The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

13481-13500hit(21534hit)

  • Performance Investigation of Adaptive Threshold Alignment for a MC-DS/CDMA Code Synchronization

    Young-Hwan YOU  Sung-Jin KANG  Pan-Yuh JOO  We-Duke CHO  Hyoung-Kyu SONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E87-A No:10
      Page(s):
    2801-2806

    This letter presents a new probability expression for a multi-carrier (MC) DS/CDMA acquisition system with a reference matched filter (RMF). To evaluate the mean acquisition time (MAT) as a measure of the system performance, the probabilities of detection, miss, and false alarm are derived. From the results, it is shown that the MAT of the MC-CDMA hybrid system with RMF is comparable to the optimum mean acquisition time of the conventional MC-CDMA hybrid system, maintaining approximately the same degree of structuring complexity.

  • A Template Matching Method Based on Marker-Controlled Watershed Segmentation

    Yi HU  Tomoharu NAGAO  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E87-D No:10
      Page(s):
    2389-2398

    This paper presents a new template matching method based on marker-controlled watershed segmentation (TMCWS). It is applied to recognize numbers on special metal plates in production lines where traditional image recognition methods do not work well. TMCWS is a shape based matching method that uses different pattern images and their corresponding marker images as probes to explore a gradient space of an unknown image to determine which pattern best matches a target object in it. Different from other matching algorithms, TMCWS firstly creates a marker image for each pattern, and then takes both the pattern image and its corresponding marker image as a template window and shifts this window across a gradient space pixel by pixel to do a search. At each position, the marker image is used to try to extract the contour of the target object with the help of marker-controlled watershed segmentation, and the pattern image is employed to evaluate the extracted shape in each trial. All of the pattern images and their corresponding marker images are tried and the pattern that best matches the target object is the recognition result. TMCWS contains shape extraction procedures and it is a high-level template matching method. Experiments are performed with this method on nearly 400 images of metal plates and the test results show its effectiveness in recognizing numbers in noisy images.

  • A Pseudo-Inverse Based Iterative Decoding Method for DFT Codes in Erasure Channels

    Paeiz AZMI  Farokh MARVASTI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E87-B No:10
      Page(s):
    3092-3095

    One of the categories of decoding techniques for DFT codes in erasure channels is the class of iterative algorithms. Iterative algorithms can be considered as kind of alternating mapping methods using the given information in a repetitive way. In this paper, we propose a new iterative method for decoding DFT codes. It will be shown that the proposed method outperforms the well-known methods such as Wiley/Marvasti, and ADPW methods in the decoding of DFT codes in erasure channels.

  • A Parameter Estimation Method for K-Distribution

    Mohammad H. MARHABAN  

     
    LETTER-Sensing

      Vol:
    E87-B No:10
      Page(s):
    3158-3162

    Estimating the parameters of a statistical distribution from measured sample values forms an essential part of many signal processing tasks. K-distribution has been proven to be an appropriate model for characterising the amplitude of sea clutter. In this paper, a new method for estimating the parameters of K-Distribution is proposed. The method greatly lowers the computational requirement and variance of parameter estimates when compared with the existing non-maximum likelihood methods.

  • Interference Suppression Based on Code Grouping and Groupwise Decorrelation in Multirate W-CDMA Downlink

    Won HA  Junghwa BAE  Jinwoo PARK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E87-B No:10
      Page(s):
    3125-3129

    In this paper, we presented a new interference suppression method based on groupwise decorrelation for the multirate wideband-code division multiple access (W-CDMA) downlink. Code grouping in the proposed method is performed according to the correlation property between the mother code and the child code in the orthogonal variable spreading factor (OVSF) code tree. The decorrelation process based on the grouped codes, so called groupwise decorrelation, is then performed to suppress the interference induced in the downlink propagation. We demonstrate that the proposed method can enhance the performance significantly, with lower computational complexity and higher operational efficiency in which any information about interference users (code, data, amplitude) is not required to know in prior at the detection stage.

