The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Ti(30728hit)

29021-29040hit(30728hit)

  • Characterization for Negative Differential Resistance in Surface Tunnel Transistors

    Tetsuya UEMURA  

     
    PAPER

      Vol:
    E77-C No:9
      Page(s):
    1444-1449

    Gate-controlled negative differential resistance (NDR) due to interband tunneling has been observed at room temperature in a Surface Tunnel Transistor (STT). The STT consists of a highly degenerate p+-drain, an n+-doped channel with an insulated gate, and an n+-source connected to the channel. To demonstrate application as a functional device, a bistable circuit consisting of only one STT and one load resistor was organized and its operation was confirmed. The obtained valley current in the NDR characteristics of the STT, however, is relatively large and limits the device performance. In order to clarify the origin of the valley current, we fabricated p+-n+ tunnel diodes in which growth interruption was done at the pn junction, and investigated the dependence of the NDR characteristics on both the impurity concentration at the regrown interface and the temperature. These measurements indicate that the valley current is mainly caused by the excess tunneling current through traps formed by the residual oxygen at the regrown interface.

  • European R & D Activities in Mobile Multimedia Communications and Expectations on Future Services

    Ralf SCHÄFER  

     
    INVITED PAPER

      Vol:
    E77-B No:9
      Page(s):
    1083-1088

    Mobile telecommunication is a rapidly growing market. Second generation systems such as GSM, DECT and ERMES, which are actually in an evolving status will be replaced by the third generation UMTS from the beginning of the next century on. While UMTS will allow data communication with up to 2Mbit/s, the fourth generation system MBS will provide up to 155Mbit/s. In several European R & D projects of the ESPRIT, DRIVE, COST and RACE programmes investigations concerning network planning, network operation, signalling, access techniques, security, terminal development and image and voice compression are carried out in order to create the scientific and technological bases for future UMTS and MBS. Some of these projects are described in more detail and an outlook toward future R & D activities is given. Finally some considerations are made concerning expectations of future services and questions concerning the development of wide band versus narrow band solutions are put.

  • Graphical Analysis for k-out-of-n: G Repairable System and Its Application

    Ikuo ARIZONO  Akihiro KANAGAWA  

     
    LETTER-Algorithms, Data Structures and Computational Complexity

      Vol:
    E77-A No:9
      Page(s):
    1560-1563

    Kumar and Billinton have presented a new technique for obtaining the steady-state probabilities from a flow graph based on Markov model. By examining the graph and choosing suitable input and output nodes, the steady-state probabilities can be obtained directly by using the flow graph. In this paper this graphical technique is applied for a k-out-of-n: G repairable system. Consequently a new derivation way of the formulae for the steady-state availability and MTBF is obtained.

  • Structure Recovery from Multiple Images by Directly Estimating the Intersections in 3-D Space

    Shinjiro KAWATO  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    966-972

    This paper presents a new approach to the recovery of 3-D structure from multiple pairs of images from different viewpoints. Searching for the corresponding points between images, which is common in stereopsis, is avoided. Extracted edges from input images are projected back into 3-D space, and their intersections are calculated directly. Many false intersections may appear, but if we have many pair images, true intersections are extracted by appropriate thresholding. Octree representation of the intersections enables this approach. We consider a way to treat adjacent edge piexels as a line segment rather than as individual points, which differs from previous works and leads to a new algorithm. Experimental results using both synthetic and actual images are also described.

  • Exhaustive Computation to Derive the Lower Bound for Sorting 13 Items

    Shusaku SAWATO  Takumi KASAI  Shigeki IWATA  

     
    PAPER-Algorithm and Computational Complexity

      Vol:
    E77-D No:9
      Page(s):
    1027-1031

    We have made an exhaustive computation to establish that 33 comparisons never sort 13 items. The computation was carried out within 10 days by a workstation. Since merge insertion sort [Ford, et al. A tournament problem, Amer. Math. Monthly, vol. 66, (1959)] uses 34 comparisons for sorting 13 items, our result guarantees the optimality of the sorting procedure to sort 13 items as far as the number of comparisons is concerned. The problem has been open for nearly three decades since Mark Wells discovered that 30 comparisons are required to sort 12 items in 1965.

