly lower computational costs.

  • Non-resonant Electromagnetic Scattering Properties of Menger's Sponge Composed of Isotropic Paraelectric Material

    Ushio SANGAWA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E90-C No:2
      Page(s):
    484-491

    Menger's sponge (MS) is a kind of three-dimensional fractal structure. To analyze non-resonant electromagnetic properties of MS composed of isotropic paraelectric material, a novel, high-speed computation method employing simple recursion equations in terms of scattering amplitudes for two MS's with adjacent stage numbers, which are the parameters describing structural differences of MS's, is formulated. Within the scope of non-resonant electromagnetic phenomena, scattering patterns, forward and backward scattering amplitudes, and total cross sections of MS are investigated as a function of stage number and incident plane waves, and behaviors typical to fractal structures are extracted from the numerical results of the above equations. In addition, scattering properties at infinite stage number are discussed.

  • Cascaded Modulation Scheme and Its Application to Optical Multi-Channel Signal Transmission Systems

    Koji KIKUSHIMA  Toshihito FUJIWARA  Satoshi IKEDA  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E90-B No:2
      Page(s):
    195-208

    This paper starts by describing the advantages of cascaded modulation, i.e., using multiple concatenated external modulators to modulate CW (Continuous Wave) light. Next, the paper examines computer simulations of the resulting modulated light waveform shapes and intermodulation distortion values to elucidate the basic modulation characteristics of a cascaded modulation scheme. Examples of applying cascaded modulation to a multi-channel optical signal transmission system are shown, and the characteristics are clarified by optical transmission experiments. For example, the dependency of the signal quality on the modulation depth values of each external modulator is clarified. Moreover, experiments show that cascaded modulation permits the remote insertion of local broadcast programs into wide area broadcast programs. Last, the paper shows that cascaded modulation offers better modulation properties than the conventional single modulation approach.

  • Switching-Wavelength Pulsed Source and Its Applications in Parallel Processing of High-Speed Signals

    Chester SHU  Ka-Lun LEE  Mable P. FOK  

     
    INVITED PAPER

      Vol:
    E90-C No:2
      Page(s):
    397-404

    We report the generation of time- and wavelength-interleaved optical pulses using the principle of sub-harmonic pulse gating in a dispersion-managed fiber cavity. The pulsed source has been applied to the processing of electrical and optical signals including analog-to-digital conversion, wavelength multicast, and serial-to-parallel optical data conversion.

  • Performance Analysis of Ultra-Fast All-Optical Analog-to-Digital Converter Using Optical Multiple-Level Thresholding Module Based on Self-Frequency Shift in Fiber

    Tsuyoshi KONISHI  Takashi NISHITANI  Kazuyoshi ITOH  

     
    INVITED PAPER

      Vol:
    E90-C No:2
      Page(s):
    405-408

    Performance analysis of ultra-fast all-optical analog-to-digital converter using optical multiple-level thresholding module based on self-frequency shift in fiber is described. In analog-to-digital conversion, the purposes of optical sampling and optical quantization are in the possibility of the speed-up of sampling and quantization processes using various ultra-fast nonlinear phenomena depending on an intensity of a light. The result of analysis indicates that the number of achievable quantized levels of the proposed approach is in the increasing tendency with an increase in the peak power of an input pulse.

  • Admission Control Utilizing Region-Based Channel Capacity

    Sungjin LEE  Sanghoon LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:2
      Page(s):
    417-420

    This paper presents an admission control technique for multi-carrier systems with an FRF(frequency reuse factor) of 1. The FRF of 1 is very attrative for more improved channel throughput but the forward link capacity is rapidly decreased at the cell boundary region due to the increase in the ICI(InterCell Interference). By measuring a region-based channel capacity and deriving a closed form of blocking probability, a QoS(Quality of Service) maintenance technique and mobility model can be acquired. In the simulation, the proposed scheme demonstrates a blocking probability reduction of up to 40% compared to the cell-based link capacity scheme.

  • Constructing a Multilayered Boundary to Defend against Intrusive Anomalies

    Zonghua ZHANG  Hong SHEN  

     
    PAPER-Application Information Security

      Vol:
    E90-D No:2
      Page(s):
    490-499

    We propose a model for constructing a multilayered boundary in an information system to defend against intrusive anomalies by correlating a number of parametric anomaly detectors. The model formulation is based on two observations. First, anomaly detectors differ in their detection coverage or blind spots. Second, operating environments of the anomaly detectors reveal different information about system anomalies. The correlation among observation-specific anomaly detectors is first formulated as a Partially Observable Markov Decision Process, and then a policy-gradient reinforcement learning algorithm is developed for an optimal cooperation search, with the practical objectives being broader overall detection coverage and fewer false alerts. A host-based experimental scenario is developed to illustrate the principle of the model and to demonstrate its performance.

