The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] form(3161hit)

3021-3040hit(3161hit)

  • A Restatement on Applications of Electrical Considerations for One-Dimentional Wave Phenomena

    Nobuo NAGAI  

     
    PAPER

      Vol:
    E77-A No:5
      Page(s):
    804-809

    Wave digital filters are a class of digital filters. They are equivalent to commensurate transmission line circuits synthesized with uniform, lossless, and commensurated transmission lines. In order to extend their applications to physical wave phenomena including quantum electronics, it is necessary to consider a generalized distributed line whose velocity of energy flow has frequency characteristics. This paper discusses a generalized distributed circuit, and we obtain two types of lines, lossless and cut-off. In order to analyze these lines, we discuss signal flow graphs of steady state voltage and current. The reflection factors we obtain here are the same as that for an active power or a diagonal element of a scattering matrix, which is zero in conjugate matching. By using this reflection factor, we obtain band-pass filters synthesized with the cut-off lines. We also describe an analysis method for nonuniform line related to Riccati differential equation.

  • Linear Phase IIR Hilbert Transformers Using Time Reversal Techniques

    Atsushi HIROI  Hiroyuki KAMATA  Yoshihisa ISHIDA  

     
    LETTER

      Vol:
    E77-A No:5
      Page(s):
    864-867

    This paper describes a new method of approximating ideal Hilbert transformers by using time reversal techniques. As is well known, an ideal Hilbert transformer is not physically realizable because it is not causal. Nevertheless, it is extremely imprortant conceptually in the area of digital signal processing. In this paper, we propose a method to approximately implement such a Hilbert transformer. The method divides the impulse response of the ideal Hilbert transformer into two parts, i.e., causal and noncausal parts. Although a causal filter is physically realizable, a noncausal filter is not realizable. A noncausal filter is realized using time reversal techniques for input signals to the filter, and then the Hilbert transformer can be approximately implemented by the parallel connection of causal and noncausal filters.

  • Perfect Reconstruction Conditions for Adaptive Blocksize MDCT

    Takashi MOCHIZUKI  

     
    PAPER-Digital Image Processing

      Vol:
    E77-A No:5
      Page(s):
    894-899

    This paper describes the general conditions for perfect signal reconstruction in adaptive blocksize MDCT. MDCT, or modified Discrete Cosine Transform, is a method in which blocks are laid to overlap each other. Because of block overlapping, some consideration must be paid to reconstructing the signals perfectly in adaptive blocksize schemes. The perfect reconstruction conditions are derived by considering the reconstruction signals, on a segment by segment basis. These conditions restrict the analysis/synthesis windows in the MDCT formula. Finally, this paper evaluates two examples of window sets, including windows used in the ISO MPEG audio coding standard.

  • Asynchronous and Synchronous Parallel Derivation of Formal Languages

    Katsuhiko NAKAMURA  

     
    PAPER-Automata, Languages and Theory of Computing

      Vol:
    E77-D No:5
      Page(s):
    539-545

    This paper discusses the asynchronous and synchronous parallel derivation of languages based on standard formal grammars. Some of the synchronous languages defined in this paper are essentially equivalent to the languages of E0L and EIL systems. Languages with restrictions on the number of parallel derivation steps are difined so that a t-time language is the set of strings w derived in t(w) or less parallel derivatio steps, where t(n) is an integer function. the properties of asynchronous derivation are generally discussed to clarify their conditions so that the derivation results are independent of the order in which productions are applied. It is shown that: (1) Any context sensitive grammar (CSG) G can be transformed into a CSG G such that the language generated by synchronous derivation in G is equal to that generated by asynchronous derivation in G , and vice versa; (2) Any regular language is a log-time context free language (CFL); (3) The class of CFLs is incomparable with that of log-time CSLs; and (4) If there is a bounded cellular automaton recognizing any language L in time T(n), then L is an O(T(n))-time CSL.

