The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] time(2217hit)

1221-1240hit(2217hit)

  • Effect of Regular and Irregular Missing Data on the Correlation Integral Analysis of Real-Time Series

    Md. Mostafizur Rahman KHAN  Noboru TANIZUKA  

     
    PAPER-Nonlinear Problems

      Vol:
    E88-A No:11
      Page(s):
    3161-3168

    Missing data which inevitably occurs in observed time series may lead to an erroneous result based on the correlation integral analysis. Effects of data, missing at regular and irregular times, on the analyzed result are estimated. A model estimation is obtained for the Lorenz time series. The effects of the missing data in economic and astronomical time series are estimated using the correlation integral analysis. A convenient method of choosing a time lag is proposed to minimize the effect of regularly missing data.

  • Continuous Wave Time-Division-Multiplexing and Its Applications

    Ke-chu YI  Chun-yan GU  Chun-ting WANG  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E88-B No:11
      Page(s):
    4266-4273

    Time-Division-Multiplexing (TDM) is usually aimed at digital signals, while Continuous Wave Time-Division- Multiplexing (i.e. CWTDM) presented in this paper mainly addresses the problem of multiple continuous signals to share a channel. According to the idea in Ref.[1], this paper proposes a novel method for implementing CWTDM, which can make multiple band-limited continuous signals time-division-multiplexed into one continuous signal without significantly expanding the frequency band. The new method has several important applications. In particular, it can be used to implement an on-board FDMA-CWTDM conversion to develop a new system of satellite communications with more efficient performance.

  • Explicitly-Adaptive Time Delay Estimation for Wide-Band Signals

    Doh-Hyoung KIM  Youngjin PARK  

     
    LETTER-Engineering Acoustics

      Vol:
    E88-A No:11
      Page(s):
    3214-3217

    A new method of explicitly adaptive time delay estimation (EATDE) algorithm is proposed for estimating a varying time delay parameter. The proposed method is based on the Haar wavelet transform of cross-correlations. The proposed algorithm can be viewed as a gradient-based optimization of lowpass filtered cross-correlations, but requires less computational power. The algorithm shows a global convergence property for wide-band signals with uncorrelated noises. A convergence analysis including mean behavior, mean-square-error behavior, and steady-state error of delay estimate is given. Simulation results are also provided to demonstrate the performance of the proposed algorithm.

  • Classification of Driving Methods for TFT-OLEDs and Novel Proposal Using Time Ratio Grayscale and Current Uniformization

    Mutsumi KIMURA  Yuji HARA  Hiroyuki HARA  Tomoyuki OKUYAMA  Satoshi INOUE  Tatsuya SHIMODA  

     
    REVIEW PAPER

      Vol:
    E88-C No:11
      Page(s):
    2043-2050

    Driving methods for TFT-OLEDs are explained with their features and classified from the viewpoints of grayscale methods and uniformizing methods. This classification leads us to a novel proposal using time ratio grayscale and current uniformization. This driving method maintains current uniformity and simultaneously overcomes charging shortage of the pixel circuit for low grayscale levels and current variation due to the shift of operating points. Tolerance toward degraded characteristics, linearity of grayscale and luminance uniformity against degraded characteristics are confirmed using circuit simulation.

  • Multiple-Access Interference Suppression in Multi-User OFDM Systems with Frequency Diversity

    Jong-Ho PAIK  Yong-Soo CHO  

     
    LETTER-Communication Theory and Signals

      Vol:
    E88-A No:11
      Page(s):
    3252-3255

    This letter deals with our investigations into improving the performance of a wireless uplink system when an orthogonal frequency-division multiple access (OFDMA) is used as an access scheme. To do this, the OFDMA-based uplink system adopts a frequency diversity coupled with a cyclic time shift (CTS) at the transmitter, which is named as the FD-OFDMA system with CTS. It is found that the multi-user FD-OFDMA system equipping with CTS can decrease the probability of destroying the orthogonality among the users and provide the MAI-robust reception without decreasing the bandwidth efficiency of the system.

  • Failure Trace Analysis of Timed Circuits for Automatic Timing Constraints Derivation

    Tomoya KITAI  Tomohiro YONEDA  Chris MYERS  

     
    PAPER-Dependable Computing

      Vol:
    E88-D No:11
      Page(s):
    2555-2564

    This work proposes a technique to automatically obtain timing constraints for a given timed circuit to operate correctly. A designated set of delay parameters of a circuit are first set to sufficiently large bounds, and verification runs followed by failure analysis are repeated. Each verification run performs timed state space enumeration under the given delay bounds, and produces a failure trace if it exists. The failure trace is analyzed, and sufficient timing constraints to prevent the failure are obtained. Then, the delay bounds are tightened according to the timing constraints by using an ILP (Integer Linear Programming) solver. This process terminates when either some delay bounds under which no failure is detected are found or no new delay bounds to prevent the failures can be obtained. The experimental results using a naive implementation show that the proposed method can efficiently handle asynchronous benchmark circuits and nontrivial GasP circuits.