  • All-Optical Analog-to-Digital Conversion Using Optical Delay Line Encoders

    Takashi NISHITANI  Tsuyoshi KONISHI  Kazuyoshi ITOH  

     
    LETTER

      Vol:
    E90-C No:2
      Page(s):
    479-480

    We propose and demonstrate the all-optical analog-to-digital conversion (ADC) using optical delay line encoders. Experimental results show that input analog signals are successfully converted into 3-bit digital signals at a bit rate of 40 Gb/s.

  • Average-Voice-Based Speech Synthesis Using HSMM-Based Speaker Adaptation and Adaptive Training

    Junichi YAMAGISHI  Takao KOBAYASHI  

     
    PAPER-Speech and Hearing

      Vol:
    E90-D No:2
      Page(s):
    533-543

    In speaker adaptation for speech synthesis, it is desirable to convert both voice characteristics and prosodic features such as F0 and phone duration. For simultaneous adaptation of spectrum, F0 and phone duration within the HMM framework, we need to transform not only the state output distributions corresponding to spectrum and F0 but also the duration distributions corresponding to phone duration. However, it is not straightforward to adapt the state duration because the original HMM does not have explicit duration distributions. Therefore, we utilize the framework of the hidden semi-Markov model (HSMM), which is an HMM having explicit state duration distributions, and we apply an HSMM-based model adaptation algorithm to simultaneously transform both the state output and state duration distributions. Furthermore, we propose an HSMM-based adaptive training algorithm to simultaneously normalize the state output and state duration distributions of the average voice model. We incorporate these techniques into our HSMM-based speech synthesis system, and show their effectiveness from the results of subjective and objective evaluation tests.

  • Bit-Parallel Algorithms for Translating Regular Expressions into NFAs

    Hiroaki YAMAMOTO  Takashi MIYAZAKI  Masayuki OKAMOTO  

     
    PAPER-Automata

      Vol:
    E90-D No:2
      Page(s):
    418-427

    The aim of the paper is to design efficient bit-parallel algorithms for translating regular expressions into nondeterministic finite automata (NFAs). Let r be a regular expression over an alphabet Σ, and let n be the length of r and let m be the number of symbols of Σ occurring in r. Then we present bit-parallel algorithms for translating regular expressions into Glushkov automata (position automata) and follow automata using Thompson automata. For Glushkov automata, we will give an algorithm which runs in O(n+mm/W) time and space. For follow automata, we will give a randomized algorithm which runs in O(n+mm/W) expected time and O(n+mm/W) space. We rely on a W-bit uniform RAM for estimating the complexities of algorithms. Since the best known algorithms for these automata runs in O(n+m2) time and space, our algorithms achieve an almost W-fold speed-up.

  • Simultaneous Frequency Conversion Technique Utilizing an SOA-MZI for Full-Duplex WDM Radio over Fiber Applications

    Jong-In SONG  Ho-Jin SONG  

     
    INVITED PAPER

      Vol:
    E90-C No:2
      Page(s):
    351-358

    Simultaneous all-optical frequency up/downconversion technique utilizing a single semiconductor optical amplifier Mach-Zehnder interferometer (SOA-MZI) for full-duplex WDM radio over fiber (RoF) applications is presented. Using this technique, error-free simultaneous upconversion and downconversion of RoF signals with a finite-length single mode fiber were experimentally demonstrated. The results show the potential of the proposed scheme for use in a cost-effective full-duplex WDM RoF link.

  • Fast Concatenative Speech Synthesis Using Pre-Fused Speech Units Based on the Plural Unit Selection and Fusion Method

    Masatsune TAMURA  Tatsuya MIZUTANI  Takehiko KAGOSHIMA  

     
    PAPER-Speech and Hearing

      Vol:
    E90-D No:2
      Page(s):
    544-553

    We have previously developed a concatenative speech synthesizer based on the plural speech unit selection and fusion method that can synthesize stable and human-like speech. In this method, plural speech units for each speech segment are selected using a cost function and fused by averaging pitch-cycle waveforms. This method has a large computational cost, but some platforms require a speech synthesis system that can work within limited hardware resources. In this paper, we propose an offline unit fusion method that reduces the computational cost. In the proposed method, speech units are fused in advance to make a pre-fused speech unit database. At synthesis time, a speech unit for each segment is selected from the pre-fused speech unit database and the speech waveform is synthesized by applying prosodic modification and concatenation without the computationally expensive unit fusion process. We compared several algorithms for constructing the pre-fused speech unit database. From the subjective and objective evaluations, the effectiveness of the proposed method is confirmed by the results that the quality of synthetic speech of the offline unit fusion method with 100 MB database is close to that of the online unit fusion method with 93 MB JP database and is slightly lower to that of the 390 MB US database, while the computational time is reduced by 80%. We also show that the frequency-weighted VQ-based method is effective for construction of the pre-fused speech unit database.

