The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] channel(1697hit)

1641-1660hit(1697hit)

  • Blind Equalization and Blind Sequence Estimation

    Yoichi SATO  

     
    INVITED PAPER

      Vol:
    E77-B No:5
      Page(s):
    545-556

    The joint estimation of two unknowns, i.e. system and input sequence, is overviewed in two methodologies of equalization and identification. Statistical approaches such as optimizing the ensamble average of the cost function at the equalizer output have been widely researched. One is based on the principle of distribution matching that total system must be transparent when the equalizer output has the same distribution as the transmitted sequence. Several generalizations for the cost function to measure mis-matching between distributions have been proposed. The other approach applies the higher order statistics like polyspectrum or cumulant, which possesses the entire information of the system. For example, the total response can be evaluated by the polyspectrum measured at equalizer output, and by zero-forcing both side of the response tail the time dependency in the equalizer output can be eliminated. This is based on the second principle that IID simultaneously at input and at output requires a tranparent system. The recent progress of digital mobile communication gives an incentive to a new approach in the Viterbi algorithm. The Viterbi algorithm coupled with the blind channel identification can be established under a finite alphabet of the transmitted symbols. In the blind algorithm, length of the candidate sequence, which decides the number of trellis states, should be defined as long enough to estimate the current channel response. The channel impairments in mobile communication, null spectrum and rapid time-variance, are solved by fast estimation techniques, for example by Kalman filters or by direct solving the short time least squared error equations. The question of what algorithm has the fastest tracking ability is discussed from algebraic view points.

  • Blind Interference Cancelling Equalizer for Mobile Radio Communications

    Kazuhiko FUKAWA  Hiroshi SUZUKI  

     
    PAPER

      Vol:
    E77-B No:5
      Page(s):
    580-588

    This paper proposes a new adaptive Interference Cancelling Equalizer (ICE) with a blind algorithm. From a received signal, ICE not only eliminates inter-symbol interference, but also cancels co-channel interference. Blind ICE can operate well even if training signals for the interference are unknown. First, training signal conditions for applying blind ICE are considered. Next, a theoretical derivation for blind ICE is developed in detail by applying the maximum likelihood estimation theory. It is shown that RLS-MLSE with diversity, which is derived for mobile radio equalizers, is also effective for blind ICE. Computer simulations demonstrate the 40kb/s QDPSK transmission performance of Blind ICE as a blind canceller with two branch diversity reception under Rayleigh fading in a single interference environment. The simulations assume synchronous training; the canceller is trained for the desired signal but not for the interference signals. Blind ICE can be successfully achieved at more than -10dB CIR values when average Eb/N0 is 15dB and a maximum Doppler frequency is 40Hz.

  • Adaptive Receiver Consisting of MLSE and Sector-Antenna Diversity for Mobile Radio Communications

    Hidekazu MURATA  Susumu YOSHIDA  Tsutomu TAKEUCHI  

     
    PAPER

      Vol:
    E77-B No:5
      Page(s):
    573-579

    A receiving system suitable for multipath fading channels with co-channel interference is described. This system is equipped with both an M-sectored directional antenna and an adaptive equalizer to mitigate the influence due to multipath propagation and co-channel interference. By using directional antennas, this receiving system can separate desirable signals from undesirable signals, such as multipath signals with longer delay time and co-channel interference. It accepts multipath signals which can be equalized by maximum likelihood sequence estimation, and rejects both multipath signals with longer delay time and co-channel interference. Based on computer simulation results, the performance of the proposed receiving system is analyzed assuming simple propagation models with Rayleigh-distributed multipath signals and co-channel interference.

  • A Proposal of New Multiple-Valued Mask-ROM Design

    Yasushi KUBOTA  Shinji TOYOYAMA  Yoji KANIE  Shuhei TSUCHIMOTO  

     
    PAPER-Integrated Electronics

      Vol:
    E77-C No:4
      Page(s):
    601-607

    A new multiple-valued mask-ROM cell and a technique suitable for data detection are proposed. The information is programmed in each of the memory cells as both the threshold voltage and the channel length of the memory cell transistor, and the stored data are detected by selecting the bias condition of both the word-line and the data-line. The datum stored in the channel length is read-out using punch-through effect at the high drain voltage. The feasibility of this mask-ROM's is studied with device simulation and circuit simulation. With this design, it would be possible to get the high-density mask-ROM's, which might be faster in access speed and easier in fabrication process than the conventional ones. Therefore, this design is expected to be one of the most practical multiple-valued mask-ROM's.

