The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] VA(3422hit)

3041-3060hit(3422hit)

  • Design and Evaluation of a 4-Valued Universal-Literal CAM for Cellular Logic Image Processing

    Takahiro HANYU  Manabu ARAKAKI  Michitaka KAMEYAMA  

     
    PAPER-Multiple-Valued Architectures

      Vol:
    E80-C No:7
      Page(s):
    948-955

    This paper presents a 4-valued content-addressable memory (CAM) for fully parallel template-matching operations in real-time cellular logic image processing with fixed templates. A universal literal is essential to perform a multiple-valued template-matching operation. It is decomposed of a pair of a threshold operation in a CAM cell and a logic-value conversion shared by CAM cells in the same column of a CAM cellular array, which makes a CAM cell function simple. Since a threshold operation together with a 4-valued storage element can be designed by using a single floating-gate MOS transistor, a high-density 4-valued universal-literal CAM with a single-transistor cell can be implemented by using a multi-layer interconnection technology. It is demonstrated that the performance of the proposed CAM is much superior to that of conventional CAMs under the same function.

  • Analysis of Connection Delay in Cellular Mobile Communication Systems Using Dynamic Channel Assignment

    Keisuke NAKANO  Hiroshi YOSHIOKA  Masakazu SENGOKU  Shoji SHINODA  

     
    PAPER

      Vol:
    E80-A No:7
      Page(s):
    1257-1262

    Dynamic Channel Assignment (DCA), which improves the efficiency of channel use in cellular mobile communication systems, requires finding an available channel for a new call after the call origination. This causes the delay which is defined as the time elapsing between call origination and completion of the channel search. For system planning, it is important to evaluate the delay characteristic of DCA because the delay corresponds to the waiting time of a call and influences service quality. It is, however, difficult to theoretically analyze the delay characteristics except its worst case behavior. The time delay of DCA has not been theoretically analyzed. The objective of this paper is analyzing the distribution and the mean value of the delay theoretically. The theoretical techniques in this paper are based on the techniques for analyzing the blocking rate performance of DCA.

  • Performance Evaluation of a Voice/Data Integrated Fast PRMA Protocol

    Jae-Shin JANG  Byung-Cheol SHIN  

     
    PAPER-Mobile Communication

      Vol:
    E80-B No:7
      Page(s):
    1074-1089

    In this work, the performance evaluation of a voice and data integrated fast PRMA has been done. In this newly proposed protocol, every data terminal has an infinite buffer and voice terminals can work independently of data terminals. Thus voice terminals have the higher priority over data terminals. We can, therefore, analyze voice and data subsystems separately. For voice analysis, we use a Markov analysis, and we use the EPA method for data analysis in order to create an analytic form. As performance measures, the voice packet dropping probability, the average voice and data delays, and the total throughput have been derived. It is shown how many voice and data terminals the fast PRMA protocol can accommodate in a frame under the constraints that the voice packet dropping probability should be less than 0.01, and average data packet delay should be less than 250 msec. We also discuss the stable region for this system. Numerical results show close agreement between analysis and computer simulation.

  • Deferred Locking with Buffer Validation on Demand for Client-Server Database Consistency: DL

    Hyeokmin KWON  Songchun MOON  

     
    PAPER-Databases

      Vol:
    E80-D No:7
      Page(s):
    705-716

    In client-server database management systems (DBMSs), inter-transaction caching is an effective technique for improving the performance. However, inter-transaction caching requires a cache consistency maintenance (CCM) protocol to ensure that cached copies at clients are kept mutually consistent. Such a protocol could be complex to implement and expensive to run, since several rounds of message exchange may be required. In this paper, we propose a new CCM scheme based on the primary-copy locking algorithm. In the proposed scheme, a number of lock requests and a data-shipping request are combined into a single message packet to reduce client-server interactions, which are known to be very critical to the performance of clientserver DBMSs. We examine its performance tradeoffs on the basis of a simulation model under a wide range of workloads. The performance results indicate that the proposed scheme improves the overall system throughput significantly over the caching two-phase locking and the optimistic two-phase locking scheme. Its higher performance mainly results from its lower communication overhead and lower degree of transaction blocking ratio.

  • An Image Scanning Method with Selective Activation of Tree Structure

    Junichi AKITA  Kunihiro ASADA  

     
    PAPER-Multi Processors

      Vol:
    E80-C No:7
      Page(s):
    956-961

    We propose a new scanning method for image signals using a tree structure of automata. The tree is scanned selectively along the signal path for realizing both lower power consumption and a kind of image compression by skipping nonactive elements. We designed the node automata along with photo-detectors of 3232 in a 7.2 mm7.2 mm chip using a 1.5µm CMOS technology. We demonstrate applications of the tree structure using its feature of selective activation; a moving picture compression using inter-frame difference, an adaptive resolution scan like human eyesight and a motion compensation as examples.

