The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] diff(926hit)

581-600hit(926hit)

  • Periodic Fourier Transform and Its Application to Wave Scattering from a Finite Periodic Surface: Two-Dimensional Case

    Junichi NAKAYAMA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E88-C No:5
      Page(s):
    1025-1032

    In this paper, the previously introduced periodic Fourier transform concept is extended to a two-dimensional case. The relations between the periodic Fourier transform, harmonic series representation and Fourier integral representation are also discussed. As a simple application of the periodic Fourier transform, the scattering of a scalar wave from a finite periodic surface with weight is studied. It is shown that the scattered wave may have an extended Floquet form, which is physically considered as the sum of diffraction beams. By the small perturbation method, the first order solution is given explicitly and the scattering cross section is calculated.

  • Differential Space Time Block Codes Using Nonconstant Modulus Constellations for Four Transmit Antennas

    Seung Hoon NAM  Jaehak CHUNG  Chan-Soo HWANG  Young-Ho JUNG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:4
      Page(s):
    1705-1709

    We extend the differential space time block code (STBC) using nonconstant modulus constellations of two transmit antennas to four transmit antennas case. The proposed method obtains larger minimum Euclidean distances than those of conventional differential STBC with PSK constellations. We derive the symbol error rate (SER) performance of the proposed method and demonstrate the SER performance using computer simulations for both static and fast fading channels. For transmission rates greater than 2 bits/channel use and 3 bits/channel use, the proposed method outperforms the conventional differential STBC.

  • Equalizer-Aided Time Delay Tracking Based on L1-Normed Finite Differences

    Jonah GAMBA  Tetsuya SHIMAMURA  

     
    PAPER-Digital Signal Processing

      Vol:
    E88-A No:4
      Page(s):
    978-987

    This paper addresses the estimation of time delay between two spatially separated noisy signals by system identification modeling with the input and output corrupted by additive white Gaussian noise. The proposed method is based on a modified adaptive Butler-Cantoni equalizer that decouples noise variance estimation from channel estimation. The bias in time delay estimates that is induced by input noise is reduced by an IIR whitening filter whose coefficients are found by the Burg algorithm. For step time-variant delays, a dual mode operation scheme is adopted in which we define a normal operating (tracking) mode and an interrupt operating (optimization) mode. In the tracking mode, only a few coefficients of the impulse response vector are monitored through L1-normed finite forward differences tracking, while in the optimization mode, the time delay optimized. Simulation results confirm the superiority of the proposed approach at low signal-to-noise ratios.

  • Resource Allocation Algorithms for Controllable Service Differentiation in Optical Burst Switching Networks

    Jumpot PHURITATKUL  Yusheng JI  

     
    PAPER

      Vol:
    E88-B No:4
      Page(s):
    1424-1431

    Optical Burst Switching (OBS) has been developed as an efficient switching technique to exploit the capacity provided by Wavelength Division Multiplexing (WDM) transmission technology for the next generation optical Internet. One critical design issue in OBS is how to provide Quality-of-Service (QoS) on optical networks. In order to provide the service differentiation, we propose in this paper a buffer allocation algorithm to schedule bursts at the edge OBS nodes, a bandwidth allocation algorithm and a Fiber Delay Line (FDL) allocation algorithm to schedule bursts at the core OBS nodes. We also introduce a new burst assembly technique in which the burst is generated either when the sum of the collected packet sizes reaches the maximum threshold or when the burst assembling time reaches the timeout limit. Our simulation results show that the proposed algorithms achieve the controllable burst loss probability for different service classes. The bandwidth allocation algorithm performs very well at the core OBS nodes in terms of the low loss probability.

  • Diffusion-Type Autonomous Decentralized Flow Control for End-to-End Flow in High-Speed Networks

    Chisa TAKANO  Masaki AIDA  

     
    PAPER-Network

      Vol:
    E88-B No:4
      Page(s):
    1559-1567

    We have proposed diffusion-type flow control as a solution for the extremely time-sensitive flow control required for high-speed networks. In our method of flow control, we design in advance simple and appropriate rules for action at the nodes, and these automatically result in stable and efficient network-wide performance through local interactions between nodes. Specifically, we design the rules for the flow control action of each node that simulates the local interaction of a diffusion phenomenon, in order that the packet density is diffused throughout the network as soon as possible. However, in order to make a comparison with other flow control methods under the same conditions, the evaluations in our previous studies used a closed network model, in which the number of packets was unchanged. This paper investigates the performance of our flow control method for an end-to-end flow, in order to show that it is still effective in more realistic networks. We identify the key issues associated with our flow control method when applied to an open network model, and demonstrate a two-step solution. First, we consider the rule for flow control action at the boundary node, which is the ingress node in the network, and propose a rule to achieve smooth diffusion of the packet density. Secondly, we introduce a shaping mechanism, which keeps the number of packets in the network at an appropriate level.

