The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

901-920hit(3183hit)

  • Partitioning and Allocation of Scratch-Pad Memory for Energy Minimization of Priority-Based Preemptive Multi-Task Systems

    Hideki TAKASE  Hiroyuki TOMIYAMA  Hiroaki TAKADA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:10
      Page(s):
    1954-1964

    Energy minimization has become one of the primary goals in the embedded real-time domains. Consequently, scratch-pad memory has been employed as partial or entire replacement for cache memory due to its better energy efficiency. However, most previous approaches were not applicable to a preemptive multi-task environment. We propose three methods of partitioning and allocation of scratch-pad memory for fixed-priority-based preemptive multi-task systems. The three methods, i.e., spatial, temporal, and hybrid methods, achieve energy reduction in the instruction memory subsystems. With the spatial method, each task occupies its exclusive space in scratch-pad memory. With the temporal method, the running task uses entire scratch-pad space. The content of scratch-pad memory is swapped out as a task executes or gets preempted. The hybrid method is based on the spatial one but a higher priority task can temporarily use the space of lower priority task. The amount of space is prioritized for higher priority tasks. We formulate each method as an integer programming problem that simultaneously determines (1) partitioning of scratch-pad memory space for the tasks, and (2) allocation of program code to scratch-pad memory space for each task. Our methods not only support the real-time task scheduling but also consider aggressively the periods and priorities of tasks for the energy minimization. Additionally, we implement an RTOS-hardware cooperative support mechanism for runtime code allocation to the scratch-pad memory space. We have made the experiments with the fully functional real-time operating system. The experimental results have demonstrated the effectiveness of our techniques. Up to 73% energy reduction compared to a conventional method was achieved.

  • Kernel Optimization Based Semi-Supervised KBDA Scheme for Image Retrieval

    Xu YANG  Huilin XIONG  Xin YANG  

     
    PAPER

      Vol:
    E94-D No:10
      Page(s):
    1901-1908

    Kernel biased discriminant analysis (KBDA), as a subspace learning algorithm, has been an attractive approach for the relevance feedback in content-based image retrieval. Its performance, however, still suffers from the “small sample learning” problem and “kernel learning” problem. Aiming to solve these problems, in this paper, we present a new semi-supervised scheme of KBDA (S-KBDA), in which the projection learning and the “kernel learning” are interweaved into a constrained optimization framework. Specifically, S-KBDA learns a subspace that preserves both the biased discriminant structure among the labeled samples, and the geometric structure among all training samples. In kernel optimization, we directly optimize the kernel matrix, rather than a kernel function, which makes the kernel learning more flexible and appropriate for the retrieval task. To solve the constrained optimization problem, a fast algorithm based on gradient ascent is developed. The image retrieval experiments are given to show the effectiveness of the S-KBDA scheme in comparison with the original KBDA, and the other two state-of-the-art algorithms.

  • A Wide Tuning Range CMOS Quadrature Ring Oscillator with Improved FoM for Inductorless Reconfigurable PLL

    Ramesh K. POKHAREL  Shashank LINGALA  Awinash ANAND  Prapto NUGROHO  Abhishek TOMAR  Haruichi KANAYA  Keiji YOSHIDA  

     
    PAPER-Active Devices and Circuits

      Vol:
    E94-C No:10
      Page(s):
    1524-1532

    This paper presents the design and implementation of a quadrature voltage-controlled ring oscillator with the improved figure of merit (FOM) using the four single-ended inverter topology. Furthermore, a new architecture to prevent the latch-up in even number of stages composed of single-ended ring inverters is proposed. The design is implemented in 0.18 µm CMOS technology and the measurement results show a FOM of -163.8 dBc/Hz with the phase noise of -125.8 dBc/Hz at 4 MHz offset from the carrier frequency of 3.4 GHz. It exhibits a frequency tuning range from 1.23 GHz to 4.17 GHz with coarse and fine frequency tuning sensitivity of 1.08 MHz/mV and 120 kHz/mV, respectively.