  • The Design of an LCD System Based on the Quantitative Analysis for Enhancement of the Motion Picture Quality

    Sung-Hak LEE  Soo-Wook JANG  Eun-Su KIM  Sang-Hoon LEE  Kyu-Ik SOHNG  

     
    LETTER

      Vol:
    E88-C No:11
      Page(s):
    2094-2098

    The pulsed backlight system has been introduced for reducing motion blurs of LCDs in high motion pictures. But applying the pulsed backlight, full screen flicker and inconsistency of transmissivity for entire frame at a lightening time should be considered. This paper discusses the analysis of blurs in high motion pictures and proposes the design method for more suitable display terminal of LCDs.

  • Capacity and Error Probability Analysis for Orthogonal Space-Time Block Codes over Correlated Rayleigh and Rician Fading Channels

    Hao ZHANG  Wei LI  T. Aaron GULLIVER  

     
    PAPER-Communication Theory and Signals

      Vol:
    E88-A No:11
      Page(s):
    3203-3213

    In this paper, the capacity and error probability of orthogonal space-time block codes (STBCs) are presented for PAM/PSK/QAM modulation in correlated flat fading channels. We consider an equivalent scalar AWGN (additive white Gaussian noise) channel with a channel gain proportional to the Frobenius norm of the matrix channel. A unified approach to the error probability analysis for correlated Rayleigh and Rician fading channels is presented. Closed form error probability expressions are derived for Rayleigh fading channels. We also determine the capacity and probability of error for a multiuser direct sequence code division multiple access (DS-CDMA) system employing a STBC over correlated fading channels.

  • QPSK Impulse Signal Transmission for Ultra Wide Band Communication Systems in Multipath Channel Environments

    Chaiyaporn KHEMAPATAPAN  Watit BENJAPOLAKUL  Kiyomichi ARAKI  

     
    PAPER

      Vol:
    E88-A No:11
      Page(s):
    3100-3109

    In this paper, three new ultra wideband (UWB) communication systems with quadrature-phase shift keying (QPSK) impulse modulation are proposed. First, direct-sequence (DS) multiple-access scheme is applied. The second proposed system is based on time-hopping (TH) multiple-access scheme. The last proposed system applies TH multiple-access scheme with QPSK impulse modulation and pulse position modulation (PPM). The conventional UWB communications as TH scheme with PPM modulation and DS scheme with binary-phase shift keying (BPSK) are used to compare. The simulation results show that all proposed UWB communication systems can provide obviously better performances compared with the conventional TH-PPM and DS-BPSK UWB communication systems. The comparisons in aspects of transmission bit rate and the number of users are also investigated.

  • Frequency-Domain and Time-Domain Novel Uniform Asymptotic Solutions for Scattered Fields by an Impedance Cylinder and a Dielectric Cylinder

    Teruhiko IDA  Toyohiko ISHIHARA  Keiji GOTO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E88-C No:11
      Page(s):
    2124-2135

    Frequency-domain and time-domain novel uniform asymptotic solutions for the scattered fields by an impedance cylinder and a dielectric cylinder, with a radius of curvature sufficiently larger than the wavelength, are presented in this paper. The frequency-domain novel extended UTD and the modified UTD solutions, derived by retaining the higher-order terms in the integrals for the scattered fields, may be applied in the deep shadow region in which the conventional UTD solutions produce the substantial errors. The novel time-domain uniform asymptotic solutions are derived by applying the saddle point technique in evaluating the inverse Fourier transform. We have confirmed the accuracy and validity of the uniform asymptotic solutions both in the frequency-domain and in the time-domain by comparing those solutions with the reference solutions calculated from the eigenfunction expansion (frequency-domain) and from the hybrid eigenfunction expansion and fast Fourier transform (FFT) method (time-domain).

  • Analyzing and Absorbing Cross-Layer Header Overhead of Video Data from End-to-End Viewpoint

    Chu-Chuan LEE  Pao-Chi CHANG  

     
    PAPER-Multimedia Systems for Communications" Multimedia Systems for Communications

      Vol:
    E88-B No:11
      Page(s):
    4360-4367

    Regarding IP-based video applications over wireless networks, the multi-layer header overhead may significantly affect the estimation of target video encoding bit rate and the effective throughput of wireless network. Based on the existing header structure of video packets, this study intends to deal with the header overhead problem from the end-to-end viewpoint. This paper first proposes a simple yet robust closed-form that can determine accurately and timely the optimal video payload length at the video sender based on the current wireless channel condition. The contribution can effectively improve the WLAN throughput and enhance the error resilience effect of scalable video data simultaneously. This study further explores the impact of multi-layer header overhead to the video coding work and proposes a Dynamic Header Overhead Accommodation (DHOA) scheme, which is executed in the video compression layer, to adjust dynamically the available video encoding bits for accommodating the header overhead in advance. The contributions of this paper are robust for various IP implementations such as IPSec (IP Security) over different 802.11 standards. Analytical and simulation results verify the accuracy and effectiveness of the proposed closed-form and header accommodation method. Using DHOA, the bandwidth mismatch between the actual bandwidth demand of packetized video data and the available network bandwidth is no more than 1.1% regardless of the packet sizes used in this paper.

