The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] symmetric(201hit)

181-200hit(201hit)

  • Efficient Characterization of Complex H-Plane Waveguide π-Junction and Cross-Junctions*

    Zhewang MA  Eikichi YAMASHITA  

     
    PAPER-Microwave and Millimeter Wave Technology

      Vol:
    E79-C No:3
      Page(s):
    444-452

    An efficient full-wave approach for the accurate characterization of a H-plane waveguide π-junction with an inductive post and a waveguide cross-junction is proposed. By employing the port reflection coefficient method (PRCM), the analysis and solution procedures of these complex waveguide junctions are greatly simplified and only the calculation of field reflections caused by the simplest waveguide step-junction discontinuities are required. The reflections are easily determined by the mode-matching technique. Scattering parameters of these junctions are provided and discussed in terms of the working frequency and the geometrical dimensions of the junctions. Calculated results are compared with those of other papers and measurements, all show good agreement.

  • A New Approach to Rule Learning Based on Fusion of Fuzzy Logic and Neural Networks

    Rui-Ping LI  Masao MUKAIDONO  

     
    PAPER-Bio-Cybernetics and Neurocomputing

      Vol:
    E78-D No:11
      Page(s):
    1509-1514

    A new method is developed to generate fuzzy rules from numerical data. This method consists of two algorithms: Algorithm 1 is used to identify structures of the given data set, that is, the optimal number of rules of system; Algorithm 2 is used to identify parameter of the used model. The former is belonged to unsupervised learning, and the latter is belonged to supervised learning. To identify parameters of fuzzy model, we developed a neural network which is referred to as Unsymmetrical Gaussian Function Network (UGFN). Unlike traditional fuzzy modelling methods, in the present method, a) the optimal number of rules (clusters) is determinde by input-output data pairs rather than by only output data as in sugeno's method, b) parameter identification of ghe present model is based on a like-RBF network rather than backpropagation algorithm. Our method is simple and effective because it integrates fuzzy logic with neural networks from basic network principles to neural architecture, thereby establishing an unifying framework for different fuzzy modelling methods such as one with cluster analysis or neural networks and so on.

  • The Range of Passband QAM-Based ADSLs in NTT's Local Networks

    Seiichi YAMANO  

     
    PAPER->Communication Cable and Wave Guide

      Vol:
    E78-B No:9
      Page(s):
    1301-1321

    The use of existing metallic local line facilities is being studied for providing "video on demand (VOD)" services to residential subscribers across asymmetric digital subscriber lines (ADSL). ADSL carries a high-rate channel in the downstream direction from a central office (CO) to the subscriber, and a low-rate channel in both directions on an existing 2-wire pair. Audio and video signals are compressed by the moving picture experts group's standardized algorithms (MPEG 1 and MPEG 2), and delivered to the subscriber in the high-rate channel. Control (demand and response) signals are transceived in the low-rate channel. This paper presents the line length coverage of ADSL systems given the environment of NTT's local networks. The bit rates in the downstream and upstream directions are assumed to be 1.6-9.2Mbit/s and 24kbit/s, respectively. Two types of ADSL systems are considered: transceiving ADSL signals using the plain old telephone service (POTS) line or the basic rate access (BRA; 320 kbaud ping-pong transmission system) line on the same 2-wire pair. 16-QAM, 32-QAM and 64-QAM are compared as transmission schemes. Intra-system crosstalk interference (interference between identical transmission systems) and inter-system crosstalk interference (interference between different transmission systems) with the existing digital subscriber lines (DSL) are estimated. It is shown that the inter-system crosstalk interference with BRA is most stringent, and ADSL with 16-QAM yields the best performance in NTT's local networks. This paper concludes that realizing ADSL with 16-QAM can achieve channel capacities of up to 9.2Mbit/s for fiber-in-the-feeder (FITF) access systems, but the possibility of applying ADSL to direct access systems is remote except for a restricted short haul use. Some comparisons regarding American local networks are also described.