  • The Emptiness Problem for Lexical-Functional Grammars is Undecidable

    Tetsuro NISHINO  

     
    LETTER-Automata, Languages and Theory of Computing

      Vol:
    E77-D No:5
      Page(s):
    597-600

    J. Bresnan and R. M. Kaplan introduced lexical-functional grammars (LFGs, for short) as a new formalism for human language syntax. It is important to show formal properties of this kind of grammars in order to characterize the formal complexity of human languages. In this paper, we will show that the emptiness problem for LFGs is undecidable.

  • AVHRR Image Segmentation Using Modified Backpropagation Algorithm

    Tao CHEN  Mikio TAKAGI  

     
    PAPER-Image Processing

      Vol:
    E77-D No:4
      Page(s):
    490-497

    Analysis of satellite images requires classificatio of image objects. Since different categories may have almost the same brightness or feature in high dimensional remote sensing data, many object categories overlap with each other. How to segment the object categories accurately is still an open question. It is widely recognized that the assumptions required by many classification methods (maximum likelihood estimation, etc.) are suspect for textural features based on image pixel brightness. We propose an image feature based neural network approach for the segmentation of AVHRR images. The learning algoriothm is a modified backpropagation with gain and weight decay, since feedforward networks using the backpropagation algorithm have been generally successful and enjoy wide popularity. Destructive algorithms that adapt the neural architecture during the training have been developed. The classification accuracy of 100% is reached for a validation data set. Classification result is compared with that of Kohonen's LVQ and basic backpropagation algorithm based pixel-by-pixel method. Visual investigation of the result images shows that our method can not only distinguish the categories with similar signatures very well, but also is robustic to noise.

  • Partial Construction of an Arrangement of Lines and Its Application to Optimal Partitioning of Bichromatic Point Set

    Tetsuo ASANO  Takeshi TOKUYAMA  

     
    PAPER

      Vol:
    E77-A No:4
      Page(s):
    595-600

    This paper presents an efficient algorithm for constructing at-most-k levels of an arrangement of n lines in the plane in time O(nk+n log n), which is optimal since Ω(nk) line segments are included there. The algorithm can sweep the at-most-k levels of the arrangement using O(n) space. Although Everett et al. recently gave an algorithm for constructing the at-most-k levels with the same time complexity independently, our algorithm is superior with respect to the space complexity as a sweep algorithm. Then, we apply the algorithm to a bipartitioning problem of a bichromatic point set: For r red points and b blue points in the plane and a directed line L, the figure of demerit fd(L) associated with L is defined to be the sum of the number of blue points below L and that of red ones above L. The problem we are going to consider is to find an optimal partitioning line to minimize the figure of demerit. Given a number k, our algorithm first determines whether there is a line whose figure of demerit is at most k, and further finds an optimal bipartitioning line if there is one. It runs in O(kn+n log n) time (n=r+b), which is subquadratic if k is sublinear.

  • Shared Pseudo-Random Secret Generation Protocols

    Manuel CERECEDO  Tsutomu MATSUMOTO  Hideki IMAI  

     
    PAPER

      Vol:
    E77-A No:4
      Page(s):
    636-645

    An extension of the notion of cryptographically strong pseudo-random generator to a distributed setting is proposed in this paper. Instead of a deterministic function to generate a pseudo-random bit string from a truly random shorter string, we have a deterministic secure protocol for a group of separate entities to compute a secretly shared pseudo-random string from a secretly shared and truly random shorter string. We propose a precise definition of this notion in terms of Yao's computational entropy and describe a concrete construction using Shamir's pseudo-random number generator. Several practical applications are also discussed.