  • On the Performance of TCM with Channel State Information in Frequency Flat Rayleigh Mobile Channels

    Carlos VALDEZ  Hirosuke YAMAMOTO  

     
    PAPER-Radio Communication

      Vol:
    E77-B No:4
      Page(s):
    501-510

    In this paper we analize the performance of Trellis Coded Modulation (TCM) schemes with coherent detection operating in a frequency flat, mobile Rayleigh fading environment, and with different knowledge levels on both the amplitude and phase fading processes (the latter is not assumed as usual to be ideally tracked), or Channel State Information (CSI). For example, whereas ideal CSI means that both the amplitude and phase fading characteristics are perfectly known by the receiver, other situations that are treated consider perfect knowledge of the amplitude (or phase) with complete disregard of the phase (or amplitude), as well as non concern on any of them. Since these are extreme cases, intermediate situations can be also defined to get extended bounds based on Chernoff which allow the phase errors, in either form of constant phase shifts or randomly distributed phase jitter, to be included in the upper bounds attainable by transfer function methods, and are applicable to multiphase/level signaling schemes. We found that when both fading characteristics are considered, the availability of CSI enhances significatively the performance. Furthermore, for non constant envelope schemes with non ideal CSI and for constant envelope schemes with phase errors, an asymmetry property of the pairwise error probability is identified. Theoretical and simulation results are shown in support of the analysis.

  • Performance Bounds for MLSE Equalization and Decoding with Repeat Request for Fading Dispersive Channels

    Hiroshi NOGAMI  Gordon L. STÜBER  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E77-A No:3
      Page(s):
    553-562

    Upper bounds on the bit error probability and repeat request probability, and lower bounds on the throughput are derived for a Hybrid-ARQ scheme that employs trellis-coded modulation on a fading dispersive channel. The receiver employs a modified Viterbi algorithm to perform joint maximum likelihood sequence estimation (MLSE) equalization and decoding. Retransmissions are generated by using the approach suggested by Yamamoto and Itoh. The analytical bounds are extended to trellis-coded modulation on fading dispersive channels with code combining. Comparison of the analytical bounds with simulation results shows that the analytical bounds are quite loose when diversity reception is not employed. However, no other analytical bounds exist in the literature for the trellis-coded Hybrid ARQ system studied in this paper. Therefore, the results presented in this paper can provide the basis for comparison with more sophisticated analytical bounds that may be derived in the future.

  • Genetic Channel Router

    Xingzhao LIU  Akio SAKAMOTO  Takashi SHIMAMOTO  

     
    PAPER-Computer Aided Design (CAD)

      Vol:
    E77-A No:3
      Page(s):
    492-501

    Genetic algorithms have been shown to be very useful in a variety of search and optimization problems. In this paper, we describe the implementation of genetic algorithms for channel routing problems and identify the key points which are essential to making full use of the population of potential solutions, that is one of the characteristics of genetic algorithms. Three efficient crossover techniques which can be divided further into 13 kinds of crossover operators have been compared. We also extend our previous work with ability to deal with dogleg case by simply splitting multi-terminal nets into a series of 2-terminal subnets. It routes the Deutsch's difficult example with 21 tracks without any detours.

  • Channel-Grouping Methods on Go-Back-N ARQ Scheme in Multiple-Parallel-Channel System

    Chun-Xiang CHEN  Masaharu KOMATSU  Kozo KINOSHITA  

     
    LETTER-Communication Theory

      Vol:
    E77-B No:2
      Page(s):
    265-269

    We consider a communication system in which a transmitter is connected to a receiver through parallel channels, and the Go-Back-N ARQ scheme is used to handle transmission errors. A packet error on one channel results in retransmission of packets assigned to other channels under the Go-Back-N ARQ scheme. Therefore, the channel-grouping (a grouped-channel is used to transmit the same packet at a time), would affect the throughput performance. We analyze the throughput performance, and give a tree-algorithm to efficiently search for the optimal channel-grouping which makes the throughput to become maximum. Numerical results show that the throughput is largely improved by using the optimal channel-grouping.