  • A WSiN-Gate GaAs HMESFET with an Asymmetric LDD Structure for MMICs

    Kazumi NISHIMURA  Kiyomitsu ONODERA  Kou INOUE  Masami TOKUMITSU  Fumiaki HYUGA  Kimiyoshi YAMASAKI  

     
    PAPER

      Vol:
    E78-C No:8
      Page(s):
    907-910

    We have developed a planar devic technology consisting of 0.15-µm Au/WSiN-gate GaAs-heterostructure MESFETs (HMESFETs) fabricated by self-aligned ion-implantation. The gate-drain breakdown voltage has been improved to 10 V by using an asymmetric LDD structure, and the maximum oscillation frequency is 190 GHz. Because asymmetric and symmetric FETs can be fabricated simultaneously, this technology is suitable for use in making multi-functional millimeter-wave MMICs.

  • Fabry-Perot Multiple-Device Oscillator Using an Axially Symmetric Mode

    Minoru SANAGI  Shigeji NOGI  Kiyoshi FUKUI  Kazuyuki WATANABE  

     
    PAPER

      Vol:
    E78-C No:8
      Page(s):
    949-956

    We propose an axially symmetrical Fabry-Perot multiple-device oscillator operating at an axially symmetrical TEM01n-mode, which has an excellent feature of uniform device-field coupling required for high efficiency power combining. By carrying out the boundary element analysis, it is shown that a plane-mirror output structure is remarkably advantageous compared with a concave-mirror output structure to obtain an adequate output coupling and to enable stable operation characteristic with respect to the axial mode number n. Experiments in X-band confirmed this excellent performance and achieved almost perfect power combining of efficiency as high as 106% and 99% for six- and eight-device case, respectively.

  • Frequency-Dependent Finite-Difference Time-Domain Analysis of High-Tc Superconducting Asymmetric Coplanar Strip Line

    Masafumi HIRA  Yasunobu MIZOMOTO  Sadao KURAZONO  

     
    PAPER-Superconductive Electronics

      Vol:
    E78-C No:7
      Page(s):
    873-877

    This paper describes analytical results of high-Tc superconducting asymmetric coplanar strip lines using the frequency-dependent finite-difference time-domain method. The propagation constants of the YBa2Cu3O7-x asymmetric coplanar strip line fabricated on the LiNbO3 substrate are reported. The effect of the SiO2 buffer layer is also investigated.

  • Call Blocking Probabilities of Asymmetric Multi-Connection Circuit Groups with Bandwidth Negotiation and Reservation

    Hajime NAKAMURA  Toshikane ODA  

     
    PAPER

      Vol:
    E78-B No:4
      Page(s):
    551-562

    The recent progress of B-ISDN signaling systems has enabled networks to handle calls which require a wide variety of ATM connection sets. This paper is concerned with the circuit group which handles calls requesting asymmetric forward and backward multi-connections, and has the capability of both bandwidth negotiation and bandwidth reservation as a traffic control for enhancing call blocking performance. A model of the circuit group is first established focusing on the call level characteristics of the group, and then a method based on the reduced load approximation and an approximate analysis of a multirate group is proposed for calculating approximate blocking probabilities. The accuracy of the approximation method is evaluated numerically by comparing with an exact method and simulation. Further the impact of bandwidth negotiation and reservation on call blockings is examined based on numerical examples.

  • Asymmetric Neural Network and Its Application to Knapsack Problem

    Akira YAMAMOTO  Masaya OHTA  Hiroshi UEDA  Akio OGIHARA  Kunio FUKUNAGA  

     
    PAPER-Neural Networks

      Vol:
    E78-A No:3
      Page(s):
    300-305

    We propose an asymmetric neural network which can solve inequality-constrained combinatorial optimization problems that are difficult to solve using symmetric neural networks. In this article, a knapsack problem that is one of such the problem is solved using the proposed network. Additionally, we study condition for obtaining a valid solution. In computer simulations, we show that the condition is correct and that the proposed network produces better solutions than the simple greedy algorithm.