  • A Wavelet View for Unifying Boolean Discrete Functions and Neural Nets through Haar Transform

    Masatoshi SEKINE  

     
    PAPER-Neural Networks and Chips

      Vol:
    E80-C No:7
      Page(s):
    1003-1009

    Spectral transform methods have been widely studied for classification and analysis of logic functions. Spectral methods have also been used for logic synthesis, and by use of BDDs, practical-sized synthesis problems have been solved. Wavelet theory has recently attracted the attention of researchers in the signal processing field. The Haar function is used in both spectral methods and in signal processing to obtain spectral coefficients of logic functions of signals. In this paper spectral transform-based analysis of neural nets verifying signal processing and discrete function is presented. A neural net element is defined as a discrete function with multi-valued input signals and multi-valued or binary outputs. The multi-valued variable is realized as a variable (V, W) formed by a pair of a binary value and a multi-value pulse width. The multi-valued encoding is used with the multi-valued Haar function to give meanings to the wavelet coefficients from the view of Boolean algebra. A design example shows that these conceptually different concepts are closely related.

  • ECKF-SVD Method for Estimating a Single Complex Sinusoid and Its Parameters in White Noise

    Kiyoshi NISHIYAMA  

     
    PAPER-Digital Signal Processing

      Vol:
    E80-A No:7
      Page(s):
    1308-1317

    A new method is proposed for estimating a single complex sinusoid and its parameters (frequency and amplitude) from measurements corrupted by white noise. This method is called the ECKF-SVD method, which is derived by applying an extended complex Kalman filter (ECKF) to a nonlinear stochastic system whose state variables consist of the AR coefficient (a function of frequency) and a sample of the original signal. Proof of the stability is given in the case of a single sinusoid. Simulations demonstrate that the proposed ECKF-SVD method is effective for estimating a single complex sinusoid and its frequency under a low signal-to-noise ratio (SNR). In addition, the amplitude estimation by means of the ECKF-SVD method is also discussed.

  • A Prediction Method of Non-Stationary Time Series Data by Using a Modular Structured Neural Network

    Eiji WATANABE  Noboru NAKASAKO  Yasuo MITANI  

     
    PAPER

      Vol:
    E80-A No:6
      Page(s):
    971-976

    This paper proposes a prediction method for non-stationary time series data with time varying parameters. A modular structured type neural network is newly introduced for the purpose of grasping the changing property of time varying parameters. This modular structured neural network is constructed by the hierarchical combination of each neural network (NNT: Neural Network for Prediction of Time Series Data) and a neural network (NNW: Neural Network for Prediction of Weights). Next, we propose a reasonable method for determination of the length of the local stationary section by using the additive learning ability of neural networks. Finally, the validity and effectiveness of the proposed method are confirmed through simulation and actual experiments.

  • Current-Mode CMOS-Based Decoder with Redundantly Represented O Addend Method for Multiple-Radix Signed-Digit Number

    Toru TABATA  Fumio UENO  

     
    PAPER

      Vol:
    E80-A No:6
      Page(s):
    1002-1008

    We discuss a new decoder for the multiple-valued signed-digit number, using a current-mode CMOS transistor-oriented circuit structure. In this paper, a new decoding method with the selective summation of a redundantly represented addend "O = [-1 r]" is proposed, where r is the radix and the addend is applied to each digit with a negative value and any consecutively higher digit takes which has a value of O. A newly designed literal linear circuit is realized, which has a current-switch function that makes independently the short path when each digit has a value of O. Through the parallel connections of these current swiches, the same addend signal at the lower digit is transmitted in a higher speed, The decoder circuit is tested by using the general circuit simulation software SPICE and the circuit characteristics of the selective summation of a redundantly represented O addend and the output results of the SD decoding operation were simulated. We also evaluated the decoder circuit in terms of the processing speed and the circuit size.

  • False Drop Analysis of Set Retrieval with Signature Files

    Hiroyuki KITAGAWA  Yoshiharu ISHIKAWA  

     
    PAPER-Databases

      Vol:
    E80-D No:6
      Page(s):
    653-664

    Modern database systems have to support complex data objects, which appear in advanced data models such as object-oriented data models and nested relational data models. Set-valued objects are basic constructs to build complex structures in those models. Therefore, efficient processing of set-valued object retrieval (simply, set retrieval) is an important feature required of advanced database systems. Our previous work proposed a basic scheme to apply superimposed coded signature files to set retrieval and showed its potential advantages over the B-tree index based approach using a performance analysis model. Retrieval with signature files is always accompanied by mismatches called false drops, and proper control of the false drops is indispensable in the signature file design. This study intensively analyzes the false drops in set retrieval with signature files. First, schemes to use signature files are presented to process set retrieval involving "has-subset," "is-subset," "has-intersection," and "is-equal" predicates, and generic formulas estimating the false drops are derived. Then, three sets of concrete formulas are derived in three ways to estimate the false drops in the four types of set retrieval. Finally, their estimates are validated with computer simulations, and advantages and disadvantages of each set of the false drop estimation formulas are discussed. The analysis shows that proper choice of estimation formulas gives quite accurate estimates of the false drops in set retrieval with signature files.

