The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

11481-11500hit(21534hit)

  • Optimal Encoding of Binary Cyclic Codes

    Houshou CHEN  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E89-B No:12
      Page(s):
    3280-3287

    This paper considers the optimal generator matrices of a given binary cyclic code over a binary symmetric channel with crossover probability p→0 when the goal is to minimize the probability of an information bit error. A given code has many encoder realizations and the information bit error probability is a function of this realization. Our goal here is to seek the optimal realization of encoding functions by taking advantage of the structure of the codes, and to derive the probability of information bit error when possible. We derive some sufficient conditions for a binary cyclic code to have systematic optimal generator matrices under bounded distance decoding and determine many cyclic codes with such properties. We also present some binary cyclic codes whose optimal generator matrices are non-systematic under complete decoding.

  • Microstrip Bandpass Filters with Reduced Size and Improved Stopband Characteristics Using New Stepped-Impedance Resonators

    Prayoot AKKARAEKTHALIN  Jaruek JANTREE  

     
    PAPER-Passive Circuits/Components

      Vol:
    E89-C No:12
      Page(s):
    1865-1871

    This paper proposes a new microstrip stepped-impedance resonator (SIR) used for bandpass filters with reduced size and improved stopband characteristics. A comprehensive treatment of both ends of the resonator with loaded triangular and rectangular microstrips is described. The design concept is demonstrated by two filter examples including four-resonator parallel-coupled Chebyshev bandpass and compact four-resonator cross-coupled elliptic-type filters. These filters are not only compact size due to the slow-wave effect, but also have a wider upper stopband resulting from the resonator bandstop characteristic. The filter designs are described in details. The simulated and experimental results are demonstrated and discussed.

  • Fabrication of Small-Molecular-Weight Organic Thin-Film Solar Cells by Combination of Wet and Dry Processes

    Tetsuya TAIMA  Toshihiro YAMANARI  Kohjiro HARA  Kazuhiro SAITO  

     
    PAPER-Organic Molecular Devices

      Vol:
    E89-C No:12
      Page(s):
    1771-1774

    We succeeded to fabricate p-n heterojunction and bulkheterojunction small-molecular-weight organic thin-film solar cells by combination of dry (p-type = zinc phthalocyanine, n-type = fullerene) and wet (p-type = tetra-tert-butyl zinc phthalocyanine, n-type = [6,6]-phenyl-C61-buteric acid methyl ester) processes. Relationship between morphologies of semiconducting layers and photovoltaic properties was investigated. The p-n heterojunction organic thin-film solar cells based on dry process, where surface roughness was approximately 2 nm, showed the highest power conversion efficiency of 1.3% in this paper.

  • Rate-Distortion Optimized Selection of Motion Vectors for Video Transmission over Packet-Loss Channels

    Jing YANG  Xiangzhong FANG  

     
    LETTER-Multimedia Systems for Communications

      Vol:
    E89-B No:12
      Page(s):
    3494-3496

    The selection of motion vectors plays an important role in the error propagation process between inter-frames. In this letter, an end-to-end prediction error calculation method is proposed and is used for the rate-distortion optimized selection of motion vectors. Simulation results show that the robustness of encoded video streams under error-prone environment is improved.

  • Analogical Conception of Chomsky Normal Form and Greibach Normal Form for Linear, Monadic Context-Free Tree Grammars

    Akio FUJIYOSHI  

     
    PAPER-Automata and Formal Language Theory

      Vol:
    E89-D No:12
      Page(s):
    2933-2938

    This paper presents the analogical conception of Chomsky normal form and Greibach normal form for linear, monadic context-free tree grammars (LM-CFTGs). LM-CFTGs generate the same class of languages as four well-known mildly context-sensitive grammars. It will be shown that any LM-CFTG can be transformed into equivalent ones in both normal forms. As Chomsky normal form and Greibach normal form for context-free grammars (CFGs) play a very important role in the study of formal properties of CFGs, it is expected that the Chomsky-like normal form and the Greibach-like normal form for LM-CFTGs will provide deeper analyses of the class of languages generated by mildly context-sensitive grammars.