  • On the Performance of TCM with Channel State Information in Frequency Flat Rayleigh Mobile Channels

    Carlos VALDEZ  Hirosuke YAMAMOTO  

     
    PAPER-Radio Communication

      Vol:
    E77-B No:4
      Page(s):
    501-510

    In this paper we analize the performance of Trellis Coded Modulation (TCM) schemes with coherent detection operating in a frequency flat, mobile Rayleigh fading environment, and with different knowledge levels on both the amplitude and phase fading processes (the latter is not assumed as usual to be ideally tracked), or Channel State Information (CSI). For example, whereas ideal CSI means that both the amplitude and phase fading characteristics are perfectly known by the receiver, other situations that are treated consider perfect knowledge of the amplitude (or phase) with complete disregard of the phase (or amplitude), as well as non concern on any of them. Since these are extreme cases, intermediate situations can be also defined to get extended bounds based on Chernoff which allow the phase errors, in either form of constant phase shifts or randomly distributed phase jitter, to be included in the upper bounds attainable by transfer function methods, and are applicable to multiphase/level signaling schemes. We found that when both fading characteristics are considered, the availability of CSI enhances significatively the performance. Furthermore, for non constant envelope schemes with non ideal CSI and for constant envelope schemes with phase errors, an asymmetry property of the pairwise error probability is identified. Theoretical and simulation results are shown in support of the analysis.

  • Total High Performance Time and Design of Degradable Real-Time Systems

    Masaharu AKATSU  Tomohiro MURATA  Kenzo KURIHARA  

     
    PAPER-Concurrent Systems, Discrete Event Systems and Petri Nets

      Vol:
    E77-A No:3
      Page(s):
    510-516

    This paper proposes the Total High Performance Time as a performance-related reliability measure in degradable/recoverable real-time systems. This measure reflects the effect of system behavior in pending states that are temporary states between the normal state and degraded states where the system operates in a degraded mode as a consequence of component failures. Such systems have to perform not only normal procedures but also error/recovery procedures in pending states, so the performance there is lower than that in the degraded states. In real-time systems, if performance is less than a lower limit, the response time for on-line transactions cannot meet the deadline. The consequences of failing to meet the deadline could be system failure. Therefore, the system reliability is affected significantly by whether the performance there is higher than the lower limit or not. A state where the level of performance is higher than the lower limit is called a High Performance State. We define the Total High Performance Time as the total time that the system spends operating in High Performance States. Moreover, this paper explains how to utilize the Total High Performance Time in system design. We model a method of controlling a system in pending states by using Extended Stochastic Petri Nets and obtain the characteristics necessary for evaluating the Total High Performance Time by analyzing the model. This approach is applied to a storage system that controls mirrored disks, and shown to be helpful for designing a method of controlling a system in pending states, which has been considered difficult because of the trade-off between performance and reliability.

  • Modified Numerical Technique for Beam Propagation Method Based on the Galerkin's Technique

    Guosheng PU  Tetsuya MIZUMOTO  Yoshiyuki NAITO  

     
    PAPER-Opto-Electronics

      Vol:
    E77-C No:3
      Page(s):
    510-514

    A modified beam propagation method based on the Galerkin's technique (FE-BPM) has been implemented and applied to the analysis of optical beam propagation in a tapered dielectric waveguide. It is based on a new calculation procedure using non-uniform sampling spacings along the transverse coordinate. Comparison with a conventional FE-BPM shows a definite improvement in saving computation time. The differences of a propagation field and a mean square power given by the proposed FE-BPM are discussed in comparison with the conventional FE-BPM.

  • Analysis of Dynamic Bandwidth Control for LAN Interconnection through ATM Networks

    Yoshihiro OHBA  Masayuki MURATA  Hideo MIYAHARA  

     
    PAPER

      Vol:
    E77-B No:3
      Page(s):
    367-377

    In this paper, we study a dynamic bandwidth control which is expected an effective use of network resources in transmitting highly bursty traffic generated by, e.g., interconnected LAN systems. First, a new LAN traffic model is proposed in which correlation of not only packet interarrival times but also packet lengths are considered. An analytic model for a LAN-ATM gateway is next introduced. It employs the dynamic bandwidth control using the proposed LAN traffic model and some performance measures are derived by it. The analytic model takes into account the probability that a bandwidth increase request may be rejected. Finally, some numerical examples are provided using the analysis method and performance comparisons between the dynamic and fixed bandwidth controls are made. As a result, it is quantitatively indicated that () if the equivalent bandwidth is used in average, the dynamic bandwidth control keeps packet and cell loss rates one to two orders lower than the fixed bandwidth control, () when the more strict QOS in terms of loss rate is requested, the dynamic bandwidth control can become more effective.