  • Balanced State Feedback Controllers for Descrete Event Systems Described by the Golaszewski-Ramadge Model

    Shigemasa TAKAI  Toshimitsu USHIO  Shinzo KODAMA  

     
    LETTER-Concurrent Systems

      Vol:
    E80-A No:5
      Page(s):
    928-931

    We study state feedback control of discrete event systems described by the Golaszewski-Ramadge model. We derive a necessary and sufficient condition for the existence of a balanced state feedback controller under partial observations.

  • A State Estimation Method in Acoustic Environment Based on Fuzzy Observation Contaminated by Background Noise Utilization of Inverse Probability and Digital Filter

    Akira IKUTA  Mitsuo OHTA  Noboru NAKASAKO  

     
    PAPER

      Vol:
    E80-A No:5
      Page(s):
    825-832

    In the measurement of actual random phenomenon, the observed data often contain the fuzziness due to the existence of confidence limitation in measuring instruments, permissible error in experimental data, some practical simplification of evaluation procedure and a quantized error in digitized observation. In this study, by introducing the well-known fuzzy theory, a state estimation method based on the above fuzzy observations is theoretically proposed through an establishment of wide sense digital filter under the actual situation of existence of the background noise in close connection of the inverse problem. The validity and effectiveness of the proposed method are experimentally confirmed by applying it to the actual fuzzy data observed in an acoustic environment.

  • Some New Survivability Measures for Network Analysis and Design

    Soumyo D. MOITRA  Eiji OKI  Naoaki YAMANAKA  

     
    LETTER-Communication Networks and Services

      Vol:
    E80-B No:4
      Page(s):
    625-631

    New network survivability measures are developed and compared with conventional ones. The advantages of using multiple survivability measures, including the new ones, are discussed. The measures are illustrated and interpreted through several numerical examples. We also show how survivability can be included as a constraint in network optimization models.

  • Interval Finding and Its Application to Data Mining

    Takeshi FUKUDA  Yasuhiko MORIMOTO  Shinichi MORISHITA  Takeshi TOKUYAMA  

     
    PAPER

      Vol:
    E80-A No:4
      Page(s):
    620-626

    In this paper, we investigate inverse problems of the interval query problem in application to data mining. Let I be the set of all intervals on U = {1, 2, , n}. Consider an objective function f(I), conditional functions ui(I) on I, and define an optimization problem of finding the interval I maximizing f(I) subject to ui(I) > Ki for given real numbers Ki (i = 1, 2, , h). We propose efficient alogorithms to solve the above optimization problem if the objective function is either additive or quotient, and the conditional functions are additive, where a function f is additive if f(I) = ΣiIf^(i) extending a function f^ on U, and quotient if it is represented as a quotient of two additive functions. We use computational-geometric methods such as convex hull, range searching, and multidimensional divide-and-conquer.

  • Performance Analysis of Mobile Cellular Radio Systems with Two-Level Priority Reservation Handoff Procedure

    Qing-An ZENG  Kaiji MUKUMOTO  Akira FUKUDA  

     
    PAPER-Mobile Communication

      Vol:
    E80-B No:4
      Page(s):
    598-607

    In this paper, we propose a handoff scheme with two-level priority for the reservation of handoff request calls in mobile cellular radio systems. We assume two types of mobile subscribers with different distributions of moving speed, that is, users with low average moving speed (e.g., pedestrians) and high average moving speed (e.g., people in moving cars). A fixed number of channels in each cell are reserved exclusively for handoff request calls. Out of these number of channels, some are reserved exclusively for the high speed handoff request calls. The remaining channels are shared by both the originating and handoff request calls. In the proposed scheme, both kinds of handoff request calls make their own queues. The system is modeled by a three-dimensional Markov chain. We apply the Successive Over-Relaxation (SOR) method to obtain the equilibrium state probabilities. Blocking probabilities of calls, forced termination probabilities and average queue length of handoff calls of each type are evaluated. We can make the forced termination probabilities of handoff request calls smaller than the blocking probability of originating calls. Moreover, we can make the forced termination probability of high speed handoff request calls smaller than that of the low speed ones. Necessary queue size for the two kinds of handoff request calls are also estimated.

