The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

841-860hit(3183hit)

  • Decentralized Supervisory Control of Timed Discrete Event Systems Using a Partition of the Forcible Event Set

    Masashi NOMURA  Shigemasa TAKAI  

     
    PAPER-Concurrent Systems

      Vol:
    E95-A No:5
      Page(s):
    952-960

    In the framework of decentralized supervisory control of timed discrete event systems (TDESs), each local supervisor decides the set of events to be enabled to occur and the set of events to be forced to occur under its own local observation in order for a given specification to be satisfied. In this paper, we focus on fusion rules for the enforcement decisions and adopt the combined fusion rule using the AND rule and the OR rule. We first derive necessary and sufficient conditions for the existence of a decentralized supervisor under the combined fusion rule for a given partition of the set of forcible events. We next study how to find a suitable partition.

  • Optimization-Based Synthesis of Self-Triggered Controllers for Networked Systems

    Koichi KOBAYASHI  Kunihiko HIRAISHI  

     
    PAPER

      Vol:
    E95-A No:4
      Page(s):
    691-696

    In this paper, for networked systems, synthesis of self-triggered controllers is addressed. In the proposed method, the control input and the sampling time such that a given cost function is minimized are computed simultaneously. First, the optimal control problem of continuous-time linear systems is rewritten as that of systems with integral continuous-time dynamics. Next, this problem is approximately reduced to a linear programming problem. The proposed method can be applied to model predictive control. Finally, the effectiveness of the proposed method is shown by a numerical example.

  • Data Rate Limitations in Feedback Control over Networks

    Hideaki ISHII  Koji TSUMURA  

     
    INVITED PAPER

      Vol:
    E95-A No:4
      Page(s):
    680-690

    This paper provides an overview on the recent research on networked control with an emphasis on the tight relation between the two fields of control and communication. In particular, we present several results focusing on data rate constraints in networked control systems, which can be modeled as quantization of control-related signals. The motivation is to reduce the amount of data rate as much as possible in obtaining control objectives such as stabilization and control performance under certain measures. We also discuss some approaches towards control problems based on techniques from signal processing and information theory.

  • Reconfiguration-Based Fault Tolerant Control of Dynamical Systems: A Control Reallocation Approach

    Ali MORADI AMANI  Ahmad AFSHAR  Mohammad Bagher MENHAJ  

     
    PAPER-Dependable Computing

      Vol:
    E95-D No:4
      Page(s):
    1074-1083

    In this paper, the problem of control reconfiguration in the presence of actuator failure preserving the nominal controller is addressed. In the actuator failure condition, the processing algorithm of the control signal should be adapted in order to re-achieve the desired performance of the control loop. To do so, the so-called reconfiguration block, is inserted into the control loop to reallocate nominal control signals among the remaining healthy actuators. This block can be either a constant mapping or a dynamical system. In both cases, it should be designed so that the states or output of the system are fully recovered. All these situations are completely analysed in this paper using a novel structural approach leading to some theorems which are supported in each section by appropriate simulations.

  • Digital Calibration and Correction Methods for CMOS Analog-to-Digital Converters Open Access

    Shiro DOSHO  

     
    INVITED PAPER

      Vol:
    E95-C No:4
      Page(s):
    421-431

    Along with the miniaturization of CMOS-LSIs, control methods for LSIs have been extensively developed. The most predominant method is to digitize observed values as early as possible and to use digital control. Thus, many types of analog-to-digital converters (ADCs) have been developed such as temperature, time, delay, and frequency converters. ADCs are the easiest circuits into which digital correction methods can be introduced because their outputs are digital. Various types of calibration method have been developed, which has markedly improved the figure of merits by alleviating margins for device variations. The above calibration and correction methods not only overcome a circuit's weak points but also give us the chance to develop quite new circuit topologies and systems. In this paper, several digital calibration and correction methods for major analog-to-digital converters are described, such as pipelined ADCs, delta-sigma ADCs, and successive approximation ADCs.