  • Subliminal Channels for Transferring Signatures: Yet Another Cryptographic Primitive

    Kouichi SAKURAI  Toshiya ITOH  

     
    PAPER

      Vol:
    E77-A No:1
      Page(s):
    31-38

    This paper considers the subliminal channel, hidden in an identification scheme, for transferring signatures. We observe the direct parallelization of the Fiat-Shamir identification scheme has a subliminal channel for the transmission of the digital signature. A positive aspect of this hidden channel supplies us how to transfer signatures without secure channels. As a formulation of such application, we introduce a new notion called privately recordable signature. The privately recordable signature is generated in an interactive protocol between a signer and a verifier, and only the verifier can keep the signatures although no third adversary can record the signatures. ln this scheme, then the disclosure of the verifier's private coin turns the signer's signature into the ordinary digital signature which is verified by anybody with the singer's public key. The basic idea of our construction suggests the novel primitive that a transferring securely signatures without secret channels could be constructed using only one-way function (without trapdoor).

  • Throughput Performances of ARQ Protocols Operating over Generalized Two-State Markov Error Channel

    Masaharu KOMATSU  Yukuo HAYASHIDA  Kozo KINOSHITA  

     
    PAPER-Communication Theory

      Vol:
    E77-B No:1
      Page(s):
    35-42

    In this paper, we analyze the throughput of the Stop-and-wait and Go-back-N ARQ schemes over an unreliable channel modeled by the two-state Markov process. Generally, in these states, block error probabilities are different. From analytical results and numerical examples, we show that the throughput of the Stop-and-wait ARQ scheme only depends on overall average error probability, while that of the Go-back-N ARQ scheme depends on the characteristic of the Markov process.

  • An Integrated Voice and Data Transmission System with Idle Signal Multiple Access--Dynamic Analysis--

    Gang WU  Kaiji MUKUMOTO  Akira FUKUDA  

     
    PAPER-Communication Systems and Transmission Equipment

      Vol:
    E76-B No:11
      Page(s):
    1398-1407

    In our preceding paper, I-ISMA (Idle Signal Multiple Access for Integrated services), a combination of ISMA and time reservation technique, was proposed to transmit an integrated voice and data traffic in third generation wireless communication networks. There, the channel capacity of I-ISMA was evaluated by the static analysis. To fully estimate performance of contention-based channel access protocols, however, we also need dynamic analysis to evaluate stability, delay, etc. Particularly, in systems concerning real-time voice transmission, delay is one of the most important performance measures. A six-mode model to describe an I-ISMA system is set up. With some assumptions for simplification, the dynamic behavior of the system is approximated by a Markov process so that the EPA (Equilibrium Point Analysis), a fluid approximation method, can be applied to the analysis. Then, numerical and simulation results are obtained for some examples. By means of the same analysis method and under the same conditions, the performance of PRMA is evaluated and compared briefly with that of I-ISMA.

  • A Study on ATM Network Planning Based on Evaluation of Design Items

    Makiko YOSHIDA  Hiroyuki OKAZAKI  

     
    PAPER-Communication Networks and Service

      Vol:
    E76-B No:11
      Page(s):
    1333-1340

    This paper describes a planning method for ATM networks. The method is based on evaluation of two design items, VC routing and VP routing, as well as on consideration of VPI constraints. In the evaluation, VC routing is compared with VP routing in separate case studies undertaken from the point of view of various parameters such as traffic volume, cost function and network scale. The results suggest the vertical relationship between VC and VP levels in optimally designed ATM networks. VC and VP network levels are then studied separately, and design methods are proposed for individual levels. In addition a perturbation method is proposed for the VC and VP routing use, whose optimum is varied as a function of the parameters described above. Evaluation results show the proposed perturbation method provides cost-effective networks.