  • Adaptive Coding Rate and Process Gain Control with Channel Activation for Multi-Media DS/CDMA Systems

    Sadayuki ABETA  Seiichi SAMPEI  Norihiko MORINAGA  

     
    PAPER-Radio Communication

      Vol:
    E80-B No:4
      Page(s):
    581-588

    This paper proposes an adaptive coding rate and process gain control technique with channel activation function to realize a CDMA based radio subsystem for multi-media communication services that include two types of media, i.e., fixed size data such as the computer data and still image, and constant bit rate data such as voice and video. The proposed system achieves high throughput data transmission for the fixed size data by controlling the process gain and coding rate according to the variation of the channel. Moreover, to adopt the constant bit rate data, the proposed system also employs a channel activation technique. Computer simulation confirms that the proposed system is very effective for multi-media communication services.

  • Hierarchical Word-Line Architecture for Large Capacity DRAMs

    Tatsunori MUROTANI  Tadahiko SUGIBAYASHI  Masahide TAKADA  

     
    INVITED PAPER-Memory LSI

      Vol:
    E80-C No:4
      Page(s):
    550-556

    The number of DRAMs that have adopted hierarchical word-line architecture has increased as developed DRAM memory capacity has increased to more than 64 Mb. Use of the architecture enhances many kinds of DRAM performances, such as access time and fabrication process margin. However, the architecture does cause some problems. This paper describes some kinds of hierarchical word-line circuitries that have been proposed. It also describes a partial subarray activation scheme that is combined with hierarchical word-line and data-line architectures and discusses their potential and required specifications for future multi-giga bit DRAMs.

  • Distributed Oil Sensors by Eccentric Core Fibers

    Kazunori NAKAMURA  Naotaka UCHINO  Yoshikazu MATSUDA  Toshihiko YOSHINO  

     
    PAPER

      Vol:
    E80-B No:4
      Page(s):
    528-534

    We demonstrate highly quick response and long distance distributed oil sensors using a newly developed eccentric core fiber (ECF). This distributed oil sensor,based on an interaction between measurand oil and evanescent-wave from the ECF, has achieved as short as 4 minutes response time by using an improved coating material and a sensing length over 17 km at a signal wavelength of 1310 nm. The observed sensitivity characteristics coincide with the calculations of the evanescent power outside the cladding and it is shown that the sensitivity can be well estimated from the amount of the outer cladding component of the evanescent power.

  • Sound Field Reproduction by Controlling the Transfer Functions from the Source to Multiple Points in Close Proximity

    Kazutaka ABE  Futoshi ASANO  Yoiti SUZUKI  Toshio SONE  

     
    PAPER-Acoustics

      Vol:
    E80-A No:3
      Page(s):
    574-581

    In the conventional sound field reproduction system with control of the transfer functions from the source to both ears of a listener, a slight shift of the ears caused by movement of the listener inevitably results in sound localization being different from that expected. In this paper, a method for reproducing a sound field by controlling the transfer function from the source to multiple points (called the "method of multiple-points control" hereafter) is applied to a sound reproduction system with the aim of expanding the area which can be controlled. The system is controlled so that the transfer functions from the input of the system to the multiple points adjacent to the original receiving points have the same desired transfer function. By placing the control points at appropriate intervals, a "zone of equalization" is formed. Based on a computer simulation, the intervals between control points is discussed. The configuration of the loundspeakers for sound reproduction is also discussed.

  • Performance Evaluation of Multipriority Reservation Protocols for Single-Hop WDM Networks

    Hyoung Soo KIM  Byung-Cheol SHIN  

     
    PAPER-Signaling System and Communication Protocol

      Vol:
    E80-B No:3
      Page(s):
    456-465

    We propose two multipriority reservation protocols for wavelength division multiplexing (WDM) networks. The network architecture is a single-hop with control channel-based passive star topology. Each station is equipped with two pairs of laser and filter. One pair of laser and filter is always tuned to wavelength λ0 for control and the other pair of laser and filter can be tuned to any of data wavelengths, λ1, λ2, ..., λN. According to the access methods of the control channel, one protocol is called slotted ALOHA-based protocol and the other protocol is called TDM-based protocol. The two protocols have the following properties. First, each of them has its own priority control scheme which easily accommodates multipriority traffics. Second, they can be employed in the network with limited channels, i.e. the number of stations in the system is not restricted by the number of data channels. Third, they are conflict-free protocols. By using a reservation scheme and a distributed arbitration algorithm, channel collision and destination conflict can be avoided. For the performance point of view, the TDM-based protocol gives an optimal solution for the priority control. However it is less scalable than the slotted ALOHA-based protocol. The slotted ALOHA-based protocol also performs good priority control even though it is not an optimal solution. We analyze their performances using a discrete time Markov model and verify the results by simulation.

3041-3060hit(3422hit)