The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] sign(2667hit)

1081-1100hit(2667hit)

  • A Succeeding Transmission Scheme for Burst Transfer in Optical Burst Switched Networks

    Yusuke HIROTA  Yu TANAKA  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E91-B No:12
      Page(s):
    3904-3912

    Optical Burst Switched (OBS) networks are considered as promising candidates for the next generation network architecture which does not need high-speed switch technologies. In OBS networks, contention resolution is one of the significant problems. Generally, setup reservations are operated per burst in OBS networks. To transmit multiple successive bursts successfully, the effective wavelength reservation must be implemented and enhanced network performance must be realized. In the proposed method, when an optical burst is generated and its destination is the same as that of the preceding burst or the path until the destination includes the entire path of the preceding burst, the subsequent burst is assigned to the same wavelength as the preceding burst and transmitted sequentially. The main aim in the proposed method is the efficient use of wavelength resources and the reduction of burst loss probability. We simulate and evaluate the effectiveness of the proposed method. As a result, it is verified that the proposed method can reduce the burst loss probably.

  • Broadband Equalizer Design with Commensurate Transmission Lines via Reflectance Modeling

    Metin ENGÜL  Sddk B. YARMAN  

     
    PAPER-Circuit Theory

      Vol:
    E91-A No:12
      Page(s):
    3763-3771

    In this paper, an alternative approach is presented, to design equalizers (or matching networks) with commensurate (or equal length) transmission lines. The new method automatically yields the matching network topology with characteristic impedances of the commensurate lines. In the implementation process of the new technique first, the driving point impedance data of the matching network is generated by tracing a pre-selected transducer power gain shape, without optimization. Then, it is modelled as a realizable bounded-real input reflection coefficient in Richard domain, which in turn yields the desired equalizer topology with line characteristic impedances. This process results in an excellent initial design for the commercially available computer aided design (CAD) packages to generate final circuit layout for fabrication. An example is given to illustrate the utilization of the new method. It is expected that the proposed design technique is employed as a front-end, to commercially available computer aided design (CAD) packages which generate the actual equalizer circuit layout with physical dimensions for mass production.

  • Dummy Fill Aware Buffer Insertion after Layer Assignment Based on an Effective Estimation Model

    Yanming JIA  Yici CAI  Xianlong HONG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E91-A No:12
      Page(s):
    3783-3792

    This paper studies the impact of dummy fill for chemical mechanical polishing (CMP)-induced capacitance variation on buffer insertion based on a virtual CMP fill estimation model. Compared with existing methods, our algorithm is more feasible by performing buffer insertion not in post-process but during early physical design. Our contributions are threefold. First, we introduce an improved fast dummy fill amount estimation algorithm based on [4], and use some speedup techniques (tile merging, fill factor and amount assigning) for early estimation. Second, based on some reasonable assumptions, we present an optimum virtual dummy fill method to estimate dummy position and the effect on the interconnect capacitance. Then the dummy fill estimation model was verified by our experiments. Third, we use this model in early buffer insertion after layer assignment considering the effects of dummy fill. Experimental results verified the necessity of early dummy fill estimation and the validity of our algorithm. Buffer insertion considering dummy fill during early physical design is necessary and our algorithm is promising.

  • Efficient Hybrid Grid Synthesis Method Based on Genetic Algorithm for Power/Ground Network Optimization with Dynamic Signal Consideration

    Yun YANG  Shinji KIMURA  

     
    PAPER-Physical Level Design

      Vol:
    E91-A No:12
      Page(s):
    3431-3442

    This paper proposes an efficient design algorithm for power/ground (P/G) network synthesis with dynamic signal consideration, which is mainly caused by Ldi/dt noise and Cdv/dt decoupling capacitance (DECAP) current in the distribution network. To deal with the nonlinear global optimization under synthesis constraints directly, the genetic algorithm (GA) is introduced. The proposed GA-based synthesis method can avoid the linear transformation loss and the restraint condition complexity in current SLP, SQP, ICG, and random-walk methods. In the proposed Hybrid Grid Synthesis algorithm, the dynamic signal is simulated in the gene disturbance process, and Trapezoidal Modified Euler (TME) method is introduced to realize the precise dynamic time step process. We also use a hybrid-SLP method to reduce the genetic execute time and increase the network synthesis efficiency. Experimental results on given power distribution network show the reduction on layout area and execution time compared with current P/G network synthesis methods.

