The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] sign(2667hit)

1101-1120hit(2667hit)

  • Robust Transceiver Design for Multiuser MIMO Downlink with Channel Uncertainties

    Wei MIAO  Yunzhou LI  Xiang CHEN  Shidong ZHOU  Jing WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3351-3354

    This letter addresses the problem of robust transceiver design for the multiuser multiple-input-multiple-output (MIMO) downlink where the channel state information at the base station (BS) is imperfect. A stochastic approach which minimizes the expectation of the total mean square error (MSE) of the downlink conditioned on the channel estimates under a total transmit power constraint is adopted. The iterative algorithm reported in [2] is improved to handle the proposed robust optimization problem. Simulation results show that our proposed robust scheme effectively reduces the performance loss due to channel uncertainties and outperforms existing methods, especially when the channel errors of the users are different.

  • Robust MOE Detector for DS-CDMA Systems with Signature Waveform Mismatch

    Tsui-Tsai LIN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3375-3378

    In this letter, a decision-directed MOE detector with excellent robustness against signature waveform mismatch is proposed for DS-CDMA systems. Both the theoretic analysis and computer simulation results demonstrate that the proposed detector can provide better SINR performance than that of conventional detectors.

  • Thermal-Aware Test Access Mechanism and Wrapper Design Optimization for System-on-Chips

    Thomas Edison YU  Tomokazu YONEDA  Krishnendu CHAKRABARTY  Hideo FUJIWARA  

     
    PAPER-Dependable Computing

      Vol:
    E91-D No:10
      Page(s):
    2440-2448

    Rapid advances in semiconductor manufacturing technology have led to higher chip power densities, which places greater emphasis on packaging and temperature control during testing. For system-on-chips, peak power-based scheduling algorithms have been used to optimize tests under specified power constraints. However, imposing power constraints does not always solve the problem of overheating due to the non-uniform distribution of power across the chip. This paper presents a TAM/Wrapper co-design methodology for system-on-chips that ensures thermal safety while still optimizing the test schedule. The method combines a simplified thermal-cost model with a traditional bin-packing algorithm to minimize test time while satisfying temperature constraints. Furthermore, for temperature checking, thermal simulation is done using cycle-accurate power profiles for more realistic results. Experiments show that even a minimal sacrifice in test time can yield a considerable decrease in test temperature as well as the possibility of further lowering temperatures beyond those achieved using traditional power-based test scheduling.

  • A Novel MAC Protocol for QoS in Ad Hoc Wireless Networks

    Kiyoshi TAKAHASHI  Takuya TERASAWA  Toshinori TSUBOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3297-3306

    We propose a medium access control (MAC) protocol for real-time applications in one-hop ad-hoc wireless networks. It is a distributed mechanism that takes account of priority and has a bounded packet delay. Nodes use energy signals to contend for the right to access the channel. Nodes, which have a packet to transmit, send energy signals or listen to the channel based on their binary frame. The node that has sent energy signals and has not heard any energy signals wins the right to access the channel. We use two schemes to determine the binary frame: at the beginning of a session, a node determines it based on its priority level and a random number; after successful transmission, based on a count of successful packet transmissions. With the first scheme, in order to reduce contention losses, the nodes that had won the right to access the channel but failed in transmission have priority over the other nodes. With the second scheme, the node that has the largest count, the one that has been waiting the longest, can send a packet without risking collision. The protocol provides higher probability of successful transmission and a limit on maximum packet delay. An analysis of the protocol provides conditions for the protocol to be stable. We evaluate the performance of the proposed protocol using simulations of a network with a mixed population of data and real-time nodes, whose source is constant bit rate (CBR) and a two state Markov on/off process.

  • QR-LRL Signal Detection for Spatially Multiplexed MIMO Systems

    Seungjae BAHNG  Youn-Ok PARK  Jaekwon KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3383-3386

    The performance of the ordered successive interference cancellation (OSIC) signal detection method is well known to depend on the successful detection of the first layer. In a previous work, in an effort to mitigate the error propagation effect, all the constellation points were tried as the first layer symbol, thereby achieving a better performance. In this letter, we show that the selection of the first layer impacts the error performance significantly, and based on the observation, we propose a novel signal detection method QR-LRL. In the proposed work, the least reliable layer (LRL) is chosen to be the first layer, which is shown to be the best choice in terms of noise enhancement in detecting the other layers. Also, we discuss Log Likelihood Ratio (LLR) computation when the proposed method is used. Computer simulations confirm the efficacy of the proposed method.

