The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

12041-12060hit(21534hit)

  • A Humidity-Control Method for Preventing Insulation Failure in Surge Protectors

    Etsuko TOYODA  Morihiko MATSUMOTO  Tomoyuki FUJITA  Kenichi SHIOI  Kazuaki YANO  Masamitsu WATANABE  Toshihiro ICHINO  Yoshimori MIYATA  Nobuo KUWAKI  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E89-B No:4
      Page(s):
    1187-1193

    We have developed a promising method for suppressing moisture condensation that prevents insulation failures in surge protectors. By analyzing surge protectors retrieved from the field, we found that electrolytic corrosion had occurred due to the encroachment of sea salt, the application of bias voltages, and the condensation of moisture. To suppress moisture condensation, a key factor in insulation failure, we applied a previously developed humidity-control package containing water-absorbent polymer. We experimentally optimized the design and functionality of the polymer package. We found that sealing the feed-through apertures alone was not enough to suppress moisture inflow and that a relatively large amount of water-absorbent polymer was needed to prevent water condensation in environments with extremely high humidity for extended periods of time. Laboratory experiments and field tests demonstrated that our optimized package minimized humidity fluctuation and thus moisture condensation in surge protectors, thereby preventing insulation failure. Application of this method to installed surge protectors greatly reduced the insulation failure rate.

  • An Approach to Extracting Trunk from an Image

    Chin-Hung TENG  Yung-Sheng CHEN  Wen-Hsing HSU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E89-D No:4
      Page(s):
    1596-1600

    Rendering realistic trees is quite important for simulating a 3D natural scene. Separating the trunk from its background is the first step toward the 3D model construction of the tree. In this paper, a three-phase algorithm is developed to extract the trunk structure of the tree and hence segment the trunk from the image. Some experiments were conducted and results confirmed the feasibility of proposed algorithm.

  • Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant

    Minoru KURIBAYASHI  Hatsukazu TANAKA  

     
    PAPER-Information Security

      Vol:
    E89-A No:4
      Page(s):
    1108-1115

    The homomorphic property of the public key cryptosystem has been exploited in order to achieve asymmetric fingerprinting such that only a buyer can obtain fingerprinted content. However, this requires many computations and a wide-band network channel because the entire uncompressed content must be encrypted based on the public key cryptosystem. In this paper, instead of the homomorphic property, we introduce the management of the enciphering keys for the symmetric cryptosystem. Based on a buyer's identity, a trusted center issues the buyer a partial sequence which is one of the two elements in the entire sequence. Although a merchant shares the entire sequence with the center, he cannot extract the buyer's key sequence from it. Such an information gap enables our protocol to be asymmetric and efficient. For each packet of content, the merchant produces two marked packets that contains a "0" or "1" information bit, and they are enciphered using the two elements from the entire sequence. Subsequently, the buyer obtains the two ciphertexts (the encrypted marked packets) containing the information bits of his identity. Since the merchant does not know the ciphertext decrypted by the buyer, an asymmetric property is achieved. In our protocol, before trade between a buyer and a merchant, the merchant can produce and compress the marked packets; this enables the reduction of both the computational costs for the encryption and the amount of data for transmission. Since only the enciphering operation is performed by a merchant in the on-line protocol, real-time operation may be possible.

  • Graphical Gaussian Modeling for Gene Association Structures Based on Expression Deviation Patterns Induced by Various Chemical Stimuli

    Tetsuya MATSUNO  Nobuaki TOMINAGA  Koji ARIZONO  Taisen IGUCHI  Yuji KOHARA  

     
    PAPER-Biological Engineering

      Vol:
    E89-D No:4
      Page(s):
    1563-1574

    Activity patterns of metabolic subnetworks, each of which can be regarded as a biological function module, were focused on in order to clarify biological meanings of observed deviation patterns of gene expressions induced by various chemical stimuli. We tried to infer association structures of genes by applying the multivariate statistical method called graphical Gaussian modeling to the gene expression data in a subnetwork-wise manner. It can be expected that the obtained graphical models will provide reasonable relationships between gene expressions and macroscopic biological functions. In this study, the gene expression patterns in nematodes under various conditions (stresses by chemicals such as heavy metals and endocrine disrupters) were observed using DNA microarrays. The graphical models for metabolic subnetworks were obtained from these expression data. The obtained models (independence graph) represent gene association structures of cooperativities of genes. We compared each independence graph with a corresponding metabolic subnetwork. Then we obtained a pattern that is a set of characteristic values for these graphs, and found that the pattern of heavy metals differs considerably from that of endocrine disrupters. This implies that a set of characteristic values of the graphs can representative a macroscopic biological meaning.

