The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

14481-14500hit(21534hit)

  • Reactive ECR-Sputter-Deposition of Ni-Zn Ferrite Thin-Films for Backlayer of PMR Media

    Hirofumi WADA  Setsuo YAMAMOTO  Hiroki KURISU  Mitsuru MATSUURA  

     
    PAPER

      Vol:
    E86-C No:9
      Page(s):
    1846-1850

    A reactive sputtering method using an Electron-Cyclotron-Resonance (ECR) microwave plasma was used to deposit Ni-Zn ferrite thin-films for a soft magnetic backlayer of Co-containing spinel ferrite thin-film perpendicular magnetic recording (PMR) media. The Ni-Zn spinel ferrite thin-films with a preferential orientation of (100) and a relatively low coercivity of 15 Oe were obtained at a high deposition rate of 14 nm/min and at a temperature below 200 degrees C. Although post-annealing treatment in air at 200 degrees C was effective to decrease the coercivity of the Ni-Zn ferrite thin-films, the saturation magnetization and initial permeability decreased and the surface smoothness was deteriorated simultaneously. The Ni-Zn ferrite thin-films prepared by ECR sputtering are promising as the backlayer of the perpendicular magnetic recording medium, but further improvement is required in terms of the soft magnetic properties, the grain size and the surface roughness.

  • A Multipurpose Image Watermarking Method for Copyright Notification and Protection

    Zhe-Ming LU  Hao-Tian WU  Dian-Guo XU  Sheng-He SUN  

     
    LETTER-Applications of Information Security Techniques

      Vol:
    E86-D No:9
      Page(s):
    1931-1933

    This paper presents an image watermarking method for two purposes: to notify the copyright owner with a visible watermark, and to protect the copyright with an invisible watermark. These two watermarks are embedded in different blocks with different methods. Simulation results show that the visible watermark is hard to remove and the invisible watermark is robust.

  • Construction of a Piecewise Linear One-Dimensional Map Generating an Arbitrary Prescribed Tree Source

    Yasutada OOHAMA  Mariko SUEMITSU  Tohru KOHDA  

     
    LETTER

      Vol:
    E86-A No:9
      Page(s):
    2251-2255

    We consider the problem of constructing nonlinear dynamical systems that realize an arbitrary prescribed tree sources. We give a construction of dynamical systems by using piecewise-linear maps. Furthermore, we examine the obtained dynamical system to show that the structure of the memory of tree sources is characterized with some geometrical property of the constructed dynamical systems. Using a similar method, we also construct a dynamical system generating an arbitrary prescribed reverse tree source and show that the obtained dynamical system has some interesting geometrical property explicitly reflecting the tree structure of the memory of the reverse tree source.

  • On Probabilistic Scheme for Encryption Using Nonlinear Codes Mapped from 4 Linear Codes

    Chunming RONG  

     
    LETTER

      Vol:
    E86-A No:9
      Page(s):
    2248-2250

    Probabilistic encryption becomes more and more important since its ability to against chosen-ciphertext attack. Applications like online voting schemes and one-show credentials are based on probabilistic encryption. Research on good probabilistic encryptions are on going, while many good deterministic encryption schemes are already well implemented and available in many systems. To convert any deterministic encryption scheme into a probabilistic encryption scheme, a randomized media is needed to apply on the message and carry the message over as an randomized input. In this paper, nonlinear codes obtained by certain mapping from linear error-correcting codes are considered to serve as such carrying media. Binary nonlinear codes obtained by Gray mapping from 4-linear codes are discussed as example for a such scheme.

  • Robustness of Morphological Filters

    Sari PELTONEN  Pauli KUOSMANEN  

     
    PAPER-Nonlinear Signal Processing and Coding

      Vol:
    E86-A No:9
      Page(s):
    2222-2228

    In this paper our recently introduced method called output distributional influence function (ODIF) is used for the evaluation of the robustness properties of the nonlinear filter class of morphological filters. Several examples of the ODIFs for the dilation, closing and clos-opening are given and explained carefully. For each of these morphological filters the effect of filter length is examined by using the ODIFs for the expectation and variance. The robustness properties of the filters are also compared to each other and the effect of the distribution of the contamination is investigated for the closing as an example of realistic filtering conditions.