  • Highly Efficient Comparator Design Automation for TIQ Flash A/D Converter

    Insoo KIM  Jincheol YOO  JongSoo KIM  Kyusun CHOI  

     
    PAPER-Physical Level Design

      Vol:
    E91-A No:12
      Page(s):
    3415-3422

    Threshold Inverter Quantization (TIQ) technique has been gaining its importance in high speed flash A/D converters due to its fast data conversion speed. It eliminates the need of resistor ladders for reference voltages generation which requires substantial power consumption. The key to TIQ comparators design is to generate 2n - 1 different sized TIQ comparators for an n-bit A/D converter. This paper presents a highly efficient TIQ comparator design methodology based on an analytical model as well as SPICE simulation experimental model. One can find any sets of TIQ comparators efficiently using the proposed method. A 6-bit TIQ A/D converter has been designed in a 0.18 µm standard CMOS technology using the proposed method, and compared to the previous measured results in order to verify the proposed methodology.

  • Construction of Scalable 2-D Multi-Weight Optical Orthogonal Codes for Optical CDMA Networks

    Yong-Chun PIAO  Jinwoo CHOE  Wonjin SUNG  Dong-Joon SHIN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E91-B No:12
      Page(s):
    3990-3993

    In this letter, we propose combinatorial and search construction methods of 2-D multi-weight optical orthogonal codes (OOCs) with autocorrelation 0 and crosscorrelation 1, called multi-weight single or no pulse per row (MSNPR) codes. An upper bound on the size of MSNPR codes is derived and the performance of MSNPR codes is compared to those of other OOCs in terms of the bit error rate (BER) and evaluated using blocking probability. It is also demonstrated that the MSNPR codes can be flexibly constructed for different applications, providing the scalability to optical CDMA networks.

  • High-Level Synthesis of Software Function Calls

    Masanari NISHIMURA  Nagisa ISHIURA  Yoshiyuki ISHIMORI  Hiroyuki KANBARA  Hiroyuki TOMIYAMA  

     
    LETTER-High-Level Synthesis and System-Level Design

      Vol:
    E91-A No:12
      Page(s):
    3556-3558

    This letter presents a novel framework in high-level synthesis where hardware modules synthesized from functions in a given ANSI-C program can call the other software functions in the program. This enables high-level synthesis from C programs that contains calls to hard-to-synthesize functions, such as dynamic memory management, I/O request, or very large and complex functions. A single-thread implementation scheme is shown, whose correctness has been verified through register transfer level simulation.

  • An Efficient RSS-Based Localization Scheme with Calibration in Wireless Sensor Networks

    Cong TRAN-XUAN  Eunchan KIM  Insoo KOO  

     
    LETTER-Network

      Vol:
    E91-B No:12
      Page(s):
    4013-4016

    In wireless sensor networks (WSNs), localization using the received signal strength (RSS) method is famous for easy adaptation and low cost where measuring the distance between sensor nodes. However, in real localization systems, the RSS is strongly affected by many surrounding factors and tends to be unstable, so that it degrades accuracy in distance measurement. In this paper, we propose the angle-referred calibration based RSS method where angle relation between sensor nodes is used to perform the calibration for better performance in distance measurement. As a result, the proposed scheme shows that it can provide high precision.

  • Simultaneous Tunable Wavelength Conversion and Power Amplification Using a Pump-Modulated Wide-Band Fiber Optical Parametric Amplifier

    Guo-Wei LU  Kazi Sarwar ABEDIN  Tetsuya MIYAZAKI  

     
    LETTER-Fiber-Optic Transmission for Communications

      Vol:
    E91-B No:11
      Page(s):
    3712-3714

    We propose and experimentally demonstrate an all-optical broadband wavelength conversion scheme with simultaneous power amplification based on a pump-modulated fiber optic parametric amplifier (FOPA). All-optical tunable wavelength conversion from one to two wavelengths was achieved with ≥13 dB extinction ratio and <2.7-dB power penalty, accompanied by a high (≥37 dB) and flat ( 3 dB variation) FOPA gain spectrum over 47 nm.

  • Precise DOA Estimation Using SAGE Algorithm with a Cylindrical Array

    Masaki TAKANASHI  Toshihiko NISHIMURA  Yasutaka OGAWA  Takeo OHGANE  

     
    LETTER-Antennas and Propagation

      Vol:
    E91-B No:11
      Page(s):
    3784-3787

    A uniform circular array (UCA) is a well-known array configuration which can accomplish estimation of 360 field of view with identical accuracy. However, a UCA cannot estimate coherent signals because we cannot apply the SSP owing to the structure of UCA. Although a variety of studies on UCA in coherent multipath environments have been done, it is impossible to estimate the DOA of coherent signals with different incident polar angles. Then, we have proposed Root-MUSIC algorithm with a cylindrical array. However, the estimation performance is degraded when incident signals arrive with close polar angles. To solve this problem, in the letter, we propose to use SAGE algorithm with a cylindrical array. Here, we adopt a CLA Root-MUSIC for the initial estimation and decompose two-dimensional search to double one-dimensional search to reduce the calculation load. The results show that the proposal achieves high resolution with low complexity.