  • Relationships among Nonlinearity Criteria of Boolean Functions

    Shouichi HIROSE  Katsuo IKEDA  

     
    PAPER-Information Security and Cryptography

      Vol:
    E78-A No:2
      Page(s):
    235-243

    For symmetric cryptosystems, their transformations should have nonlinear elements to be secure against various attacks. Several nonlinearity criteria have been defined and their properties have been made clear. This paper focuses on, among these criteria, the propagation criterion (PC) and the strict avalanche criterion (SAC), and makes a further investigation of them. It discusses the sets of Boolean functions satisflying the PC of higher degrees, the sets of those satisfying the SAC of higher orders and their relationships. We give a necessary and sufficient condition for an n-input Boolean function to satisfy the PC with respect to a set of all but one or two elements in {0,1}n{(0,...,0)}. From this condition, it follows that, for every even n 2, an n-input Boolean function satisfies the PC of degree n 1 if and only if it satisfies the PC of degree n. We also show a method that constructs, for any odd n 3, n-input Boolean functions that satisfy the PC with respect to a set of all but one elements in {0,1}n{(0,...,0)}. This method is a generalized version of a previous one. Concerned with the SAC of higher orders, it is shown that the previously proved upper bound of the nonlinear order of Boolean functions satisfying the criterion is tight. The relationships are discussed between the set of n-input Boolean functions satisfying the PC and the sets of those satisfying the SAC.

  • Propagation Characteristics of Boolean Functions and Their Balancedness

    Shouichi HIROSE  Katsuo IKEDA  

     
    PAPER

      Vol:
    E78-A No:1
      Page(s):
    11-18

    This paper discusses Boolean functions satisfying the propagation criterion (PC) and their balancedness. Firstly, we discuss Boolean functions with n variables that satisfy the PC with respect to all but three elements in {0,1}n-{(0,...,0)}. For even n4, a necessary and sufficient condition is presented for Boolean functions with n variables to satisfy the PC with respect to all but three elements in {0,1}n-{(0,...,0)}. From this condition, it is proved that all of these Boolean functions are constructed from all perfectly nonlinear Boolean functions with n-2 variables. For odd n3, it is shown that Boolean functions with n variables satisfying the PC with respect to all but three elements in {0,1}n-{(0,...,0)} satisfy the PC with respect to all but one elements in it. Secondly, Boolean functions satisfying the PC of degree n-2 and their balancedness are considered. For even n4, it is proved that an upper bound on the degree of the PC is n-3 for balanced Boolean functions with n variables. This bound is optimal for n=4,6. It is also proved that, for odd n3, balanced Boolean functions with n variables satisfying the PC of degree n-2 satisfy the PC with respect to all but one elements in {0,1}n-{(0,...,0)}.

  • A Class of Unidirectional Byte Error Locating Codes with Single Symmetric Bit Error Correction Capability

    Shuxin JIANG  Eiji FUJIWARA  

     
    LETTER

      Vol:
    E77-A No:11
      Page(s):
    1932-1937

    This paper proposes a new class of unidirectional byte error locating codes, called single symmetric bit error correcting and single unidirectional byte error locating codes, or SEC–SUbEL codes. Here, "byte" denotes a cluster of b bits, where b2. First, the necessary and sufficient conditions of the codes are clarified, and then code construction method is demonstrated. The lower bound on check bit length of the SEC–SUbEL codes is derived. Based on this, the proposed codes are shown to be very efficient in some range of the information length. The code design concept presented for the SEC–SUbEL codes induces the generalized unidirectional byte error locating codes with single symmetric bit error correction capability.

  • Application of a Boundary Matching Technique to an Inverse Problem for Circularly Symmetric Objects

    Kenichi ISHIDA  Takato KUDOU  Mitsuo TATEIBA  

     
    LETTER

      Vol:
    E77-C No:11
      Page(s):
    1837-1840

    We present a novel algorithm to reconstruct the refractive-index profile of a circularly symmetric object from measurements of the electromagnetic field scattered when the object is illuminated by a plane wave. The reconstruction algorithm is besed on an iterative procedure of matching the scattered field calculated from a certain refractive-index distribution with the measured scattered field on the boundary of the object. In order to estimate the convergence of the reconstruction, the mean square error between the calculated and measured scattered fields is introduced. It is shown through reconstructing several examples of lossy dielectric cylinders that the algorithm is quite stable and is applicable to high-contrasty models in situations where the Born approximation is not valid.