  • Performance Bounds for MLSE Equalization and Decoding with Repeat Request for Fading Dispersive Channels

    Hiroshi NOGAMI  Gordon L. STÜBER  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E77-A No:3
      Page(s):
    553-562

    Upper bounds on the bit error probability and repeat request probability, and lower bounds on the throughput are derived for a Hybrid-ARQ scheme that employs trellis-coded modulation on a fading dispersive channel. The receiver employs a modified Viterbi algorithm to perform joint maximum likelihood sequence estimation (MLSE) equalization and decoding. Retransmissions are generated by using the approach suggested by Yamamoto and Itoh. The analytical bounds are extended to trellis-coded modulation on fading dispersive channels with code combining. Comparison of the analytical bounds with simulation results shows that the analytical bounds are quite loose when diversity reception is not employed. However, no other analytical bounds exist in the literature for the trellis-coded Hybrid ARQ system studied in this paper. Therefore, the results presented in this paper can provide the basis for comparison with more sophisticated analytical bounds that may be derived in the future.

  • Flexible Information Sharing and Handling System--Towards Knowledge Propagation--

    Yoshiaki SEKI  Toshihiko YAMAKAMI  Akihiro SHIMIZU  

     
    PAPER

      Vol:
    E77-B No:3
      Page(s):
    404-410

    The use of computers with private networks has accelerated the electronic storage of business information in office systems. With the rapid progress in processing capability and small sizing of the computer world, private networks are going to be more intelligent. The utilization of shared information is a key issue in modern organizations, in order to increase the productivity of white-collar workers. In the CSCW research field, it is said that informal and unstructured information is important in group work contexts but difficult to locate in a large organization. Many researchers are paying particular attention to the importance of support systems for such information. These kinds of information are called Organizational memory or Group Memory. Our research focuses on knowledge propagation with private networks in the organization. This means emphasis on the process; with which organized information or the ability to use information is circulated throughout the organization. Knowledge propagation has three issues: knowledge transmission, destination locating and source locating. To cope with these issues we developed FISH, which stands for Flexible Information Sharing and Handling system. FISH was designed to provide cooperative information sharing in a group work context and to explore knowledge propagation. FISH stores fragmental information as cards with multiple keywords and content. This paper discusses a three-layered model that describes computer supported knowledge transmission. Based on this model, three issues are discussed regarding knowledge propagation. FISH and its two-year experiment are described and knowledge propagation is explored based on the results of this experiment.

  • Automatic Tracing of Transistor-Level Performance Faults with CAD-Linked Electron Beam Test System

    Katsuyoshi MIURA  Koji NAKAMAE  Hiromu FUJIOKA  

     
    PAPER-Computer Aided Design (CAD)

      Vol:
    E77-A No:3
      Page(s):
    539-545

    An automatic tracing algorithm of the transistor-level performance faults in the waveform-based approach with CAD-linked electron beam test system which utilizes a transistor-level circuit data in CAD database is proposed. Performance faults mean some performance measure such as the temporal parameters (rise time, fall time and so on) lies outside of the specified range in a VLSI. Problems on automatic fault tracing in the transistor level are modeled by using graphs. Combinational circuits which consist of MOS transistors are considered. A single fault is assumed to be in a circuit. The algorithm utilizes Depth-First Search algorithm where faulty upstream interconnections are searched as deeply as possible. Treatment of the faults on downstream interconnections and on unmeasurable interconnections is given. Application of this algorithm to the 2k-transistor block of a CMOS circuit showed its validity in the simulation.