  • Shape and Reflectance of a Polyhedron from Interreflections by Two-Image Photometric Stereo

    Jun YANG  Noboru OHNISHI  Noboru SUGIE  

     
    LETTER

      Vol:
    E77-D No:9
      Page(s):
    1017-1021

    In this paper, we extend two-image photometric stereo method to treat a concave polyhedron, and present an iterative algorithm to remove the influence of interreflections. By the method we can obtain the shape and reflectance of a concave polyhedron with perfectly diffuse (Lambertian) and unknown constant reflectance. Both simulation and experiment show the feasibility and accuracy of the method.

  • Assembly Plan Generation from an Assembly Illustration by Integrating the Information from Explanatory Words

    Shoujie HE  Norihiro ABE  Tadahiro KITAHASHI  

     
    PAPER-Foundations of Artificial Intelligence and Knowledge Processing

      Vol:
    E77-A No:9
      Page(s):
    1546-1559

    This paper presents an approach for assembly plan generation from an assembly illustration. Previously, we have already proposed an approach for the assembly plan related information acquisition from an assembly illustration, in which auxiliary lines were taken as clues. However, some ambiguity remains in dynamic information such as assembly operations and their execution order. We have verified through experiments that the ambiguity could be made clear by referring to the feedback information from the completed assemblage after the assembly operations shown in the current illustration. But in fact, in an assembly illustration there are not only the figures of mechanical parts and the auxiliary lines for visualizing their assembly relations, but explanatory words and explanatory lines as well. Explanatory words can basically be classified into two categories: instructions on assembly operations and mechanical part names. The former explicitly describes dynamic information such as the details of assembly operations. The latter also implies dynamic information such as the function of a mechanical part. Explanatory lines are usually drawn for making clear the explanatory relations. Naturally we consider that to integrate the information from explanatory words with that already obtained through the extraction of auxiliary lines will probably enable us to generate an unambiguous assembly plan from the currently observing illustration.

  • Some Two-Person Game is Complete for ACk Under Many-One NC1 Reducibility

    Shigeki IWATA  

     
    PAPER-Automata, Languages and Theory of Computing

      Vol:
    E77-D No:9
      Page(s):
    1022-1026

    ACk is the class of problems solvable by an alternating Turing machine in space O(log n) and alternation depth O(logk n) [S. A. Cook, A taxonomy of problems with fast parallel algorithms, Inform. Contr. vol. 64]. We consider a game played by two persons: each player alternately moves a marker along an edge of a given digraph, and the first palyer who cannot move loses the game. It is shown that the problem to determine whether the first player can win the game on a digraph with n nodes exactly after logk n moves is complete for ACk nuder NC1 reducibility.

  • A Subband Adaptive Filtering Algorithm with Adaptive Intersubband Tap-Assignment

    Akihiko SUGIYAMA  Akihiro HIRANO  

     
    PAPER-Adaptive Digital Filters

      Vol:
    E77-A No:9
      Page(s):
    1432-1438

    This paper proposes a new subband adaptive filtering algorithm for adaptive FIR filters. The number of taps for each subband filter is adaptively controlled based on a sum of the absolute coefficients or the coefficient power in conjunction with the subband signal power. Keeping the total number of taps constant, redundant taps are redistributed to subbands where the number of taps is insufficient. Simulation results with a white signal show that the number of taps in each subband approaches an optimum as each subband filter converges. For a colored signal, tap assignment by the new algorithm is as stable as for a white signal.

  • Improved Contextual Classifiers of Multispectral Image Data

    Takashi WATANABE  Hitoshi SUZUKI  Sumio TANBA  Ryuzo YOKOYAMA  

     
    PAPER-Image Processing

      Vol:
    E77-A No:9
      Page(s):
    1445-1450

    Contextual classification of multispectral image data in remote sensing is discussed and concretely two improved contextual classifiers are proposed. The first is the extended adaptive classifier which partitions an image successively into homogeneously distributed square regions and applies a collective classification decision to each region. The second is the accelerated probabilistic relaxation which updates a classification result fast by adopting a pixelwise stopping rule. The evaluation experiment with a pseudo LANDSAT multispectral image shows that the proposed methods give higher classification accuracies than the compound decision method known as a standard contextual classifier.