  • AURORA-2J: An Evaluation Framework for Japanese Noisy Speech Recognition

    Satoshi NAKAMURA  Kazuya TAKEDA  Kazumasa YAMAMOTO  Takeshi YAMADA  Shingo KUROIWA  Norihide KITAOKA  Takanobu NISHIURA  Akira SASOU  Mitsunori MIZUMACHI  Chiyomi MIYAJIMA  Masakiyo FUJIMOTO  Toshiki ENDO  

     
    PAPER-Speech Corpora and Related Topics

      Vol:
    E88-D No:3
      Page(s):
    535-544

    This paper introduces an evaluation framework for Japanese noisy speech recognition named AURORA-2J. Speech recognition systems must still be improved to be robust to noisy environments, but this improvement requires development of the standard evaluation corpus and assessment technologies. Recently, the Aurora 2, 3 and 4 corpora and their evaluation scenarios have had significant impact on noisy speech recognition research. The AURORA-2J is a Japanese connected digits corpus and its evaluation scripts are designed in the same way as Aurora 2 with the help of European Telecommunications Standards Institute (ETSI) AURORA group. This paper describes the data collection, baseline scripts, and its baseline performance. We also propose a new performance analysis method that considers differences in recognition performance among speakers. This method is based on the word accuracy per speaker, revealing the degree of the individual difference of the recognition performance. We also propose categorization of modifications, applied to the original HTK baseline system, which helps in comparing the systems and in recognizing technologies that improve the performance best within the same category.

  • Reducing Receiver's Storage in CS, SD and LSD Broadcast Encryption Schemes

    Tomoyuki ASANO  

     
    PAPER-Application

      Vol:
    E88-A No:1
      Page(s):
    203-210

    This paper deals with broadcast encryption schemes, in which a sender can send information securely to a group of receivers excluding some receivers over a broadcast channel. In this paper we propose modifications of the Complete Subtree (CS), the Subset Difference (SD) and the Layered Subset Difference (LSD) methods based on the Master Key Tree (MKT). Our modifications eliminate log N keys or labels from receivers' storage, in exchange for an increase in the computational overhead, where N is the total number of receivers. We also propose modifications of the SD and LSD methods by applying the Trapdoor One-way Permutation Tree (TOPT) which is originally proposed in order to modify the CS method. Our modifications based on TOPT also eliminate log N labels, and the computational cost is much smaller than MKT based methods.

  • A Generalized Performance Study of DS-CDMA Uplink/Downlink Receivers in Nakagami Wideband Fading Channel

    Mohammed ABDEL-HAFEZ  Fatih ALAGOZ  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E88-B No:1
      Page(s):
    333-344

    In this paper, we consider a mobile system consisting of a single isolated circular cell with K independent users simultaneously sharing the channel using binary DS-CDMA to establish a full duplex channel with the base station. Both coherent and differential detection RAKE receivers with Maximal Ratio Combining (MRC) techniques are considered. The performance of two uplink/downlink receivers in Nakagami wideband fading channel is studied. Our approach relies on the use of total instantaneous interference power calculations instead of the use of average power approximations. We analyzed and derived new exact formulae for bit error probabilities for the considered system, and presented a set of numerical results both for the exact formulae and Gaussian approximation. The performance comparisons suggest that the exact formulae provide superior performance to Gaussian approximation especially at low number of users and either high fading parameters of the desired user or low fading parameters of the MAIs.