  • Design of a Tree-Queue Model for a Large-Scale System

    Byungsung PARK  Jaeyeong YOO  Hagbae KIM  

     
    LETTER-Dependable Computing

      Vol:
    E95-D No:4
      Page(s):
    1159-1161

    In a large queuing system, the effect of the ratio of the filled data on the queue and waiting time from the head of a queue to the service gate are important factors for process efficiency because they are too large to ignore. However, many research works assumed that the factors can be considered to be negligible according to the queuing theory. Thus, the existing queuing models are not applicable to the design of large-scale systems. Such a system could be used as a product classification center for a home delivery service. In this paper, we propose a tree-queue model for large-scale systems that is more adaptive to efficient processes compared to existing models. We analyze and design a mean waiting time equation related to the ratio of the filled data in the queue. Based on simulations, the proposed model demonstrated improvement in process-efficiency, and it is more suitable to realistic system modeling than other compared models for large-scale systems.

  • Hybrid Wired/Wireless On-Chip Network Design for Application-Specific SoC

    Shouyi YIN  Yang HU  Zhen ZHANG  Leibo LIU  Shaojun WEI  

     
    PAPER

      Vol:
    E95-C No:4
      Page(s):
    495-505

    Hybrid wired/wireless on-chip network is a promising communication architecture for multi-/many-core SoC. For application-specific SoC design, it is important to design a dedicated on-chip network architecture according to the application-specific nature. In this paper, we propose a heuristic wireless link allocation algorithm for creating hybrid on-chip network architecture. The algorithm can eliminate the performance bottleneck by replacing multi-hop wired paths by high-bandwidth single-hop long-range wireless links. The simulation results show that the hybrid on-chip network designed by our algorithm improves the performance in terms of both communication delay and energy consumption significantly.

  • Intelligent Data Rate Control in Cognitive Mobile Heterogeneous Networks

    Jeich MAR  Hsiao-Chen NIEN  Jen-Chia CHENG  

     
    PAPER

      Vol:
    E95-B No:4
      Page(s):
    1161-1169

    An adaptive rate controller (ARC) based on an adaptive neural fuzzy inference system (ANFIS) is designed to autonomously adjust the data rate of a mobile heterogeneous network to adapt to the changing traffic load and the user speed for multimedia call services. The effect of user speed on the handoff rate is considered. Through simulations, it has been demonstrated that the ANFIS-ARC is able to maintain new call blocking probability and handoff failure probability of the mobile heterogeneous network below a prescribed low level over different user speeds and new call origination rates while optimizing the average throughput. It has also been shown that the mobile cognitive wireless network with the proposed CS-ANFIS-ARC protocol can support more traffic load than neural fuzzy call-admission and rate controller (NFCRC) protocol.

  • Path Tracking Control for Underactuated Autonomous Underwater Vehicles Using Approach Angle

    Kyoung Joo KIM  Jin Bae PARK  Yoon Ho CHOI  

     
    PAPER-Systems and Control

      Vol:
    E95-A No:4
      Page(s):
    760-766

    In this paper, we propose a novel path tracking control algorithm for an underactuated autonomous underwater vehicle (AUV). The underactuated AUV is controlled by the thrust force and the yaw torque: no sway thruster is used. To deal with this underactuated AUV problem in the path tracking, we introduce an approach angle which makes the AUV converge to the reference path. To design the path tracking controller, we obtain the vehicle's error dynamics in the body-fixed frame, and then design the path tracking controller based on the dynamic surface control (DSC) method. The proposed controller only needs the information of the position and the heading angle of the reference path. Some simulation results demonstrate the effectiveness of the proposed controller.

  • Achievable Capacity of Closed/Open-Access Cognitive Radio Systems Coexisting with a Macro Cellular Systems

    Hiromasa FUJII  Hiroki HARADA  Shunji MIURA  Hidetoshi KAYAMA  

     
    PAPER

      Vol:
    E95-B No:4
      Page(s):
    1190-1197

    We provide a theoretical analysis of the capacity achievable by an open/closed-access cognitive radio system, where the system uses spectrum resources primarily allocated to a macro cellular system. For spectrum sharing, we consider two methods based on listen-before-talk and adaptive transmit power control principles. Moreover, outdoor and indoor installations of CRS stations are investigated. We have also taken the effect of antenna heights into consideration. Numerical results reveal the capacities possible from CRS base stations installed within the coverage area of the macro cell system. We show numerical examples that compare the capacities achievable by open-access and closed access cognitive radio systems.