  • A Feasibility Study on a Simple Stored Channel Simulator for Urban Mobile Radio Environments

    Tsutomu TAKEUCHI  

     
    PAPER-Radio Communication

      Vol:
    E76-B No:11
      Page(s):
    1424-1428

    A stored channel simulator for digital mobile radio enviroments is proposed, which enables the field tests in the laboratory under identical conditions, since it can reproduce the actual multipath radio channels by using the channel impulse responses (CIR's) measured in the field. Linear interpolation of CIR is introduced to simplify the structure of the proposed simulator. The performance of the proposed simulator is confirmed by the laboratory tests.

  • A Verification Method via Invariant for Communication Protocols Modeled as Extended Communicating Finite-State Machines

    Masahiro HIGUCHI  Osamu SHIRAKAWA  Hiroyuki SEKI  Mamoru FUJII  Tadao KASAMI  

     
    PAPER-Signaling System and Communication Protocol

      Vol:
    E76-B No:11
      Page(s):
    1363-1372

    This paper presents a method for verifying safety property of a communication protocol modeled as two extended communicating finite-state machines with two unbounded FIFO channels connecting them. In this method, four types of atomic formulae specifying a condition on a machine and a condition on a sequence of messages in a channel are introduced. A human verifier describes a logical formula which expresses conditions expected to be satisfied by all reachable global states, and a verification system proves that the formula is indeed satisfied by such states (i.e. the formula is an invariant) by induction. If the invariant is never satisfied in any unsafe state, it can be concluded that the protocol it safe. To show the effectiveness of this method, a sample protocol extracted from the data transfer phase of the OSI session protocol was verified by using the verification system.

  • Restrictive Channel Routing with Evolution Programs

    Xingzhao LIU  Akio SAKAMOTO  Takashi SHIMAMOTO  

     
    PAPER

      Vol:
    E76-A No:10
      Page(s):
    1738-1745

    Evolution programs have been shown to be very useful in a variety of search and optimization problems, however, until now, there has been little attempt to apply evolution programs to channel routing problem. In this paper, we present an exolution program and identify the key points which are essential to successfully applying evolution programs to channel routing problem. We also indicate how integrating heuristic information related to the problem under consideration helps in convergence on final solutions and illustrate the validity of out approach by providing experimental results obtained for the benchmark tests. compared with the optimal solutions.

  • An Optimal Channel Pin Assignment Algorithm for Hierarchical Building-Block Layout Design

    Tetsushi KOIDE  Shin'ichi WAKABAYASHI  Noriyoshi YOSHIDA  

     
    PAPER

      Vol:
    E76-A No:10
      Page(s):
    1636-1644

    This paper presents a linear time optimal algorithm to a channel pin assignment problem for hierarchical building-block layout design. The channel pin assignment problem is to determine positions of the pins of nets on the top and the bottom sides of a channel, which are partitioned into several intervals, and the pins are permutable within their associated intervals. The channel pin assignment problem has been shown NP-hard in general. We present a linear time optimal algorithm for an important special case of the problem, in which there is at most one pin of a net within each interval in the channel. The proposed algorithm is optimal in a sense that it can minimize both the channel density and the total wire length of the channel. We also disscuss how to apply our algorithm to the pin assignment in the L-shaped and staircase channels. Experimental results indicate that substantial reduction in both channel density and estimated total wire length can be obtained by permuting pins in each interval. Combining the proposed algorithm with a conventional channel router, results of channel routing also achieve large amount of reduction of the number of tracks, total wire length, and the number of vias.

