The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SiON(4624hit)

1801-1820hit(4624hit)

  • A Band Extension Technique for Narrow-Band Telephony Speech Based on Full Wave Rectification

    Naofumi AOKI  

     
    LETTER-Network

      Vol:
    E93-B No:3
      Page(s):
    729-731

    This study investigates a band extension technique for narrow-band telephony speech. The proposed technique employs full wave rectification that nonlinearly generates high-band overtones from the low band. In order to improve the conventional technique, this study investigates a frame-by-frame gain control based on the estimation of gain parameter from narrow-band telephony speech. A subjective evaluation indicates that the proposed technique outperforms the conventional technique.

  • Overlay Transmission System on Wireless LAN with RTS/CTS Exchange Taking into Account Timing Synchronization

    Kilsoo JEONG  Kazuto YANO  Satoshi TSUKAMOTO  Makoto TAROMARU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:3
      Page(s):
    640-649

    This paper proposes a new overlay transmission system for wireless LAN with RTS/CTS exchange. Conventional timing synchronization schemes may fail in the presence of inter-system interference, because they have not been designed for overlay transmission. In the proposed system, a transmitter estimates the transmission timing of the next wireless LAN DATA frame, and then sends its DATA frame at almost the same time as the estimated transmission timing to easily establish timing synchronization at the receiver. Moreover, we employ a tapped delay line adaptive array antenna at both transmitter and receiver to effectively suppress interference due to overlay transmission in a rich multipath propagation environment. The frame error rate performances of the proposed system and the IEEE 802.11a wireless LAN are evaluated through computer simulations that assume an exponentially decaying 8-path non-line-of-sight fading channel and include a timing synchronization process. Simulation results demonstrate that the proposed system can achieve overlay transmission while avoiding interference in a rich multipath propagation environment.

  • A Novel Cooperative-Aided Transmission in Multi-Hop Wireless Networks

    Tran Trung DUY  Beongku AN  Hyung-Yun KONG  

     
    LETTER-Network

      Vol:
    E93-B No:3
      Page(s):
    716-720

    Cooperative transmission protocols attract a great deal of attention in recent years as an efficient way to increase the capacity of multi-hop wireless networks in fading environments. In this paper, we propose and analyze a cooperative transmission method, called Cooperative-Aided Skipping multi-Hop protocol (CASH), for multi-hop wireless networks with Rayleigh fading environments. For performance evaluation, we compare and verify the results of the theoretical analysis with the results of simulations.

  • Channel-Gain-Based Transmission Scheduling for Cooperative Relaying

    Naotaka SHIBATA  Koji YAMAMOTO  Hidekazu MURATA  Susumu YOSHIDA  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E93-B No:3
      Page(s):
    776-779

    A cooperative relaying system with transmission scheduling is investigated. Cooperative relaying is composed of multiple links because the source sends the data to more than one receiver, and the destination receives multiple data transmitted by more than one transmitter. Therefore, if the source can transmit the data when the channel gains of the links are high, it is not clear which channel gains should be high in order to achieve high spectral efficiency. In the present letter, the spectral efficiency of a cooperative relaying system is theoretically derived under the assumption that the source transmits the data only when the channel gains of links are above certain threshold values. Numerical results reveal that a high spectral efficiency can be achieved by assuring a high channel gain for the link with the highest average received power among links to the destination.

  • Score-Level Fusion of Phase-Based and Feature-Based Fingerprint Matching Algorithms

    Koichi ITO  Ayumi MORITA  Takafumi AOKI  Hiroshi NAKAJIMA  Koji KOBAYASHI  Tatsuo HIGUCHI  

     
    PAPER-Image

      Vol:
    E93-A No:3
      Page(s):
    607-616

    This paper proposes an efficient fingerprint recognition algorithm combining phase-based image matching and feature-based matching. In our previous work, we have already proposed an efficient fingerprint recognition algorithm using Phase-Only Correlation (POC), and developed commercial fingerprint verification units for access control applications. The use of Fourier phase information of fingerprint images makes it possible to achieve robust recognition for weakly impressed, low-quality fingerprint images. This paper presents an idea of improving the performance of POC-based fingerprint matching by combining it with feature-based matching, where feature-based matching is introduced in order to improve recognition efficiency for images with nonlinear distortion. Experimental evaluation using two different types of fingerprint image databases demonstrates efficient recognition performance of the combination of the POC-based algorithm and the feature-based algorithm.

