The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] order(489hit)

221-240hit(489hit)

  • Analysis of Second-Order Modes of Linear Continuous-Time Systems under Positive-Real Transformations

    Shunsuke KOSHITA  Yousuke MIZUKAMI  Taketo KONNO  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Systems and Control

      Vol:
    E91-A No:2
      Page(s):
    575-583

    This paper discusses the behavior of the second-order modes (Hankel singular values) of linear continuous-time systems under variable transformations with positive-real functions. That is, given a transfer function H(s) and its second-order modes, we analyze the second-order modes of transformed systems H(F(s)), where 1/F(s) is an arbitrary positive-real function. We first discuss the case of lossless positive-real transformations, and show that the second-order modes are invariant under any lossless positive-real transformation. We next consider the case of general positive-real transformations, and reveal that the values of the second-order modes are decreased under any general positive-real transformation. We achieve the derivation of these results by describing the controllability/observability Gramians of transformed systems, with the help of the lossless positive-real lemma, the positive-real lemma, and state-space formulation of transformed systems.

  • Activity Recorder: A Device to Record User's Activities Using RFIDs and Sensors

    Jun'ichi YURA  Hiroshi SAKAKIBARA  Jin NAKAZAWA  Hideyuki TOKUDA  

     
    PAPER

      Vol:
    E90-B No:12
      Page(s):
    3480-3495

    We have been investigating a new class of ubiquitous services, called Activity Logging, which takes advantage for private and public sensors and the RFID tags on real-world objects. The purpose of Activity Logging is to digitally record users' interests with real-world objects and users' context to describe the users' activity. Such digital information acquired from a range of sensors and tags, if being accumulated, forms a great data source for users to recall their activities later or to share the activities with others. This paper explores the design space to realize Activity Logging, and proposes a simple mobile device called Activity Recorder that marries public and private sensors to provide a powerful Activity Logging service. An Activity Recorder contains a range of private sensors, and has communication capability to work with public sensors around the user.

  • Joint Optimization of Power Allocation and Detection Ordering for Closed-Loop OSIC System

    Deok-Kyu HWANG  Seung-Hoon HWANG  Keum-Chan WHANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:12
      Page(s):
    3606-3611

    In this paper, we investigate a detection ordering scheme of OSIC (Ordered Successive Interference Cancellation) systems suitable for power controlled MIMO transmission. Most studies about power controlled systems have mainly focused on strategies for transmitter, while the ordering scheme optimized at open-loop system has not been modified. In a conventional ordering scheme, the ordering process is done according to the largeness and smallness relation of each sub-stream's SNR. Unlike the conventional scheme, we derive an optimized detection ordering scheme that uses proximity to the optimal SNR. Because of error propagation, our proximity based algorithm is not valid for open-loop MIMO system in many cases. An optimization problem analysis and simulation results show that the system using the proposed ordering scheme outperforms the system using the conventional ordering scheme. Furthermore, due to the nature of QR decomposition, the proposed scheme shows not only lower implementation complexity but also better BER performance compared with the conventional scheme based on pseudo-inverse.

  • A Relocation Method for Circuit Modifications

    Kunihiko YANAGIBASHI  Yasuhiro TAKASHIMA  Yuichi NAKAMURA  

     
    PAPER-Circuit Synthesis

      Vol:
    E90-A No:12
      Page(s):
    2743-2751

    In this paper, we propose a novel migration method. In this method, the resultant placement retains the structure of the original placement, called model placement, as much as possible. For this purpose, we minimize the sum of the difference in area between the model placement and the relocated one and the total amount of displacement between them. Moreover, to achieve a short runtime, we limit the solution space and change the packing origin in the optimization process. We construct the system on Sequence-Pair. Experimental results show that our approach preserves the chip area and the overall circuit structure with 98% less runtime than that realized by naive simulated annealing.

  • Analysis of Second-Order Modes of Linear Discrete-Time Systems under Bounded-Real Transformations

    Shunsuke KOSHITA  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Systems and Control

      Vol:
    E90-A No:11
      Page(s):
    2510-2515

    This paper discusses the behavior of the second-order modes (Hankel singular values) of linear discrete-time systems under bounded-real transformations, where the transformations are given by arbitrary transfer functions with magnitude bounded by unity. Our main result reveals that the values of the second-order modes are decreased under any of the above-mentioned transformations. This result is the generalization of the theory of Mullis and Roberts, who proved that the second-order modes are invariant under any allpass transformation, i.e. any lossless bounded-real transformation. We derive our main result by describing the controllability/observability Gramians of transformed systems with the help of the discrete-time bounded-real lemma.