  • Efficient Secret Sharing Schemes Based on Unauthorized Subsets

    Kouya TOCHIKUBO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    2860-2867

    We propose two multiple assignment secret sharing schemes realizing general access structures. One is always more efficient than the secret sharing scheme proposed by Ito, Saito and Nishizeki [5] from the viewpoint of the number of shares distributed to each participant. The other is also always more efficient than the scheme I of [7].

  • Application-Level and User-Level QoS Assessment of Audio-Video IP Transmission over Cross-Layer Designed Wireless Ad Hoc Networks

    Toshiro NUNOME  Shuji TASAKA  Ken NAKAOKA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3205-3215

    This paper performs application-level QoS and user-level QoS assessment of audio-video streaming in cross-layer designed wireless ad hoc networks. In order to achieve high QoS at the user-level, we employ link quality-based routing in the network layer and media synchronization control in the application layer. We adopt three link quality-based routing protocols: OLSR-SS (Signal Strength), AODV-SS, and LQHR (Link Quality-Based Hybrid Routing). OLSR-SS is a proactive routing protocol, while AODV-SS is a reactive one. LQHR is a hybrid protocol, which is a combination of proactive and reactive routing protocols. For application-level QoS assessment, we performed computer simulation with ns-2 where an IEEE 802.11b mesh topology network with 24 nodes was assumed. We also assessed user-level QoS by a subjective experiment with 30 assessors. From the assessment results, we find AODV-SS the best for networks with long inter-node distances, while LQHR outperforms AODV-SS for short inter-node distances. In addition, we also examine characteristics of the three schemes with respect to the application-level QoS in random topology networks.

  • An Efficient Signature Matching Scheme for Mobile Security

    Ruhui ZHANG  Makoto IWATA  

     
    PAPER-Network Management/Operation

      Vol:
    E91-B No:10
      Page(s):
    3251-3261

    The development of network technology reveals the clear trend that mobile devices will soon be equipped with more and more network-based functions and services. This increase also results in more intrusions and attacks on mobile devices; therefore, mobile security mechanisms are becoming indispensable. In this paper, we propose a novel signature matching scheme for mobile security. This scheme not only emphasizes a small resource requirement and an optimal scan speed, which are both important for resource-limited mobile devices, but also focuses on practical features such as stable performance, fast signature set updates and hardware implementation. This scheme is based on the finite state machine (FSM) approach widely used for string matching. An SRAM-based two-level finite state machine (TFSM) solution is introduced to utilize the unbalanced transition distribution in the original FSM to decrease the memory requirement, and to shorten the critical path of the single-FSM solution. By adjusting the boundary of the two FSMs, optimum memory usage and throughput are obtainable. The hardware circuit of our scheme is designed and evaluated by both FPGA and ASIC technology. The result of FPGA evaluation shows that 2,168 unique patterns with a total of 32,776 characters are stored in 177.75 KB SelectRAM blocks of Xilinx XC4VLX40 FPGA and a 3.0 Gbps throughput is achieved. The result of ASIC evaluation with 180 nm-CMOS library shows a throughput of over 4.5 Gbps with 132 KB of SRAM. Because of the small amount of memory and logic cell requirements, as well as the scalability of our scheme, higher performance is achieved by instantiating several signature matching engines when more resources are provided.

  • A Support Vector Machine-Based Gender Identification Using Speech Signal

    Kye-Hwan LEE  Sang-Ick KANG  Deok-Hwan KIM  Joon-Hyuk CHANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E91-B No:10
      Page(s):
    3326-3329

    We propose an effective voice-based gender identification method using a support vector machine (SVM). The SVM is a binary classification algorithm that classifies two groups by finding the voluntary nonlinear boundary in a feature space and is known to yield high classification performance. In the present work, we compare the identification performance of the SVM with that of a Gaussian mixture model (GMM)-based method using the mel frequency cepstral coefficients (MFCC). A novel approach of incorporating a features fusion scheme based on a combination of the MFCC and the fundamental frequency is proposed with the aim of improving the performance of gender identification. Experimental results demonstrate that the gender identification performance using the SVM is significantly better than that of the GMM-based scheme. Moreover, the performance is substantially improved when the proposed features fusion technique is applied.

  • Composite Signaling Coded Cooperation for Fast and Slow Fading

    Asaduzzaman  Hyung Yun KONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:9
      Page(s):
    3025-3029

    Motivated by the recent works of coded cooperation this letter presents a composite signal structure based coded cooperation technique. Our proposed protocol performs well in both slow and fast fading whereas, conventional coded cooperation is ineffective in fast fading. We develop the bounds on BER and FER of our proposal. Simulations confirm our developed bound and shows that the proposed coded cooperation protocol outperforms direct transmission in both fast and slow fading environments.

