The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

1281-1300hit(3183hit)

  • Adaptive Impedance Matching System Using FPGA Processor for Efficient Control Algorithm

    Hirokazu OBA  Minseok KIM  Ryotaro TAMAKI  Hiroyuki ARAI  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E91-C No:8
      Page(s):
    1348-1355

    The input impedance of an antenna fluctuates because of various usage conditions, which causes a mismatch between an internal circuit and an antenna. An automatic matching system solves this problem, then this paper presents a reconfigurable impedance tuner that has a set of fixed capacitors controlled by switching p-i-n diodes. A fast control algorithm for selecting the appropriate conditions of an impedance tuner is proposed and mounted on FPGA to demonstrate the performance.

  • Platform for Load Balancing and Throughput Enhancement with Cognitive Radio

    Seishi HANAOKA  Junji YAMAMOTO  Masashi YANO  

     
    PAPER

      Vol:
    E91-B No:8
      Page(s):
    2501-2508

    The cognitive radio system consists of multiple wireless access systems that cover overlapping areas and cognitive terminals that use one or more of the wireless access systems simultaneously. In this paper, we describe the system architecture of a platform for load balancing and throughput enhancement with cognitive radio system. In our platform, each terminal, which can access multiple radio systems, operates with a single local IP address. Based on our platform, we have developed both simulator and testbed system. Through the simulation of and the testing of a testbed system, we prove that systems load balance was achieved between WiMAX and wireless LAN, and total user throughput was increased with the proposed platform. Moreover, load balance to satisfy both real time service and best effort service. These results demonstrate the platform described in the paper can achieve a convergence with plural wireless systems.

  • SPORT: An Algorithm for Divisible Load Scheduling with Result Collection on Heterogeneous Systems

    Abhay GHATPANDE  Hidenori NAKAZATO  Olivier BEAUMONT  Hiroshi WATANABE  

     
    PAPER-Network

      Vol:
    E91-B No:8
      Page(s):
    2571-2588

    Divisible Load Theory (DLT) is an established mathematical framework to study Divisible Load Scheduling (DLS). However, traditional DLT does not address the scheduling of results back to source (i.e., result collection), nor does it comprehensively deal with system heterogeneity. In this paper, the DLSRCHETS (DLS with Result Collection on HETerogemeous Systems) problem is addressed. The few papers to date that have dealt with DLSRCHETS, proposed simplistic LIFO (Last In, First Out) and FIFO (First In, First Out) type of schedules as solutions to DLSRCHETS. In this paper, a new polynomial time heuristic algorithm, SPORT (System Parameters based Optimized Result Transfer), is proposed as a solution to the DLSRCHETS problem. With the help of simulations, it is proved that the performance of SPORT is significantly better than existing algorithms. The other major contributions of this paper include, for the first time ever, (a) the derivation of the condition to identify the presence of idle time in a FIFO schedule for two processors, (b) the identification of the limiting condition for the optimality of FIFO and LIFO schedules for two processors, and (c) the introduction of the concept of equivalent processor in DLS for heterogeneous systems with result collection.

  • Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Hiroki IKEDA  Jun SUGAWA  Yoshihiro ASHI  Kenichi SAKAMOTO  

     
    PAPER

      Vol:
    E91-B No:8
      Page(s):
    2477-2484

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  • Packet QoS Aware AMC Selection for 3G LTE of Evolved Packet System

    Kyungkoo JUN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:8
      Page(s):
    2740-2743

    3GPP evolved packet system (EPS) is an all-IP based system that supports various access networks such as LTE, HSPA/HSPA+ and non-3GPP networks. Recently, the support of IP flows with packet level QoS profiles has been added to the requirements of the EPS. This paper proposes an adaptive modulation and coding (AMC) scheme that supports the QoS of such IP flows in the 3G LTE access network of the EPS. Defining the retransmission as a critical factor for QoS, the proposed scheme applies different maximum packet error probability Pmax to each packet when selecting the AMC transmission mode. In determining Pmax, the QoS constraints as well as channel condition are considered, balancing two objectives: the satisfaction of the QoS and the maximization of spectral efficiency. Simulations show that it is able to reduce both delay violation and retransmission, while improving throughput in comparison with an existing scheme.