  • Performance and Convergence Analysis of Improved MIN-SUM Iterative Decoding Algorithm

    Jun HEO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E87-B No:10
      Page(s):
    2847-2858

    Density evolution has recently been used to analyze the iterative decoding of Low Density Parity Check (LDPC) codes, Turbo codes, and Serially Concatenated Convolutional Codes (SCCC). The density evolution technique makes it possible to explain many characteristics of iterative decoding including convergence of performance and preferred structures for the constituent codes. While the analytic density evolution methods were applied to LDPC codes, the simulation based density evolution methods were used for Turbo codes and SCCC due to analytic difficulties. In this paper, several density evolution ideas in the literature are used to analyze common code structures and it is shown that those ideas yield consistent results. In order to do that, we derive expressions for density evolution of SCCC with a simple 2-state constituent code. The analytic expressions are based on the sum-product and min-sum algorithms, and the thresholds are evaluated for both message passing algorithms. Particularly, for the min-sum algorithm, the density evolution with Gaussian approximation is derived and used to analyze the effect of scaling soft information. The scaling of extrinsic information slows down the convergence of soft information or avoids an overestimation effect of it and results in better performance, and its gain is maximized in particular constituent codes. Similar approaches are made for LDPC code. We show that the scaling gain is noticeable in the LDPC code as well. This scaling gain is analyzed with both density evolution and simulation performance. The expected scaling gain by density evolution matches well with the achievable scaling gain from simulation results. These results can be extended to the irregular LDPC codes based on the degree distribution for the min-sum algorithm. All density evolution algorithms used in this paper are based on the Gaussian approximation for the exchanged messages.

  • Optimum Beamforming Considering the Performance Improvement on DS/CDMA Systems

    Kyungseok KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E87-B No:10
      Page(s):
    3130-3135

    Efficient schemes to enhance the performance of the optimum beamforming for DS/CDMA systems are proposed. The main focus of the proposed schemes is to enhance the practical estimation of an array response vector used at the weight vector for the optimum beamforming. The proposed schemes for the performance enhancement of the optimum beamforming are the Complex Toeplitz Approximation (CTA) and the real Toeplitz-plus-Hankel Approximation (RTHA) which have the theoretical property of an overall noise-free signal. It is shown through several simulation results that the performance of the optimum beamforming using the proposed schemes is much superior to that of a system using the conventional method under several simulation environments, i.e., the number of users, the SNR value, the number of antenna elements, the angular spread, and Nakagami fading parameter.

  • Inter-Destination Synchronization Schemes for Continuous Media Multicasting: An Application-Level QoS Comparison in Hierarchical Networks

    Toshiro NUNOME  Shuji TASAKA  

     
    PAPER-Multimedia Systems for Communications" Multimedia Systems for Communications

      Vol:
    E87-B No:10
      Page(s):
    3057-3067

    This paper presents an application-level QoS comparison of three inter-destination synchronization schemes: the master-slave destination scheme, the synchronization maestro scheme, and the distributed control scheme. The inter-destination synchronization adjusts the output timing among destinations in a multicast group for live audio and video streaming over the Internet/intranets. We compare the application-level QoS of these schemes by simulation with the Tiers model, which is a sophisticated network topology model and reflects hierarchical structure of the Internet. The comparison clarifies their features and finds the best scheme in the environment. The simulation result shows that the distributed control scheme provides the highest quality of inter-destination synchronization among the three schemes in heavily loaded networks, while in lightly loaded networks the other schemes can have almost the same quality as that of the distributed control scheme.