  • Coordinate Interleaved Orthogonal Design with Two Transmit Antennas in Spatially Correlated Rayleigh Fading Channels: Symbol-Error Rate and Diversity Order

    Hoojin LEE  Robert W. HEATH, Jr.  Edward J. POWERS  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:11
      Page(s):
    3294-3297

    Full-diversity transmission for space-time block codes (STBCs) with multiple transmit antennas can be achieved by using coordinate interleaved orthogonal designs (CIODs). To effectively evaluate the performance of CIODs, we derive union upper and lower bounds on the symbol-error rate (SER) and a corresponding asymptotic diversity order of symmetric structured CIOD, in particular, with two transmit antennas over quasi-static spatially uncorrelated/correlated frequency-nonselective Rayleigh fading channels. Some numerical results are provided to verify our analysis.

  • A New Ordered Decision Feedback Equalization Algorithm for Spatial Multiplexing Systems in MIMO Channel

    Wenjie JIANG  Yusuke ASAI  Takeshi ONIZAWA  Satoru AIKAWA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E90-A No:11
      Page(s):
    2546-2555

    In rich scattering environments, multiple antenna systems designed to accomplish spatial multiplexing have enormous potential of lifting the capacity of corresponding multiple input multiple output channels. In this paper, we present a new low complexity algorithm for decision feedback equalization detector in the SM scheme. The basic idea is to reduce the joint optimization problem to separate optimization problems to achieve better performance-complexity tradeoffs. Concretely, we separately optimize the detection order and the detector filters so that the complexity of the entire signal detection task is reduced. The new order search rule approximates the optimal Bell Labs layered space time (BLAST) approach from a geometrical perspective, and the detector filters are derived using a Cholesky based QR decomposition. The new algorithm is able to switch from zero forcing to minimum mean square error without additional operations and the computational effort is a small fraction of that in the optimal BLAST algorithm. Despite its low complexity, the error performance of new detector closely approximates that of the standard BLAST.

  • MRAM Applications Using Unlimited Write Endurance

    Tadahiko SUGIBAYASHI  Takeshi HONDA  Noboru SAKIMURA  Shuichi TAHARA  Naoki KASAI  

     
    PAPER-Next-Generation Memory for SoC

      Vol:
    E90-C No:10
      Page(s):
    1936-1940

    Apart from magnetic random access memories (MRAM), nonvolatile memories cannot be used without causing fatigue. As the use of MRAMs can solve fatigue problems, MRAMs have a large potential to open up large new markets. The manufacturing cost of LSIs cannot be reduced while they have not been produced massively. To increase the size of the MRAM market, new applications, in which MRAMs create added value, are needed. A demo system that models a drive recorder was developed to introduce the novel features of MRAMs, and a 4-Mb MRAM was developed to be used in the demo system.

  • Design of Class DE Inverter with Second Order Constant K Band-Pass Filter

    Motoki KATAYAMA  Hiroyuki HASE  Hiroo SEKIYA  Jianming LU  Takashi YAHAGI  

     
    PAPER-Nonlinear Circuits

      Vol:
    E90-A No:10
      Page(s):
    2132-2140

    In this paper, class DE inverter with second order constant K band-pass filter is proposed. In the proposed inverter, the band-pass filter is used instead of the resonant filter in class DE inverter presented at the previous papers. By using band-pass filter, two important results can be gotten. One is the sensitivity of the output voltage to the operating frequency is suppressed by using band-pass filter. The other is that zero voltage switching operation appears when the operating frequency is lower than the nominal frequency. Moreover, it keeps the advantage of class DE inverter with resonant filter, that is, high power conversion efficiency under high frequency operation because of class E switching. The laboratory experiments achieve 90.4% power conversion efficiency under 1.98 W output power and 1.0 MHz operation.

  • Consideration of Capacity and Order Constraints for Event-Varying MPL Systems

    Hiroyuki GOTO  Shiro MASUDA  

     
    LETTER-Systems and Control

      Vol:
    E90-A No:9
      Page(s):
    2024-2028

    This letter extends the existent MPL (Max-Plus Linear) state-space representation and proposes a new form that can account for both capacity and order constraints. It is often essential to consider these factors when applying the MPL approach to scheduling problems for production or transportation systems. The derived form is a type of augmented state-representation and can contribute to obtaining the earliest start and completion times for processes in installed facilities.