  • Perceptually Transparent Polyline Watermarking Based on Normal Multi-Resolution Representation

    Yu-Chi PU  Wei-Chang DU  I-Chang JOU  

     
    PAPER-Application Information Security

      Vol:
    E89-D No:12
      Page(s):
    2939-2949

    Digital watermarking techniques were developed for regular raster data such as images or video, but little research addressed irregular vector data, such as the shapes of cartoons or elevation contours. Vector graphic images, such as those in SVG format, are popular on the WWW, and provide the advantage of permitting affine transformations without aliasing. The creation of cartoon images or the acquisition of GIS geometry data involves much work, so the copyright and ownership of vector data must be protected. Common components in vector graphic images are polygonal lines or polylines. This work develops a normal multi-resolution representation of a polygonal line, and embeds a copyright notice or serial number in this representation. Previous studies on polyline watermarking have the non-transparent problems, including self-intersection of line segments. The experimental results demonstrate that the proposed watermarking approach is perceptually transparent, and solves the self-intersection problem. It is also resistant to similarity transformation, traversal reordering, point insertion/deletion and random noise attacks.

  • Proactive Route Maintenance for Tree-Based Application Layer Multicast and Its Implementations

    Tetsuya KUSUMOTO  Jiro KATTO  Sakae OKUBO  

     
    PAPER

      Vol:
    E89-D No:12
      Page(s):
    2856-2866

    The purpose of this study is to maintain efficient backup routes for reconstructing overlay trees quickly. In most conventional methods, after a node leaves the trees, its child nodes start searching for the new parents. In this reactive approach, it takes a lot of time to find a new parent. In this paper, we propose a proactive approach to finding a next parent as the backup route node over the overlay tree before the current parent leaves. A proactive approach allows a node to find its new parent node immediately and switch to the backup route node smoothly. In our proposal, the structure of the overlay tree using a redundant degree can decide a backup route node without so much overhead. Simulations demonstrate our proactive approach can recover from node departures 2 times faster than reactive approaches, and can construct overlay trees with lower overheads than another proactive method. Additionally we carried out experiments over actual networks and their results support the effectiveness of our approach. We confirmed that our proposal achieved better streaming quality than conventional approaches.

  • Modelling Real-Time Flow Connections in Wireless Mobile Internet

    Bongkyo MOON  

     
    LETTER-Network

      Vol:
    E89-B No:12
      Page(s):
    3442-3445

    In this letter, an analytic model for real-time flow connections in a Wireless Mobile Internet (WMI) is developed, and then performance measures are derived. Some examples are also presented in order to show the call-blocking ratio and the number of connections admitted into a WMI.

  • Accurate Source Number Detection Using Pre-Estimated Signal Subspace

    Yoshihisa ISHIKAWA  Koichi ICHIGE  Hiroyuki ARAI  

     
    PAPER

      Vol:
    E89-B No:12
      Page(s):
    3257-3265

    This paper presents a scheme for accurately detecting the number of incident waves arriving at array antennas. The array antenna and MIMO techniques are developing as 4th generation mobile communication systems and wireless LAN technologies, and the accurate estimation of the propagation environment is becoming more important. This paper emphasizes the accurate detection of the number of incident waves; one of the important characteristics in multidirectional communication. There are some recent papers on accurate detection but they have problems of estimation accuracy or computational cost in severe environment like low SNR, small number of snapshots or waves with close angles. Hence, AIC and MDL methods based on statistics and information theory are still often used. In this paper, we propose an accurate estimation method of the number of arrival signals using the orthogonality of subspaces derived from preliminary estimation of signal subspace. The proposed method accurately estimates the number of signals also in severe environments where AIC and MDL methods can hardly estimate. We evaluate the performance of these methods through some computer simulation and experiments in anechoic chamber.

  • On-Chip Thermal Gradient Analysis Considering Interdependence between Leakage Power and Temperature

    Takashi SATO  Junji ICHIMIYA  Nobuto ONO  Masanori HASHIMOTO  

     
    PAPER-Simulation and Verification

      Vol:
    E89-A No:12
      Page(s):
    3491-3499

    In this paper, we propose a methodology for calculating on-chip temperature gradient and leakage power distributions. It considers the interdependence between leakage power and local temperature using a general circuit simulator as a differential equation solver. The proposed methodology can be utilized in the early stages of the design cycle as well as in the final verification phase. Simulation results proved that consideration of the temperature dependence of the leakage power is critically important for achieving reliable physical designs since the conventional temperature analysis that ignores the interdependence underestimates leakage power considerably and may overlook potential thermal runaway.