  • Coordinated Power Allocation for Generalized Multi-Cluster Distributed Antenna Systems

    Wei FENG  Yanmin WANG  Yunzhou LI  Xibin XU  Jing WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:9
      Page(s):
    2656-2659

    In this letter, coordinated power allocation (PA) is investigated for the downlink of a generalized multi-cluster distributed antenna system (DAS). Motivated by practical applications, we assume only the global large-scale channel state information is known at the transmitter. First, an upper bound (UB) for the ergodic sum capacity of the system is derived and used as a simplified optimization target. Then, a coordinated PA scheme is proposed based on Geometric Programming (GP), which is demonstrated to be nearly optimal by Monte Carlo simulations.

  • A High Capacity Cell Architecture Based on Distributed Antenna System and Frequency Allocation Scheme

    Chih-Wen (Wenson) CHANG  Chien-Yuan CHU  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:9
      Page(s):
    2690-2695

    In orthogonal frequency division multiple access (OFD-MA) systems, soft frequency reuse (SFR) and distributed antenna system (DAS) are two effective techniques to avoid excessive inter-cell interference (ICI). To gain the advantages of both, in this letter, we build a new cell architecture by jointly taking DAS and SFR into consideration to achieve the goal of high and well-balanced capacity. Furthermore, to rectify the shortfall in the literature, the capacity and outage probability in the multi-cell environment are derived by taking the complete channel effects into account, including the path loss, shadowing and Rayleigh fading. Simulations verify the superior performance and exactness of the analytical results.

  • Energy-Efficient Flexible Beacon Scheduling Mechanism for Cluster-Tree Healthcare Systems

    Haoru SU  Heungwoo NAM  Sunshin AN  

     
    LETTER

      Vol:
    E94-B No:9
      Page(s):
    2480-2483

    An Energy-efficient Flexible Beacon Scheduling (EFBS) mechanism is proposed to solve the beacon collision problem in cluster-tree healthcare systems. In EFBS, after clustering, BAN Coordinators perform power control. Then they are divided into groups and each group is assigned one contention-free time-slot. The duration of the beacon-only period is flexible. According to the simulation results, EFBS provides better performance than other beacon scheduling approaches.

  • Master-Slave Coupled Piecewise Constant Spiking Oscillators

    Yusuke MATSUOKA  

     
    LETTER-Nonlinear Problems

      Vol:
    E94-A No:9
      Page(s):
    1860-1863

    This paper presents pulse-coupled piecewise constant spiking oscillators (PWCSOs) consisting of two PWCSOs and a coupling method is master-slave coupling. The slave PWCSO exhibits chaos because of chaotic response of the master one. However, if the parameter varies, the slave PWCSO can exhibit the phenomena as a periodicity in the phase plane. We focus on such phenomena and corresponding bifurcation. Using the 2-D return map, we clarify its mechanism.

  • Practical Orientation Field Estimation for Embedded Fingerprint Recognition Systems

    Yukun LIU  Dongju LI  Tsuyoshi ISSHIKI  Hiroaki KUNIEDA  

     
    PAPER-Pattern Recognition

      Vol:
    E94-D No:9
      Page(s):
    1792-1799

    As a global feature of fingerprint patterns, the Orientation Field (OF) plays an important role in fingerprint recognition systems. This paper proposes a fast binary pattern based orientation estimation with nearest-neighbor search, which can reduce the computational complexity greatly. We also propose a classified post processing with adaptive averaging strategy to increase the accuracy of the estimated OF. Experimental results confirm that the proposed method can satisfy the strict requirements of the embedded applications over the conventional approaches.