  • Secret Image Transmission Scheme Using Secret Codebook

    Shih-Chieh SHIE  Ji-Han JIANG  Long-Tai CHEN  Zeng-Hui HUANG  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E93-D No:2
      Page(s):
    399-402

    A secret image transmission scheme based on vector quantization (VQ) and a secret codebook is proposed in this article. The goal of this scheme is to transmit a set of good-quality images secretly via another high-quality cover image with the same image size. In order to reduce the data size of secret images, the images are encoded by an adaptive codebook. To guarantee the visual quality of secret images, the adaptive codebook applied at the transmitter is transmitted to the receiver secretly as well. Moreover, to enhance the security of the proposed scheme and to compact the data size of the codebook, the adaptive codebook is encoded based on VQ using another codebook generated from the cover image. Experiments show impressive results.

  • Evaluation of a Multi-Line De-Embedding Technique up to 110 GHz for Millimeter-Wave CMOS Circuit Design

    Ning LI  Kota MATSUSHITA  Naoki TAKAYAMA  Shogo ITO  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER

      Vol:
    E93-A No:2
      Page(s):
    431-439

    An L-2L through-line de-embedding method has been verified up to millimeter wave frequency. The parasitics of the pad can be modeled from the L-2L through-line. Measurement results of the transmission lines and transistors can be de-embedded by subtracting the parasitic matrix of the pad. Therefore, the de-embedding patterns, which is used for modeling active and passive devices, decrease greatly and the chip area also decreases. A one-stage amplifier is firstly implemented for helping verifying the de-embedding results. After that a four-stage 60 GHz amplifier has been fabricated in CMOS 65 nm process. Experimental results show that the four-stage amplifier realizes an input matching better than -10.5 dB and an output matching better than -13 dB at 61 GHz. A small signal power gain of 16.4 dB and a 1 dB output compression point of 4.6 dBm are obtained with a DC current consumption of 128 mA from a 1.2 V power supply. The chip size is 1.5 mm 0.85 mm.

  • A Direct Conversion Receiver Adopting Balanced Three-Phase Analog System

    Takafumi YAMAJI  Takeshi UENO  Tetsuro ITAKURA  

     
    PAPER

      Vol:
    E93-A No:2
      Page(s):
    367-374

    Recent advanced technology makes digital circuits small and the number of digital functional blocks that can be integrated on a single chip is increasing rapidly. On the other hand, reduction in the size of analog circuits has been insufficient. This means that the analog circuit area is relatively large, and reducing analog circuit area can be effective to make a low cost radio receiver. In this paper, a new wireless receiver architecture that occupies small analog area is proposed, and measured results of the core analog blocks are described. To reduce the analog area, a balanced 3-phase analog system is adopted and the functions of analog baseband filters and VGAs are moved to the digital domain. The test chip consists of a 3-phase downconverter and a 3-phase ADC. There is no analog baseband filter on the chip and the analog filter is assumed to be replaced with a digital filter. The downconverter and ADC occupy 0.28 mm2. The measured results show the possibility that the requirements for IMT-2000 are fulfilled even with a small chip area.

  • Selective Scan Slice Grouping Technique for Efficient Test Data Compression

    Yongjoon KIM  Jaeseok PARK  Sungho KANG  

     
    LETTER-Dependable Computing

      Vol:
    E93-D No:2
      Page(s):
    380-383

    This paper presents a selective scan slice grouping technique for test data compression. In conventional selective encoding methods, the existence of a conflict bit contributes to large encoding data. However, many conflict bits are efficiently removed using the scan slice grouping technique, which leads to a dramatic improvement of encoding efficiency. Experiments performed with large ITC'99 benchmark circuits presents the effectiveness of the proposed technique and the test data volume is reduced up to 92% compared to random-filled test patterns.

  • Beat Noise Cancellation in 2-D Optical Code-Division Multiple-Access Systems Using Optical Hard-Limiter Array

    Ngoc T. DANG  Anh T. PHAM  Zixue CHENG  

     
    LETTER

      Vol:
    E93-B No:2
      Page(s):
    289-292

    We analyze the beat noise cancellation in two-dimensional optical code-division multiple-access (2-D OCDMA) systems using an optical hard-limiter (OHL) array. The Gaussian shape of optical pulse is assumed and the impact of pulse propagation is considered. We also take into account the receiver noise and multiple access interference (MAI) in the analysis. The numerical results show that, when OHL array is employed, the system performance is greatly improved compared with the cases without OHL array. Also, parameters needed for practical system design are comprehensively analyzed.

