The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22735hit)

20941-20960hit(22735hit)

  • Data Bypassing Register File for Low Power Microprocessor

    Makoto IKEDA  Kunihiro ASADA  

     
    LETTER-Integrated Electronics

      Vol:
    E78-C No:10
      Page(s):
    1470-1472

    In this paper, we propose a register file with data bypassing function. This register file bypasses data using data bypassing units instead of functional units when actual operation in functional units such as ALU is unnecessary. Applying this method to a general purpose microprocessor with benchmark programs, we demonstrate 50% power consumption reduction in functional units. Though length of bus lines increases a little due to an additional hardware in register file, as buses are not driven when data is bypassed, power consumption in bus lines is also reduced by 40% compared with the conventional architecture.

  • Prediction of Chaotic Time Series with Noise

    Tohru IKEGUCHI  Kazuyuki AIHARA  

     
    PAPER

      Vol:
    E78-A No:10
      Page(s):
    1291-1298

    In this paper, we propose algorithm of deterministic nonlinear prediction, or a modified version of the method of analogues which was originally proposed by E.N. Lorenz (J. Atom. Sci., 26, 636-646, 1969), and apply it to the artificial time series data produced from nonlinear dynamical systems and further corrupted by superimposed observational noise. The prediction performance of the present method are investigated by calculating correlation coefficients, root mean square errors and signature errors and compared with the prediction algorithm of local linear approximation method. As a result, it is shown that the prediction performance of the proposed method are better than those of the local linear approximation especially in case that the amount of noise is large.

  • A Priori Estimation of Newton Type Homotopy Method for Calculating an Optimal Solution of Convex Optimization Problem

    Mitsunori MAKINO  

     
    PAPER

      Vol:
    E78-A No:10
      Page(s):
    1339-1344

    In this paper a priori estimation method is presented for calculating solution of convex optimization problems (COP) with some equality and/or inequality constraints by so-called Newton type homotopy method. The homotopy method is known as an efficient algorithm which can always calculate solution of nonlinear equations under a certain mild condition. Although, in general, it is difficult to estimate a priori computational complexity of calculating solution by the homotopy method. In the presented papers, a sufficient condition is considered for linear homotopy, under which an upper bound of the complexity can be estimated a priori. For the condition it is seen that Urabe type convergence theorem plays an important role. In this paper, by introducing the results, it is shown that under a certain condition a global minimum of COP can be always calculated, and that computational complexity of the calculation can be a priori estimated. Suitability of the estimation for analysing COP is also discussed.

  • Linear Systems Analysis of Blood Clotting System

    Hirohumi HIRAYAMA  Kiyono YOSHII  Hidetomo OJIMA  Norikazu KAWAI  Shintaro GOTOH  Yuzo FUKUYAMA  

     
    LETTER-Systems and Control

      Vol:
    E78-A No:10
      Page(s):
    1419-1431

    The controllability and the stability of the blood clotting system are examined with the linear system analysis. The dynamic behavior of the clotting system consisting of a cascade of ten proteolytic reactions of the clotting factors with multiple positive feed back and feed forward loops is represented by the rate equations in a system of non linear ordinary differential equations with 35 variables. The time courses of concentration change in every factor are revealed by numerical integration of the rate equations. Linearization of the rate equations based on the dynamic behavior of the chemical species relevant to the nonlinear terms leads to the linear systems analysis of the clotting system to clarify the essential features of blood coagulation. It follows from the analysis that the clotting system is uncontrollable regardless of changes in any system parameters and control input and that all the chemical species of the system are uncontrollable so that the sequential reactions in the cascade proceed irreversibly, once they are activated. More over by the analysis of the eigen values, the clotting reaction as a total system was shown to be unstable which was insensitive to changes in the system parameters. These characteristic natures of clotting system must be derived in the sequential cascade reaction pattern and the inherent multiple positive feed back and feed forward regulation.

  • Scattering by Two-Dimensional Rectangular Resistive Plane Gratings with Anisotropic Slab

    Masamitsu ASAI  Jiro YAMAKITA  Shinnosuke SAWA  Junya ISHII  

     
    PAPER

      Vol:
    E78-C No:10
      Page(s):
    1453-1459

    We present a 44 matrix-based analysis of scattering form a two-dimensional rectangular resistive plane gratings placed on an anisotropic dielectric slab. The solution procedure used is formulated by extending the 44 matrix approach. The fields are expanded in terms of two-dimensional Floquet modes. Total fields can be given as sum of primary and secondary fields whose expression are obtained through eigenvalue problem of coupled wave matrix. Unknown currents on resistive patches are determined by applying Galerkin's method to the resistive boundary condition on resistive grating. Results are compared with other numerical examples available in the literature for isotropic cases. Further, numerical calculation are performed in the case of gratings with polar-type anisotropic slab.