  • Chaotification of the Van der Pol System Using Jerk Architecture

    Sinuhe BENITEZ  Leonardo ACHO  Ricardo J.R. GUERRA  

     
    PAPER-Systems and Control

      Vol:
    E89-A No:4
      Page(s):
    1088-1091

    In this brief, a chaotic Jerk system is presented. This was obtained by converting the Van der Pol architecture into a third order differential equation, and, after the state-space representation was obtained, adding one innovation term and modifying some proportional parameters. Using Lyapunov exponents, Poincare maps, Fourier spectrum analysis and numerical experiments, we confirm the chaotic nature of the proposed Jerk system. Experimental results are also included.

  • Performance Evaluation for RF-Combining Diversity Antenna Configured with Variable Capacitors

    Hiroya TANAKA  Jun-ichi TAKADA  Ichirou IDA  Yasuyuki OISHI  

     
    PAPER

      Vol:
    E89-C No:4
      Page(s):
    488-494

    An RF adaptive array antenna (RF-AAA) configured with variable capacitors is proposed. This antenna system can control the power combining ratio and phase value of received signals. In this paper, we focus on the diversity effects of RF-AAA. First, we show the design methodology of the combiner circuit to realize the effective combining. Second, the perturbation method and the steepest gradient method are compared for the optimization algorithms to provide fast convergence and suboptimum solutions among the variable circuit constants. Finally, in simulation, we show the RF-AAA can achieve diversity antenna gains of 7.7 dB, 10.9 dB and 12.6 dB for 2-branch, 3-branch and 4-branch configuration, respectively, which have higher performance than the selection combining.

  • Modeling the Influence of Input-to-Output Coupling Capacitance on CMOS Inverter Delay

    Zhangcai HUANG  Atsushi KUROKAWA  Yun YANG  Hong YU  Yasuaki INOUE  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    840-846

    The modeling of gate delays has always been one of the most difficult and market-sensitive works. In submicron designs, the second-order effects such as the input-to-output coupling capacitance have a significant influence on gate delay as shown in this paper. However, the accurate analysis of the input-to-output coupling capacitance effect has not been presented in previous research. In this paper, an analytical model for the influence of the input-to-output coupling capacitance on CMOS inverter delay is proposed, in which a novel algorithm for computing overshooting time is given. Experimental results show good agreement with Spice simulations.

  • Hybrid Evolutionary Soft-Computing Approach for Unknown System Identification

    Chunshien LI  Kuo-Hsiang CHENG  Zen-Shan CHANG  Jiann-Der LEE  

     
    PAPER-Computation and Computational Models

      Vol:
    E89-D No:4
      Page(s):
    1440-1449

    A hybrid evolutionary neuro-fuzzy system (HENFS) is proposed in this paper, where the weighted Gaussian function (WGF) is used as the membership function for improved premise construction. With the WGF, different types of the membership functions (MFs) can be accommodated in the rule base of HENFS. A new hybrid algorithm of random optimization (RO) algorithm incorporated with the least square estimation (LSE) is presented. Based on the hybridization of RO-LSE, the proposed soft-computing approach overcomes the disadvantages of other widely used algorithms. The proposed HENFS is applied to chaos time series identification and industrial process modeling to verify its feasibility. Through the illustrations and comparisons the impressive performances for unknown system identification can be observed.

  • Generalization Performance of Subspace Bayes Approach in Linear Neural Networks

    Shinichi NAKAJIMA  Sumio WATANABE  

     
    PAPER-Algorithm Theory

      Vol:
    E89-D No:3
      Page(s):
    1128-1138

    In unidentifiable models, the Bayes estimation has the advantage of generalization performance over the maximum likelihood estimation. However, accurate approximation of the posterior distribution requires huge computational costs. In this paper, we consider an alternative approximation method, which we call a subspace Bayes approach. A subspace Bayes approach is an empirical Bayes approach where a part of the parameters are regarded as hyperparameters. Consequently, in some three-layer models, this approach requires much less computational costs than Markov chain Monte Carlo methods. We show that, in three-layer linear neural networks, a subspace Bayes approach is asymptotically equivalent to a positive-part James-Stein type shrinkage estimation, and theoretically clarify its generalization error and training error. We also discuss the domination over the maximum likelihood estimation and the relation to the variational Bayes approach.

  • A New Fusion Based Blind Logo-Watermarking Algorithm

    Gui XIE  Hong SHEN  

     
    PAPER-Application Information Security

      Vol:
    E89-D No:3
      Page(s):
    1173-1180

    We propose a novel blind watermarking algorithm, called XFuseMark, which can hide a small, visually meaningful, grayscale logo in a host image instead of using a random-noise-like sequence based on the multiresolution fusion principles, and extract a recognizable version of the embedded logo even without reference to the original host data at the receiving end. XFuseMark is not only secure, i.e., only authorized users holding a private key are able to conduct the logo extraction operation, but also robust against noise addition and image compression. Experiments verify the practical performance of XFuseMark.