  • On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes

    Todorka ALEXANDROVA  Hiroyoshi MORITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2138-2150

    Constructing ideal (t,n) threshold secret sharing schemes leads to some limitations on the maximum number of users, that are able to join the secret sharing scheme. We aim to remove these limitations by reducing the information rate of the constructed threshold secret sharing schemes. In this paper we propose recursive construction algorithms of (t,n) threshold secret sharing schemes, based on the generalized vector space construction. Using these algorithms we are able to construct a (t,n) threshold secret sharing scheme for any arbitrary n.

  • On Algebraic Properties of Delay-Nonconflicting Languages in Supervisory Control under Communication Delays

    Jung-Min YANG  Seong-Jin PARK  

     
    LETTER-Systems and Control

      Vol:
    E91-A No:8
      Page(s):
    2237-2239

    In networked control systems, uncontrollable events may unexpectedly occur in a plant before a proper control action is applied to the plant due to communication delays. In the area of supervisory control of discrete event systems, Park and Cho [5] proposed the notion of delay-nonconflictingness for the existence of a supervisor achieving a given language specification under communication delays. In this paper, we present the algebraic properties of delay-nonconflicting languages which are necessary for solving supervisor synthesis problems under communication delays. Specifically, we show that the class of prefix-closed and delay-nonconflicting languages is closed under intersection, which leads to the existence of a unique infimal prefix-closed and delay-nonconflicting superlanguage of a given language specification.

  • Differential Energy Based Watermarking Algorithm Using Wavelet Tree Group Modulation (WTGM) and Human Visual System

    Min-Jen TSAI  Chang-Hsing SHEN  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1961-1973

    Wavelet tree based watermarking algorithms are using the wavelet coefficient energy difference for copyright protection and ownership verification. WTQ (Wavelet Tree Quantization) algorithm is the representative technique using energy difference for watermarking. According to the cryptanalysis on WTQ, the watermark embedded in the protected image can be removed successfully. In this paper, we present a novel differential energy watermarking algorithm based on the wavelet tree group modulation structure, i.e. WTGM (Wavelet Tree Group Modulation). The wavelet coefficients of host image are divided into disjoint super trees (each super tree containing two sub-super trees). The watermark is embedded in the relatively high-frequency components using the group strategy such that energies of sub-super trees are close. The employment of wavelet tree structure, sum-of-subsets and positive/negative modulation effectively improve the drawbacks of the WTQ scheme for its insecurity. The integration of the HVS (Human Visual System) for WTGM provides a better visual effect of the watermarked image. The experimental results demonstrate the effectiveness of our algorithm in terms of robustness and imperceptibility.

  • Convergence Acceleration of Iterative Signal Detection for MIMO System with Belief Propagation

    Satoshi GOUNAI  Tomoaki OHTSUKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:8
      Page(s):
    2640-2647

    In multiple-input multiple-output (MIMO) wireless systems, the receiver must extract each transmitted signal from received signals. Iterative signal detection with belief propagation (BP) can improve the error rate performance, by increasing the number of detection and decoding iterations in MIMO systems. This number of iterations is, however, limited in actual systems because each additional iteration increases latency, receiver size, and so on. This paper proposes a convergence acceleration technique that can achieve better error rate performance with fewer iterations than the conventional iterative signal detection. Since the Log-Likelihood Ratio (LLR) of one bit propagates to all other bits with BP, improving some LLRs improves overall decoder performance. In our proposal, all the coded bits are divided into groups and only one group is detected in each iterative signal detection whereas in the conventional approach, each iterative signal detection run processes all coded bits, simultaneously. Our proposal increases the frequency of initial LLR update by increasing the number of iterative signal detections and decreasing the number of coded bits that the receiver detects in one iterative signal detection. Computer simulations show that our proposal achieves better error rate performance with fewer detection and decoding iterations than the conventional approach.

  • An Effective GA-Based Scheduling Algorithm for FlexRay Systems

    Shan DING  Hiroyuki TOMIYAMA  Hiroaki TAKADA  

     
    PAPER-System Programs

      Vol:
    E91-D No:8
      Page(s):
    2115-2123

    An advanced communication system, the FlexRay system, has been developed for future automotive applications. It consists of time-triggered clusters, such as drive-by-wire in cars, in order to meet different requirements and constraints between various sensors, processors, and actuators. In this paper, an approach to static scheduling for FlexRay systems is proposed. Our experimental results show that the proposed scheduling method significantly reduces up to 36.3% of the network traffic compared with a past approach.

  • Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback

    Rongrong NI  Qiuqi RUAN  

     
    LETTER-Application Information Security

      Vol:
    E91-D No:8
      Page(s):
    2196-2198

    A neighbor-aided authentication watermarking based on a chaotic system with feedback is proposed in this paper. This algorithm can not only detect malicious manipulations but reveal block substitutions when the VQ attack occurs. An image is partitioned into non-overlapped blocks. The pixels in one block and its neighboring block are combined to produce an authentication watermark based on a chaotic system with feedback, which is sensitive to the initial value. The produced watermark is embedded into the current block. During detection, the detector extracts the watermark firstly, then generates a reference sequence and compares it with the extracted watermark to authenticate the integrity of the image and locate the tampered regions. Experimental results prove the effectiveness of our method.

  • Analysis and Optimization for a Contactor with Feedback Controlled Magnet System

    Yingyi LIU  Degui CHEN  Chunping NIU  Liang JI  Weixiong TONG  

     
    PAPER-Contactors & Circuit Breakers

      Vol:
    E91-C No:8
      Page(s):
    1273-1279

    In the optimum design of AC contactors, it is important to analyze the dynamic behavior. Moreover, movable contact and core bounces have remarkable effect on the lifetime of contactors. According to a new kind of contactor with feedback controlled magnet system, this paper builds two different sets of periodically inter-transferred equations to obtain the dynamic characteristics of the contactor. The equations describe the coupling of the electric circuit, electromagnetic field and mechanical system taking account of the influence of friction. Then, the paper gives an optimum design to the dimension and the duty ratio of the contactor' pulse modulated wave (PWM) under different exciting, and proves, by experiment and simulation, that the bounce time of the contactor working in the optimized duty ratio is much less than that of the general AC contactors.

  • MIMO Broadcast Transmission Strategy over Fast Time-Varying Channels

    Hongmei WANG  Xibin XU  Ming ZHAO  Weiling WU  Yan YAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:8
      Page(s):
    2731-2735

    In time-varying channels, the channel state information available at the transmitter (CSIT) is outdated due to inherent time delay between the uplink channel estimation and the downlink data transmission in TDD systems. In this letter, we propose an iterative precoding method and a linear decoding method which are both based on minimum mean-squared error (MMSE) criteria to mitigate the interference among data streams and users created by outdated CSIT for multiuser MIMO downlink systems. Analysis and simulation results show that the proposed method can effectively reduce the impairment of the outdated CSIT and improve the system capacity.

  • A High-Rate Space-Time Block Code with Full Diversity

    Zhenzhen GAO  Shihua ZHU  Zhimeng ZHONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:7
      Page(s):
    2431-2434

    A new high-rate space-time block code (STBC) with full transmit diversity gain for four transmit antennas based on a generalized Alamouti code structure is proposed. The proposed code has lower Maximum Likelihood (ML) decoding complexity than the Double ABBA scheme does. Constellation rotation is used to maximize the diversity product. With the optimal rotated constellations, the proposed code significantly outperforms some known high-rate STBCs in the literature with similar complexity and the same spectral efficiency.

  • Skew-Frobenius Maps on Hyperelliptic Curves

    Shunji KOZAKI  Kazuto MATSUO  Yasutomo SHIMBARA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:7
      Page(s):
    1839-1843

    Scalar multiplication methods using the Frobenius maps are known for efficient methods to speed up (hyper)elliptic curve cryptosystems. However, those methods are not efficient for the cryptosystems constructed on fields of small extension degrees due to costs of the field operations. Iijima et al. showed that one can use certain automorphisms on the quadratic twists of elliptic curves for fast scalar multiplications without the drawback of the Frobenius maps. This paper shows an extension of the automorphisms on the Jacobians of hyperelliptic curves of arbitrary genus.

  • Improving Handover Quality in 4G Mobile Systems

    Dongwook KIM  Hanjin LEE  Namgi KIM  Hyunsoo YOON  

     
    LETTER

      Vol:
    E91-A No:7
      Page(s):
    1686-1688

    In this paper, we propose a new handover algorithm to guarantee handover quality in 4G mobile systems. The proposed algorithm limits the handover interruption time by improving the HARQ retransmission latency of the first packet transmitted from new serving cell. Through the simulations, we proved that our algorithm meets the requirement of handover interruption time for TCP services with high rate.