  • Performance Analysis of Handoff for Virtual Cellular Network with Centralized/Distributed Resource Control

    Jumin LEE  Hyun-Ho CHOI  Jemin CHUNG  Dong-Ho CHO  

     
    LETTER-Wireless Communication Switching

      Vol:
    E86-B No:9
      Page(s):
    2828-2834

    A Virtual Cellular Network (VCN) is a wireless cellular network wherein a single Mobile Station (MS) can communicate simultaneously with more than one Base Station (BS). In this paper, we analyze handoff for two kinds of VCN: a 'Distributed Resource-control VCN' (DR-VCN) and a 'Centralized Resource-control VCN' (CR-VCN). A VCN can take advantage of the fact that the same data is received by multiple base stations. The DR-VCN is a system in which every BS controls its own channels, while the CR-VCN is a system wherein a central station controls all system channels. Results from analysis and simulation show that both the new call drop rate and handoff refusal rate of the CR-VCN are much lower than those of the DR-VCN.

  • Technology Scalable Matrix Architecture for Data Parallel Applications

    Mostafa SOLIMAN  Stanislav SEDUKHIN  

     
    PAPER-Networking and Architectures

      Vol:
    E86-D No:9
      Page(s):
    1549-1559

    Within a few years it will be possible to integrate a billion transistors on a single chip operating at frequency more than 10 GHz. At this integration level, we propose using a multi-level ISA to express fine-grain data parallelism to hardware instead of using a huge transistor budget to dynamically extract it. Since the fundamental data structures for a wide variety of data parallel applications are scalar, vector, and matrix, our proposed Trident processor extends a scalar ISA with vector and matrix instruction sets to effectively process matrix formulated applications. Like vector architectures, the Trident processor consists of a set of parallel lanes (each lane contains a set of vector pipelines and a slice of register file) combined with a fast scalar core. However, Trident processor can effectively process on the parallel lanes not only vector but also matrix data. One key point of our architecture is the local communication within and across lanes to overcome the limitations of the future VLSI technology. Another key point is the effective execution of a mixture of scalar, vector, and matrix operations. This paper describes the architecture of the Trident processor and evaluates its performance on BLAS and on the standard matrix bidiagonalization algorithm. The last one is evaluated as an example of an entire application based on a mixture of scalar, vector, and matrix operations. Our results show that many data parallel applications, such as scientific, engineering, multimedia, etc., can be speeded up on the Trident processor. Besides, the scalability of the Trident processor does not require more fetch, decode, or issue bandwidth, but requires only replication of parallel lanes.

  • A New Method for Constructing Modulatable Complete Complementary Codes

    Hideyuki TORII  Makoto NAKAMURA  Naoki SUEHIRO  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E86-A No:9
      Page(s):
    2388-2395

    Complete complementary codes have the property that the sum of correlation functions of several sequences satisfies both ideal autocorrelation and cross-correlation values. Modulatable complete complementary codes (MCC codes), which is a type of periodic complete complementary codes, are suitable for spreading sequences of M-ary CDMA systems. In the present paper, we propose a new method for constructing MCC codes. Using this method, we can easily generate various MCC codes.

  • Information Extraction and Summarization for Newspaper Articles on Sassho-jiken

    Teiji FURUGORI  Rihua LIN  Takeshi ITO  Dongli HAN  

     
    PAPER

      Vol:
    E86-D No:9
      Page(s):
    1728-1735

    Described here is an automatic text summarization system for Japanese newspaper articles on sassho-jiken (murders and bodily harms). We extract the pieces of information from a text, inter-connect them to represent the scenes and participants involved in the sassho-jiken, and finally produce a summary by generating sentences from the information extracted. An experiment and its evaluation show that, while a limitation being imposed on the domain, our method works well in depicting important information from the newspaper articles and the summaries produced are better in adequacy and readability than those obtained by extracting sentences.

  • Capacity Estimation of SIR-Based Power Controlled CDMA Cellular Systems in Presence of Power Control Error

    Lin WANG  A. Hamid AGHVAMI  Williams G. CHAMBERS  

     
    LETTER-Wireless Communication Technology

      Vol:
    E86-B No:9
      Page(s):
    2774-2776

    Power control error is well known for its negative effects on CDMA system capacity. In this Letter, an analytical model is developed to estimate the uplink capacity for a SIR-based power controlled CDMA cellular system. The voice capacity reduction due to power control error is numerically examined with this model.

  • Efficient and Scalable Client Clustering for Web Proxy Cache

    Kyungbaek KIM  Daeyeon PARK  

     
    PAPER-Software Systems and Technologies

      Vol:
    E86-D No:9
      Page(s):
    1577-1585

    Many cooperated web cache systems and protocols have been proposed. These systems, however, require expensive resources, such as external bandwidth and CPU power or storage of a proxy, while inducing hefty administrative costs to achieve adequate client population growth. Moreover, a scalability problem in the cache server management still exists. This paper suggests peer-to-peer client-clustering. The client-cluster provides a proxy cache with backup storage which is comprised of the residual resources of the clients. We use DHT based peer-to-peer lookup protocol to manage the client-cluster. With the natural characteristics of this protocol, the client-cluster is self-organizing, fault-tolerant, well-balanced and scalable. Additionally, we propose the Backward ICP which is used to communicate between the proxy cache and the client-cluster, to reduce the overhead of the object replication and to use the resources more efficiently. We examine the performance of the client-cluster via a trace driven simulation and demonstrate effective enhancement of the proxy cache performance.