  • A Single-Chip 8-Band CMOS Transceiver for 3G Cellular Systems with Digital Interface

    Hiroshi YOSHIDA  Takehiko TOYODA  Hiroshi TSURUMI  Nobuyuki ITOH  

     
    PAPER

      Vol:
    E93-A No:2
      Page(s):
    375-381

    In this paper, a single-chip dual-mode 8-band 130 nm CMOS transceiver including A/D/A converters and digital filters with 312 MHz LVDS interface is presented. For a transmitter chain, linear direct quadrature modulation architecture is introduced for both W-CDMA/HSDPA (High Speed Uplink Packet Access) and for GSM/EDGE. Analog baseband LPFs and quadrature modulators are commonly used both for GSM and for EDGE. For a direct conversion receiver chain, ABB (Analog Base-Band) blocks, i.e., LPFs and VGAs, delta-sigma A/D converters, and FIR filters are commonly used for W-CDMA/HSDPA (High Speed Downlink Packet Access) and GSM/EDGE to reduce chip area. Their characteristics can be reconfigured by register-based control sequence. The receiver chain also includes high-speed DC offset cancellers both in analog and in digital stage, and the self-contained AGC controller, whose parameters such as time constant are programmable to be free from DBB (Digital Base-Band) control. The transceiver also includes wide-range VCOs and fractional PLLs, an LVDS driver and receiver for high-speed digital interface of 312 MHz. Measured results reveal that the transceiver satisfies 3GPP specifications for W-CDMA/HSPA (High Speed Packet Access) and GSM/EDGE.

  • Space-Time Block Codes from Quasi-Orthogonal Designs with Maximal Rate or Minimal Decoding Complexity

    Huanfei MA  Zhihao WU  Haibin KAN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    399-402

    This letter investigates the space-time block codes from quasi-orthogonal design as a tradeoff between high transmission rate and low decoding complexity. By studying the role orthogonality plays in space-time block codes, upper bound of transmission rate and lower bound of decoding complexity for quasi-orthogonal design are claimed. From this point of view, novel algorithms are developed to construct specific quasi-orthogonal designs achieving these bounds.

  • Side Lobe Suppression Based on Optimized Phase Rotation Sequence

    Junrong GU  Jae Ho HWANG  Ning HAN  Jae Moung KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    403-406

    This paper proposes an optimized phase rotation sequence method for side lobe suppression by complementing and regulating the side lobe suppression sequence set. The sequence set is efficiently enhanced through the quadratically constrained least square model. The theoretical suppression performance of our method is discussed. Furthermore, our scheme is also suitable for cognitive radio, which is analyzed in the simulation part. The simulation results confirm the effectiveness of our schemes.

  • Systematic Generation of Tardos's Fingerprint Codes

    Minoru KURIBAYASHI  Masakatu MORII  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:2
      Page(s):
    508-515

    Digital fingerprinting is used to trace back illegal users, where unique ID known as digital fingerprints is embedded into a content before distribution. On the generation of such fingerprints, one of the important properties is collusion-resistance. Binary codes for fingerprinting with a code length of theoretically minimum order were proposed by Tardos, and the related works mainly focused on the reduction of the code length were presented. In this paper, we present a concrete and systematic construction of the Tardos's fingerprinting code using a chaotic map. Using a statistical model for correlation scores, the actual number of true-positive and false-positive detection is measured. The collusion-resistance of the generated fingerprinting codes is evaluated by a computer simulation.

  • An Improved Run_before Coding for H.264 CAVLC

    Jie JIA  Daeil YOON  Hae Kwang KIM  

     
    LETTER-Coding Theory

      Vol:
    E93-A No:2
      Page(s):
    561-564

    Context-based adaptive variable length coding (CAVLC) is an entropy coding scheme employed in H.264/AVC for transform coefficient compression. The CAVLC encodes levels of nonzero-valued coefficients. Then indicates their positions with run_before which is number of zeros preceding each nonzero coefficient in scan order. In H.264, the run_before is coded using lookup tables depending on number of zero-valued coefficients that have not been coded. This paper presents an improved run_before coding method which encodes run_before using tables taking both zero-valued and nonzero-valued coefficients into consideration. Simulation results report that the proposed method yields an average of 4.40% bit rate reduction for run_before coding over H.264 baseline profile with intra-only coding structure. It corresponds to 0.52% bit rate saving over total bit rate on average.