  • Improved Array Architectures of DINOR for 0.5 µm 32 M and 64 Mbit Flash Memories

    Hiroshi ONODA  Yuichi KUNORI  Kojiro YUZURIHA  Shin-ichi KOBAYASHI  Kiyohiko SAKAKIBARA  Makoto OHI  Atsushi FUKUMOTO  Natsuo AJIKA  Masahiro HATANAKA  Hirokazu MIYOSHI  

     
    PAPER-Non-volatile Memory

      Vol:
    E77-C No:8
      Page(s):
    1279-1286

    A novel operation of a flash memory cell, named DINOR (DIvided bit line NOR) operation, is proposed. This operation is based on gate-biased FN programming/FN erasing, and we found that it satisfies all basic cell characteristics such as program/erase, disturb immunity and a cycling endurance. Making a good use of this cell operation, we also proposed a new array structure applied to DINOR type cell whose bit line is divided into the main and sub bit line, having 1.82 µm2 cell size, suitable for 32 Mbit flash memory based on 0.5 µm CMOS process. In the last part of this paper, the useful and practical application of the DINOR operation to a virtual ground array architecture, realizing 1.0 µm2 cell size for a 0.5 µm 64 Mbit flash memory, is described.

  • Efficient Maximum Likelihood Decoding Algorithms for Linear Codes over Z-Channel

    Tomohiko UYEMATSU  

     
    PAPER

      Vol:
    E76-A No:9
      Page(s):
    1430-1436

    This paper presents two new maximum likelihood decoding (MLD) algorithms for linear codes over Z-channel, which are much more efficient than conventional exhaustive algorithms for high rate codes. In the proposed algorithms, their complexities are reduced by employing the projecting set Cs of the code, which is determined by the "projecting" structure of the code. Space and computational complexities of algorithms mainly depend upon the size of Cs which is usually several times smaller than the total number of codewords. It is shown that the upper bounds on computational complexities of decoding algorithms are in proportion to the number of parity bits and the distance between an initial estimate of the codeword and the received word, respectively, while space complexities of them are equal to the size of Cs. Lastly, numerical examples clarify the average computational complexities of the proposed algorithms, and the efficiency of these algorithms for high rate codes is confirmed.

  • Synthesis of Linard's Equations Having More than One Periodic Solution

    Tosiro KOGA  Masaharu SHINAGAWA  Satoshi HASAKO  

     
    PAPER-Nonlinear Circuits and Neural Nets

      Vol:
    E76-A No:6
      Page(s):
    848-857

    As is well known, Linard's equation +µf (χ)+g(χ)=0 represents a wide class of oscillatory circuits as an extension of van der Pol's equation, and Linard's theorem guarantees the existence of a unique periodic solution which is orbitally stable. However, we sometimes meet such cases in engineering applications that the symmetry of the equation is violated, for instance, by a constant bias force. While, it has been known that asymmetric Linard's equation can have more than one periodic solution. The problem of finding the maximum number of such solutions, known as a special case of Hilbert's sixteenth problem, has recently been solved by T. Koga, one of the present authors. This paper first describes fundamental theorems due to T. Koga, and presents a solution to the synthesis problem of asymmetric Linard's systems, which generates an arbitrarily prescribed number of limit cycles, and which is considered to be important in relation to the stability of Linard's systems. Then, as application of this result, we give a method of determining parameters included in Linard's systems which may produce two limit cycles depending on the parameters. We also give a Linard's system which have three limit cycles. In addition, a new result on the parameter dependency of the number of limit cycles is presented.