  • Framework for PCE Based Multi-Layer Service Networks

    Mallik TATIPAMULA  Eiji OKI  Ichiro INOUE  Kohei SHIOMOTO  Zafar ALI  

     
    SURVEY PAPER-Traffic Engineering and Multi-Layer Networking

      Vol:
    E90-B No:8
      Page(s):
    1903-1911

    Implementing the fast-responding multi-layer service network (MLSN) functionality will allow the IP/MPLS service network logical topology and Optical Virtual Network topology to be reconfigured dynamically according to the traffic pattern on the network. Direct links can be created or removed in the logical IP/MPLS service network topology, when either extra capacity in MLSN core is needed or existing capacity in core is no longer required. Reconfiguring the logical and virtual network topologies constitute a new manner by which Traffic Engineering (TE) can solve or avoid network congestion problems and service degradations. As both IP and optical network layers are involved, this is called Multi-layer Traffic Engineering. We proposed border model based MLSN architecture in [5]. In this paper, we define the realization of Multi-Layer TE functions using Path Computation Element (PCE) for Border model based MLSN. It defines nodal requirements for multi-layer TE. Requirements of communication protocol between PCC (Path Computation Client) and PCE is introduced. It presents Virtual Network Topology (VNT) scenarios and steps involved along with examples for PCE-based VNT reconfiguration triggered by network failure, where VNT is a set of different layer's network resource accumulation.

  • Enabling Large-Scale Bayesian Network Learning by Preserving Intercluster Directionality

    Sungwon JUNG  Kwang Hyung LEE  Doheon LEE  

     
    PAPER-Artificial Intelligence and Cognitive Science

      Vol:
    E90-D No:7
      Page(s):
    1018-1027

    We propose a recursive clustering and order restriction (R-CORE) method for learning large-scale Bayesian networks. The proposed method considers a reduced search space for directed acyclic graph (DAG) structures in scoring-based Bayesian network learning. The candidate DAG structures are restricted by clustering variables and determining the intercluster directionality. The proposed method considers cycles on only cmax(«n) variables rather than on all n variables for DAG structures. The R-CORE method could be a useful tool in very large problems where only a very small amount of training data is available.

  • Content Adaptive Visible Watermarking during Ordered Dithering

    Hao LUO  Jeng-Shyang PAN  Zhe-Ming LU  

     
    LETTER-Application Information Security

      Vol:
    E90-D No:7
      Page(s):
    1113-1116

    This letter presents an improved visible watermarking scheme for halftone images. It incorporates watermark embedding into ordered dither halftoning by threshold modulation. The input images include a continuous-tone host image (e.g. an 8-bit gray level image) and a binary watermark image, and the output is a halftone image with a visible watermark. Our method is content adaptive because it takes local intensity information of the host image into account. Experimental results demonstrate effectiveness of the proposed technique. It can be used in practical applications for halftone images, such as commercial advertisement, content annotation, copyright announcement, etc.

  • Invariance of Second-Order Modes of Linear Continuous-Time Systems under Typical Frequency Transformations

    Masayuki KAWAMATA  Yousuke MIZUKAMI  Shunsuke KOSHITA  

     
    LETTER-Systems and Control

      Vol:
    E90-A No:7
      Page(s):
    1481-1486

    This paper discusses the behavior of the second-order modes (Hankel singular values) of linear continuous-time systems under typical frequency transformations, such as lowpass-lowpass, lowpass-highpass, lowpass-bandpass, and lowpass-bandstop transformations. Our main result establishes the fact that the second-order modes are invariant under any of these typical frequency transformations. This means that any transformed system that is generated from a prototype system has the same second-order modes as those of the prototype system. We achieve the derivation of this result by describing the state-space equations and the controllability/observability Gramians of transformed systems.