  • Zero Crossing Statistics of Chaos-Based FM Clock Signals

    Stefano SANTI  Riccardo ROVATTI  Gianluca SETTI  

     
    PAPER-Nonlinear Signal Processing and Coding

      Vol:
    E86-A No:9
      Page(s):
    2229-2240

    We investigate the statistical features of both random- and chaos-based FM timing signals to ascertain their applicability to digital circuits and systems. To achieve such a goal, we consider both the case of single- and two-phase logic and characterize the random variable representing, respectively, the time lag between two subsequent rising edges or between two consecutive zero-crossing points of the modulated timing signal. In particular, we determine its probability density and compute its mean value and variance for cases which are relevant for reducing Electromagnetic emissions. Finally, we address the possible problems of performance degradation in a digital system driven by a modulated timing signal and to cope with this we give some guidelines for the proper choice of the statistical properties of the modulating signals.

  • Evaluation Methods for Web Retrieval Tasks Considering Hyperlink Structure

    Koji EGUCHI  Keizo OYAMA  Emi ISHIDA  Noriko KANDO  Kazuko KURIYAMA  

     
    PAPER

      Vol:
    E86-D No:9
      Page(s):
    1804-1813

    This paper proposes the evaluation methods for measuring retrieval effectiveness of Web search engine systems, attempting to make them suitable for real Web environment. With this objective, we constructed 100-gigabyte and 10-gigabyte document sets that were mainly gathered from the '.jp' domain, and conducted an evaluation workshop at the third NTCIR Workshop from 2001 to 2002, where we assessed the retrieval effectiveness of a certain number of Web search engine systems using the common data set. Conventional evaluation workshops assessed the relevance of the retrieved documents, which were submitted by the workshop participants, by considering the contents of individual pages. On the other hand, we assessed the relevance of the retrieved pages by considering the relationship between the pages referenced by hyperlinks.

  • A Fixed Point Theorem for Recurrent System of Fuzzy-Set-Valued Nonlinear Mapping Equations

    Kazuo HORIUCHI  

     
    PAPER-Neuro, Fuzzy, GA

      Vol:
    E86-A No:9
      Page(s):
    2256-2261

    Let us introduce n ( 2) nonlinear mappings fi (i = 1,2,,n) defined on complete linear metric spaces (Xi-1,ρ) (i = 1,2,,n), respectively, and let fi: Xi-1 Xi be completely continuous on bounded convex closed subsets Xi-1,(i = 1,2,,n 0), such that fi() . Moreover, let us introduce n fuzzy-set-valued nonlinear mappings Fi: Xi-1 Xi {a family of all non-empty closed compact fuzzy subsets of Xi}. Here, we have a fixed point theorem on the recurrent system of β-level fuzzy-set-valued mapping equations: xi Fiβ(xi-1,fi(xi-1)), (i = 1,2,,n 0), where the fuzzy set Fi is characterized by a membership function µFi(xi): Xi [0,1], and the β-level set Fiβ of the fuzzy set Fi is defined as Fiβ {ξi Xi | µFi(ξi) β}, for any constant β (0,1]. This theorem can be applied immediately to discussion for characteristics of ring nonlinear network systems disturbed by undesirable uncertain fluctuations and to fine estimation of available behaviors of those disturbed systems. In this paper, its mathematical situation and proof are discussed, in detail.

  • Routing Methodology for Minimizing Crosstalk in SoC

    Takashi YAMADA  Atsushi SAKAI  Yoshifumi MATSUSHITA  Hiroto YASUURA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E86-A No:9
      Page(s):
    2347-2356

    In this paper, we propose new physical design techniques to reduce crosstalk noise and crosstalk-induced delay variations caused in a nanometer-scale system-on-a-chip (SoC). We have almost eliminated the coupling effect between signal wires by simply optimizing parameters for the automatic place and route methodology. Our approach consists of two techniques, (1) A 3-D optimization technique for tuning the routing grid configuration both in the horizontal and vertical directions. (2) A co-optimization technique for tuning the cell utilization ratio and the routing grid simultaneously. Experiments on the design of an image processing circuit fabricated in a 0.13 µm CMOS process with six layers of copper interconnect show that crosstalk noise is almost eliminated. From the results of a static timing analysis considering the worst-case crosstalk condition, the longest path delay is decreased by about 15% maximum if technique (1) is used, and by about 7% maximum if technique (2) is used. The 7-15% delay reduction has been achieved without process improvement, and this reduction corresponds to between 1/4 and 1/2 generation of process progress.