  • A Design of Communication Environment for Networked Multimedia Ecosystem

    Gen SUZUKI  Kazunori SHIMAMURA  

     
    INVITED PAPER

      Vol:
    E78-B No:10
      Page(s):
    1353-1357

    The concept of a new visual communication environment is proposed. The proposed system is a shared and interactive multi-user virtual space that consists of a CG-based virtual space structure and video-based objects. Human interface design issues are discussed from the view point of creating a new reality for enhanced communication.

  • Calculation of Harmonic Distortion of PLL FM Demodulator with Time Delay

    Yutaka TAKAHASHI  Hitoshi SAKAGAMI  

     
    LETTER-Communication Systems and Transmission Equipment

      Vol:
    E78-B No:9
      Page(s):
    1336-1338

    We present both numerical and approximate calculations to estimate the total harmonic distortion of demodulated signal from the PLL which has an excess phase shift or some time delay in the loop. Values by the two calculation methods are in agreement with results of the appropriate experiment.

  • Identification of a Class of Time-Varying Nonlinear System Based on the Wiener Model with Application to Automotive Engineering

    Jonathon C. RALSTON  Abdelhak M. ZOUBIR  Boualem BOASHASH  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1192-1200

    We consider the identification of a class of systems which are both time-varying and nonlinear. Time-varying nonlinear systems are often encountered in practice, but tend to be avoided due to the difficulties that arise in modelling and estimation. We study a particular time-varying polynomial model, which is a member of the class of time-varying Wiener models. The model can characterise both time-variation and nonlinearity in a straightforward manner, without requiring an excessively large number of coefficients. We formulate a procedure to find least-squares estimates of the model coefficients. An advantage of the approach is that systems with rapidly changing dynamics can be characterised. In addition, we do not require that the input is stationary or Gaussian. The approach is validated with an application to an automobile modelling problem, where a time-varying nonlinear model is seen to more accurately characterise the system than a time-invariant nonlinear one.

  • Uniquely Decodable Code for Three-User Binary Adder Channel

    Jian-Jun SHI  Yoichiro WATANABE  

     
    LETTER

      Vol:
    E78-A No:9
      Page(s):
    1206-1208

    A uniquely decodable code (C1, C2, C3) is investigated for the three-user binary adder channel. The uniquely decodable code is constructed as follows: If C1 is an (n, k) linear code with a generator matrix, C2 is a coset of C1 and C3 is a set of all coset leaders, then the code (C1, C2, C3) is uniquely decodable and its total rate is equal to 1k/n, n2k. This code is easily decodable.

  • Power Heterojunction FETs for Low-Voltage Digital Cellular Applications

    Keiko INOSAKO  Naotaka IWATA  Masaaki KUZUHARA  

     
    PAPER

      Vol:
    E78-C No:9
      Page(s):
    1241-1245

    This paper describes 950 GHz power performance of double-doped AlGaAs/InGaAs/AlGaAs heterojunction field-effect transistors (HJFET) operated at a drain bias voltage ranging from 2.5 to 3.5 V. The developed 1.0 µm gatelength HJFET exhibited a maximum drain current (Imax) of 500 mA/mm, a transconductance (gm) of 300 mS/mm, and a gate-to-drain breakdown voltage of 11 V. Operated at 3.0 V, a 17.5 mm gate periphery HJFET showed 1.4 W Pout and -50.3 dBc adjacent channel leakage power at a 50 kHz off-carrier frequency from 950 MHz with 50% PAE. Harmonic balance simulations revealed that the flat gm characteristics of the HJFET with respect to gate bias voltage are effective to suppress intermodulation distortion under large signal operation. The developed HJFET has great potential for small-sized digital cellular power applications operated at a low DC supply voltage.

  • A Universal Data-Base for Data Compression

    Jun MURAMATSU  Fumio KANAYA  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1057-1062

    A data-base for data compression is universal if in its construction no prior knowledge of the source distribution is assumed and is optimal if, when we encode the reference index of the data-base, its encoding rate achieves the optimal encoding rate for any given source: in the noiseless case the entropy rate and in the semifaithful case the rate-distortion function of the source. In the present paper, we construct a universal data-base for all stationary ergodic sources, and prove the optimality of the thus constructed data-base for two typical methods of referring to the data-base: one is a block-shift type reference and the other is a single-shift type reference.