  • Detection of Tongue Protrusion Gestures from Video

    Luis Ricardo SAPAICO  Hamid LAGA  Masayuki NAKAJIMA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E94-D No:8
      Page(s):
    1671-1682

    We propose a system that, using video information, segments the mouth region from a face image and then detects the protrusion of the tongue from inside the oral cavity. Initially, under the assumption that the mouth is closed, we detect both mouth corners. We use a set of specifically oriented Gabor filters for enhancing horizontal features corresponding to the shadow existing between the upper and lower lips. After applying the Hough line detector, the extremes of the line that was found are regarded as the mouth corners. Detection rate for mouth corner localization is 85.33%. These points are then input to a mouth appearance model which fits a mouth contour to the image. By segmenting its bounding box we obtain a mouth template. Next, considering the symmetric nature of the mouth, we divide the template into right and left halves. Thus, our system makes use of three templates. We track the mouth in the following frames using normalized correlation for mouth template matching. Changes happening in the mouth region are directly described by the correlation value, i.e., the appearance of the tongue in the surface of the mouth will cause a decrease in the correlation coefficient through time. These coefficients are used for detecting the tongue protrusion. The right and left tongue protrusion positions will be detected by analyzing similarity changes between the right and left half-mouth templates and the currently tracked ones. Detection rates under the default parameters of our system are 90.20% for the tongue protrusion regardless of the position, and 84.78% for the right and left tongue protrusion positions. Our results demonstrate the feasibility of real-time tongue protrusion detection in vision-based systems and motivates further investigating the usage of this new modality in human-computer communication.

  • Enhancing VoIP in UTRAN LTE Downlink: Methods and Performance

    Yong FAN  Mikko VALKAMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:8
      Page(s):
    2338-2345

    In this article, we study different methods to enhance the capacity of Voice-over-IP (VoIP) in Evolved UTRAN (E-UTRAN) downlink. According to previous E-UTRAN system level simulation results, VoIP capacity with dynamic scheduling and semi-persistent scheduling is limited by available Physical Downlink Control CHannel (PDCCH) resources and Physical Downlink Shared CHannel (PDSCH) resources respectively. The different behavior of these two packet scheduling schemes and specific bottleneck on capacity lead us to formulate two distinctly different performance enhancement strategies, which are the main focus of this paper. For dynamic scheduling, we propose a bi-directional power control algorithm to rationalize PDCCH resource allocation, thus greatly improving VoIP capacity. For semi-persistent scheduling, we introduce Adaptive Transmission Bandwidth (ATB) to rationalize PDSCH resource allocation and further apply dynamic packet bundling in highly-loaded network, thus improving VoIP capacity in a considerable manner. The proposed enhancement methods are validated through large-scale system level simulations and the obtained system simulation results further confirm effectiveness of these enhancement methods.

  • Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security

    Kyusuk HAN  Taeshik SHON  Kwangjo KIM  

     
    LETTER

      Vol:
    E94-B No:8
      Page(s):
    2235-2238

    The VoIP-based Internet Phonesystem is now seen as one of the killer applications in the high speed and broadband internet environment. Given the wide-spread use of the Internet Phone, it is necessary to provide security services for guaranteeing users' privacy. However, providing security service in Internet Phone has the possibility of incurring additional overheads such as call setup delay time. In this paper, we present a one-way key agreement model based on VoIP in order to reduce call setup time as well as protecting user privacy. The proposed approach decreases the delay time of the call setup in comparison with the previous models because our model enables the key generation in caller side without waiting the response from the receiver.

  • Modeling of Electric Vehicle Charging Systems in Communications Enabled Smart Grids

    Seung Jun BAEK  Daehee KIM  Seong-Jun OH  Jong-Arm JUN  

     
    LETTER-Information Network

      Vol:
    E94-D No:8
      Page(s):
    1708-1711

    We consider a queuing model with applications to electric vehicle (EV) charging systems in smart grids. We adopt a scheme where an Electric Service Company (ESCo) broadcasts a one bit signal to EVs, possibly indicating 'on-peak' periods during which electricity cost is high. EVs randomly suspend/resume charging based on the signal. To model the dynamics of EVs we propose an M/M/∞ queue with random interruptions, and analyze the dynamics using time-scale decomposition. There exists a trade-off: one may postpone charging activity to 'off-peak' periods during which electricity cost is cheaper, however this incurs extra delay in completion of charging. Using our model we characterize achievable trade-offs between the mean cost and delay perceived by users. Next we consider a scenario where EVs respond to the signal based on the individual loads. Simulation results show that peak electricity demand can be reduced if EVs carrying higher loads are less sensitive to the signal.

