The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

17381-17400hit(21534hit)

  • A Novel Infrared-Controlled Telephone Communication Interface for the Disabled

    Yu-Luen CHEN  Ying-Ying SHIH  Walter H. CHANG  Fuk-Tan TANG  May-Kuen WONG  Te-Son KUO  

     
    PAPER-Medical Electronics and Medical Information

      Vol:
    E82-D No:10
      Page(s):
    1417-1424

    This paper reports on the development of an eyeglass-type infrared-controlled telephone communication interface for the disabled. This system is comprised of four major components: A) a headset; B) an infrared transmitting module; C) an infrared receiving/signal-processing module; and D) a main controller, the Intel-8951 microprocessor. The headset with a tongue-touch panel, a wireless earphone, and a wireless microphone. The infrared transmitting module utilizes a tongue touch panel via tongue-touch circuitry which is converted to an infrared beam and a low power laser (<0.1 mW) beam. The infrared receiving/signal-processing module, receives the infrared beam and fine tunes the unstable infrared beam into standard pulses which are used as control signals. The main controller is responsible for detecting the input signals from the infrared receiving/signal-processing module and verifying these signals with the mapping table in its memory. After the signal is verified, it is released to control the keys of the telephone interface. This design concept was mainly based on the idea that the use of an infrared remote module fastened to the eyeglasses could allow the convenient control of the dialing motion on the keys of a telephone's dialing-pad which are all modified with infrared receiving/signal-processing modules. The disabled are competent for some of work, such as a telephone operator. The increase of opportunity to do a job for the disabled would help them live independently.

  • Sufficient Conditions for Ruling-Out Useless Iterative Steps in a Class of Iterative Decoding Algorithms

    Tadao KASAMI  Yuansheng TANG  Takuya KOUMOTO  Toru FUJIWARA  

     
    PAPER-Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2061-2073

    In this paper, we consider sufficient conditions for ruling out some useless iteration steps in a class of soft-decision iterative decoding algorithms for binary block codes used over the AWGN channel using BPSK signaling. Sufficient conditions for ruling out the next single decoding step, called ruling-out conditions and those for ruling out all the subsequent iteration steps, called early termination conditions, are formulated in a unified way without degradation of error performance. These conditions are shown to be a type of integer programming problems. Several techniques for reducing such an integer programming problem to a set of subprograms with smaller computational complexities are presented. As an example, an early termination condition for Chase-type decoding algorithm is presented. Simulation results for the (64, 42, 8) Reed-Muller code and (64, 45, 8) extended BCH code show that the early termination condition combined with a ruling-out condition proposed previously is considerably effective in reducing the number of test error patterns, especially as the total number of test error patterns concerned grows.

  • Additive Noise Response of a Charge Pump Phase-Locked Loop

    Bishnu Charan SARKAR  Muralidhar NANDI  

     
    LETTER-Analog Signal Processing

      Vol:
    E82-A No:10
      Page(s):
    2291-2293

    The additive noise response of a charge pump phase-locked loop in the synchronous mode of operation has been studied. In order to determine the tracking and noise performances of the loop, mean square values of tracking error and local oscillator phase jitter have been analytically obtained. Analytical results agree well with the simulation results obtained here and elsewhere. The analysis performed can be used in choosing different system parameters for optimum system operation.

  • Tail-Biting Trellises of Block Codes: Trellis Complexity and Viterbi Decoding Complexity

    Ilan REUVEN  Yair BE'ERY  

     
    PAPER-Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2043-2051

    Tail-biting trellises of linear and nonlinear block codes are addressed. We refine the information-theoretic approach of a previous work on conventional trellis representation, and show that the same ideas carry over to tail-biting trellises. We present lower bounds on the state and branch complexity profiles of these representations. These bounds are expressed in terms of mutual information between different portions of the code, and they introduce the notions of superstates and superbranches. For linear block codes, our bounds imply that the total number of superstates, and respectively superbranches, of a tail-biting trellis of the code cannot be smaller than the total number of states, and respectively branches, of the corresponding minimal conventional trellis, though the total number of states and branches of a tail-biting trellis is usually smaller than that of the conventional trellis. We also develop some improved lower bounds on the state complexity of a tail-biting trellis for two classes of codes: the first-order Reed-Muller codes and cyclic codes. We show that the superstates and superbranches determine the Viterbi decoding complexity of a tail-biting trellis. Thus, the computational complexity of the maximum-likelihood decoding of linear block codes on a tail-biting trellis, using the Viterbi algorithm, is not smaller than that of the conventional trellis of the code. However, tail-biting trellises are beneficial for suboptimal and iterative decoding techniques.