  • QoS Enhancement for VoIP Using a New FEC Scheme with Backup Channel

    Abbas ASOSHEH  Mohammad SHIKH-BAHAEI  Jonathon A. CHAMBERS  

     
    LETTER-Network

      Vol:
    E87-B No:10
      Page(s):
    3102-3106

    This paper proposes a new FEC scheme using backup channel to send redundant information instead of piggybacking the main packet. This is particularly applicable to the modern IP networks which are distributed all over the world. In this method only one source coder for both the main and the redundant payload is used to reduce the overall computational complexity. The Gilbert loss model (GLM) is employed to verify the improvement of the packet loss probability in this new method compared with that in a single path FEC scheme. It is shown, through simulation results that using our proposed backup channel can considerably improve the packet loss and delay performance of the VoIP networks.

  • Adaptive Tessellation of PN Triangles Using Minimum-Artifact Edge Linking

    Yun-Seok CHOI  Kyu-Sik CHUNG  Lee-Sup KIM  

     
    LETTER-Computer Graphics

      Vol:
    E87-A No:10
      Page(s):
    2821-2828

    The PN triangle method has a great significance in processing tessellation at the hardware level without software assistance. Despite its significance, however, the conventional PN triangle method has certain defects such as inefficient GE operation and degradation of visual quality. Because the method tessellates a curved surface according to the user-defined fixed LOD (Level Of Detail). In this paper, we propose adaptive tessellation of PN triangles using minimum-artifact edge linking. Through this method, higher efficiency of tessellation and better quality of scene are obtained by adaptivity and minimum-artifact edge linking, respectively. This paper also presents a hardware architecture of a PN triangle method using adaptive LOD, which is not a burden for overall 3D graphics hardware.

  • Large Deviation for Chaotic Binary Sequences Generated by Nonlinear Maps and Threshold Functions

    Yasutada OOHAMA  Tohru KOHDA  

     
    PAPER-Stochastic Process

      Vol:
    E87-A No:10
      Page(s):
    2555-2563

    In this paper we study the large deviation property for chaotic binary sequences generated by one-dimensional maps displaying chaos and thresholds functions. We deal with the case when nonlinear maps are the r-adic maps. The large deviation theory for dynamical systems is useful for investigating this problem.

  • Available Bit Rate Traffic Engineering in MPLS Networks with Flow-Based Multipath Routing

    Nail AKAR  brahim HOKELEK  Ezhan KARASAN  

     
    PAPER-Network

      Vol:
    E87-B No:10
      Page(s):
    2913-2921

    In this paper, we propose a novel traffic engineering architecture for IP networks with MPLS backbones. In this architecture, two link-disjoint label switched paths, namely the primary and secondary paths, are established among every pair of IP routers located at the edges of an MPLS backbone network. As the main building block of this architecture, we propose that primary paths are given higher priority against the secondary paths in the MPLS data plane to cope with the so-called knock-on effect. Inspired by the ABR flow control mechanism in ATM networks, we propose to split traffic between a source-destination pair between the primary and secondary paths using explicit rate feedback from the network. Taking into consideration the performance deteriorating impact of packet reordering in packet-based load balancing schemes, we propose a traffic splitting mechanism that operates on a per-flow basis (i.e., flow-based multipath routing). We show via an extensive simulation study that using flow-based multipath traffic engineering with explicit rate feedback not only provides consistently better throughput than that of a single path but is also void of out-of-order packet delivery.

  • A 0.24 µm PRAM Cell Technology Using N-Doped GeSbTe Films

    Hideki HORII  Jeong Hee PARK  Ji Hye YI  Bong Jin KUH  Yong Ho HA  

     
    PAPER-Phase Change RAM

      Vol:
    E87-C No:10
      Page(s):
    1673-1678

    We have integrated a phase change random access memory (PRAM), completely based on 0.24 µm-CMOS technologies using nitrogen doped GeSbTe films. The Ge2Sb2Te5 (GST) thin films are well known to play a critical role in writing current of PRAM. Through device simulation, we found that high-resistive GST is indispensable to minimize the writing current of PRAM. For the first time, we found the resistivity of GST film can be controlled with nitrogen doping. Doping nitrogen to GST film successfully reduced writing current. A 0.24 µm PRAM using N-doped GST films were demonstrated with writing pulse of 0.8 mA-50 ns for RESET and 0.4 mA-100 ns for SET. Also, the cell endurance has been enhanced with grain growth suppression effect of dopant nitrogen. Endurance performance of fully integrated PRAM using N-doped GST shows no fail bit up to 2E9 cycles. Allowing 1% failures, extrapolation to 85 indicates retention time of 2 years. All the results show that PRAM is one of the most promising candidates in the market for the next generation memories.