  • Policy Gradient Based Semi-Markov Decision Problems: Approximation and Estimation Errors

    Ngo Anh VIEN  SeungGwan LEE  TaeChoong CHUNG  

     
    PAPER

      Vol:
    E93-D No:2
      Page(s):
    271-279

    In and we have presented a simulation-based algorithm for optimizing the average reward in a parameterized continuous-time, finite-state semi-Markov Decision Process (SMDP). We approximated the gradient of the average reward. Then, a simulation-based algorithm was proposed to estimate the approximate gradient of the average reward (called GSMDP), using only a single sample path of the underlying Markov chain. GSMDP was proved to converge with probability 1. In this paper, we give bounds on the approximation and estimation errors for GSMDP algorithm. The approximation error of that approximation is the size of the difference between the true gradient and the approximate gradient. The estimation error, the size of the difference between the output of the algorithm and its asymptotic output, arises because the algorithm sees only a finite data sequence.

  • Context-Sensitive Grammar Transform: Compression and Pattern Matching

    Shirou MARUYAMA  Youhei TANAKA  Hiroshi SAKAMOTO  Masayuki TAKEDA  

     
    PAPER

      Vol:
    E93-D No:2
      Page(s):
    219-226

    A framework of context-sensitive grammar transform for speeding-up compressed pattern matching (CPM) is proposed. A greedy compression algorithm with the transform model is presented as well as a Knuth-Morris-Pratt (KMP)-type compressed pattern matching algorithm. The compression ratio is a match for gzip and Re-Pair, and the search speed of our CPM algorithm is almost twice faster than the KMP-type CPM algorithm on Byte-Pair-Encoding by Shibata et al., and in the case of short patterns, faster than the Boyer-Moore-Horspool algorithm with the stopper encoding by Rautio et al., which is regarded as one of the best combinations that allows a practically fast search.

  • A New Hybrid Scheme for Preventing Channel Interference and Collision in Mobile Networks

    Kyungjun KIM  Kijun HAN  

     
    LETTER-Network

      Vol:
    E93-B No:2
      Page(s):
    385-388

    This paper proposes a new hybrid scheme based on a given set of channels for preventing channel interference and collision in mobile networks. The proposed scheme is designed for improving system performance, focusing on enhancement of performance related to path breakage and channel interference. The objective of this scheme is to improve the performance of inter-node communication. Simulation results from this paper show that the new hybrid scheme can reduce a more control message overhead than a conventional random scheme.

  • Accurate and Robust Surface Measurement Using Optimal Structured Light Tracking Method

    Shi WANG  Hyongsuk KIM  Chun-Shin LIN  Hongxin CHEN  

     
    PAPER-Computation and Computational Models

      Vol:
    E93-D No:2
      Page(s):
    293-299

    Structured light vision systems are based on the fact that the pixel location of light in an image has a unique association with the object depth. However, their applications are mainly limited to the properties of the object surface and the lighting conditions. This paper presents a robust vision system for accurate acquisition of 3-D surface data based on optimal structured light. To achieve depth measurement for a dynamic scene, the data acquisition must be performed with only a single image. Our special arrangement makes the image of the light stripe remaining sharp while the background becomes blurred. Moreover, a dynamic programming approach is proposed to track the optimal path while the laser beam is invisible or divergent under extreme condition. The principle and necessary mathematics for implementing the algorithm are presented. The robustness of the system against uncalibrated errors is demonstrated.

  • Lower Bounds on Quantum Query Complexity for Read-Once Formulas with XOR and MUX Operators

    Hideaki FUKUHARA  Eiji TAKIMOTO  

     
    PAPER

      Vol:
    E93-D No:2
      Page(s):
    280-289

    We introduce a complexity measure r for the class F of read-once formulas over the basis {AND,OR,NOT, XOR, MUX} and show that for any Boolean formula F in the class F, r(F) is a lower bound on the quantum query complexity of the Boolean function that F represents. We also show that for any Boolean function f represented by a formula in F, the deterministic query complexity of f is only quadratically larger than the quantum query complexity of f. Thus, the paper gives further evidence for the conjecture that there is an only quadratic gap for all functions.

1801-1820hit(4624hit)