  • Differential HELLO Technique for Multihop Wireless Network Routing Protocols in Dense Environments

    Shigeyuki ASAMI  Masashi YOSHIDA  Kenichi KAGOSHIMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:1
      Page(s):
    292-303

    The Multi-Point Relay (MPR) of the Optimized Link State Routing protocol reduces the flooding overhead compared with classic flooding. To select MPR nodes, HELLO messages are used. In dense population environments, the overhead of HELLO messages is critical because the HELLO messages carry all adjacent node IDs in the classical manner. Consequently, wireless bandwidth is consumed for data communications. One solution for this problem is to compress HELLO messages using a differential technique. However, few, if any, studies have applied a differential technique to HELLO messages. We introduce the novel Differential HELLO technique to reduce the overhead of the HELLO messages. The Differential HELLO technique consists of two kinds of compression methods: Chronological Compression and Topological Compression. In addition, the inconsistency problems of the 1-hop node information in adjacent nodes caused by packet loss are discussed. As solutions to the inconsistency problems, No Compression Acknowledgement (NC-ACK) and HELLO Information Forecast (HIF) have been examined. Our simulation has taken the efficiency of the Differential HELLO technique into consideration. The HELLO message overhead was reduced to 29.1 IDs from 75.8 IDs using the Differential HELLO technique at a packet loss rate of 10-4 under random node arrangement. This result reveals that the Differential HELLO technique reduces the classic HELLO overhead by 38%. In environments with lower packet-loss rates, the Differential HELLO technique promises to offer even better performance.

  • A New Design Concept for Balanced-Type SAW Filters Using a Common-Mode Signal Suppression Circuit

    Hiroyuki NAKAMURA  Toshio ISHIZAKI  Toshifumi NAKATANI  Shigeru TSUZUKI  

     
    PAPER

      Vol:
    E88-C No:1
      Page(s):
    28-33

    A new design concept for a common-mode signal suppression circuit for a balanced-type filter has been investigated. The degradation mechanism of the balance characteristics was studied. The degradation is caused by the common-mode signals combined with the differential-mode signals in the balanced terminals. The concept employed is the reduction of the common-mode signal using a common-mode signal suppression circuit, connected to the balanced terminals. A serial resonance circuit is formed, in which the common-mode signals are shorted to ground. The circuit was applied to the balanced-type Surface Acoustic Wave (SAW) filter. The improvement in balance characteristics, without increasing in the insertion loss, was confirmed by experiments for Global System Mobile (GSM) applications.

  • Zero-Value Register Attack on Elliptic Curve Cryptosystem

    Toru AKISHITA  Tsuyoshi TAKAGI  

     
    PAPER-Tamper-Resistance

      Vol:
    E88-A No:1
      Page(s):
    132-139

    Differential power analysis (DPA) might break implementations of elliptic curve cryptosystem (ECC) on memory constraint devices. Goubin proposed a variant of DPA using a point (0,y), which is not randomized in Jacobian coordinates or in an isomorphic class. This point often exists in standardized elliptic curves, and we have to care this attack. In this paper, we propose zero-value register attack as an extension of Goubin's attack. Note that even if a point has no zero-value coordinate, auxiliary registers might take zero value. We investigate these zero-value registers that cannot be randomized by the above randomization. Indeed, we have found several points P = (x,y) which cause the zero-value registers, e.g., (1) 3x2 + a = 0,(2) 5x4 + 2ax2 - 4bx + a2 = 0,(3) P is y-coordinate self-collision point, etc. We demonstrate the elliptic curves recommended in SECG that have these points. Interestingly, some conditions required for zero-value register attack depend on explicit implementation of addition formulae -- in order to resist this type of attacks, we have to care how to implement the addition formulae. Finally, we note that Goubin's attack and the proposed attack assume that a base point P can be chosen by attackers and a secret scalar d is fixed, so that they are not applicable to ECDSA.

  • Analysis and Evaluation of Required Precision for Color Images in Digital Cinema Application

    Junji SUZUKI  Isao FURUKAWA  Sadayasu ONO  

     
    PAPER-Image

      Vol:
    E87-A No:12
      Page(s):
    3409-3419

    Digital cinema will continue, for some time, to use image signals converted from the density values of film stock through some form of digitization. This paper investigates the required numbers of quantization bits for both intensity and density. Equations for the color differences created by quantization distortion are derived on the premise that the uniform color space L* a* b* can be used to evaluate color differences in digitized pictorial color images. The location of the quantized sample that yields the maximum color difference in the color gamut is theoretically analyzed with the proviso that the color difference must be below the perceivable limit of human visual systems. The result shows that the maximum color difference is located on a ridge line or a surface of the color gamut. This can reduce the computational burden for determining the required precision for color quantization. Design examples of quantization resolution are also shown by applying the proposed evaluation method to three actual color spaces: NTSC, HDTV, and ROMM.