  • Optimization of Pseudo-Kronecker Expressions Using Multiple-Place Decision Diagrams

    Tsutomu SASAO  

     
    PAPER-Logic Design

      Vol:
    E76-D No:5
      Page(s):
    562-570

    This paper presents an optimization method for pseudo-Kronecker expressions of p-valued input two-valued output functions by using multi-place decision diagrams for p2 and p4. A conventional method using extended truth tables requires memory of O (3n) to simplify an n-variable expression, and is only practical for functions of up to n14 variables when p2. The method presented here utilizes multi-place decision diagrams, and can optimize considerably larger problems. Experimental results for up to n39 variables are shown.

  • Performance of a Multicast Error Control Protocol Based on a Product Code Structure--Part : On Random Error Channels--

    Katsumi SAKAKIBARA  Masao KASAHARA  

     
    PAPER

      Vol:
    E75-A No:12
      Page(s):
    1674-1683

    A multicast error control protocol proposed by Metzner is generalized and the performance of the proposed protocol on random error channels (binary symmetric channels) is analyzed. The proposed protocol adopts an encoding procedure based on a product code structure, whith enables each destined user terminal to decode the received frames with the Reddy-Robinson algorithm. As a result, the performance degradation due to the re-broadcasting of the replicas of the previously transmitted frames can be circumvented. The numerical results for the analysis and the simulation indicate that the proposed protocol yields higher throughput and less degradation of throughput with an increase of the number of destined terminals.

  • Comparison of Aliasing Probability for Multiple MISRs and M-Stage MISRs with m Inputs

    Kazuhiko IWASAKI  Shou-Ping FENG  Toru FUJIWARA  Tadao KASAMI  

     
    PAPER

      Vol:
    E75-D No:6
      Page(s):
    835-841

    MISRs are widely used as signature circuits for VLSI built-in self tests. To improve the aliasing probability of MISRs, multiple MISRs and M-stage MISRs with m inputs are available, where M is grater than m. The aliasing probability as a function of the test length is analyzed for the compaction circuits for a binary symmetric channel. It is observed that the peak aliasing probability of the double MISRs is less than that of M-stage MISRs with m inputs. It is also shown that the final aliasing probability for a multiple MISR with d MISRs is 2dm and that for an M-stage MISR with m imputs is 2M if it is characterized by a primitive polynomial.

  • Subband Image Coding with Biorthogonal Wavelets

    Cha Keon CHEONG  Kiyoharu AIZAWA  Takahiro SAITO  Mitsutoshi HATORI  

     
    PAPER-Image Coding and Compression

      Vol:
    E75-A No:7
      Page(s):
    871-881

    In this paper, subband image coding with symmetric biorthogonal wavelet filters is studied. In order to implement the symmetric biorthogonal wavelet basis, we use the Laplacian Pyramid Model (LPM) and the trigonometric polynomial solution method. These symmetric biorthogonal wavelet basis are used to form filters in each subband. Also coefficients of the filter are optimized with respect to the coding efficiency. From this optimization, we show that the values of a in the LPM generating kernel have the best coding efficiency in the range of 0.7 to 0.75. We also present an optimal bit allocation method based on considerations of the reconstruction filter characteristics. The step size of each subband uniform quantizer is determined by using this bit allocation method. The coding efficiency of the symmetric biorthogonal wavelet filter is compared with those of other filters: QMF, SSKF and Orthonormal wavelet filter. Simulation results demonstrate that the symmetric biorthogonal wavelet filter is useful as a basic means for image analysis/synthesis filters and can give better coding efficiency than other filters.

  • Design of Circularly Symmetric Two-Dimensional R Lowpass Digital Filters With Constant Group Delay Using McClellan Transformations

    Kiyoshi NISHIKAWA  Russell M. MERSEREAU  

     
    PAPER-Design and Implementation of Multidimensional Digital Filters

      Vol:
    E75-A No:7
      Page(s):
    830-836

    We present a successful method for designing 2-D circularly symmetric R lowpass filters with constant group delay. The procedure is based on a transformation of a 1-D prototype R filter with constant group delay, whose magnitude response is the 2-D cross-sectional response. The 2-D filter transfer function has a separable denominator and a numerator which is obtained from the prototype numerator by means of a series of McClellan transformations whose free parameters can be optimized by successive procedure. The method is illustrated by an example.

181-200hit(201hit)