  • IM3 Cancellation Method Using Current Feedback Suitable for a Multi-Stage RFIC Amplifier

    Toshifumi NAKATANI  Koichi OGAWA  

     
    PAPER

      Vol:
    E90-C No:6
      Page(s):
    1209-1221

    A new method of cancellation of IM3 using current feedback has been proposed for a multi-stage RFIC amplifier. In order to cancel the IM3 present in an output signal of the amplifier, the IIP3 level and IM3 phase of the amplifier are adjusted by means of feedback circuit techniques, so that the target specification is satisfied. By estimating the IIP3 level and IM3 phase variations for two states in situations with and without feedback possessing linear factors, the parameters of a feedback circuit can be calculated. To confirm the validity of the method, we have investigated two approaches; one including an analytical approach to designing a two-stage feedback amplifier, achieving an IIP3 level improvement of 14.8 dB. The other method involves the fabrication of single-stage amplifiers with and without feedback, operating at 850 MHz, both of which were designed as an integrated circuit using a 0.18 µm SiGe BiCMOS process. The fabricated IC's were tested using a load-pull measurement system, and a good agreement between the estimated and measured IIP3 level and IM3 phase variations has been achieved. Further studies show that the error in these variations, as estimated by the method, has been found to be less than 1.5 dB and 15 degrees, respectively, when the load admittance at 1701 MHz was greater than 1/50 S.

  • A Study to Realize a 1-V Operational Passive Σ-Δ Modulator by Using a 90 nm CMOS Process

    Toru CHOI  Tatsuya SAKAMOTO  Yasuhiro SUGIMOTO  

     
    LETTER

      Vol:
    E90-C No:6
      Page(s):
    1304-1306

    A 1-V operational sigma-delta modulator with a second-order passive switched capacitor filter is designed and fabricated by using a 90 nm CMOS process. No gate-voltage bootstrapped scheme is adopted to drive analog switches, and the voltage gain of a comparator is chosen to be 94 dB. The experimental results show that the peak SNR reached 68.9 dB with a frequency bandwidth of 40 kHz when the clock was 40 MHz.

  • Guided-Wave EO Intensity Modulator Using Coupled Microstrip Line Electrode of Higher-Order Harmonic Resonance Combined with Polarization-Reversed Structure

    Akira ENOKIHARA  Hiroyoshi YAJIMA  Hiroshi MURATA  Yasuyuki OKAMURA  

     
    PAPER-LiNbO3 Devices

      Vol:
    E90-C No:5
      Page(s):
    1096-1104

    A novel structure of a resonator type guided-wave electro-optic intensity modulator is introduced that uses a higher-order harmonic resonant electrode of coupled microstrip lines combined with polarization-reversed structure. The light modulation cancellation caused by the light transit-time effect in the resonant electrode, which is longer than the wavelength of the standing wave, is compensated for to enhance modulation efficiency. The modulator for 26 GHz operation was designed and fabricated with a LiTaO3 substrate. The modulation electrode is 9.03 mm long for seventh order harmonic resonance by RF signal. The workability of the modulator was confirmed by experiments with 1.3 µm wavelength light.

  • A More Robust Subsampling-Based Image Watermarking

    Chih-Cheng LO  Pao-Tung WANG  Jeng-Shyang PAN  Bin-Yih LIAO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E90-D No:5
      Page(s):
    877-878

    In this letter, we propose a novel subsampling based image watermark sequentially embedding scheme to reduce the risk of common permutation attack. The image is still perceptual after watermarking, and experimental results also show its effectiveness and robustness.

  • Adaptive Scanning Using Pixel Similarity for H.264/AVC

    Dae-Yeon KIM  Dong-Kyun KIM  Yung-Lyul LEE  

     
    LETTER-Image

      Vol:
    E90-A No:5
      Page(s):
    1112-1114

    In H.264/AVC, the quantized coefficients are scanned in a zigzag pattern. But the zigzag scanning is not always efficient for the directional spatial predictions in the intra coding of H.264/AVC. In this letter, we propose an adaptive scanning using the pixel similarity of the neighboring pixels to achieve enhanced intra coding performance. The proposed method reduces the bit rate approximately 2% compared with H.264/AVC without video quality degradation.

  • A Higher-Order Knuth-Bendix Procedure and Its Applications

    Keiichirou KUSAKARI  Yuki CHIBA  

     
    PAPER-Computation and Computational Models

      Vol:
    E90-D No:4
      Page(s):
    707-715

    The completeness (i.e. confluent and terminating) property is an important concept when using a term rewriting system (TRS) as a computational model of functional programming languages. Knuth and Bendix have proposed a procedure known as the KB procedure for generating a complete TRS. A TRS cannot, however, directly handle higher-order functions that are widely used in functional programming languages. In this paper, we propose a higher-order KB procedure that extends the KB procedure to the framework of a simply-typed term rewriting system (STRS) as an extended TRS that can handle higher-order functions. We discuss the application of this higher-order KB procedure to a certification technique called inductionless induction used in program verification, and its application to fusion transformation, a typical kind of program transformation.

221-240hit(489hit)