  • A Fast Algorithm for Crosspoint Assignment under Crosstalk Constraints with Shielding Effects

    Keiji KIDA  Xiaoke ZHU  Changwen ZHUANG  Yasuhiro TAKASHIMA  Shigetoshi NAKATAKE  

     
    PAPER-Physical Design

      Vol:
    E87-A No:12
      Page(s):
    3258-3264

    This paper presents a novel algorithm for crosspoint assignment (CPA) that takes into consideration crosstalk noise and shielding effects in deep sub-micron design. We introduce a conditional constraint which is imposed on a sensitive net-pair to detach one net from the other or to put another insensitive net between them for shielding. We provide two algorithms which can handle the conditional constraint: One is based on an ILP, which outputs an exact optimum solution. The other is a fast heuristics whose time complexity is O(n2 log n), where n is the number of pins. In experiments, we tested these algorithms for industrial examples. The results showed that the conditional constraint for shielding released algorithms from a tight space of feasible assignments. Our heuristics ran quickly and attained near optimum solutions.

  • An Effective Re-marking Scheme for Diffserv AF Service through Multiple Domains

    Shoichi MOTOHISA  Hiroyuki FUKUOKA  Ken-ichi BABA  Shinji SHIMOJO  

     
    PAPER-Protocols, Applications and Services

      Vol:
    E87-D No:12
      Page(s):
    2569-2577

    AF service class in Diffserv by realizes minimum bandwidth guarantee with the use of differentiated drop precedence property marked on each packet. In the context of a multiple domains environment, however, QoS of individual flow is not always preserved due to the re-marking behavior forced at the domain boundaries. Focusing on this point, this paper proposes new packet re-marking schemes that can improve the per-flow QoS of AF service traversing multiple domains. The basic concept of the schemes distinguishes packets re-marked to out-of-profile at the domain boundaries from those already marked as out-of-profile at the time of entering the network, and allows the re-marked packet to recover back to in-of-profile, thus regaining its rightful QoS within the networks. The performance of the proposed schemes is evaluated through simulation. The results on UDP flows show the effectiveness of the proposed schemes for reducing packet losses on the flow through multiple domains and preserving fairness between flows. Simulations on TCP flows show that the proposed schemes improve the throughput of the flows through multiple domains. The proposed scheme is especially effective on the transfer time of short TCP flows such as Web traffic, whose throughput is affected more seriously by a single packet loss due to its flow control mechanisms.

  • The Error Diffusion Halftoning Using Local Adaptive Sharpening Control

    Nae-Joung KWAK  Wun-Mo YANG  Jae-Hyuk HAN  Jae-Hyeong AHAN  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E87-D No:12
      Page(s):
    2888-2892

    Digital halftoning is used to quantize a grayscale image to a binary image. Error diffusion halftoning generates a high-quality binary image, but also generates some defects such as the warm effect, sharpening, and so forth. To reduce these defects, Kite proposed a modified threshold modulation method that utilizes a multiplicative parameter for controlling sharpening. Nevertheless, some degradation was observed near the edges of objects with a large luminance change. In this paper, we propose a method of controlling the multiplicative parameter in proportion to the magnitude of the local edge slope. The results of computer simulation show a greater reduction of sharpening in the halftone image. In particular, there is a great improvement in the quality of the edges of objects with a large luminance change.

  • Transient and Steady-State Photocurrent in an Emissive Layer of Green Electrophosphorescent Devices

    Noriyuki MATSUSUE  Satoshi IKAME  Yuichiro SUZUKI  Hiroyoshi NAITO  

     
    PAPER-Characterization and Abilities of Organic Electronic Devices

      Vol:
    E87-C No:12
      Page(s):
    2033-2038

    Charge carrier generation, transport, and exciton diffusion in f ac tris(2-phenylpyridine)iridium(III) Ir(ppy)3 doped in 4,4'-N,N'-dicarbazole-biphenel (CBP) thin films, an emissive layer of green electrophosphorescent devices, have been studied in terms of time-of-flight (TOF) transient photocurrent, steady-state photocurrent and time-resolved photoluminescence (PL) spectroscopies. It is found that the excitation energy rapidly transfer from CBP to Ir(ppy)3, and that the charge carriers are generated on Ir(ppy)3 sites. With increasing Ir(ppy)3 concentration, the electron drift mobility is slightly decreased, while the hole transit signals become unobservable. The electron and hole transport properties of Ir(ppy)3 doped CBP thin films result from the energy levels of the lowest unoccupied molecular orbital and the highest occupied molecular orbital of Ir(ppy)3 with respect to those of CBP. From steady-state photocurrent measurement, the diffusion lengths of 3.5% and 7.0% Ir(ppy)3 doped CBP thin films are determined to be 21 nm and 50 nm, respectively.