  • Signal Separation and Reconstruction Method for Simultaneously Received Multi-System Signals in Flexible Wireless System

    Takayuki YAMADA  Doohwan LEE  Hiroyuki SHIBA  Yo YAMAGUCHI  Kazunori AKABANE  Kazuhiro UEHARA  

     
    PAPER

      Vol:
    E95-B No:4
      Page(s):
    1085-1092

    We previously proposed a unified wireless system called “Flexible Wireless System”. Comprising of flexible access points and a flexible signal processing unit, it collectively receives a wideband spectrum that includes multiple signals from various wireless systems. In cases of simultaneous multiple signal reception, however, reception performance degrades due to the interference among multiple signals. To address this problem, we propose a new signal separation and reconstruction method for spectrally overlapped signals. The method analyzes spectral information obtained by the short-time Fourier transform to extract amplitude and phase values at each center frequency of overlapped signals at a flexible signal processing unit. Using these values enables signals from received radio wave data to be separated and reconstructed for simultaneous multi-system reception. In this paper, the BER performance of the proposed method is evaluated using computer simulations. Also, the performance of the interference suppression is evaluated by analyzing the probability density distribution of the amplitude of the overlapped interference on a symbol of the received signal. Simulation results confirmed the effectiveness of the proposed method.

  • Economical and Fault-Tolerant Load Balancing in Distributed Stream Processing Systems

    Fuyuan XIAO  Teruaki KITASUKA  Masayoshi ARITSUGI  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E95-D No:4
      Page(s):
    1062-1073

    We present an economical and fault-tolerant load balancing strategy (EFTLBS) based on an operator replication mechanism and a load shedding method, that fully utilizes the network resources to realize continuous and highly-available data stream processing without dynamic operator migration over wide area networks. In this paper, we first design an economical operator distribution (EOD) plan based on a bin-packing model under the constraints of each stream bandwidth as well as each server's CPU capacity. Next, we devise super-operator (SO) that load balances multi-degree operator replicas. Moreover, for improving the fault-tolerance of the system, we color the SOs based on a coloring bin-packing (CBP) model that assigns peer operator replicas to different servers. To minimize the effects of input rate bursts upon the system, we take advantage of a load shedding method while keeping the QoS guarantees made by the system based on the SO scheme and the CBP model. Finally, we substantiate the utility of our work through experiments on ns-3.

  • A Low-Cost Cooperative Strategy for Cellular Controlled Short-Range Communication Systems

    Han HAN  Hao WANG  Xiaokang LIN  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:4
      Page(s):
    1471-1474

    This letter is concerned with cellular controlled short-range communication (CCSRC) systems, which can provide a significant performance gain over the traditional cellular systems as shown in the literature. However, to obtain such a gain, CCSRC systems need perfect channel state information (CSI) of all users and the complexity of setting up the optimal cooperative clusters is factorial with respect to the number of potentially cooperative users, which is very unrealistic in practical systems. To solve this problem, we propose a novel cooperative strategy, where CCSRC systems only need the distances between all user pairs and the complexity of setting up the cooperative clusters is relatively low. Simulation results show that the performance of the proposed strategy is close to optimal.

  • Authentication Binding between SSL/TLS and HTTP

    Takamichi SAITO  Kiyomi SEKIGUCHI  Ryosuke HATSUGAI  

     
    PAPER-Information Network

      Vol:
    E95-D No:3
      Page(s):
    797-803

    While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.

  • Depth Enhancement Considering Just Noticeable Difference in Depth

    Seung-Won JUNG  Sung-Jea KO  

     
    LETTER-Image

      Vol:
    E95-A No:3
      Page(s):
    673-675

    Recent advances in 3-D technologies draw an interest on the just noticeable difference in depth (JNDD) that describes a perceptual threshold of depth differences. In this letter, we address a new application of the JNDD to the depth image enhancement. In the proposed algorithm, a depth image is first segmented into multiple layers and then the depth range of the layer is expanded if the depth difference between adjacent layers is smaller than the JNDD. Therefore, viewers can effectively perceive the depth differences between layers and thus the human depth perception can be improved. The proposed algorithm can be applied to any depth-based 3-D display applications.