  • Error Identification in At-Speed Scan BIST Environment in the Presence of Circuit and Tester Speed Mismatch

    Yoshiyuki NAKAMURA  Thomas CLOUQUEUR  Kewal K. SALUJA  Hideo FUJIWARA  

     
    PAPER-Dependable Computing

      Vol:
    E89-D No:3
      Page(s):
    1165-1172

    In this paper, we provide a practical formulation of the problem of identifying all error occurrences and all failed scan cells in at-speed scan based BIST environment. We propose a method that can be used to identify every error when the circuit test frequency is higher than the tester frequency. Our approach requires very little extra hardware for diagnosis and the test application time required to identify errors is a linear function of the frequency ratio between the CUT and the tester.

  • Low-Complexity ICI Cancellation in Frequency Domain for OFDM Systems in Time-Varying Multipath Channels

    Hongmei WANG  Xiang CHEN  Shidong ZHOU  Ming ZHAO  Yan YAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:3
      Page(s):
    1020-1023

    In this letter, we propose a partial minimum mean-squared error (MMSE) with successive interference cancellation (PMMSESIC) method in frequency domain to mitigate ICI caused by channel variation. Each detection, the proposed method detects the symbol with the largest received signal-to-interference-plus-noise ratio (SINR) among all the undetected symbols, using an MMSE detector that considers only the interference of several neithborhood subcarriers. Analysis and simulations show that it outperforms the MMSE method at relatively high Eb/N0 and its performance is close to the MMSE with successive detection (MMSESD) method in relatively low Doppler frequency region.

  • Design of MIMO Communication Systems Using Tapped Delay Line Structure in Receiver Side

    Tetsuki TANIGUCHI  Hoang Huy PHAM  Nam Xuan TRAN  Yoshio KARASAWA  

     
    PAPER-Communications

      Vol:
    E89-A No:3
      Page(s):
    670-677

    This paper presents a simple method to determine weights of single carrier multiple input multiple output (MIMO) broadband communication systems adopting tapped delay line (TDL) structure in receiver side for the effective communication under frequency selective fading (FSF) environment. First, assuming the perfect knowledge of the channel matrix in both arrays, an iterative design method of transmitter and receiver weights is proposed. In this approach, both weights are determined alternately to maximize signal to noise plus interference ratio (SINR) by fixing the weight of one side while optimizing the other, and this operation is repeated until SINR converges. Next, considering the case of uninformed transmitter, maximum SINR design method of MIMO system is extended for space time block coding (STBC) scheme working under FSF. Through computer simulations, it is demonstrated that the proposed schemes achieves higher SINR than conventional method with delay-less structure, particularly for the fading with long duration.

  • Speech Analysis Based on Modeling the Effective Voice Source

    M. Shahidur RAHMAN  Tetsuya SHIMAMURA  

     
    PAPER-Speech Analysis

      Vol:
    E89-D No:3
      Page(s):
    1107-1115

    A new system identification based method has been proposed for accurate estimation of vocal tract parameters. An often encountered problem in using the conventional linear prediction analysis is due to the harmonic structure of the excitation source of voiced speech. This harmonic characteristic is coupled with the estimation of autoregressive (AR) coefficients that results in difficulties in estimating the vocal tract filter. This paper models the effective voice source from the residual obtained through the covariance analysis in the first-pass which is then used as input to the second-pass least-square analysis. A better source-filter separation is thus achieved. The formant frequencies and corresponding bandwidths obtained using the proposed method for synthetic vowels are found to be accurate up to a factor of more than three (in percent) compared to the conventional method. Since the source characteristic is taken into account, local variations due to the positioning of analysis window are reduced significantly. The validity of the proposed method is also examined by inspecting the spectra obtained from natural vowel sounds uttered by high-pitched female speaker.

  • Integrated Connection Admission Control and Bandwidth on Demand Algorithm for a Broadband Satellite Network with Heterogeneous Traffic

    Yi QIAN  Rose Qingyang HU  Catherine ROSENBERG  

     
    PAPER-Satellite Communication

      Vol:
    E89-B No:3
      Page(s):
    895-905

    There are many system proposals for satellite-based broadband communications that promise high capacity and ease of access. Many of these proposals require advanced switching technology and signal processing on-board the satellite(s). One solution is based on a geo-synchronous (GEO) satellite system equipped with on-board processing and on-board switching. An important feature of this system is allowing for a maximum number of simultaneous users, hence, requiring effective medium access control (MAC) layer protocols for connection admission control (CAC) and bandwidth on demand (BoD) algorithms. In this paper, an integrated CAC and BoD algorithm is proposed for a broadband satellite communication system with heterogeneous traffic. A detailed modeling and simulation approach is presented for performance evaluation of the integrated CAC and BoD algorithm based on heterogeneous traffic types. The proposed CAC and BoD scheme is shown to be able to efficiently utilize available bandwidth and to gain high throughput, and also to maintain good Grade of Service (GoS) for all the traffic types. The end-to-end delay for real-time traffic in the system falls well within ITU's Quality of Service (QoS) specification for GEO-based satellite systems.