  • Simulation Algorithms among Enhanced Mesh Models

    Susumu MATSUMAE  Nobuki TOKURA  

     
    PAPER-Algorithm and Computational Complexity

      Vol:
    E82-D No:10
      Page(s):
    1324-1337

    In this paper, we present simulation algorithms among enhanced mesh models. The enhanced mesh models here include reconfigurable mesh and mesh with multiple broadcasting. A reconfigurable mesh (RM) is a processor array that consists of processors arranged to a 2-dimensional grid with a reconfigurable bus system. The bus system can be used to dynamically obtain various interconnection patterns among the processors during the execution of programs. A horizontal-vertical RM (HV-RM) is obtained from the general RM model, by restricting the network topology it can take to the ones in which each bus segment must be along row or column. A mesh with multiple broadcasting (MWMB) is an enhanced mesh, which has additional broadcasting buses endowed to every row and column. We present two algorithms:1) an algorithm that simulates a HV-RM of size nn time-optimally in θ(n) time on a MWMB of size nn, and 2) an algorithm that simulates a RM of size nn in θ(log2 n) time on a HV-RM of size nn. Both algorithms use a constant number of storage in each processor. Furthermore, we show that a RM of size nn can be simulated in θ((n/m)2 log n log m) time on a HV-RM of size mm, in θ ((n/m)2 m log n log m) time on a MWMB of size mm (m < n). These simulations use θ((n/m)2) storage in each processor, which is optimal.

  • Dynamics of Cellular Automata on Groups

    Shuichi YUKITA  

     
    PAPER-Automata,Languages and Theory of Computing

      Vol:
    E82-D No:10
      Page(s):
    1316-1323

    Dynamical theory of cellular automata on groups is developed. Main results are non-Euclidean extensions of Sato and Honda's results on the dynamics of Euclidean cellular automata. The notion of the period of a configuration is redefined in a more group theoretical way. The notion of a co-finite configuration substitutes the notion of a periodic configuration, where the new term is given to it to reflect and emphasize the importance of finiteness involved. With these extended or substituted notions, the relations among period preservablity, injectivity, and Poisson stability of parallel maps are established. Residually finite groups are shown to give a nice topological property that co-finite configurations are dense in the configuration space.

  • Evolutional Design and Training Algorithm for Feedforward Neural Networks

    Hiroki TAKAHASHI  Masayuki NAKAJIMA  

     
    PAPER-Image Processing,Computer Graphics and Pattern Recognition

      Vol:
    E82-D No:10
      Page(s):
    1384-1392

    In pattern recognition using neural networks, it is very difficult for researchers or users to design optimal neural network architecture for a specific task. It is possible for any kinds of neural network architectures to obtain a certain measure of recognition ratio. It is, however, difficult to get an optimal neural network architecture for a specific task analytically in the recognition ratio and effectiveness of training. In this paper, an evolutional method of training and designing feedforward neural networks is proposed. In the proposed method, a neural network is defined as one individual and neural networks whose architectures are same as one species. These networks are evaluated by normalized M. S. E. (Mean Square Error) which presents a performance of a network for training patterns. Then, their architectures evolve according to an evolution rule proposed here. Architectures of neural networks, in other words, species, are evaluated by another measurement of criteria compared with the criteria of individuals. The criteria assess the most superior individual in the species and the speed of evolution of the species. The species are increased or decreased in population size according to the criteria. The evolution rule generates a little bit different architectures of neural network from superior species. The proposed method, therefore, can generate variety of architectures of neural networks. The designing and training neural networks which performs simple 3 3 and 4 4 pixels which include vertical, horizontal and oblique lines classifications and Handwritten KATAKANA recognitions are presented. The efficiency of proposed method is also discussed.