  • An Integrated Voice and Data Transmission System with Idle Signal Multiple Access--Static Analysis--

    Gang WU  Kaiji MUKUMOTO  Akira FUKUDA  

     
    PAPER-Communication Systems and Transmission Equipment

      Vol:
    E76-B No:9
      Page(s):
    1186-1192

    Corresponding to the development of B-ISDN, integrated services for data, voice, etc. are imperatively required for the so called third generation wireless communication networks. In this paper, I-ISMA (Idle Signal Multiple Access for Integrated services) is proposed to transmit integrated voice and data traffic from dispersed terminals to a base station. In the system, data packets and the first packets of talkspurts of conversational speeches are transmitted using ISMA protocol over a shared channel while subsequent packets of talkspurts are sent with time reservation technique. The channel capacity of I-ISMA is evaluated and compared with that of PRMA. The region in which I-ISMA has larger capacity than PRMA is figured out. Generally speaking, I-ISMA has larger capacity than PRMA when the duration for transmitting and detecting an idle signal is not too long and the channel is not too congested by the reserved voice transmissions. When we concern real time voice transmission, delay is one of the most important performance measures. Only is a qualitative discussion on delay performance given here. The quantitative evaluation is obtained by the dynamic analysis in our succeeding paper.

  • 0.15 µm Gate i-AlGaAs/n-GaAs HIGFET with a 13.3 S/Vcm K-Value

    Hidetoshi MATSUMOTO  Yasunari UMEMOTO  Yoshihisa OHISHI  Mitsuharu TAKAHAMA  Kenji HIRUMA  Hiroto ODA  Masaru MIYAZAKI  Yoshinori IMAMURA  

     
    PAPER

      Vol:
    E76-C No:9
      Page(s):
    1373-1378

    We have developed a new HIGFET structure achieving an extremely high K-value of 13.3 S/Vcm with a gate length of 0.15 µm. Self-aligned ion implantation is excluded to suppress a short-channel effect. An i-GaAs cap layer and an n+-GaAs contact layer are employed to reduce source resistance. The threshold voltage shift is as small as 50 mV when the gate length is reduced from 1.5 µm to 0.15 µm. Source resistance is estimated to be 53 mΩcm. We have also developed a new fabrication process that can achieve a shorter gate length than the minimum size of lithography. This process utilizes an SiO2 sidewall formed on the n+-GaAs contact layer to reduce the gate length. A gate length of 0.15 µm can be achieved using 0.35 µm lithography.

  • A Centralized Control Microcell Radio System with Spectrum Delivery Switches

    Hirofumi ICHIKAWA  Mamoru OGASAWARA  

     
    PAPER-System and Network Matters

      Vol:
    E76-B No:9
      Page(s):
    1115-1121

    This paper presents a delivery mechanism using a spectrum delivery switch (SDS) in a microcell system. In our fiber-optic microcell systems, modulators, demodulators and spectrum delivery switches are installed in a central station. A spectrum delivery switch controls provide flexible dynamic channel assignment and functions as a hand over algorithm. This control method employs a TDMA time slot switch and a MODEM connection switch. The relation between blocking probability and offered traffic are described and computer simulation results are shown. The results indicate an improvement in this blocking probability over conventional systems.

  • A Fiber-Optic Passive Double Star Network for Microcellular Radio Communication Systems Applications

    Kiyomi KUMOZAKI  

     
    PAPER-System and Network Matters

      Vol:
    E76-B No:9
      Page(s):
    1122-1127

    Fiber-optic passive double star (PDS) network is described as an access network for microcellular radio communication systems. The intrinsic characteristics of the PDS network, reduction in the optical fiber count and flexible access capability, are examined. A unit cell structure is introduced which enables the PDS network to be effectively incorporated into the access portion of microcellular radio communication systems. The reduced total fiber length in the unit cell structure based on the PDS network is discussed in comparison with the conventional architecture. Calculations show that there is an optimum splitting ratio that minimizes the total fiber length. When the microcell radius and service area radius are 100m and 10km, respectively, the total fiber length of the PDS network is reduced to only about 9% of that of the conventional single star (SS) network for a splitting ratio of 34. Resource sharing and handover between microcells in a unit cell are performed by using the dynamic channel allocation function of the PDS system. Substantial performance improvement for loaded traffic can be obtained by resource sharing. When the splitting ratio is 32, the available traffic of a base station (BS) increases from 0.9 [erl/BS] to 3.4 [erl/BS] by adopting dynamic channel allocation for the lost call probability of 0.01.

1641-1660hit(1697hit)