Atsushi NOYA Mayumi B. TAKEYAMA
A high temperature performance of a W2N compound barrier in the model electrode configuration of W/W2N/poly-Si was examined. The stacked electrode was fairly stable upon annealing at 850 for 1 h. In this electrode configuration, the decomposition and outdiffusion of nitrogen, which were observed in the electrode with a WNx barrier incorporating nitrogen atoms at the interstitial sites in the bcc W lattice, were completely suppressed. We interpreted that the obtained excellent high temperature performance was attributed to the strong chemical interaction forming chemical bonds between nitrogen and W atoms in the W2N compound barrier.
Jaemin KIM Moongoo KANG Seongwon CHO
This article describes a new method for converting an arbitrary topology mesh into one having subdivision connectivity. First, a base mesh is produced by applying a sequence of edge collapse operations to the original mesh with irregular connectivity. Then, the base mesh is iteratively subdivided. Each subdivided mesh is optimized to reduce its distance from the original mesh and to improve its global smoothness and compactness. A set of corresponding point pairs, which is required to compute the distance from the original mesh to the subdivided mesh, is determined by combining the initial parameterization and the multi-resolution projection. Experimental results show that the proposed method yields good performance in terms of global smoothness, small distortion, and good compactness, compared with conventional methods.
Jimpei TABATA Kouichi HIRANAKA Tohru SAITOH Takeshi NAGASHIMA Masanori HANGYO
The DC resistivities of silicon germanium thin films on Si substrates by a non-contact and non-destructive technique using terahertz time domain spectroscopy (THz-TDS) agree with the values obtained by the four-point probe measurement. In the present experiment, the mobility has not been precisely determined owing to the limitation of the frequency range in our equipment (from 0.1 to 1.5 THz). However, when the mobility becomes large enough, this method will be highly useful in evaluating semiconductor thin films, since the method gives the same data as those from Hall measurement without sample processing or electrode contact to sample.
Shin-ichiro MORI Tomoaki TSUMURA Masahiro GOSHIMA Yasuhiko NAKASHIMA Hiroshi NAKASHIMA Shinji TOMITA
This paper describes the architecture of ReVolver/C40 a scalable parallel machine for volume rendering and its prototype implementation. The most important feature of ReVolver/C40 is view-independent real time rendering of translucent 3D object by using perspective projection. In order to realize this feature, the authors propose a parallel volume memory architecture based on the principal axis oriented sampling method and parallel treble volume memory. This paper also discusses the implementation issues of ReVolver/C40 where various kinds of parallelism extracted to achieve high-perfromance rendering are explained. The prototype systems had been developed and their performance evaluation results are explained. As the results of the evaluation of the prototype systems, ReVolver/C40 with 32 parallel volume memory is estimated to achieve more than 10 frame per second for 2563 volume data on 2562 screen by using perspective projection. The authors also review the development of ReVolver/C40 from several view points.
Heng-Iang HSU Wen-Whei CHANG Xiaobei LIU Soo Ngee KOH
An approach to minimum mean-squared error (MMSE) decoding for vector quantization over channels with memory is presented. The decoder is based on the Gilbert channel model that allows the exploitation of both intra- and inter-block correlation of bit error sequences. We also develop a recursive algorithm for computing the a posteriori probability of a transmitted index sequence, and illustrate its performance in quantization of Gauss-Markov sources under noisy channel conditions.
Yasunori ISHIHARA Kengo MORI Toru FUJIWARA
Detecting the possibility of inference attacks is necessary in order to keep a database secure. Inference attacks mean that a user tries to infer the result of an unauthorized queries to the user. For method schemas, which are a formal model of object-oriented databases, it is known that the security problem against inference attacks is decidable in polynomial time in the size of a given database instance. However, when the database instance or authorization has slightly been updated, it is not desirable to check the entire database again for efficiency. In this paper, we propose several sufficient conditions for update operations to preserve the security. Furthermore, we show that some of the proposed sufficient conditions can be decided much more efficiently than the entire security check. Thus, the sufficient conditions are useful for incremental security checking.
Tomoyuki OHTA Munehiko FUJIMOTO Shinji INOUE Yoshiaki KAKUDA
Recently, in wired networks, a hierarchical structure has been introduced to improve management and routing. In ad hoc networks, we introduce a hierarchical structure to achieve the same goal. However, it is difficult to introduce the hierarchical structure because all mobile hosts are always moving around the network. So, we proposed the clustering scheme to construct the hierarchical structure before. In this paper, we propose a new hierarchical routing protocol called Hi-TORA based on the clustering scheme. And we show the experimental evaluation of Hi-TORA with respect to the number of control packets, accuracy of packet delivery and hop counts in comparison with TORA.