  • An Improved Union Bound on Block Error Probability for Closest Coset Decoding

    Kenichi TOMITA  Toyoo TAKATA  Tadao KASAMI  Shu LIN  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1077-1085

    This paper is concerned with the evaluation of the block error probability Pic of a block modulation code for closest coset decoding over an AWGN channel. In most cases, the conventional union bound on Pic for closest coset decoding is loose not only at low signal-to-noise ratios but at relatively high signal-to-noise ratios. In this paper, we introduce a new upper bound on the probability of union of events by using the graph theory and we derive an improved upper bound on Pic for some block modulation codes using closest coset decoding over an AWGN channel. We show that the new bound is better than the conventional union bound especially at relatively high signal-to-noise ratios.

  • A Class of Error Locating Codes--SECSe/bEL Codes--

    Masato KITAKAMI  Eiji FUJIWARA  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1086-1091

    This paper proposes a new class of error locating codes which corrects random single-bit errors and indicates a location of an erroneous b-bit byte which includes e-bit errors, where 2 e b, called SECSe/bEL codes. This type of codes is very suitable for an application to memory systems constructed from byte-organized memory chips because this corrects random single-bit errors induced by soft-errors and also indicates the position of the faulty memory chips. This paper also gives a construction method of the proposed codes using tensor product of the two codes, i.e., the single b-bit byte error correcting codes and the single-bit error correcting and e-bit error detecting codes. This clarifies lower bounds and error control capabilities of the proposed codes.

  • A Proposal of Multiple Optical Wideband Frequency Modulation System and Its Phase Noise Insensitivity

    Toshiaki KURI  Katsutoshi TSUKAMOTO  Norihiko MORINAGA  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1136-1141

    This paper proposes a multiple optical wideband frequency modulation system and clarifies its phase noise insensitivity. In this system, an optical carrier is phase-modulated by a conventional FM signal to generate many sidebands in optical frequency band. The n-th order sideband component yields also FM signal with frequency deviation of n times the one of original FM signal. Therefore, by selecting the high order optical sideband, the wideband optical FM signal can be obtained. Moreover, if some sidebands are simultaneously extracted and multiplied at the receiver, a wideband FM signal with larger frequency deviation and no laser phase noise can be obtained, and FM threshold extension can be realized.

  • A New Approach to Constructing a Provably Secure Variant of Schnorr's Identification Scheme

    Satoshi HADA  Hatsukazu TANAKA  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1154-1159

    Schnorr's identification scheme is the most efficient and simplest scheme based on the discrete logarithm problem. Unfortunately, Schnorr's scheme is not provably secure, i.e., the security has not been proven to be reducible to well defined intractable problems. Two works have already succeeded to construct provably secure variants of Schnorr's scheme. They have been constructed with a common approach, i.e., by modifying the formula to compute the public key so that each public key has multiple secret keys. These multiple secret keys seem to be essential for their provable security, but also give rise to a penalty in their efficiency. In this paper, we describe a new approach to constructing a provably secure variant, where we never modify the formula, and show that with our approach, we can construct a new efficient provably secure scheme.

  • The Impact of Crosstalk and Phase Noise in Multichannel Coherent Optical ASK Systems

    M. Okan TANRIKULU  Ozan K. TONGUZ  

     
    PAPER-Optical Communication

      Vol:
    E78-B No:9
      Page(s):
    1278-1286

    This paper investigates the effect of crosstalk in multichannel coherent optical ASK systems. A closed-form signal-to-noise ratio (SNR) expression as a function of number of channels, channel separation, laser phase noise, intermediate frequency (IF) filter bandwidth expansion factor (α), system bit rate (Rb=1/T), and additive shot noise is presented. When the desired channel is between two channels in the electrical domain, the minimum permissible electrical domain channel spacing for a 1dB sensitivity penalty due to crosstalk is found to be 4.85Rb when α is optimum; and 8Rb when α=5 for νT=0.30 at BER=10-9. A fairly good agreement is found between the results of this work and those of a previous study.