  • New Families of Binary Low Correlation Zone Sequences Based on Interleaved Quadratic Form Sequences

    Zhengchun ZHOU  Xiaohu TANG  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E91-A No:11
      Page(s):
    3406-3409

    In this letter, new families of binary low correlation zone (LCZ) sequences based on the interleaving technique and quadratic form sequences are constructed, which include the binary LCZ sequence set derived from Gordon-Mills-Welch (GMW) sequences. The constructed sequences have the property that, in a specified zone, the out-of-phase autocorrelation and cross-correlation values are all equal to -1. Due to this property, such sequences are suitable for quasi-synchronous code-division multiple access (QS-CDMA) systems.

  • Contract Specification in Java: Classification, Characterization, and a New Marker Method

    Chien-Tsun CHEN  Yu Chin CHENG  Chin-Yun HSIEH  

     
    PAPER-Fundamentals of Software and Theory of Programs

      Vol:
    E91-D No:11
      Page(s):
    2685-2692

    Design by Contract (DBC), originated in the Eiffel programming language, is generally accepted as a practical method for building reliable software. Currently, however, few languages have built-in support for it. In recent years, several methods have been proposed to support DBC in Java. We compare eleven DBC tools for Java by analyzing their impact on the developer's programming activities, which are characterized by seven quality attributes identified in this paper. It is shown that each of the existing tools fails to achieve some of the quality attributes. This motivates us to develop ezContract, an open source DBC tool for Java that achieves all of the seven quality attributes. ezContract achieves streamlined integration with the working environment. Notably, standard Java language is used and advanced IDE features that work for standard Java programs can also work for the contract-enabled programs. Such features include incremental compilation, automatic refactoring, and code assist.

  • Real-Time Road Sign Detection Using Fuzzy-Boosting

    Changyong YOON  Heejin LEE  Euntai KIM  Mignon PARK  

     
    PAPER-Intelligent Transport System

      Vol:
    E91-A No:11
      Page(s):
    3346-3355

    This paper describes a vision-based and real-time system for detecting road signs from within a moving vehicle. The system architecture which is proposed in this paper consists of two parts, the learning and the detection part of road sign images. The proposed system has the standard architecture with adaboost algorithm. Adaboost is a popular algorithm which used to detect an object in real time. To improve the detection rate of adaboost algorithm, this paper proposes a new combination method of classifiers in every stage. In the case of detecting road signs in real environment, it can be ambiguous to decide to which class input images belong. To overcome this problem, we propose a method that applies fuzzy measure and fuzzy integral which use the importance and the evaluated values of classifiers within one stage. It is called fuzzy-boosting in this paper. Also, to improve the speed of a road sign detection algorithm using adaboost at the detection step, we propose a method which chooses several candidates by using MC generator. In this paper, as the sub-windows of chosen candidates pass classifiers which are made from fuzzy-boosting, we decide whether a road sign is detected or not. Using experiment result, we analyze and compare the detection speed and the classification error rate of the proposed algorithm applied to various environment and condition.

  • Cross-Layer Design for Low-Power Wireless Sensor Node Using Wave Clock

    Takashi TAKEUCHI  Yu OTAKE  Masumi ICHIEN  Akihiro GION  Hiroshi KAWAGUCHI  Chikara OHTA  Masahiko YOSHIMOTO  

     
    PAPER

      Vol:
    E91-B No:11
      Page(s):
    3480-3488

    We propose Isochronous-MAC (I-MAC) using the Long-Wave Standard Time Code (so called "wave clock"), and introduce cross-layer design for a low-power wireless sensor node with I-MAC. I-MAC has a periodic wakeup time synchronized with the actual time, and thus we take the wave clock. However, a frequency of a crystal oscillator varies along with temperature, which incurs a time difference among nodes. We present a time correction algorithm to address this problem, and shorten the time difference. Thereby, the preamble length in I-MAC can be minimized, which saves communication power. For further power reduction, a low-power crystal oscillator is also proposed, as a physical-layer design. We implemented I-MAC on an off-the-shelf sensor node to estimate the power saving, and verified that the proposed cross-layer design reduces 81% of the total power, compared to Low Power Listening.

  • A Study on Possibility of Detecting IEEE802.15.4a Signals for Spectrum Sharing

    Makoto HASEGAWA  Tetsushi IKEGAMI  Kenichi TAKIZAWA  

     
    LETTER

      Vol:
    E91-A No:11
      Page(s):
    3201-3205

    In March, 2007, IEEE802.15.4a was standardized as a low-rate and low-power UWB system for sensor networks. In general, detection of the IEEE802.15.4a signal is considered to be difficult because of its low transmitting power density and low duty cycle. However, if detecting of the IEEE802.15.4a signal is available, it is possible to avoid interference issues both among the IEEE802.15.4a systems and between the 15.4a and other UWB systems. This letter proposes a simple detection method using non-coherent detectors. The possibility of detecting of the IEEE802.15.4a signal by proposal detection method was examined. By conducting experiments with an emulated 15.4a RF signal, the signal detection probability was examined, and 15.4a signal from the range of about 11 meters in the radius could be detected. From this observation, the CSMA/CA method with detecting the signal in 15.4a system may be applied for alternative access method for 15.4a systems.