  • Equality Based Flow-Admission Control by Using Mixed Loss and Delay System

    Sumiko MIYATA  Katsunori YAMAOKA  

     
    PAPER-Network System

      Vol:
    E95-B No:3
      Page(s):
    832-844

    We have proposed a novel call admission control (CAC) for maximizing total user satisfaction in a heterogeneous traffic network and showed the effectiveness of our CAC by using an optimal threshold from numerical analysis [1]. In our previous CAC, when a new broadband flow arrives and the total accommodated bandwidth is more than or equal to the threshold, the arriving new broadband flow is rejected. In actual networks, however, users may agree to wait for a certain period until the broadband flow, such as video, begins to play. In this paper, when total accommodated bandwidth is more than or equal to the threshold, arriving broadband flows wait instead of being rejected. As a result, we can greatly improve total user satisfaction.

  • Control of the Cart-Pendulum System Based on Discrete Mechanics – Part II: Transformation to Continuous-Time Inputs and Experimental Verification –

    Tatsuya KAI  Kensuke BITO  Takeshi SHINTANI  

     
    PAPER-Systems and Control

      Vol:
    E95-A No:2
      Page(s):
    534-541

    In this paper, we consider a stabilization problem for the cart-pendulum system based on discrete mechanics, which is known as a good discretizing method for mechanical systems and has not been really applied to control theory. First, the continuous and discrete cart-pendulum systems are explained. We next propose a transformation method that converts a discrete-time input derived from the discrete-time optimal regulator theory into a continuous-time zero-order hold input, and carry out some simulations on stabilization of the cart-pendulum system by the transformation method. Then, we apply not only our proposed method but also existing methods to an experimental laboratory of the cart-pendulum system and perform some experiments in order to verify the availability of the proposed method.

  • A Low Distortion 3rd-Order Continuous-Time Delta-Sigma Modulator for a Worldwide Digital TV-Receiver

    Koji OBATA  Kazuo MATSUKAWA  Yosuke MITANI  Masao TAKAYAMA  Yusuke TOKUNAGA  Shiro SAKIYAMA  Shiro DOSHO  

     
    PAPER

      Vol:
    E95-A No:2
      Page(s):
    471-478

    This paper presents a low distortion 3rd-order continuous-time delta-sigma modulator for a worldwide digital TV-receiver whose peak SNDR is 69.8 dB and SNR is 70.2 dB under 1 V power supply. To enhance SNDR performance, the mechanisms to occur harmonic distortions at feedback current-steering DAC and flash ADC have been analyzed. A low power tuning system using RC-relaxation oscillator has been developed in order to achieve high yield against PVT variations. A 3rd-order modulator with modified single opamp resonator contributes to cost reduction by realizing a very compact circuit. Reduction schemes of the distortions enabled the modulator to achieve FOM of 0.18 pJ/conv-step.

  • Enhancing Endurance of Huge-Capacity Flash Storage Systems by Selectively Replacing Data Blocks

    Wei-Neng WANG  Kai NI  Jian-She MA  Zong-Chao WANG  Yi ZHAO  Long-Fa PAN  

     
    PAPER-Computer System

      Vol:
    E95-D No:2
      Page(s):
    558-564

    The wear leveling is a critical factor which significantly impacts the lifetime and the performance of flash storage systems. To extend lifespan and reduce memory requirements, this paper proposed an efficient wear leveling without substantially increasing overhead and without modifying Flash Translation Layer (FTL) for huge-capacity flash storage systems, which is based on selective replacement. Experimental results show that our design levels the wear of different physical blocks with limited system overhead compared with previous algorithms.

  • Oblivious Transfer Based on the McEliece Assumptions

    Rafael DOWSLEY  Jeroen van de GRAAF  Jorn MULLER-QUADE  Anderson C. A. NASCIMENTO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:2
      Page(s):
    567-575

    We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only. We present two different constructions for oblivious transfer, one based on cut-and-chose arguments and another one which is based on a novel generalization of Bennett-Rudich commitments which may be of independent interest. Finally, we also present a variant of our protocol which is based on the Niederreiter cryptosystem.

841-860hit(3183hit)