  • 2 MHz Power Converter with Piezoelectric Ceramic Transformer

    Toshiyuki ZAITSU  Takeshi INOUE  Osamu OHNISHI  Yasuhiro SASAKI  

     
    PAPER-Electronic Circuits

      Vol:
    E77-C No:2
      Page(s):
    280-286

    A power converter with a new piezoelectric transformer is presented. The piezoelectric transformer, made of lead titanate solid solution ceramic, is operated with a thickness extensional vibration mode. This transformer can operate at high frequency, over several megahertz, with about 90% high efficiency. The resonant frequency for the transformer is 2 MHz. The power converter with the transformer applies the theory for a class-E switching converter using an electromagnetic transformer. Maximum output power was obtained when the switching frequency was slightly higher than the resonant frequency. 4.4 W output power was successfully obtained with 52% efficiency at 2.1 MHz switching frequency.

  • A Study on Customer Complaint Handling System

    Masashi ICHINOSE  Hiroshi TOKUNAGA  

     
    LETTER-Communication Networks and Service

      Vol:
    E77-B No:2
      Page(s):
    261-264

    From the viewpoint of customer's satisfaction, precise information and rapid action are very important when complaints about call connection failures or service quality deterioration come from customers. It is indispensable to the propose that operators are supported by an operation system which stores and processes each customer's information, their complaint's histories, network failure status and call connection detail data. This paper shows functions and Human Machine Interface (HMI) of Customer Complaint Handling System (CCHS). This system can handle a customer's complaint by an electric ticket and necessary information is automatically collected and shown on the ticket.

  • Influence of Energy Transport Related Effects on NPN BJT Device Performance and ECL Gate Delay Analysed by 2D Parallel Mixed Level Device/Circuit Simulation

    Matthias STECHER  Bernd MEINERZHAGEN  Ingo BORK  Joachim M. J. KRÜCKEN  Peter MAAS  Walter L. ENGL  

     
    PAPER-Coupled Device & Circuit Modeling

      Vol:
    E77-C No:2
      Page(s):
    200-205

    The consequences of energy transport related effects like velocity overshoot on the performance of bipolar transistors have already been studied previously. So far however most of the applied models were only 1D and it remained unclear whether such effects would have a significant influence on important quantities like ECL gate delay accessible only on the circuit level. To the authors' best knowledge in this paper for the first time the consequences of energy transport related effects on the circuit level are investigated in a rigorous manner by mixed level device/circuit simulation incorporating full 2D numerical hydrodynamic models on the device level.

  • Space-Time Galerkin/Least-Squares Finite Element Formulation for the Hydrodynamic Device Equations

    N. R. ALURU  Kincho H. LAW  Peter M. PINSKY  Arthur RAEFSKY  Ronald J. G. GOOSSENS  Robert W. DUTTON  

     
    PAPER-Numerics

      Vol:
    E77-C No:2
      Page(s):
    227-235

    Numerical simulation of the hydrodynamic semiconductor device equations requires powerful numerical schemes. A Space-time Galerkin/Least-Squares finite element formulation, that has been successfully applied to problems of fluid dynamic, is proposed for the solution of the hydrodynamic device equations. Similarity between the equations of fluid dynamic and semiconductor devices is discussed. The robustness and accuracy of the numerical scheme are demonstrated with the example of a single electron carrier submicron silicon MESFET device.

  • Application of DBF Technique to Radar Systems

    Shin'ichi TAKEYA  Mitsuyoshi SHINONAGA  Yoshitaka SASAKI  Hiroshi MIYAUCHI  Masanori MATSUMURA  Tasuku MOROOKA  

     
    PAPER-Electronic and Radio Applications

      Vol:
    E77-B No:2
      Page(s):
    256-260

    This paper describes a DBF (Digital Beamforming) technique as a spatial filtering in the radar systems. DBF for a beamformer and an adaptive processor are discussed. An architecture for the beamformer is proposed. The beamformer discussed consists of systolic arrays that can form beams arbitrarily. Antenna radiation patterns measured in an open site are shown. For the adaptive processor, Gram-Schmidt transformation method is attained by using systolic arrays. Proposed is a means to prevent target signals from being suppressed in cells of the systolic arrays and to achieve the convergent characteristics independent of the magnitude of undesired signal power. In order to demonstrate the performance of the proposed processor, a test model of the adaptive processor was developed and tested in multiple undesired signal environment. Test results are indicated.

3021-3040hit(3161hit)