  • Proposal of Two-Dimensional Self-Matching Receiver Using Chaotic Spatial Synchronization for Free Space Optics Communication System and Its Application to Image Transmission and Code Division Multiplexing

    Shinya TAKEDA  Takeshi HIGASHINO  Katsutoshi TSUKAMOTO  Shozo KOMAKI  

     
    PAPER

      Vol:
    E90-C No:2
      Page(s):
    389-396

    This paper proposes a two-dimensional self-matching receiver for Free Space Optics (FSO) communication system using chaotic spatial synchronization. This system is able to obtain the information of two-dimensional code from received pattern. This paper considers that proposed system is applied to two applications. The first application is image transmission. This paper shows that applying proposed system to image transmission enables to restore the desired image, which doesn't require strict alignment of receiver, and evaluates transmission optical power. The second application is Code Division Multiplexing (CDM). This paper shows that applying proposed system to CDM system enables to demodulate desired digital signals regardless of the uncertainty of received position. Moreover, the required transmission optical power and bit error rate performance are obtained by computer simulation.

  • Improved Collision Attacks on MD4 and MD5

    Yu SASAKI  Yusuke NAITO  Noboru KUNIHIRO  Kazuo OHTA  

     
    PAPER-Hash Functions

      Vol:
    E90-A No:1
      Page(s):
    36-47

    At Eurocrypt'05, Wang et al. presented efficient collision attacks on MD5 and MD4 hash functions. They found a collision of MD5 with a complexity of less than 237 MD5 hash operations, and a collision of MD4 with complexity less than 28 MD4 hash operations. In their attack, the procedure to generate a collision is divided into 4 steps. First, they determine the message differential and output differentials of chaining variables in each step, which generates a collision with small complexity. Second, they construct sufficient conditions that guarantee that the desired differential is always calculated. Third, they find a message modification that can satisfy the sufficient conditions with high probability. Finally, they search for a message that satisfies all sufficient conditions. In this paper, we focus on the message modification of MD5 and MD4, and propose a new message modification. Using our message modification, a collision of MD5 can be found with complexity less than 229 MD5 hash operations, and a collision of MD4 can be found with complexity less than 3 MD4 hash operations. To improve the complexity from previous attacks, we mainly use two ideas. The first idea is to use message modification that can satisfy more sufficient conditions in the second round than in previous attacks. The second idea is to use message modification that can enable us to search for a collision starting from an intermediate step.

  • Image Authentication Scheme for Resisting JPEG, JPEG2000 Compression and Scaling

    Chih-Hung LIN  Wen-Shyong HSIEH  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    126-136

    This paper presents a secure and simple content-based digital signature method for verifying the image authentication under JPEG, JPEG2000 compression and scaling based on a novel concept named lowest authenticable difference (LAD). The whole method, which is extended from the crypto-based digital signature scheme, mainly consists of statistical analysis and signature generation/verification. The invariant features, which are generated from the relationship among image blocks in the spatial domain, are coded and signed by the sender's private key to create a digital signature for each image, regardless of the image size. The main contributions of the proposed scheme are: (1) only the spatial domain is adopted during feature generation and verification, making domain transformation process unnecessary; (2) more non-malicious manipulated images (JPEG, JPEG2000 compressed and scaled images) than related studies can be authenticated by LAD, achieving a good trade-off of image authentication between fragile and robust under practical image processing; (3) non-malicious manipulation is clearly defined to meet closely the requirements of storing images or sending them over the Internet. The related analysis and discussion are presented. The experimental results indicate that the proposed method is feasible and effective.

  • A 900 MHz RF Transmitter with Output LO Suppression

    Viet-Hoang LE  Trung-Kien NGUYEN  Seok-Kyun HAN  Sang-Gug LEE  

     
    LETTER-Electronic Circuits

      Vol:
    E90-C No:1
      Page(s):
    201-203

    This letter presents a 900 MHz ZigBee RF transmitter front-end with on-chip LO suppression circuit at the output. To suppress the LO leakage at the RF output, a novel LO suppression circuit is adopted at the up-conversion mixer. The RF transmitter implemented in 0.18 µm CMOS shows more than 28 dB of LO suppression over a wide range of the baseband signal power variation.

  • Performance Analysis of IEEE 802.11e EDCA

    Wei ZHANG  Jun SUN  Jing LIU  Haibin ZHANG  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E90-B No:1
      Page(s):
    180-183

    This letter presents a clear and more accurate analytical model to evaluate the IEEE 802.11e enhanced distributed channel access (EDCA) protocol. The proposed model distinguishes internal collision from external collision. It also differentiates the two cases when the backoff counter decreases, i.e. an arbitration interframe space (AIFS) period after a busy duration and a time slot after the AIFS period. The analytical model is validated through simulation.

  • IEEE 802.11b Performance Analysis in the Presence of IEEE 802.15.4 Interference

    Kwan-Joo MYOUNG  Soo-Young SHIN  Hong-Seong PARK  Wook-Hyun KWON  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E90-B No:1
      Page(s):
    176-179

    In this paper, the performance of IEEE 802.11b WLAN under the interference of IEEE 802.15.4 WPAN is analyzed. An analytic model for the coexistence of IEEE 802.15.4 and IEEE 802.11b is presented. Packet error rate, average transmission time, and throughput are evaluated.

2381-2400hit(4624hit)