Byeong-Sook BAE Gi-Hong IM Yoon-Ha JEONG
In this paper, a simple adaptive notch filter (ANF) scheme for reducing RFI over CAP/QAM-based VDSL systems is proposed. To alleviate the spectral null caused by notch filtering, a null reshaping scheme is introduced between the normal ANF and the decision feedback equalizer (DFE). The proposed filter scheme can control the width and depth of the null. The shallow and narrow null obtained by null reshaping reduces the loss of signal components and consequently improves the mean square error (MSE) at the output of the equalizer. The proposed null reshaping scheme also enables the infinite impulse response (IIR) type constrained ANF to have a smaller pole contraction factor α. This results in a fast convergence property in RFI frequency estimation with a recursive prediction error (RPE) algorithm. The performance variations of the proposed null reshaping are investigated with varying filter parameters. Compared to the conventional ANF, simulation results show that, at the expense of small system complexity, the proposed structure yields a 2-3 dB MSE gain and a fast convergence property for RFI estimation.
Hans L. HARTNAGEL Manuel RODRIGUEZ-GIRONES
As new applications of THz waves emerge, new active and passive components need to be developed. The efficiency of wave guiding systems can be significantly increased with the use of MEMS approaches as well as with the development of new planar antenna concepts with high bunching properties. Generation of sufficient THz power relies on new active devices like Heterostructure Barrier Varactors and cascaded quantum structures, but also in the optimisation of new generation concepts. One of these is photomixing in non-linear materials with very short carrier lifetimes, like low-temperature-grown GaAs.
Hideo TAKEUCHI Yoshitsugu YAMAMOTO Ryo HATTORI Takahide ISHIKAWA Masaaki NAKAYAMA
We propose an analysis method for Franz-Keldysh (FK) oscillations appearing in photoreflectance (PR) spectra of heterojunction device structures, which enables precise and simultaneous evaluation of the built-in electric field strength and band-gap energy. Samples for PR measurements were n+-GaAs/n-Al0.3 Ga0.7 As/i-GaAs heterostructures with different Al0.3Ga0.7As-layer thickness. We have found that the phase of the FK oscillations originating from the i-GaAs buffer layer depends on the Al0.3 Ga0.7 As-layer thickness. We have derived a calculation model for FK oscillations that includes the interference of probe light. From the comparison of the calculated spectra with the measured spectra, we conclude that mixing of the real and imaginary parts of a modulated dielectric function, which is caused by the probe-light interference, gives rise to the phase shift of the FK oscillations. Our FK-oscillation analysis method reduces ambiguity in the estimation of band-gap energy that is considerable in a conventional analysis.
Yoshifumi KAWAKAMI Naohiro KUZE Jin-Ping AO Yasuo OHNO
DC and RF performances of AlGaN/GaN HEMTs are simulated using a two-dimensional device simulator with the material parameters of GaN and AlGaN. The cut-off frequency is estimated as 205 GHz at the gate length of 0.05 µm and the drain breakdown voltage at this gate length is over 10 V. The values are satisfactory for millimeter wavelength power applications. The use of thin AlGaN layers has key importance to alleviate gate parasitic capacitance effects at this gate length.
Mi-Jeong KIM Kyung-Geun LEE Hyoung-Kyu SONG
Recently, there has been increasing interest in providing high quality and efficient broadband services over wireless and mobile links. Space-time code is designed to exploit multiple-input multiple-output antenna systems and by doing so an enormous increase in the capacity of wireless systems can be achieved. In this letter, a synchronization technique is proposed to improve the performance of multiple-input multiple-output system. The interpolation method is employed to estimate the coarse and fine frequency offset at the same time without additional complexity.
In this letter, a new output feedback tracking control using a fuzzy disturbance observer (FDO) is proposed and its application to control of a nonlinear system in the presence of the internal parameter perturbation and external disturbance is presented. An FDO using a filtered signal is developed and the high gain observer (HGO) is employed to implement the output feedback tracking control. It is shown in a rigorous manner that all the errors involved can be kept arbitrarily small. Finally, the effectiveness and the feasibility of the suggested method is demonstrated by computer simulation.
This paper presents a novel data placement and retrieval scheme for video-on-demand systems. In particular, a zone-based data placement scheme is employed to reduce the average seek time of the disk array storage system and thus increase the disk access bandwidth to allow the video server provide more services of video programs concurrently. Furthermore, due to the inherent nature of video access, a popular program always requires more accesses and therefore occupies more disk I/O bandwidth as request for serving such program increases. A new retrieval strategy is proposed to maintain a single copy of each video program disregarding the popularity of the video programs, and to achieve maximum I/O throughput of the video server.