  • SNR Estimation Using Gibbs Sampler

    Zhigang CAO  Yafeng ZHAN  Zhengxin MA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E87-B No:10
      Page(s):
    2972-2979

    This paper proposes a SNR estimation scheme based on Gibbs sampler. This scheme can estimate SNR using a very short received sequence, and does not require any prior information of the transmitted symbol. Compared with the existing estimators, the performance of this method is better when real SNR is larger than 5 dB in both single path channel and multi-path channel.

  • A Novel Signal Enhancement Scheme for Adaptive Antenna Arrays in Multirate DS/CDMA Systems

    Kyungseok KIM  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E87-A No:10
      Page(s):
    2780-2789

    A novel signal enhancement scheme using the rotation of signal subspace (RSS) and Toeplitz matrix approximation (TMA) methods to enhance the performance of an adaptive antenna array in multirate DS/CDMA systems is proposed. The basis of RSS is to find a transformation matrix in order to recover the desired complex array covariance matrix from a sampled complex array covariance matrix which is contaminated by an interference-plus-noise component, which is the total noise. Also, the objective of TMA is to change the output matrix of RSS into a matrix having the theoretical properties of a total noise-free signal. Consequently, the proposed signal enhancement scheme using RSS and TMA methods can greatly improve the performance of an adaptive antenna array by reducing the undesired total noise effect from the sampled complex array covariance matrix of the pre-correlation received signal vector that is used to calculate a weight vector of an adaptive antenna array. It is shown through various simulation results that the system performance using the proposed signal enhancement scheme is much superior to that of the conventional method.

  • Dependency of Distortion on Output Binary Pattern of the Hidden Layer for a Noisy LSP Quantization Neural Network

    Yoshinori MORITA  Tetsuo FUNADA  Hideyuki NOMURA  

     
    PAPER-Speech and Hearing

      Vol:
    E87-D No:10
      Page(s):
    2348-2355

    The bandwidth occupied by individual telecommunication devices in the field of mobile radio communication must be narrow in order to effectively exploit the limited frequency band. Therefore, it is necessary to implement low-bit-rate speech coding that is robust against background noise. We examine vector quantization using a neural network (NNVQ) as a robust LSP encoder. In this paper, we compare four types of binary patterns of a hidden layer, and clarify the dependency of quantization distortion on the bit pattern. By delayed decision (selection of low-distortion codes in decoding, i.e., EbD method) the spectral distortion (SD) can be decreased by 0.8 dB (20%). For noisy speech, the performance of the EbD method is better than that of the conventional VQ codebook mapping method. In addition, the SD can be decreased by 2.3 dB (40%) by using a method in which the neural networks for encoding and decoding are combined and re-trained. Finally, we examine the SD for speech having different signal-to-noise ratios (SNRs) from that used in training. The experimental results show that training using SNR between 30 and 40 dB is appropriate.