  • Automatic Affect Recognition Using Natural Language Processing Techniques and Manually Built Affect Lexicon

    Young Hwan CHO  Kong Joo LEE  

     
    PAPER-Natural Language Processing

      Vol:
    E89-D No:12
      Page(s):
    2964-2971

    In this paper, we present preliminary work on recognizing affect from a Korean textual document by using a manually built affect lexicon and adopting natural language processing tools. A manually built affect lexicon is constructed in order to be able to detect various emotional expressions, and its entries consist of emotion vectors. The natural language processing tools analyze an input document to enhance the accuracy of our affect recognizer. The performance of our affect recognizer is evaluated through automatic classification of song lyrics according to moods.

  • Scheduling Real-Time Multi-Processor Systems with Distance-Constrained Tasks Using the Early-Release-Fair Model

    Da-Ren CHEN  Chiun-Chieh HSU  Chien-Min WANG  

     
    PAPER-Digital Signal Processing

      Vol:
    E89-A No:11
      Page(s):
    3260-3271

    A hard real-time system is one whose correctness depends not only on the logical result, but also when the results are produced. While many techniques have been proposed for single processor real-time systems, multiprocessor systems have not been studied so extensively. In this paper, we mainly propose two variant (DCTS) by using the Early-Release-Fair (ERfair) and Proportionate-fair (Pfair) model with integral assumptions for identical multi-processor real-time systems. ERfair is a scheduling model for real-time tasks on a multiprocessor system. On the different definitions of distance constraint, we propose two efficient scheduling algorithms designed to probe whether the distance constraints of all ER-fair tasks can be guaranteed. If the distance constraints cannot be guaranteed, then the proposed algorithms gather the unfeasible tasks and inflate them with a reweighting function. The proposed algorithms are linear-time and most suitable for dynamic systems. The experimental results reveal that the proposed algorithms increase significantly the ratio of schedulable task sets.

  • Investigation of Ultra-Wideband Propagation Channel based on a Cluster Scheme

    Hiroaki TSUCHIYA  Katsuyuki HANEDA  Jun-ichi TAKADA  

     
    PAPER

      Vol:
    E89-A No:11
      Page(s):
    3095-3102

    In this paper, an Ultra-Wideband (UWB) double-directional channel sounding measurement and spatio-temporal analysis of UWB propagation based on the clusterization approach were reported. After separating the propagation paths and diffuse components both on the transmitter (Tx) antenna and receiver (Rx) antenna positions, the propagation paths both on Tx and Rx positions were observed for clusters separately, while coupling the clusters between Tx and Rx position based on similar time of arrivals, and ray tracing by utilizing high temporal and spatial resolution, respectively. The relation between direction of departure and direction of arrival will then be investigated. For cluster properties, parameters of model characteristics are discussed and compared to other earlier works.

  • Passive Reduced-Order Macro-Modeling for Linear Time-Delay Interconnect Systems

    Wenliang TSENG  Chien-Nan Jimmy LIU  Chauchin SU  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E89-C No:11
      Page(s):
    1713-1718

    This paper presents a methodology based on congruent transformation for distributed interconnects described by state-space time-delays system. The proposed approach is to obtain the passive reduced order of linear time-delays system. The unified formulations are used to satisfy the passive preservation. The details of the mathematical proof and a couple of validation examples are given in this paper.

  • Network Design Scheme for Virtual Private Network Services

    Tomonori TAKEDA  Ryuichi MATSUZAKI  Ichiro INOUE  Shigeo URUSHIDANI  

     
    PAPER-Network

      Vol:
    E89-B No:11
      Page(s):
    3046-3054

    This paper proposes a network design scheme for Virtual Private Network (VPN) services. Traditionally, network design to compute required amount of resource is based on static point-to-point resource demand. This scheme is effective for traditional private line services. However, since VPN services allow multi-site connectivity for customers, it may not be appropriate to design a network based on static point-to-point resource demand. In particular, this scheme is not effective when the traffic pattern changes over time. Therefore, network design for VPN services introduces a new challenge in order to comply with traffic flexibility. There are conventional studies tackling this issue. In those studies, by defining a resource demand model considering flexibility, and designing the network based on this model, amount of resource required can be computed. However, there are some deficiencies in those studies. This paper proposes a new network design scheme, consisting of two components. The first one is a new resource demand model, created by extending conventional resource demand models, that can specify resource demand more precisely. The second one is a new network design algorithm for this resource demand model. Simulations are conducted to evaluate the performance of the proposed network design scheme, and the results show significant performance improvement against conventional schemes. In addition, deployment considerations of the proposed scheme are analyzed.