  • A Proposal of Simplified Viterbi Equalizer Applied to FWA Systems Employing 64QAM Signals

    Hiroshi YOSHIOKA  Yushi SHIRATO  Kazuji WATANABE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:3
      Page(s):
    784-790

    We propose a novel simplified Viterbi equalizer for high symbol rate FWA (Fixed Wireless Access) systems carrying 64QAM signals. Reduced complexity and improved performance are achieved adopting two approaches. The first one is reducing the number of survival paths, taking advantage of the large D/U common in LOS (line of sight) communications. The second one is using a multi-stage process to generate desired signal replicas based on their likelihoods. Computer simulations confirm that the proposed replica generation method offers a performance improvement of about 1 dB and the proposed Viterbi equalizer offers reduced complexity with no performance penalty compared to full Viterbi equalizer.

  • New Formula of the Polarization Entropy

    Jian YANG  Yilun CHEN  Yingning PENG  Yoshio YAMAGUCHI  Hiroyoshi YAMADA  

     
    LETTER-Sensing

      Vol:
    E89-B No:3
      Page(s):
    1033-1035

    In this letter, a new formula is proposed for calculating the polarization entropy, based on the least square method. There is no need to calculate the eigenvalues of a covariance matrix as well as to use logarithms of values. So the time for computing the polarization entropy is reduced. Using polarimetric SAR data, the authors validate the effectiveness of the new formula.

  • Reducing Consuming Clock Power Optimization of a 90 nm Embedded Processor Core

    Tetsuya YAMADA  Masahide ABE  Yusuke NITTA  Kenji OGURA  Manabu KUSAOKE  Makoto ISHIKAWA  Motokazu OZAWA  Kiwamu TAKADA  Fumio ARAKAWA  Osamu NISHII  Toshihiro HATTORI  

     
    PAPER-Low Power Techniques

      Vol:
    E89-C No:3
      Page(s):
    287-294

    A low-power SuperHTM embedded processor core, the SH-X2, has been designed in 90-nm CMOS technology. The power consumption was reduced by using hierarchical fine-grained clock gating to reduce the power consumption of the flip-flops and the clock-tree, synthesis and a layout that supports the implementation of the clock gating, and several-level power evaluations for RTL refinement. With this clock gating and RTL refinement, the power consumption of the clock-tree and flip-flops was reduced by 35% and 59%, including the process shrinking effects, respectively. As a result, the SH-X2 achieved 6,000 MIPS/W using a Renesas low-power process with a lowered voltage. Its performance-power efficiency was 25% better than that of a 130-nm-process SH-X.

  • Design of Equiripple Minimum Phase FIR Filters with Ripple Ratio Control

    Masahiro OKUDA  Masaaki IKEHARA  Shin-ichi TAKAHASHI  

     
    PAPER-Digital Signal Processing

      Vol:
    E89-A No:3
      Page(s):
    751-756

    In this paper, we present a numerical method for the equiripple approximation of minimum phase FIR digital filters. Many methods have been proposed for the design of such filters. Many of them first design a linear phase filter whose length is twice as long, and then factorize the filter to obtain the minimum phase. Although these methods theoretically guarantee its optimality, it is difficult to control the ratio of ripples between different bands. In the conventional lowpass filter design, for example, when different weights are given for its passband and stopband, one needs to iteratively design the filter by trial and error to achieve the ratio of the weights exactly. To address this problem, we modifies well-known Parks-McClellan algorithm and make it possible to directly control the ripple ratios. The method iteratively solves a set of linear equations with controlling the ratio of ripples. Using this method, the equiripple solutions are obtained quickly.

  • A Phase Noise Reduction Algorithm for OFDM Systems with a Higher-Order Constellation

    Kyung Won PARK  Yong Soo CHO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:3
      Page(s):
    1012-1015

    In this letter, a phase noise reduction algorithm for orthogonal frequency division multiplexing (OFDM) systems with an input of higher-order constellation is proposed to achieve high data rate transmission. The proposed algorithm estimates dominant interchannel interference (ICI) terms, caused by phase noise, using the subcarriers adjacent to pilot subcarriers, and compensates the OFDM signal using these estimates. Also, the length of dominant ICI terms is efficiently determined by estimating 3 dB bandwidth of phase noise. The proposed algorithm is shown to reduce the effect of phase noise on OFDM systems with an input of higher-order modulation and a large amount of phase noise.

12041-12060hit(21534hit)