  • Adaptive Noise Suppression Algorithm for Speech Signal Based on Stochastic System Theory

    Akira IKUTA  Hisako ORIMOTO  

     
    PAPER

      Vol:
    E94-A No:8
      Page(s):
    1618-1627

    Numerous noise suppression methods for speech signals have been developed up to now. In this paper, a new method to suppress noise in speech signals is proposed, which requires a single microphone only and doesn't need any priori-information on both noise spectrum and pitch. It works in the presence of noise with high amplitude and unknown direction of arrival. More specifically, an adaptive noise suppression algorithm applicable to real-life speech recognition is proposed without assuming the Gaussian white noise, which performs effectively even though the noise statistics and the fluctuation form of speech signal are unknown. The effectiveness of the proposed method is confirmed by applying it to real speech signals contaminated by noises.

  • Exact & Closed-Form BER Expressions Based on Error-Events at Relay Nodes for DF Relay Systems over Rayleigh Fading Channels

    Jeanyeung JANG  Kyunbyoung KO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:8
      Page(s):
    2419-2422

    In this letter, we derive another exact bit error rate (BER) for decode-and-forward (DF) relay systems over Rayleigh fading channels. At first, our focus is on fixed-DF (FDF) relay schemes in which the probability density function (PDF) is derived based on error-events at relay nodes. Some insight into how erroneous detection and transmission at relay nodes affect both the combined signal-to-noise ratio (SNR) and the averaged BER is obtained, and cooperative diversity is observed from the closed-form BER expression. In addition, the developed analytical method is extended to adaptive-DF (ADF) schemes and the exact BER expressions are derived. Simulation results are finally presented to validate the analysis.

  • Lightweight Consistent Recovery Algorithm for Sender-Based Message Logging in Distributed Systems

    Jinho AHN  

     
    LETTER-Dependable Computing

      Vol:
    E94-D No:8
      Page(s):
    1712-1715

    Sender-based message logging (SBML) with checkpointing has its well-known beneficial feature, lowering highly failure-free overhead of synchronous logging with volatile logging at sender's memory. This feature encourages it to be applied into many distributed systems as a low-cost transparent rollback recovery technique. However, the original SBML recovery algorithm may no longer be progressing in some transient communication error cases. This paper proposes a consistent recovery algorithm to solve this problem by piggybacking small log information for unstable messages received on each acknowledgement message for returning the receive sequence number assigned to a message by its receiver. Our algorithm also enables all messages scheduled to be sent, but delayed because of some preceding unstable messages to be actually transmitted out much earlier than the existing ones.

  • LILES System: Guiding and Analyzing Cognitive Visualization in Beginning and Intermediate Kanji Learners

    Luis INOSTROZA CUEVA  Masao MUROTA  

     
    PAPER-Educational Technology

      Vol:
    E94-D No:7
      Page(s):
    1449-1458

    This paper provides conceptual and experimental analysis of a new approach in the study of kanji, our “Learner's Visualization (LV) Approach”. In a previous study we found that the LV Approach assists beginning learners in significantly updating their personal kanji deconstruction visualization. Additionally, in another study our findings provided evidence that beginning learners also receive a significant impact in the ability to acquire vocabulary. In this study, our research problem examines how beginning and intermediate students use visualization to cognitively deconstruct (divide) kanji in different ways, and how this affects their learning progress. We analyze the cognitive differences in how kanji learners explore and deconstruct novel kanji while using the LV Approach and how these differences affect their learning process while using the LV Approach. During the learning experience, our LILES System (Learner's Introspective Latent Envisionment System), based on the LV Approach, guides learners to choose from a set of possible “kanji deconstruction layouts” (layouts showing different ways in which a given kanji can be divided). The system then assists learners in updating their “kanji deconstruction level” (the average number of parts they visualize within kanji according to their current abilities). Statistical analysis based on achieved performance was conducted. The analysis of our results proves that there are cognitive differences: beginners deconstruct kanji into more parts (“blocks”) than intermediate learners do, and while both improve their kanji deconstruction scores, there is a more significant change in “kanji deconstruction level” in beginners. However, it was also found that intermediate learners benefit more in “kanji retention score” compared with beginners. Suggestions for further research are provided.