  • Decomposition of Task-Level Concurrency on C Programs Applied to the Design of Multiprocessor SoC

    Mohammad ZALFANY URFIANTO  Tsuyoshi ISSHIKI  Arif ULLAH KHAN  Dongju LI  Hiroaki KUNIEDA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E91-A No:7
      Page(s):
    1748-1756

    A simple extension used to assist the decomposition of task-level concurrency within C programs is presented in this paper. The concurrency decomposition is meant to be used as the point of entry for Multiprocessor System-on-Chips (MPSoC) architectures' design-flow. Our methodology allows the (re)use of readily available reference C programs and enables easy and rapid exploration for various alternatives of task partitioning strategies; a crucial task that greatly influences the overall quality of the designed MPSoC. A test case using a JPEG encoder application has been performed and the results are presented in this paper.

  • Image Enhancement by Analysis on Embedded Surfaces of Images and a New Framework for Enhancement Evaluation

    Li TIAN  Sei-ichiro KAMATA  

     
    PAPER

      Vol:
    E91-D No:7
      Page(s):
    1946-1954

    Image enhancement plays an important role in many machine vision applications on images captured in low contrast and low illumination conditions. In this study, we propose a new method for image enhancement based on analysis on embedded surfaces of images. The proposed method gives an insight into the relationship between the image intensity and image enhancement. In our method, scaled surface area and the surface volume are proposed and used to reconstruct the image iteratively for contrast enhancement, and the illumination of the reconstructed image can also be adjusted simultaneously. On the other hand, the most common methods for measuring the quality of enhanced images are Mean Square Error (MSE) or Peak Signal-to-Noise-Ratio (PSNR) in conventional works. The two measures have been recognized as inadequate ones because they do not evaluate the result in the way that the human vision system does. This paper also presents a new framework for evaluating image enhancement using both objective and subjective measures. This framework can also be used for other image quality evaluations such as denoising evaluation. We compare our enhancement method with some well-known enhancement algorithms, including wavelet and curvelet methods, using the new evaluation framework. The results show that our method can give better performance in most objective and subjective criteria than the conventional methods.

  • Efficient VLSI Design of Residue-to-Binary Converter for the Moduli Set (2n, 2n+1 - 1, 2n - 1)

    Su-Hon LIN  Ming-Hwa SHEU  Chao-Hsiang WANG  

     
    LETTER-Computer Systems

      Vol:
    E91-D No:7
      Page(s):
    2058-2060

    The moduli set (2n, 2n+1-1, 2n-1) which is free of (2n+1)-type modulus is profitable to construct a high-performance residue number system (RNS). In this paper, we derive a reduced-complexity residue-to-binary conversion algorithm for the moduli set (2n, 2n+1-1, 2n-1) by using New Chinese Remainder Theorem (CRT). The resulting converter architecture mainly consists of simple adder and multiplexer (MUX) which is suitable to realize an efficient VLSI implementation. For the various dynamic range (DR) requirements, the experimental results show that the proposed converter can significantly achieve at least 23.3% average Area-Time (AT) saving when comparing with the latest designs. Based on UMC 0.18 µm CMOS cell-based technology, the chip area for 16-bit residue-to-binary converter is 931931 µm2 and its working frequency is about 135 MHz including I/O pad.

  • Analysis of Divisible Load Scheduling with Result Collection on Heterogeneous Systems

    Abhay GHATPANDE  Hidenori NAKAZATO  Olivier BEAUMONT  Hiroshi WATANABE  

     
    PAPER-Network

      Vol:
    E91-B No:7
      Page(s):
    2234-2243

    Divisible Load Theory (DLT) is an established framework to study Divisible Load Scheduling (DLS). Traditional DLT ignores the result collection phase, and specifies no solution to the general case where both the network speed and computing capacity of the nodes are heterogeneous. In this paper, the DLS with Rosult Collection on HETerogemeous Systems (DLSRCHETS) problem is formulated as a linear program and analyzed. The papers to date that have dealt with result collection, proposed simplistic LIFO (Last In, First Out) and FIFO (First In, First Out) type of schedules as solutions. The main contributions of this paper are: (a) A proof of the Allocation Precedence Condition, which is inconsequential in LIFO or FIFO, but is important in a general schedule. (b) A proof of the Idle Time Theorem, which states that irrespective of whether load is allocated to all available processors, in the optimal solution to the DLSRCHETS problem, at the most one processor that is allocated load has idle time, and that the idle time exists only when the result collection begins immediately after the completion of load distribution.

1281-1300hit(3183hit)