  • The Range of Passband QAM-Based ADSLs in NTT's Local Networks

    Seiichi YAMANO  

     
    PAPER->Communication Cable and Wave Guide

      Vol:
    E78-B No:9
      Page(s):
    1301-1321

    The use of existing metallic local line facilities is being studied for providing "video on demand (VOD)" services to residential subscribers across asymmetric digital subscriber lines (ADSL). ADSL carries a high-rate channel in the downstream direction from a central office (CO) to the subscriber, and a low-rate channel in both directions on an existing 2-wire pair. Audio and video signals are compressed by the moving picture experts group's standardized algorithms (MPEG 1 and MPEG 2), and delivered to the subscriber in the high-rate channel. Control (demand and response) signals are transceived in the low-rate channel. This paper presents the line length coverage of ADSL systems given the environment of NTT's local networks. The bit rates in the downstream and upstream directions are assumed to be 1.6-9.2Mbit/s and 24kbit/s, respectively. Two types of ADSL systems are considered: transceiving ADSL signals using the plain old telephone service (POTS) line or the basic rate access (BRA; 320 kbaud ping-pong transmission system) line on the same 2-wire pair. 16-QAM, 32-QAM and 64-QAM are compared as transmission schemes. Intra-system crosstalk interference (interference between identical transmission systems) and inter-system crosstalk interference (interference between different transmission systems) with the existing digital subscriber lines (DSL) are estimated. It is shown that the inter-system crosstalk interference with BRA is most stringent, and ADSL with 16-QAM yields the best performance in NTT's local networks. This paper concludes that realizing ADSL with 16-QAM can achieve channel capacities of up to 9.2Mbit/s for fiber-in-the-feeder (FITF) access systems, but the possibility of applying ADSL to direct access systems is remote except for a restricted short haul use. Some comparisons regarding American local networks are also described.

  • Reliability Functions for Concatenated Codes Employing Modular Codes with Maximum Likelihood Decoding

    Tomohiko UYEMATSU  Junya KAGA  Eiji OKAMOTO  

     
    PAPER

      Vol:
    E78-A No:9
      Page(s):
    1160-1169

    This paper investigates the error correcting capabilities of concatenated codes employing algebraic geometry codes as outer codes and time-varying randomly selected inner codes, used on discrete memoryless channels with maximum likelihood decoding. It is proved that Gallager's random coding error exponent can be obtained for all rates by such codes. Further, it is clarified that the error exponent arbitrarily close to Gallager's can be obtained for almost all random selections of inner codes with a properly chosen code length, provided that the length of the outer code is sufficiently large. For a class of regular channels, the result is also valid for linear concatenated codes, and Gallager's expurgated error exponent can be asymptotically obtained for all rates.

  • Broadcasting in Hypercubes with Randomly Distributed Byzantine Faults

    Feng BAO  Yoshihide IGARASHI  Keiko KATANO  

     
    PAPER-Reliability and Fault Analysis

      Vol:
    E78-A No:9
      Page(s):
    1239-1246

    We study all-to-all broadcasting in hypercubes with randomly distributed Byzantine faults. We construct an efficient broadcasting scheme BC1-n-cube running on the n-dimensional hypercube (n-cube for short) in 2n rounds, where for communication by each node of the n-cube, only one of its links is used in each round. The scheme BC1-n-cube can tolerate (n-1)/2 Byzantine faults of nodes and/or links in the worst case. If there are exactly f Byzantine faulty nodes randomly distributed in the n-cabe, BC1-n-cube succeeds with a probability higher than 1(64nf/2n) n/2. In other words, if 1/(64nk) of all the nodes(i.e., 2n/(64nk) nodes) fail in Byzantine manner randomly in the n-cube, then the scheme succeeds with a probability higher than 1kn/2. We also consider the case where all nodes are faultless but links may fail randomly in the n-cube. Broadcasting by BC1-n-cube is successful with a probability hig her than 1kn/2 provided that not more than 1/(64(n1)k) of all the links in the n-cube fail in Byzantine manner randomly. For the case where only links may fail, we give another broadcasting scheme BC2-n-cube which runs in 2n2 rounds. Broadcasting by BC2-n-cube is successful with a high probability if the number of Byzantine faulty links randomly distributed in the n-cube is not more than a constant fraction of the total number of links. That is, it succeeds with a probability higher than 1nkn/2 if 1/(48k) of all the links in the n-cube fail randomly in Byzantine manner.

  • Process and Device Technologies for High Speed Self-Aligned Bipolar Transistors

    Tohru NAKAMURA  Takeo SHIBA  Takahiro ONAI  Takashi UCHINO  Yukihiro KIYOTA  Katsuyoshi WASHIO  Noriyuki HOMMA  

     
    INVITED PAPER

      Vol:
    E78-C No:9
      Page(s):
    1154-1164

    Recent high-speed bipolar technologies based on SICOS (Sidewall Base Contact Structure) transistors are reviewed. Bipolar device structures that include polysilicon are key technologies for improving circuit characteristics. As the characteristics of the upward operated SICOS transistors are close to those of downward transistors, they can easily be applied in memory cells which have near-perfect soft-error-immunity. Newly developed process technologies for making shallow base and emitter junctions to improve circuit performance are also reviewed. Finally, complementary bipolar technology for low-power and high-speed circuits using pnp transistors, and a quasi-drift base transistor structure suitable for below 0.1 µm emitters are discussed.

20941-20960hit(22735hit)