  • Almost Sure and Mean Convergence of Extended Stochastic Complexity

    Masayuki GOTOH  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Source Coding/Image Processing

      Vol:
    E82-A No:10
      Page(s):
    2129-2137

    We analyze the extended stochastic complexity (ESC) which has been proposed by K. Yamanishi. The ESC can be applied to learning algorithms for on-line prediction and batch-learning settings. Yamanishi derived the upper bound of ESC satisfying uniformly for all data sequences and that of the asymptotic expectation of ESC. However, Yamanishi concentrates mainly on the worst case performance and the lower bound has not been derived. In this paper, we show some interesting properties of ESC which are similar to Bayesian statistics: the Bayes rule and the asymptotic normality. We then derive the asymptotic formula of ESC in the meaning of almost sure and mean convergence within an error of o(1) using these properties.

  • Exploiting Symmetric Relation for Efficient Feature Interaction Detection

    Masahide NAKAMURA  Tohru KIKUNO  

     
    PAPER-Computer Networks

      Vol:
    E82-D No:10
      Page(s):
    1352-1363

    Feature interaction detection determines whether interactions occur or not between the new and existing telecommunication services. Most of conventional detection methods on state transition model utilize an exhaustive search. The exhaustive search is fundamentally very powerful in the sense that all interactions are exactly detected. However, it may suffer from the state explosion problem due to the exponential growth of the number of states in the model when the number of users and the number of features increase. In order to cope with this problem, we propose a new detection method using a state reduction technique. By means of a symmetric relation, called permutation symmetry, we succeed in reducing the size of the model while preserving the necessary information for the interaction detection. Experimental evaluation shows that, for practical interaction detection with three users, the proposed method achieves about 80% reduction in space and time, and is more scalable than the conventional ones especially for the increase of the number of users in the service.

  • Performance Evaluation of Reliable Multicast Communication Protocols under Heterogeneous Transmission Delay Circumstances

    Takashi HASHIMOTO  Miki YAMAMOTO  Hiromasa IKEDA  James F. KUROSE  

     
    PAPER-Signaling System and Communication Protocol

      Vol:
    E82-B No:10
      Page(s):
    1609-1617

    This paper presents a performance evaluation of NAK-based reliable multicast communication protocols operating in an environment where end-to-end delay are heterogeneous. In the case of heterogeneous delay, performance of a timer-based retransmission control scheme may become worse. We show that a counter-based retransmission control scheme works well in the case of heterogeneous transmission delay. We also compare two NAK-based protocols and show that a NAK-multicasting protocol outperforms a NAK-unicasting protocol from the viewpoint of scalability even when delays are heterogeneous.

  • Unequal Error Protected Image Transmission and Recovery Using Trellis Coding

    Tae-Sun CHOI  Byungseog BAEK  

     
    LETTER-Communication Theory

      Vol:
    E82-B No:10
      Page(s):
    1684-1687

    A new UEP technique for image transmission using trellis code based on Hamming distance criterion has been proposed. The simulation results comparing the image quality and bit-rate for UEP and EEP have been provided. The results show that UEP performs better than EEP in terms of bit-rate without any significant depreciation in image quality.

  • On Optimal and Proper Binary Codes from Irreducible Cyclic Codes over GF(2m)

    Katsumi SAKAKIBARA  Ritsuko IWASA  Yoshiharu YUBA  

     
    LETTER-Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2191-2193

    We prove that binary images of irreducible cyclic codes C over GF(2m) and binary concatenated codes of C and a binary [m+1,m,2] even-parity code are optimal (in the sense that they meet the Griesmer bound with equality) and proper, if a root of the check polynomial of C is primitive over GF(2m) or its extensions.

