Toshinori YAMASAKI Tetsuo HATTORI
We developed the computer calligraphy, that is, a computer formation of brush-written Kanji characters using calligraphic knowledge. The style of brush handwriting depends mainly on the way of using a writing brush. Brush writing skills include the direction of brush at the beginning, curvature and turning the brush, the brush-up at the termination point in a stroke. We make up the calligraphic knowledge base according to the above mentioned brush writing skills. For simulating real brush movement, we represent the brush contact form that is the brush shape on the writing plane as a brush-touch. The system can control the size and direction of this brush-touch during the brush simulation. The system simulates the real brush writing to move the brush-touch along the skeleton letter shape in the standard database. We get the brush written Kanji from the locus of the brush-touch movement. We can extend this system to the new on line training system for brush writing using the simulation of brushtouch movement modified by the pressure, speed and rotation of the writing brush, and the skeleton letters written by a learner from the tablet. This system is also useful for students learning how to write Japanese letters beautifully with brush.
Satoshi MATSUMOTO Masato MINO Toshiaki YACHI
Integrating the power supply and signal processing circuit into one chip is an important step towards achieving a system-on-chip. This paper reviews and looks at the current technologies and their trends for power supply components such as DC-DC converters, intelligent power LSIs, and thin-film magnetic devices for the system-on-chip. A device structure has been proposed for the system-on-chip that is based on a quasi-SOI technique, in which the buried oxide layer is partially removed from the SOI substrate. In this structure, the CMOS devices for the digital signal-processing circuit and the bipolar transistors are formed in a conventional SOI region, and the CMOS analog devices and high-voltage devices are formed in a quasi-SOI region.
Pao-Ann HSIUNG Trong-Yen LEE Sao-Jie CHEN
A formal system-level synthesis model for the concurrent object-oriented design of parallel computer systems, called Multi-token Object-oriented Bi-directional net (MOBnet), is proposed. The MOBnet model extends the standard Petri net by defining (1) multiple tokens to represent different kinds of synthesis control information, (2) object-oriented nodes (places) to denote the system parts under synthesis, and (3) bi-directional arcs to model the design completion check and synthesis rollback operations. In this paper, we first show that MOBnet can serve as a pre-fabrication design methodology analysis tool in ways such as class hierarchy construction, design specification comparison, reachability analysis, and concurrent process management and analysis. We then formally prove MOBnet to be a valid model for concurrent synthesis and give experimental application examples to verify. Finally, solution schemes for the design completion check and synthesis rollback problems are formally validated by analyzing the dynamic behavior of MOBnet, and experimentally illustrated through examples.
Yi CAI Shengjin WANG Makoto SATO
For constructing the next generation education system, we have developed a new human-scale virtual reality interface device called Big-SPIDAR. This device can provide not only the visual and auditory information but also haptic/kinaesthetic display. And it has the capability for the operator or participant to move around inside it. In this paper, we introduce the construction of this interface device and show the evaluation experiments and application systems realized by proposed device.
Toshiro TSUKADA Keiko Makie-FUKUDA
Digital-switching noise coupled into sensitive analog circuits is a critical problem in large-scale integration of mixed analog and digital circuits. This paper describes noise coupling of this kind, especially, through the substrate in CMOS integrated circuits, and reviews recent technical solutions to this noise problem. Simplified models have been developed to simulate the substrate coupling rapidly and accurately. A method using a CMOS comparator was proposed for measuring the effects of substrate noise, and equivalent waveforms of actual substrate noise were obtained. A circuit tecnique, called active guard band filtering, that controls the noise source is a new approach to substrate noise decoupling. CAD methods for handling substrate-coupled switching noise are making design verification possible for practical mixed-signal LSIs.
The purpose of our study is to develop an intelligent adaptive instruction system that manages intelligently the learner's estimated knowledge structure and optimizes the selection of problems according to his/her knowledge structures. The system adopts the dynamic problems of high school physics as a material of study, and is intended to operate on a UNIX Work Station. For these purposes, the system is composed of three parts, 1) interface part, 2) problem solving expert part, and 3) optimization expert system part for problem selection. The main feature of our system is that both knowledge structures of learner and teacher are represented by structural graph, and the problem selection process is controlled by the relationship between the learner's knowledge structure and the teacher's knowledge structure. In our system the relationship between these two knowledge structures is handled in the optimization expert system part for problem selection. In this paper the theory of the optimization expert system part for problem selection is described, and the effectiveness of this part is clarified through a simulation experiment of the originally defined matching coefficient.