  • BER Analysis of Dual-Carrier Modulation (DCM) over Nakagami-m Fading Channel

    Hyun-Seok RYU  Jun-Seok LEE  Chung-Gu KANG  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E94-B No:7
      Page(s):
    2123-2126

    This letter provides a tight upper bound on the bit error rate (BER) over the Nakagami-m fading channel for the dual carrier modulation (DCM) scheme, which is adopted by the multi-band orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband (UWB) system. Its tightness is verified with the existing result for Rayleigh fading channel, i.e., for m=1, which would be also valid for a more general fading environment.

  • Re-Scheduling of Unit Commitment Based on Customers' Fuzzy Requirements for Power Reliability

    Bo WANG  You LI  Junzo WATADA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E94-D No:7
      Page(s):
    1378-1385

    The development of the electricity market enables us to provide electricity of varied quality and price in order to fulfill power consumers' needs. Such customers choices should influence the process of adjusting power generation and spinning reserve, and, as a result, change the structure of a unit commitment optimization problem (UCP). To build a unit commitment model that considers customer choices, we employ fuzzy variables in this study to better characterize customer requirements and forecasted future power loads. To measure system reliability and determine the schedule of real power generation and spinning reserve, fuzzy Value-at-Risk (VaR) is utilized in building the model, which evaluates the peak values of power demands under given confidence levels. Based on the information obtained using fuzzy VaR, we proposed a heuristic algorithm called local convergence-averse binary particle swarm optimization (LCA-PSO) to solve the UCP. The proposed model and algorithm are used to analyze several test systems. Comparisons between the proposed algorithm and the conventional approaches show that the LCA-PSO performs better in finding the optimal solutions.

  • A Scalable and Reconfigurable Fault-Tolerant Distributed Routing Algorithm for NoCs

    Zewen SHI  Xiaoyang ZENG  Zhiyi YU  

     
    PAPER-Computer System

      Vol:
    E94-D No:7
      Page(s):
    1386-1397

    Manufacturing defects in the deep sub-micron VLSI process and aging resulted problems of devices during lifecycle are inevitable, and fault-tolerant routing algorithms are important to provide the required communication for NoCs in spite of failures. The proposed algorithm, referred to as scalable and reconfigurable fault-tolerant distributed routing (RFDR), partitions the system into nine regions using the concept of divide-and-conquer. It is a distributed algorithm, and each router guarantees fault-tolerance within one's own region and the system can be still sustained with multiple fault areas. The proposed RFDR has excellent scalability with hardware cost keeping constant independent of system size. Also it is completely reconfigurable when new nodes fail. Simulations under various synthetic traffic patterns show its better performance compared to Extended-XY routing algorithm. Moreover, there is almost no hardware overhead compared to Logic-Based Distributed Routing (LBDR), but the fault-tolerance capacity is enhanced in the proposed algorithm. Hardware cost is reduced 37% compared to Reconfigurable Distributed Scalable Predictable Interconnect Network (R-DSPIN) which only supports single fault region.

  • Distance-Adaptive Path Allocation in Elastic Optical Path Networks Open Access

    Bartlomiej KOZICKI  Hidehiko TAKARA  Takafumi TANAKA  Yoshiaki SONE  Akira HIRANO  Kazushige YONENAGA  Masahiko JINNO  

     
    PAPER

      Vol:
    E94-B No:7
      Page(s):
    1823-1830

    We describe a concept and realization of distance-adaptive (DA) resource allocation in spectrum-sliced elastic optical path network (SLICE). We modify the modulation format and cross-connection bandwidth of individual fixed-bit rate optical paths to optimize performance with respect to transmission distance. The shorter paths are allocated a smaller amount of resources which allows reducing the spectrum occupied by the channel. We show in calculation a reduction in required spectral resources of more than 60% when compared to the traditional traffic allocation schemes based on ITU-T grid. The concept is verified experimentally.

901-920hit(3183hit)