  • Adaptive Subcarrier Allocation for Multi-User OFDM System

    Kok Ann Donny TEO  Yoshiyuki OTANI  Shuichi OHNO  

     
    PAPER

      Vol:
    E89-A No:11
      Page(s):
    3131-3137

    Orthogonal Frequency Division Multiple Access (OFDMA) allows multiple users to make use of the same bandwidth as the single-user OFDM for data transmission and is a promising candidate to be used for future cellular systems. A key issue at hand is the rate-adaptive resource allocation problem. In this paper, we propose two basic subcarrier allocation schemes with low complexities based on the magnitude of the channel frequency responses. The proposed algorithms ensure a fair resource allocation in terms of the number of subcarriers with affordable bit-rates. Through extensive discussions and Monte Carlo simulations, a comprehensive comparison with previously derived subcarrier allocation schemes is performed which depicts the pros and cons of our proposed algorithms.

  • Impact of Chip Duty Factor in DS-UWB Systems over Indoor Multipath Environment

    Chin Sean SUM  Shigenobu SASAKI  Hisakazu KIKUCHI  

     
    LETTER

      Vol:
    E89-A No:11
      Page(s):
    3152-3156

    This paper investigates the impact of chip duty factor (DF) in DS-UWB system with Rake receiver over AWGN and UWB indoor multipath environment corresponding to system parameters such as spreading bandwidth and chip length. Manipulating DF in DS-UWB system offers several advantages over multipath channel and thus, capable of improving system performance for better quality of communication. Although employing lower DF generally improves performance, in some exceptional cases on the other hand, degradation can be observed despite decreasing DF. Therefore, the objective of this paper is to clarify the relationship between DF and DS-UWB system performance. We discovered that with constant processing gain and spreading bandwidth, performance improvement can be observed at DF lower than 0.17. Additionally, with spreading bandwidth as tradeoff parameter, significant performance improvement can only be observed below DF of 0.85.

  • Iterative Joint Correlation Interval Selection and Doppler Spread Estimation

    Peng ZHANG  Xiaodong XU  Guangguo BI  Xiuying CAO  Junhui ZHAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:11
      Page(s):
    3156-3159

    In this paper, the relationship between correlation interval (CI) and estimate is investigated. Then a special correlation interval is explored that is adaptive to all levels of signal-to-noise ratio (SNR) and velocity conditions, and the mean square error is deduced. Finally, we propose an iterative algorithm that achieves the special correlation interval and calculates the Doppler spread by increasing the resolution on time-domain iteratively. Simulation results show that compared with conventional schemes, performance of the proposed algorithm is basically independent of velocity variation and less sensitive to SNR, especially in low SNR environments. It achieves high accurate estimation directly without any post-rectification.

  • Security Analysis of Provably Secure Constant Round Dynamic Group Key Agreement

    Joseph Chee Ming TEO  Chik How TAN  Jim Mee NG  

     
    LETTER-Information Security

      Vol:
    E89-A No:11
      Page(s):
    3348-3350

    Recently, Dutta and Barua proposed provably secure constant round authenticated group key agreement protocols in dynamic scenario. In this letter, we show that their Leave Protocol does not provide forward secrecy, that is, a leaving user can still obtain the new session key used in subsequent sessions.

  • Mining Frequent Patterns Securely in Distributed System

    Jiahong WANG  Takuya FUKASAWA  Shintaro URABE  Toyoo TAKATA  Masatoshi MIYAZAKI  

     
    PAPER-Data Mining

      Vol:
    E89-D No:11
      Page(s):
    2739-2747

    Data mining across different companies, organizations, online shops, or the likes is necessary so as to discover valuable shared patterns, associations, trends, or dependencies in their shared data. Privacy, however, is a concern. In many situations it is required that data mining should be conducted without any privacy being violated. In response to this requirement, in this paper we propose an effective distributed privacy-preserving data mining approach called SDDM. SDDM is characterized by its ability to resist collusion. Unless the number of colluding sites in a distributed system is larger than or equal to 4, privacy cannot be violated. Results of performance study demonstrated the effectiveness of SDDM.

11481-11500hit(21534hit)