  • An Efficient R-R Interval Detection for ECG Monitoring System

    Takashi KOHAMA  Shogo NAKAMURA  Hiroshi HOSHINO  

     
    PAPER-Medical Electronics and Medical Information

      Vol:
    E82-D No:10
      Page(s):
    1425-1432

    The recording of electrocardiogram (ECG) signals for the purpose of finding arrhythmias takes 24 hours. Generally speaking, changes in R-R intervals are used to detect arrhythmias. Our purpose is to develop an algorithm which efficiently detects R-R intervals. This system uses the R-wave position to calculate R-R intervals and then detects any arrhythmias. The algorithm searches for only the short time duration estimated from the most recent R-wave position in order to detect the next R-wave efficiently. We call this duration a WINDOW. A WINDOW is decided according to a proposed search algorithm so that the next R-wave can be expected in the WINDOW. In a case in which an S-wave is enhanced for some reason such as the manner in which the electrodes are installed in the system, the S-wave positions are taken to calculate the peak intervals instead of the R-wave. However, baseline wander and noise contained in the ECG signal have a deterrent effect on the accuracy with which the R-wave or the S-wave position is determined. In order to improve detection, the ECG signal is preprocessed using a Band-Pass Filter (BPF) which is composed of simple Cascaded Integrator Comb (CIC) filters. The American Heart Association (AHA) database was used in the simulation with the proposed algorithm. Accurate detection of the R-wave position was achieved in 99% of cases and efficient extraction of R-R intervals was possible.

  • Analysis of Relative Rate Switch Algorithms for ABR Flow Control in ATM Networks

    Dong-Ho KIM  You-Ze CHO  Jong-Hee PARK  

     
    PAPER-Switching and Communication Processing

      Vol:
    E82-B No:10
      Page(s):
    1586-1594

    This paper investigates the performance of relative rate (RR) switch algorithms for available bit rate (ABR) flow control in asynchronous transfer mode (ATM) networks. An RR switch can be implemented differently according to the congestion detection and notification methods used. This paper proposes three implementation schemes for an RR switch using various congestion detection and notification methods, and then analyzes the allowed cell rate (ACR) of a source and the queue length at a switch in steady state. The upper and lower bounds for the maximum and minimum queue lengths are also determined for each scheme, respectively, thereby investigating the effects of ABR parameter values on a queue length. Furthermore, a selection method for rate increase factor (RIF) and rate decrease factor (RDF) parameter values is suggested to prevent buffer overflow and underflow.

  • Newly Found Visual Illusions and 3-D Display

    Masanori IDESAWA  Qi ZHANG  

     
    REVIEW PAPER

      Vol:
    E82-C No:10
      Page(s):
    1823-1830

    Human visual system can perceive 3-D structure of an object by binocular disparity, gradient of illumination (shading), occlusion, textures, perspective and so forth. Among them, binocular disparity seems to be the essentially important cues for the 3-D space perception and it is used widely for displaying 3-D visual circumstances such as in VR (virtual reality) system or 3-D TV. Visual illusions seem to be one of the phenomena which are purely reflecting the mechanism of human visual system. In the recent several years, the authors found several new types of 3-D visual illusions with binocular viewing. Entire 3-D illusory object including volume perception, transparency, dynamic illusions can be perceived only from the visual stimuli of disparity given by some inducing objects arranged with suitable relations. In this report, the authors introduced these newly found visual illusions and made some considerations on the human visual mechanism of 3-D perception and on their exploitation for new effective techniques in 3-D display. They introduced especially on the visual effect in two kinds of arrangement with occlusion and sustaining relationship between the illusory object and inducing objects. In the former case, the inducing objects which provide the stimuli were named as occlusion cues and classified into two types: contour occlusion cues and bulky occlusion cues. In the later case, those inducing objects were named as sustaining cues and a 3-D fully transparent illusory object was perceived. The perception was just like imagined from the scenes of the actions and positions of the pantomimists; then this phenomena was named as "Mime (Pantomime) Effect. " According to the positions of sustaining cues, they played different actions in this perception, and they are classified into three types: front sustaining cues, side sustaining cues and back sustaining cues. In addition, dynamic fusion and separation of volumetrical illusory objects were perceived when the visual stimuli were moving continuously between two structurally different conditions. Then the hysteresis was recognized in geometrical position between the fusion and separation. The authors believe that the occlusion cues and sustaining cues introduced in this paper could be effective clues for exploiting the new techniques for 3-D display.

  • Iterative Decoding of Serially Concatenated Punctured Trellis-Coded Modulation

    Haruo OGIWARA  Voltaire Balisnomo BAJO  

     
    PAPER-Communication Systems

      Vol:
    E82-A No:10
      Page(s):
    2089-2095

    Iterative decoding of serially concatenated code is extended to punctured trellis-coded modulation. A system configuration, a decoding algorithm and a performance evaluation method are proposed. It realizes a total coding rate of m/(m+1) by puncturing parity bits. Simulation results indicate that the proposed system shows no flattening effect which is observed in parallel concatenated system and realizes BER of 10-6 at Eb/N0=4.43 dB even with a small interleaver of size 2047.