  • Stability Conditions of Terminated Two-Port Networks

    Yoshihiro MIWA  

     
    LETTER-Microwave and Millimeter Wave Technology

      Vol:
    E77-C No:9
      Page(s):
    1528-1531

    The stability of a terminated two-port network is investigated, and the stability conditions with only one inequality are obtained. Furthermore, the stability conditions with two inequalities, which are in the same form as those for the passive terminations known at the present time, are also obtained.

  • 2-D Variable FIR Filters Using 3-D Prototype Filters

    Toshiyuki YOSHIDA  Akinori NISHIHARA  Nobuo FUJII  

     
    LETTER-Parallel/Multidimensional Signal Processing

      Vol:
    E77-A No:9
      Page(s):
    1568-1572

    This paper discusses a new design method for 2-D variable FIR digital filters, which is an extension of our previous work for 1-D case. The method uses a 3-D prototype FIR filter whose cross-sections correspond to the desired characteristics of 2-D variable FIR filters. A 2-D variable-angle FIR fan filter is given as a design example.

  • A Method for Solving Configuration Problem in Scene Reconstruction Based on Coplanarity

    Seiichiro DAN  Toshiyasu NAKAO  Tadahiro KITAHASHI  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    958-965

    We can understand and recover a scene even from a picture or a line drawing. A number of methods have been developed for solving this problem. They have scarcely aimed to deal with scenes of multiple objects although they have ability to recognize three-dimensional shapes of every object. In this paper, challenging to solve this problem, we describe a method for deciding configurations of multiple objects. This method employs the assumption of coplanarity and the constraint of occlusion. The assumption of coplanarity generates the candidates of configurations of multiple objects and the constraint of occlusion prunes impossible configurations. By combining this method with a method of shape recovery for individual objects, we have implemented a system acquirig a three-dimensional information of scene including multiple objects from a monocular image.

  • A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp

    Min-Shiang HWANG  Wen-Guey TZENG  Wei-Pang YANG  

     
    PAPER-Information Security

      Vol:
    E77-D No:9
      Page(s):
    1042-1046

    Many methods, based on the concept of key-lock-pair have been proposed for access control in computer protection systems. However, the proposed methods still either lack of dynamic ability or need quite a lot of computation in performing requests of deleting users/files, inserting users/files, or updating access rights of users to files. In this paper we propose a two-key-lock-pair access control method that is based on the unique factorization theorem and a time stamp mechanism. Our method is dynamic and needs a minimum amount of computation in the sense that it only updates at most one key/lock for each access request, which has not been achieved before.

  • Reverse Distance Transformation and Skeletons Based upon the Euclidean Metric for n-Dimensional Digital Binary Pictures

    Toyofumi SAITO  Jun-ichiro TORIWAKI  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    1005-1016

    In this paper, we present new algorithms to calculate the reverse distance transformation and to extract the skeleton based upon the Euclidean metric for an arbitrary binary picture. The presented algorithms are applicable to an arbitrary picture in all of n-dimensional spaces (n2) and a digitized picture sampled with the different sampling interval in each coordinate axis. The reconstruction algorithm presented in this paper is resolved to serial one-dimensional operations and efficiently executed by general purpose computer. The memory requirement is very small including only one picture array and single one-dimensional work space array for n-dimensional pictures. We introduce two different definitions of skeletons, both of them allow us to reconstruct the original binary picture exactly, and present algorithms to extract those skeltons from the result of the squared Euclidean distance transformation.

  • A Method of 3D Object Reconstruction from a Series of Cross-Sectional Images

    Ee-Taek LEE  Young-Kyu CHOI  Kyu Ho PARK  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    996-1004

    This paper addresses a method for constructing surface representation of 3D structures from a sequence of cross-sectional images. Firstly, we propose cell-boundary representation, which is a generalization of PVP method proposed by Yun and Park, and develop an efficient surface construction algorithm from a cell-boundary. Cell-boundary consists of a set of boundary cells with their 1-voxel configurations, and can compactly describe binary volumetric data. Secondly, to produce external surface from the cell-boundary representation, we define 19 modeling primitives (MP) including volumetric, planar and linear groups. Surface polygons are created from those modeling primitives using a simple table look-up operation. Since a cell-boundary can be obtained using only topological information of neighboring voxels, there is no ambiguity in determining modeling primitives which may arise in PVP method. Since our algorithm has data locality and is very simple to implement, it is very appropriate for parallel processing.