Masami SHISHIBORI Takeshi ARITA Hisatoshi MOCHIZUKI Jun-ichi AOE
In accordance with the diffusion of applications, such as the Desk Top Publishing system, the Document Formatting system and the Document Editing system, it is easy to make a document by using a computer. However, as for allocating the diagrams (figures and tables), there are few document processing systems able to allocate diagrams on the appropriate places automatically. In a document processing system it is a very important issue to allocate diagrams on the most suitable places. This paper defines the criteria for allocating diagrams on the suitable positions by investigating published papers. These criteria concern 1) the order of diagrams to be allocated, 2) the stability of the diagram allocations, 3) the distance between the diagram and the location of the corresponding first reference in the text, 4) the allocation balance of diagrams in a text, 5) the restricted areas where diagrams shouldn't be allocated, 6) the allocation priorities between diagrams of different width. Moreover, this paper proposes a method for deciding the diagram allocations satisfying the above criteria automatically and fast on document formatting systems. In this case we have limited its application to one type of ducuments, which is papers. Especially, this method can skillfully allocate diagrams of different width on the page by reallocating the diagrams and texts within it, and can allocate diagrams over the document uniformly.
Tadatomo SUGA Yuzo ISHII Naoe HOSODA
The present paper describes a novel approach to interconnecting and assembling components of MEMS at room temperature. The main drawback of the conventional bonding methods is their rather high process temperatures. The new method, which is referred as the surface activated bonding (SAB), utilizes the phenomena of the adhesion between two atomically clean solid surfaces to enable the bonding at lower temperature or even at room temperature. In the bonding procedure, the surfaces to be bonded are merely brought into contact after sputter-cleaning by Ar fast atom in ultrahigh vacuum conditions. TEM observations of the bonded interfaces show that a direct bonding in atomic scale is achieved in the interface between the micro-components. Based on the concept of this new bonding technology, a micro-assembly system was developed. The micro-assembly system is operated by means of a virtual manipulation system in which 3D model of the micro-components are manipulated virtually in a computer graphics constructed in the world wide web (WWW) scheme. The micro-assembly system will provide a new design tool of three dimensional MEMS by combining the possibility of the flexible assembly and the intuitive operations.
The use of existing metallic local line facilities is being studied for the provision of high-speed digital transmission services. Local line characteristics have to be modeled in the form of the objective requirements that should be met by DSL for estimating the feasibility of the service provision in the actual network. This paper presents the results of a study that models the metallic media characteristics of NTT's local network. First, the line lenghts determined by the existing local line deployment rule and the cable types used in the networks are introduced. Second, the values of crosstalk characteristics, the most significant factors in limiting DSL range, are given by classifying essential line conditioning states of each cable. The values of crosstalk characteristics are newly computed by taking into account detailed cable pair-binding (cabling) structures, and the worst case values among all possible combinations of multiple inter-pair interfering-interfered relationships within a cable are given though a previous study approximated cable pair-binding structures. The crosstalk characteristics of NTT's and American local networks are also compared. A modified approximate equation of line propagation characteristics is also proposed for representative local lines, and its precision is verified by comparing simulation results to actual measurements in both frequency and time domains.
Shinichi NAKAGAWA Shuichi SUMITA
Narrow-band ISDN services may experience nonstationary traffic conditions. Therefore, switch design should take account of these conditions. We propose new performance measures for switching systems and describe a traffic model, which is a mixture of stationary Poissonian traffic and momentarily focused traffic. On the basis of this model, performance measures are determined so as to satisfy grade of service requirements that are in effect during some short interval after the momentarily focused traffic enters the system. We also propose an overload control scheme that uses these new performance measures. Finally, we show practical and numerical examples for the performance measures and overload control scheme.
Tsutomu KAWAI Mikio IKEDA Minoru OKADA
In this paper, an efficient one-way point-to-multipoint communication protocol (PTMP) is proposed. The PTM protocol is helpful to distribute information to many workstations simultaneously and correctly. The PTM protocol is designed for network channels with low error possibility. The PTM protocol utilizes broadcast for data distributing. Re-transmission request for lost packet is returned to the server, and acknowledgment for correctly received packets is not returned to the server. We have applied the protocol to the network presentation system. The network presentation system is intended to display same graphical images to multiple workstations simultaneously on an X window system. This presentation system is able to provide services for at least forty X servers simultaneously, the capacity is limited to X server performance, except for pixmap drawing. For the case of pixmap drawing, the system capacity is limited to the network bandwidth. To solve network bandwidth problem, we combined PTM protocol with the network presentation system. With PTM protocol, system performance is improved and the use of network bandwidth is lowered.
In this paper a new type of public-key cryptosystem, proxy cryptosystem, is studied. The proxy cryptosystem allows an original decryptor to transform its ciphertext to a ciphertext for a designated decryptor, proxy decryptor. Once the ciphertext transformation is executed, the proxy decryptor can compute a plaintext in place of the original decryptor. Such a cryptosystem is very useful when an entity has to deal with large amount of decrypting operation. The entity can actually speed-up the decrypting operation by authorizing multiple proxy decyptors. Concrete proxy cryptosystems are constructed for the ElGamal cryptosystem and the RSA cryptosystem. A straightforward construction of the proxy cryptosystem is given as follows. The original decryptor decrypts its ciphertext and re-encrypts an obtained plaintext under a designated proxy decryptor's public key. Then the designated proxy decryptor can read the plaintext. Our constructions are more efficient than such consecutive execution of decryption and re-encryption. Especially, the computational work done by the original decryptor is reduced in the proxy cryptosystems.