  • Selective Signal Combining for Effective BER Improvement in Noncoherent IR-UWB Systems

    Jaewoon KIM  Sekwon KIM  Wonjin SUNG  Yoan SHIN  

     
    LETTER

      Vol:
    E91-A No:11
      Page(s):
    3197-3200

    In order to effectively improve the BER (Bit Error Rate) performance of noncoherent IR-UWB (Impulse Radio Ultra Wide Band) systems utilizing 2PPM (Binary Pulse Position Modulation), we propose a selective signal combining scheme which performs selective combination of received signals by estimating the SNR (Signal-to-Noise Ratio) of the energies during the pulse width interval.

  • A Support Vector Machine-Based Gender Identification Using Speech Signal

    Kye-Hwan LEE  Sang-Ick KANG  Deok-Hwan KIM  Joon-Hyuk CHANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E91-B No:10
      Page(s):
    3326-3329

    We propose an effective voice-based gender identification method using a support vector machine (SVM). The SVM is a binary classification algorithm that classifies two groups by finding the voluntary nonlinear boundary in a feature space and is known to yield high classification performance. In the present work, we compare the identification performance of the SVM with that of a Gaussian mixture model (GMM)-based method using the mel frequency cepstral coefficients (MFCC). A novel approach of incorporating a features fusion scheme based on a combination of the MFCC and the fundamental frequency is proposed with the aim of improving the performance of gender identification. Experimental results demonstrate that the gender identification performance using the SVM is significantly better than that of the GMM-based scheme. Moreover, the performance is substantially improved when the proposed features fusion technique is applied.

  • Efficient Secret Sharing Schemes Based on Unauthorized Subsets

    Kouya TOCHIKUBO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    2860-2867

    We propose two multiple assignment secret sharing schemes realizing general access structures. One is always more efficient than the secret sharing scheme proposed by Ito, Saito and Nishizeki [5] from the viewpoint of the number of shares distributed to each participant. The other is also always more efficient than the scheme I of [7].

  • A Novel MAC Protocol for QoS in Ad Hoc Wireless Networks

    Kiyoshi TAKAHASHI  Takuya TERASAWA  Toshinori TSUBOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3297-3306

    We propose a medium access control (MAC) protocol for real-time applications in one-hop ad-hoc wireless networks. It is a distributed mechanism that takes account of priority and has a bounded packet delay. Nodes use energy signals to contend for the right to access the channel. Nodes, which have a packet to transmit, send energy signals or listen to the channel based on their binary frame. The node that has sent energy signals and has not heard any energy signals wins the right to access the channel. We use two schemes to determine the binary frame: at the beginning of a session, a node determines it based on its priority level and a random number; after successful transmission, based on a count of successful packet transmissions. With the first scheme, in order to reduce contention losses, the nodes that had won the right to access the channel but failed in transmission have priority over the other nodes. With the second scheme, the node that has the largest count, the one that has been waiting the longest, can send a packet without risking collision. The protocol provides higher probability of successful transmission and a limit on maximum packet delay. An analysis of the protocol provides conditions for the protocol to be stable. We evaluate the performance of the proposed protocol using simulations of a network with a mixed population of data and real-time nodes, whose source is constant bit rate (CBR) and a two state Markov on/off process.

  • Application-Level and User-Level QoS Assessment of Audio-Video IP Transmission over Cross-Layer Designed Wireless Ad Hoc Networks

    Toshiro NUNOME  Shuji TASAKA  Ken NAKAOKA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3205-3215

    This paper performs application-level QoS and user-level QoS assessment of audio-video streaming in cross-layer designed wireless ad hoc networks. In order to achieve high QoS at the user-level, we employ link quality-based routing in the network layer and media synchronization control in the application layer. We adopt three link quality-based routing protocols: OLSR-SS (Signal Strength), AODV-SS, and LQHR (Link Quality-Based Hybrid Routing). OLSR-SS is a proactive routing protocol, while AODV-SS is a reactive one. LQHR is a hybrid protocol, which is a combination of proactive and reactive routing protocols. For application-level QoS assessment, we performed computer simulation with ns-2 where an IEEE 802.11b mesh topology network with 24 nodes was assumed. We also assessed user-level QoS by a subjective experiment with 30 assessors. From the assessment results, we find AODV-SS the best for networks with long inter-node distances, while LQHR outperforms AODV-SS for short inter-node distances. In addition, we also examine characteristics of the three schemes with respect to the application-level QoS in random topology networks.

1081-1100hit(2667hit)