Sathit INTAJAG Kitti PAITHOONWATANAKIJ
Edge detection has been an essential step in image processing, and there has been much work undertaken to date. This paper inspects a fuzzy mathematical morphology in order to reach a higher-level of edge-image processing. The proposed scheme uses a fuzzy morphological gradient to detect object boundaries, when the boundaries are roughly defined as a curve or a surface separating homogeneous regions. The automatic edge detection algorithm consists of two major steps. First, a new version of anisotropic diffusion is proposed for edge detection and image restoration. All improvements of the new version use fuzzy mathematical morphology to preserve the edge accuracy and to restore the images to homogeneity. Second, the fuzzy morphological gradient operation detects the step edges between the homogeneous regions as object boundaries. This operation uses geometrical characteristics contained in the structuring element in order to extract the edge features in the set of edgeness, a set consisting of the quality values of the edge pixels. This set is prepared with fuzzy logic for decision and selection of authentic edge pixels. For experimental results, the proposed method has been tested successfully with both synthetic and real pictures.
Tomohiko UYEMATSU Shigeaki KUZUOKA
This paper proposes the conditional LZ complexity and analyzes its property. Especially, we show an inequality corresponding to Ziv's inequality concerning a distinct parsing of a pair of sequences. Further, as a byproduct of the result, we show a simple proof of the asymptotical optimality of Ziv's universal source coding algorithm with side information.
Toshio FUKUTA Yuuichi HAMASUNA Ichi TAKUMI Masayasu HATA Takahiro NAKANISHI
Given the importance of the traffic on modern communication networks, advanced error correction methods are needed to overcome the changes expected in channel quality. Conventional countermeasures that use high dimensionality parity codes often fail to provide sufficient error correction capability. We propose a parity code with high dimensionality that is iteratively decoded. It provides better error correcting capability than conventional decoding methods. The proposal uses the steepest descent method to increase code bit reliability and the coherency between parities and code bits gradually. Furthermore, the quantization of the decoding algorithm is discussed. It is found that decoding with quantization can keep the error correcting capability high.
Hans VANDIERENDONCK Koen De BOSSCHERE
Embedded processors are used in numerous devices executing dedicated applications. This setting makes it worthwhile to optimize the processor to the application it executes, in order to increase its power-efficiency. This paper proposes to enhance direct mapped data caches with automatically tuned randomized set index functions to achieve that goal. We show how randomization functions can be automatically generated and compare them to traditional set-associative caches in terms of performance and energy consumption. A 16 kB randomized direct mapped cache consumes 22% less energy than a 2-way set-associative cache, while it is less than 3% slower. When the randomization function is made configurable (i.e., it can be adapted to the program), the additional reduction of conflicts outweighs the added complexity of the hardware, provided there is a sufficient amount of conflict misses.
Masayuki GOTO Toshiyasu MATSUSHIMA Shigeichi HIRASAWA
Nishiara and Morita defined an i.i.d. word-valued source which is defined as a pair of an i.i.d. source with a countable alphabet and a function which transforms each symbol into a word over finite alphabet. They showed the asymptotic equipartition property (AEP) of the i.i.d. word-valued source and discussed the relation with source coding algorithm based on a string parsing approach. However, their model is restricted in the i.i.d. case and any universal code for a class of word-valued sources isn't discussed. In this paper, we generalize the i.i.d. word-valued source to the ergodic word-valued source which is defined by an ergodic source with a countable alphabet and a function from each symbol to a word. We show existence of entropy rate of the ergodic word-valued source and its formula. Moreover, we show the recurrence time theorem for the ergodic word-valued source with a finite alphabet. This result clarifies that Ziv-Lempel code (ZL77 code) is universal for the ergodic word-valued source.
Huiqin JIANG Takashi YAHAGI Jianming LU
Automatic image inspector inspects the quality of printed circuit boards using image-processing technology. In this study, we change an automatic inspection problem into a problem for detecting the signal singularities. Based on the wavelet theory that the wavelet transform can focus on localized signal structures with a zooming procedure, a novel singularity detection and measurement algorithm is proposed. Singularity positions are detected with the local wavelet transform modulus maximum (WTMM) line, and the Lipschitz exponent is estimated at each singularity from the decay of the wavelet transform amplitude along the WTMM line. According to the theoretical analysis and computer simulation results, the proposed algorithm is shown to be successful for solving the automatic inspection problem and calculating the Lipschitz exponents of signals. These Lipschitz exponents successfully characterize singular behavior of signals at singularities.