Yoshitaka FUJIWARA Shin-ichiro OKADA Hiroyuki TAKADOI Toshiharu MATSUNISHI Hiroshi OHKAMA
In a conventional client-server system using the satellite communications, the responsibility of the system to the client user is considerably degraded by the long transmission time between the satellite and the ground terminal as well as the relatively low data transmission rate in comparison with the ground transmission line as the Ethernet. In this paper, a new client-server control, VEEC, is proposed to solve the problem. As a result of the experimental performance studies, it is clarified that the responsibility in the client is remarkably improved when the pre-fetching mechanism of VEEC works efficiently.
Mitsuo ICHIYA Takuro NAKAMURA Shuji NAKATA Jacques LEWINER
Micromachined sensors and actuators applied with electrostatic fields are getting widely developed. At the same time, "electrets," which are dielectrics carrying non-equilibrium permanent space charges or polarization distribution, are in demand because they improve the transducer characteristics. In this paper, we have reported on our successful fabrication of silicon dioxide electrets with extremely superior long-term charge stability by plasma chemical vapor deposition (PCVD). We have also reported on the correlation between the deposition conditions, the long-term charge stability and thermally stimulated current (TSC). Finally, the characterization of the long-term stable electrets will be described and discussed.
In this paper, two new signature schemes whose security is based on both discrete logarithms and factorization are proposed to enhance the security of the OSS signature scheme. The major benefit of these new signature schemes is that the signer dose not need to know how to factor p-1, thus it is possible for every user to employ the same modulus p, where p is the modulus commonly used in the system. Furthermore, two identification schemes based on this advantage are also developed in this paper.
Osamu YAMANAKA Hiromitsu OHMORI Akira SANO
For finite Volterra series systems, this paper investigates the stability of the exact model matching (EMM) control we have already presented. First, in order to analyze the stability of the EMM system, we present modified small gain theorems depending on the magnitude of the external input (s) in the cases of one input and two inputs. Next, with the help of the theorem for feedback systems with two inputs, we clarify the condition under which the control system is stable for the reference input magnitude within a certain range, and is also robust for small disturbances. The modified small gain theorems are effective for the stability analysis of the nonlinear feedback control systems which do not have affine finite gain.
Choong Ho LEE Masayuki KAWAMATA Tatsuo HIGUCHI
Roundoff error due to iterative computation with finite wordlength degrades the quality of decoded images in fractal image coding that employs a deterministic iterated function system. This paper presents a state-space approach to roundoff error analysis of fractal image coding for grey-scale images. The output noise variance matrix and the noise matrix are derived for the measures of error and the output noise variance is newly defined as the pixel mean of diagonal elements of the output noise matrix. A quantitative comparison of experimental roundoff error with analytical result is made for the output noise variance. The result shows that our analysis method is valid for the fractal image coding. Our analysis method is useful to design a real-time and low-cost decoding hardware with finite wordlength for fractal image coding.
Shinichiro YAMAGUCHI Tetsuaki NAKAMIKAWA Naoto MIYAZAKI Yuuichirou MORITA Yoshihiro MIYAZAKI Sakou ISHIKAWA
The fault tolerant computer (FTC) is applied as a communication or database server in the information service and computer aided process control fields. User requires of the FTC are to provide the current level of performance and software transparency needing no additional dedicated program for fault tolerance. To meet these requirements, we propose quadprocessor redundancy (QPR) architecture that combines dualRISC based duplicated CPUs integrating main memories, and duplicated I/O subsystems by using some additional hardware. Duplicated CPUs run under the instruction level synchronization (lock step operation) , and the duplicated I/O subsystems are managed by an operating system. When a fault is detected, the faulty CPU is isolated by hardware. User program is continuously executed by the remaining CPU. We applied the QPR to our UNIX servers, and achieved satisfactory levels of performance.
Masato SAITO Hiraku OKADA Takeshi SATO Takaya YAMAZATO Masaaki KATAYAMA Akira OGAWA
In this paper, we evaluate the throughput performance of CDMA Slotted ALOHA systems. To improve the throughput performance, we employ the Quasi-synchronous sequences and the Modified Channel Load Sensing Protocol as an access control procedure. As a result, we found a good throughput by the QS-sequences. By employing MCLSP, we can keep the maximum throughput even in high offered load and in the presence of a long access timing delay, which is one of the issue in satellite packet communication systems.
Recently, Yagisawa proposed a public key cryptosystem which is very similar to the modified Lu-Lee cryptosystem. The differences are the set of messages and the decryption. On the other hand, Brickell and Odlyzko showed that the modified Lu-Lee cryptosystem is completely broken in polynomial time. This paper shows that Yagisawa cryptosystem is completely broken in the same way.