  • A Novel Railway Signal Control System Based on the Internet and Assurance Technologies

    Takashi KUNIFUJI  Gen KOGURE  Hiroyuki SUGAHARA  Masayuki MATSUMOTO  

     
    PAPER

      Vol:
    E91-D No:9
      Page(s):
    2293-2299

    We have developed a novel railway signal control system that operates as a distributed system. It consists of a central control unit (called LC) and terminal devices (called FC) that are distributed at the railroad wayside and operate signal devices. The Internet technologies and optical LAN technologies have been used as communication methods between the LC and the FCs. While handling enormous amount of electric cables may cause human errors, the system is expected to reduce troubles of the current signal system at construction works thanks to the Internet technologies. The FC is a distributed terminal device that has its own processor and placed at the railroad wayside to control the field signal devices. The LC is a centralized computer device that has software arranged by the function of the field devices. An optical network system and multiple communication paths between the LC and the FCs realize durable transmissions. Moreover, the assure performance of controls and transmissions have been investigated, and the autonomous distributed signal control system is also discussed as the next steps of the system.

  • A Simple Mechanism for Collapsing Instructions under Timing Speculation

    Toshinori SATO  

     
    PAPER

      Vol:
    E91-C No:9
      Page(s):
    1394-1401

    The deep submicron semiconductor technologies will make the worst-case design impossible, since they can not provide design margins that it requires. We are investigating a typical-case design methodology, which we call the Constructive Timing Violation (CTV). This paper extends the CTV concept to collapse dependent instructions, resulting in performance improvement. Based on detailed simulations, we find the proposed mechanism effectively collapses dependent instructions.

  • Threshold Equalization for On-Line Signature Verification

    Isao NAKANISHI  Hiroyuki SAKAMOTO  Yoshio ITOH  Yutaka FUKUI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2244-2247

    In on-line signature verification, complexity of signature shape can influence the value of the optimal threshold for individual signatures. Writer-dependent threshold selection has been proposed but it requires forgery data. It is not easy to collect such forgery data in practical applications. Therefore, some threshold equalization method using only genuine data is needed. In this letter, we propose three different threshold equalization methods based on the complexity of signature. Their effectiveness is confirmed in experiments using a multi-matcher DWT on-line signature verification system.

  • Global Signal Elimination and Local Signals Enhancement from EM Radiation Waves Using Independent Component Analysis

    Motoaki MOURI  Arao FUNASE  Andrzej CICHOCKI  Ichi TAKUMI  Hiroshi YASUKAWA  Masayasu HATA  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1875-1882

    Anomalous environmental electromagnetic (EM) radiation waves have been reported as the portents of earthquakes. Our study's goal is predicting earthquakes using EM radiation waves by detecting some anomalies. We have been measuring the Extremely Low Frequency (ELF) range EM radiation waves all over Japan. However, the recorded data contain signals unrelated to earthquakes. These signals, as noise, confound earthquake prediction efforts. In this paper, we propose an efficient method of global signal elimination and enhancement local signals using Independent Component Analysis (ICA). We evaluated the effectiveness of this method.

  • Single-Input Six-Output Voltage-Mode Filter Using Universal Voltage Conveyors

    Martin MINARCIK  Kamil VRBA  

     
    LETTER

      Vol:
    E91-A No:8
      Page(s):
    2035-2037

    In this letter a new structure of multifunctional frequency filter using a universal voltage conveyor (UVC) is presented. The multifunctional circuit can realize a low-pass, high-pass and band-pass filter. All types of frequency filter can be realized as inverting or non-inverting. Advantages of the proposed structure are the independent control of the quality factor at the cut-off frequency and the low output impedance of output terminals. The computer simulations and measuring of particular frequency filters are depicted.

  • Detection of Leak Location in a Pipeline by Acoustic Signal

    Umut YUNUS  Masaru TSUNASAKI  Yiwei HE  Masanobu Kominami   Katsumi YAMASHITA  

     
    PAPER-Engineering Acoustics

      Vol:
    E91-A No:8
      Page(s):
    2053-2061

    Gas or water leaks in pipes that are buried under ground or that are situated in the walls of buildings may occur due to aging or unpredictable accidents, such as earthquakes. Therefore, the detection of leaks in pipes is an important task and has been investigated extensively. In the present paper, we propose a novel leak detection method by means of acoustic wave. We inject an acoustic chirp signal into a target pipeline and then estimate the leak location from the delay time of the compressed pulse by passing the reflected signal through a correlator. In order to distinguish a leak reflection in a complicated pipeline arrangement, the reflection characteristics of leaks are carefully discussed by numerical simulations and experiments. There is a remarkable difference in the reflection characteristics between the leak and other types of discontinuity, and the property can be utilized to distinguish the leak reflection. The experimental results show that, even in a complicated pipe arrangement including bends and branches, the proposed approach can successfully implement the leak detection. Furthermore, the proposed approach has low cost and is easy to implement because only a personal computer and some commonly equipment are required.