  • Analysis of Light Wave Propagation in In-Plane Switching Liquid-Crystal Devices by Finite-Difference Time-Domain Method

    Hideo KAWANO  Atsushi MATSUMOTO  Tanroku MIYOSHI  

     
    PAPER-Organic Molecular Electronics

      Vol:
    E87-C No:12
      Page(s):
    2172-2178

    Liquid-crystal devices with in-plane switching electrodes (IPS-LCD) are superior to twisted nematic ones in their wider range of viewing angle, but show serious color shift with viewing angle. The color shift is a phenomenon governed by the three-dimensional orientation of liquid-crystal molecules. In order to evaluate such effects numerically, light wave propagation in the IPS-LCD is studied using a two-dimensional finite-difference time-domain method, where all six components of electromagnetic field are analysed and the three-dimensional properties of liquid-crystal materials are taken into account through the dielectric tensor. The computational space termination is provided by a combination of the uniaxial perfectly matched layer and periodic boundary conditions. It is found for the first time numerically that the color shift effects strongly depend on the asymmetrical profile of liquid-crystal orientation, which is originated from the small pretilt angle.

  • A Redox Microarray--An Experimental Model for Molecular Computing Integrated Circuits--

    Masahiko HIRATSUKA  Shigeru IKEDA  Takafumi AOKI  Tatsuo HIGUCHI  

     
    PAPER

      Vol:
    E87-C No:11
      Page(s):
    1804-1808

    An experimental model of a redox microarray, which provides a foundation for constructing future massively parallel molecular computers, is proposed. The operation of a redox microarray is confirmed, using an experimental setup based on an array of microelectrodes with analog integrated circuits.

  • Differential Operation Oriented Multiple-Valued Encoding and Circuit Realization for Asynchronous Data Transfer

    Tomohiro TAKAHASHI  Naoya ONIZAWA  Takahiro HANYU  

     
    PAPER

      Vol:
    E87-C No:11
      Page(s):
    1928-1934

    This paper presents an asynchronous data transfer scheme using 2-color 2-phase dual-rail encoding based on a differential operation and its circuit realization. The proposed encoding enables seamless asynchronous data transfer without inserting a spacer, because each logic value is represented by two kinds of codewords with dual-rail, called "color" data. Since the difference x-x between components of a codeword (x,x) becomes constant in every valid state, the data-arrival state can be detected by calculating the difference x-x. From the viewpoint of circuit implementation, during the state transition, since the dual-rail x and x are defined so as to transit differentially, the compatibility with a comparator using a differential amplifier becomes high, which results in reduction of the cycle time. It is evaluated using HSPICE simulation with a 0.18 µm CMOS technology that communication speed using the proposed dual-rail encoding becomes 1.4 times faster than that using conventional dual-rail encoding.

  • Dynamic Class Assignment for Stream Flows Considering Characteristics of Non-stream Flow Classes

    Kenta YASUKAWA  Ken-ichi BABA  Katsunori YAMAOKA  

     
    PAPER-Network

      Vol:
    E87-B No:11
      Page(s):
    3242-3254

    In this paper, we term multimedia streaming application traffic "stream flows" and the other usual application traffic "non-stream flows." Many problems occur when both flows are aggregated on a shared link because the different TCP and UDP behaviors cause negative interactions. One way to solve these problems is to isolate stream and non-stream flows to different classes. However, it is difficult to determine the bandwidth allocation for each class and dynamic bandwidth allocation schemes are hard to implement on large scale networks. We therefore propose a dynamic class assignment method that maintains the QoS and that has a higher scalability than dynamic bandwidth allocation schemes. It is workable on Diffserv AF PHB. The outline is as follows. We classify non-stream flows into four classes and dynamically assign stream flows to the classes, taking the conditions and characteristics of the classes into consideration. On assigning classes to stream flows, we map them to a higher drop precedence than non-stream flows not to degrade the QoS of them, based on the assumption that occasional packets being dropped do not create serious problems for them. In this paper, we first discuss our classification of non-stream flows, and present the characteristics of non-stream flows in each class. We then discuss our drop precedence mapping. After this, we propose an algorithm for our method of dynamic class assignment and provide some simulation results where it could provide constant qualities with stream and non-stream flows, adapting to changing traffic.

581-600hit(926hit)