  • Analysis of Bandpass Filters with Shielded Inverted Microstrip Lines

    Ushio SANGAWA  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E87-C No:10
      Page(s):
    1715-1723

    A bandpass filter (BPF) with shielded inverted microstrip lines (SIMSL), previously demonstrated by the author, has shown the nontrivial asymmetry of filter responses in spite of adopting a conventional filter synthesis procedure. This paper will reveal the mechanism of the asymmetry and propose prescriptions for recovering the defect, in addition to observing the wave propagation property of SIMSL. Firstly, the behavior of phase constants or effective dielectric constants for various modes propagating on single SIMSL are indicated in terms of the line configuration, and the dispersion characteristics of the quasi-TEM mode are interpreted from the point of mode coupling between the pure TEM mode and dielectric slab modes. Then it is shown that the asymmetry is dependent only on the transmission characteristics of SIMSL parallel-coupled lines involved in the filter circuits. Theoretical considerations reveal that the asymmetry is due to the fact that SIMSL has quite different phase constants for the even- and odd-mode. On the basis of these results, the optimized BPF is designed and it is experimentally demonstrated that the symmetry of its responses is notably recovered. Furthermore, this optimization is still quite efficient for achieving high attenuation properties at its harmonics.

  • Error Detection of Structured Workflow Definition Using Set Constraint System

    Jaeyong SHIM  Minkyu LEE  Dongsoo HAN  

     
    PAPER-Database

      Vol:
    E87-D No:10
      Page(s):
    2295-2305

    A workflow definition containing errors might cause serious problems for an enterprise especially when it involves mission critical business processes or inter-organizational interaction. So workflow definitions should be defined in a strict and rigorous way. In this paper, we develop a workflow definition language and analysis methods for the language to support strict and rigorous workflow definitions. Faults or mistakes causing communication deadlock, access conflicts, and improper exception specification in workflow definitions can be detected and notified automatically using the methods. The proposed workflow definition language borrows structured constructs of conventional programming languages because many good features of conventional programming languages also can be used effectively in expressing workflow processes. With slight modifications and scope restrictions, the developed analysis techniques in this paper can be used in any workflow definition languages and they can help workflow designers define workflow processes in much more safe and reliable manner.

  • Real Time Creation of Pseudo 2D HMMs for Composite Keyword Spotting in Document Images

    Beom-Joon CHO  Bong-Kee SIN  Jin H. KIM  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E87-D No:10
      Page(s):
    2379-2388

    The traditional methods of HMM, although highly successful in 1-D time series analysis, have not yet been successfully extended to 2-D image analysis while fully exploiting the hierarchical design and extension of HMM networks for complex structured signals. Apart from the traditional method off-line training of the Baum-Welch algorithm, we propose a new method of real time creation of word or composite character HMMs for 2-D word/character patterns. Unlike the Latin words in which letters run left-to-right, the composition of word/character components need not be linear, as in Korean Hangul and Chinese characters. The key idea lies in the character composition at the image level and the image-to-model conversion followed by redundancy reduction. Although the resulting model is not optimal, the proposed method has much greater advantage in regard to memory usage and training difficulty. In a series of experiments in character/word spotting in document images, the system recorded the hit ratios of 80% and 67% in Hangul character and word spotting respectively without language models.

  • Study of Orthogonal SSB Modulation Method

    Gen-ichiro OHTA  Mitsuru UESUGI  Takuro SATO  Hideyoshi TOMINAGA  

     
    PAPER

      Vol:
    E87-A No:10
      Page(s):
    2676-2683

    This paper proposes a new SSB-QPSK modulation/demodulation method. The present method multiplexes the USB (Upper Side Band) and LSB (Lower Side Band) of a QPSK-modulated SSB (Single Side Band) on the same SSB complex frequency band. The present method thus achieves 2 bit/s/Hz. This method is an orthogonal SSB-QPSK method, because the multiplex signals are orthogonal to each other. The demodulator consists of two SSB demodulators. A simulation result in AWGN conditions, shows that the proposed method has better BER (Bit Error Rate) performance than 16 QAM. The degradation of BER in comparison with QPSK is less than 0.2 dB on Eb/No (bit-energy-to-noise-power ratio). In a fading/Doppler environment, the BER performance of the orthogonal SSB-QPSK is the same as that of QPSK.

13481-13500hit(21534hit)