  • Convergence Acceleration of Iterative Signal Detection for MIMO System with Belief Propagation

    Satoshi GOUNAI  Tomoaki OHTSUKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:8
      Page(s):
    2640-2647

    In multiple-input multiple-output (MIMO) wireless systems, the receiver must extract each transmitted signal from received signals. Iterative signal detection with belief propagation (BP) can improve the error rate performance, by increasing the number of detection and decoding iterations in MIMO systems. This number of iterations is, however, limited in actual systems because each additional iteration increases latency, receiver size, and so on. This paper proposes a convergence acceleration technique that can achieve better error rate performance with fewer iterations than the conventional iterative signal detection. Since the Log-Likelihood Ratio (LLR) of one bit propagates to all other bits with BP, improving some LLRs improves overall decoder performance. In our proposal, all the coded bits are divided into groups and only one group is detected in each iterative signal detection whereas in the conventional approach, each iterative signal detection run processes all coded bits, simultaneously. Our proposal increases the frequency of initial LLR update by increasing the number of iterative signal detections and decreasing the number of coded bits that the receiver detects in one iterative signal detection. Computer simulations show that our proposal achieves better error rate performance with fewer detection and decoding iterations than the conventional approach.

  • Parallel Architecture for 2-D Discrete Wavelet Transform with Low Energy Consumption

    Nozomi ISHIHARA  Koki ABE  

     
    PAPER-Digital Signal Processing

      Vol:
    E91-A No:8
      Page(s):
    2068-2075

    A novel two-dimensional discrete wavelet transform (2-DDWT) parallel architecture for higher throughput and lower energy consumption is proposed. The proposed architecture fully exploits full-page burst accesses of DRAM and minimizes the number of DRAM activate and precharge operations. Simulation results revealed that the architecture reduces the number of clock cycles for DRAM memory accesses as well as the DRAM power consumption with moderate cost of internal memory. Evaluation of the VLSI implementation of the architecture showed that the throughput of wavelet filtering was increased by parallelizing row filtering with a minimum area cost, thereby enabling DRAM full-page burst accesses to be exploited.

  • Analysis and Optimization for a Contactor with Feedback Controlled Magnet System

    Yingyi LIU  Degui CHEN  Chunping NIU  Liang JI  Weixiong TONG  

     
    PAPER-Contactors & Circuit Breakers

      Vol:
    E91-C No:8
      Page(s):
    1273-1279

    In the optimum design of AC contactors, it is important to analyze the dynamic behavior. Moreover, movable contact and core bounces have remarkable effect on the lifetime of contactors. According to a new kind of contactor with feedback controlled magnet system, this paper builds two different sets of periodically inter-transferred equations to obtain the dynamic characteristics of the contactor. The equations describe the coupling of the electric circuit, electromagnetic field and mechanical system taking account of the influence of friction. Then, the paper gives an optimum design to the dimension and the duty ratio of the contactor' pulse modulated wave (PWM) under different exciting, and proves, by experiment and simulation, that the bounce time of the contactor working in the optimized duty ratio is much less than that of the general AC contactors.

  • Outage Performance and Average Symbol Error Rate of M-QAM for Maximum Ratio Combining with Multiple Interferers

    Kyung Seung AHN  

     
    PAPER-Communication Theory and Signals

      Vol:
    E91-A No:8
      Page(s):
    2205-2212

    In this paper, we investigate the performance of maximum ratio combining (MRC) in the presence of multiple cochannel interferences over a flat Rayleigh fading channel. Closed-form expressions of signal-to-interference-plus-noise ratio (SINR), outage probability, and average symbol error rate (SER) of quadrature amplitude modulation (QAM) with M-ary signaling are obtained for unequal-power interference-to-noise ratio (INR). We also provide an upper-bound for the average SER using moment generating function (MGF) of the SINR. Moreover, we quantify the array gain loss between pure MRC (MRC system in the absence of CCI) and MRC system in the presence of CCI. Finally, we verify our analytical results by numerical simulations.

1101-1120hit(2667hit)