  • Data Compression and Interpolation of Multi-View Image Set

    Toshiaki FUJII  Hiroshi HARASHIMA  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    987-995

    This paper is concerned with the data compression and interpolation of multi-view image set. In this paper, we propose a novel disparity compensation scheme based on geometric relationship. We first investigate the geometric relationship between a point in the object space and its projection onto view images. Then, we propose the disparity compensation scheme which utilize the geometric constraints between view images. This scheme is used to compress the multi-view image into the structure of the triangular patches and the texture data on the surface of patches. This scheme not only compresses the multi-view image but also synthesize the view images from any viewpoints in the viewing zone. Also, this scheme is fast and have compatibility with 2-D interframe coding. Finally, we report the experiment, where two sets multi-view image were used as original images and the amount of data was reduced to 1/19 and 1/20 with SNR 34 dB and 20 dB, respectively.

  • The Number of Permutations Realizable in Fault-Tolerant Multistage Interconnection Networks

    Hiroshi MASUYAMA  Tetsuo ICHIMORI  

     
    PAPER-Computer Networks

      Vol:
    E77-D No:9
      Page(s):
    1032-1041

    In this paper we estimate the number of permutations realizable in fault-tolerant multistage interconnection networks designed to tolerate faults on any switching element. The Parallel Omega network and the INDRA network are representative types of fault-tolerate multistage interconnection networks designed to tolerate a single fault. In order to evaluate the enhancement in the function of network by preparing the hardware redundancy for fault-tolerance, we estimate the number of permutations realizable in fault-tolerant networks. This result enables us to set up a standard to evaluate the hardware redundancy required to tolerate multifaults from the viewpoint of the enhancement of network function. This paper concludes that in the case where the number of inputs is up to 32 the increase ratio of the number of realizable permutations is no more than 1/0.73 even if the tolerance to multifaults is prepared instead of the tolerance to a single fault.

  • Fault Tolerant Non-regular Digital Signal Processing Based on Computation Tree Block Decomposition

    Mineo KANEKO  Hiroyuki MIYAUCHI  

     
    PAPER-Digital Signal Processing

      Vol:
    E77-A No:9
      Page(s):
    1535-1545

    In this paper, we present Branching Oriented System Equation based on-line error correction scheme for recursive digital signal processing. The target digital signal processing is linear and time-invariant, and the algorithm includes multiplications with constant coefficient, additions and delays. The difficulties of the algorithm-level fault tolerance for such algorithm without structural regularity include error distribution problem and right timing of error correction. To escape the error distribution problem, multiple fan-out nodes in an algorithm are specified as the nodes at which error corrections are performed. The Branching Oriented Graph and Branching Oriented System Equation are so introduced to formulate on-line correction schemes based on this strategy. The Branching Oriented Graph is treated as the collection of computation sub-blocks. Applying checksum code independently to each sub-block is our most trivial on-line error correction scheme, and it results in, with appropriate selection of error identification process, TMR in sub-block level. One of the advantages of our method is in the reduction of redundant operations performed by merging some computation sub-blocks. On the other hand, the schedulability of the system is an important issue for our method since our on-line error correction mechanism induces additional data dependencies. In this paper, the schedulability condition and some modifications on the scheme are also discussed.

  • Single-Mode Separation for Mode-Division Multiplexing by Holographic Filter

    Manabu YOSHIKAWA  Kazuyuki KAMEDA  

     
    LETTER-Opto-Electronics

      Vol:
    E77-C No:9
      Page(s):
    1526-1527

    Mode separation of a multiplex mode in a mode-division multiplexing system is studied. The clear, desired single-mode pattern, which is separated from the multiplex mode by using a holographic filter, is observed in the experiment.

29021-29040hit(30728hit)