  • Unified Fully-Pipelined VLSI Implementations of the One- and Two-Dimensional Real Discrete Trigonometric Transforms

    Wen-Hsien FANG  Ming-Lu WU  

     
    PAPER-Digital Signal Processing

      Vol:
    E82-A No:10
      Page(s):
    2219-2230

    This paper presents unified VLSI architectures which can efficiently realize some widespread one-dimensional (1-D) and two-dimensional (2-D) real discrete trigonometric transforms, including the discrete Hartley transform (DHT), discrete sine transform (DST), and discrete cosine transform (DCT). First, succinct and unrestrictive Clenshaw's recurrence formula along with the inherent symmetry of the trigonometric functions are adequately employed to render efficient recurrences for computing these 1-D RDTT. By utilizing an appropriate row-column decomposition approach, the same set of recurrences can also be used to compute both of the row transform and column transform of the 2-D RDTT. Array architectures, basing on the developed recurrences, are then introduced to implement these 1-D and 2-D RDTT. Both architectures provide substantial hardware savings as compared with previous works. In addition, they are not only applicable to the 1-D and 2-D RDTT of arbitrary size, but they can also be easily adapted to compute all aforementioned RDTT with only minor modifications. A complete set of input/output (I/O) buffers along with a bidirectional circular shift matrix are addressed as well to enable the architectures to operate in a fully-pipelined manner and to rectify the transformed results in a natural order. Moreover, the resulting architectures are both highly regular, modular, and locally-connected, thus being amenable to VLSI implementations.

  • Systolic Implementations of Modified Gaussian Eliminations for the Decoding of Reed-Solomon Codes

    Chih-Wei LIU  Li-Lien LIN  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E82-A No:10
      Page(s):
    2251-2258

    Systolic array implementations of modified Gaussian eliminations for the decoding of an (n, n-2t) RS code, including the Hong-Vetterli algorithm and the FIA proposed by Feng and Tzeng, are designed in this paper. These modified Gaussian eliminations are more easily understanding than the classical Berlekamp-Massey algorithm and, in addition, are efficient to decode RS codes for small e or e <

  • Timing Jitter Characteristics of RZ Pulse Nonlinear Transmission on Dispersion Managed Fiber Link

    Kazuho ANDO  Masanori HANAWA  Mikio TAKAHARA  

     
    PAPER-Communication Systems

      Vol:
    E82-A No:10
      Page(s):
    2081-2088

    One of the limitation factors on the achievable distance for long-haul nonlinear Return-to-Zero (RZ)-Gaussian pulse transmission on optical fiber links is timing jitter. Although it is well known that the dispersion management technique is very effective to reduce the timing jitter, comparisons among some dispersion management methods based on the timing jitter reduction have not been reported yet. In this paper, timing jitter reduction by some dispersion management methods in nonlinear RZ-Gaussian pulse transmission systems are discussed. Moreover, we will report that the amount of timing jitter at the receiver side drastically changes depending on the configuration of dispersion managed optical fiber transmission line.

  • Iterative Processing for Improving Decode Quality in Mobile Multimedia Communications

    Shoichiro YAMASAKI  Hirokazu TANAKA  Atsushi ASANO  

     
    PAPER-Communication Systems

      Vol:
    E82-A No:10
      Page(s):
    2096-2104

    Multimedia communications over mobile networks suffer from fluctuating channel degradation. Conventional error handling schemes consist of the first stage error correction decoding in wireless interface and the second stage error correction decoding in multimedia demultiplexer, where the second stage decoding result is not used to improve the first stage decoding performance. To meet the requirements of more powerful error protection, we propose iterative soft-input/soft-output error correction decoding in multimedia communications, where the likelihood output generated by the error correction decoding in multimedia demultiplexer is fed back to the decoding in wireless interface and the decoding procedure is iterated. The performances were evaluated by MPEG-4 video transmission simulation over mobile channels.

17381-17400hit(21534hit)