  • An Interference-Canceller-Aided Code Acquisition Scheme for DS-CDMA Systems with Interference Cancellation

    Jong Bin LEE  Seong Keun OH  

     
    LETTER-Wireless Communication Technology

      Vol:
    E86-B No:9
      Page(s):
    2785-2787

    We propose an interference-canceller-aided (ICA) code timing acquisition scheme, code acquisition in short subsequently, for initial synchronization of direct sequence-code division multiple access (DS-CDMA) systems with interference cancellation (IC). The scheme removes completely or partially multiple access interference (MAI) due to the already-synchronized users from the received signal prior to code acquisition of a desired user. Code acquisition is then performed using the MAI-reduced signal. We compare the ICA code acquisition scheme with the conventional non-ICA scheme in terms of the probability of correct acquisition and the code timing accuracy. Simulation results shows that the proposed scheme can accommodate many more users than the conventional one and provide reliable code timing estimates even under many more interfering users.

  • Delayed Feedback Guaranteed Cost Controller Design for Uncertain Time-Delay Systems

    Ohmin KWON  Sangchul WON  Dong YUE  

     
    LETTER-Systems and Control

      Vol:
    E86-A No:9
      Page(s):
    2413-2418

    In this paper, we propose a delayed feedback guaranteed cost controller design method for uncertain linear systems with delays in states. Based on the Lyapunov method, an LMI optimization problem is formulated to design a delayed feedback controller which minimizes the upper bound of a given quadratic cost function. Numerical examples show the effectiveness of the proposed method.

  • Finite Extension Field with Modulus of All-One Polynomial and Representation of Its Elements for Fast Arithmetic Operations

    Yasuyuki NOGAMI  Akinori SAITO  Yoshitaka MORIKAWA  

     
    PAPER-Information Theory

      Vol:
    E86-A No:9
      Page(s):
    2376-2387

    In many cryptographic applications, a large-order finite field is used as a definition field, and accordingly, many researches on a fast implementation of such a large-order extension field are reported. This paper proposes a definition field Fpm with its characteristic p a pseudo Mersenne number, the modular polynomial f(x) an irreducible all-one polynomial (AOP), and using a suitable basis. In this paper, we refer to this extension field as an all-one polynomial field (AOPF) and to its basis as pseudo polynomial basis (PPB). Among basic arithmetic operations in AOPF, a multiplication between non-zero elements and an inversion of a non-zero element are especially time-consuming. As a fast realization of the former, we propose cyclic vector multiplication algorithm (CVMA), which can be used for possible extension degree m and exploit a symmetric structure of multiplicands in order to reduce the number of operations. Accordingly, CVMA attains a 50% reduction of the number of scalar multiplications as compared to the usually adopted vector multiplication procedure. For fast realization of inversion, we use the Itoh-Tsujii algorithm (ITA) accompanied with Frobenius mapping (FM). Since this paper adopts the PPB, FM can be performed without any calculations. In addition to this feature, ITA over AOPF can be composed with self reciprocal vectors, and by using CVMA this fact can also save computation cost for inversion.

  • Construction of an Electroencephalogram-Based Brain-Computer Interface Using an Artificial Neural Network

    Xicheng LIU  Shin HIBINO  Taizo HANAI  Toshiaki IMANISHI  Tatsuaki SHIRATAKI  Tetsuo OGAWA  Hiroyuki HONDA  Takeshi KOBAYASHI  

     
    PAPER-Welfare Engineering

      Vol:
    E86-D No:9
      Page(s):
    1879-1886

    A brain-computer interface using an electroencephalogram as input into an artificial neural network is investigated as a potentially general control system applicable to all subjects and time frames. Using the intent and imagination of bending the left or right elbow, the left and right desired movements are successfully distinguished using event-related desynchronization resolved by fast Fourier transformation of the electroencephalogram and analysis of the power spectrum using the artificial neural network. The influence of age was identified and eliminated through the use of a frequency distribution in the α band, and the recognition rate was further improved by confirmation based on forced excitement of the β band in the case of an error. The proposed system was effectively trained for general use by using the combined data of a cross-section of subjects.

  • Multivariate Phase Synchronization Analysis of EEG Data

    Carsten ALLEFELD  Jurgen KURTHS  

     
    PAPER-Nonlinear Signal Processing and Coding

      Vol:
    E86-A No:9
      Page(s):
    2218-2221

    A method for a genuinely multivariate analysis of statistical phase synchronization phenomena in empirical data is presented. It is applied to EEG data from a psychological experiment, obtaining results which indicate a possible relevance of this method in the context of cognitive science as well as in other fields.

14481-14500hit(21534hit)