  • Design and Performance Analysis of Quasi-Orthogonal Space-Time Block Codes for Four Antennae

    Yan ZHAO  Chen HE  

     
    LETTER-Coding Theory

      Vol:
    E88-A No:11
      Page(s):
    3244-3247

    In this letter, a novel general design method of quasi-orthogonal space-time block codes for four antennae is presented. Comparison with the design method proposed by Jafarkhani, this method enlarges the number of quasi-orthogonal space-time block codes. The performance of these codes is also analyzed and the simulation results show that it is similar to even better than that of the codes proposed by Jafarkhani.

  • Double Depth First Search Based Parametric Analysis for Parametric Time-Interval Automata

    Tadaaki TANIMOTO  Akio NAKATA  Hideaki HASHIMOTO  Teruo HIGASHINO  

     
    PAPER

      Vol:
    E88-A No:11
      Page(s):
    3007-3021

    In this paper, we propose a parametric model checking algorithm for a subclass of Timed Automata called Parametric Time-Interval Automata (PTIA). In a PTIA, we can specify upper- and lower-bounds of the execution time (time-interval) of each transition using parameter variables. The proposed algorithm takes two inputs, a model described in a PTIA and a property described in a PTIA accepting all invalid infinite/finite runs (called a never claim), or valid finite runs of the model. In the proposed algorithm, firstly we determinize and complement the given property PTIA if it accepts valid finite runs. Secondly, we accelerate the given model, that is, we regard all the actions that are not appeared in the given property PTIA as invisible actions and eliminate them from the model while preserving the set of visible traces and their timings. Thirdly, we construct a parallel composition of the model and the property PTIAs which is accepting all invalid runs that are accepted by the model. Finally, we perform the extension of Double Depth First Search (DDFS), which is used in the automata-theoretic approach to Linear-time Temporal Logic (LTL) model checking, to derive the weakest parameter condition in order that the given model never executes the invalid runs specified by the given property.

  • Real Time Search for Similar Hand Images from Database for Robotic Hand Control

    Kiyoshi HOSHINO  Takanobu TANIMOTO  

     
    PAPER

      Vol:
    E88-A No:10
      Page(s):
    2514-2520

    The authors propose a system for searching the shape of human hands and fingers in real time and with high accuracy, without using any special peripheral equipment such as range sensor, PC cluster, etc., by a method of retrieving similar image quickly with high accuracy from a large volume of image database containing the complicated shapes and self-occlusions. In designing the system, we constructed a database in a way to be adaptable even to differences among individuals, and searched CG images of hand similar to unknown hand image, through extraction of characteristics using high-order local autocorrelational patterns, reduction of the amount of characteristics centering on principal component analysis, and prior rearrangement of data corresponding to the amount of characteristics. As a result of experiments, our system performed high-accuracy estimation of human hand shape where mean error was 7 degrees in finger joint angles, with the processing speed of 30 fps or over.

  • A New Robust Fuzzy Controller for Nonlinear and Large Dead Time Systems

    Rakesh K. ARYA  Ranjit MITRA  Vijay KUMAR  

     
    PAPER

      Vol:
    E88-A No:10
      Page(s):
    2527-2534

    This paper deals with new fuzzy controller for handling systems having large dead time and nonlinearities, via approximations of large rule fuzzy logic controller by simplest fuzzy controller (4 rules). The error between large rule fuzzy controller and simplest fuzzy controller are compensated by proposed compensating factors. These compensating factors are modified to handle large dead time and nonlinear systems. Features of proposed approximations are discussed. The concept of variation of nonlinearity factor of fuzzy controller is also discussed. Various processes from different literatures are utilized to demonstrate the proposed methodology. After doing many simulations it has been found that with proper tuning, overall system handles large dead time and nonlinearity which may be difficult by conventional methods. The processes are also simulated for load disturbances and change of operating point (set point) and it has been found that proposed scheme is robust for long dead times.

  • D2MST: A Shared Tree Construction Algorithm for Interactive Multimedia Applications on Overlay Networks

    Tein-Yaw CHUNG  Yen-Din WANG  

     
    PAPER-Network

      Vol:
    E88-B No:10
      Page(s):
    4023-4029

    Interactive multimedia applications (IMAs) require not only adequate bandwidth to support large volume data transmission but also bounded end-to-end transmission delay between end users. This study proposes a Delay and Degree constrained Multicasting Spanning Tree (D2MST) algorithm to build an any-to-any share tree for IMAs. D2MST comprises root selection and spanning tree generation. A weighting function is defined based on the novel concept of network center and gravity to choose the root of a share tree. From the root, a spanning tree is built by incrementally connecting nodes with larger "power" to the tree so that the degree constraint is satisfied. Simulation results show that D2MST can successfully generate a Δ-constraint MST in which a high percentage of nodes can interact within the bounded delay.

  • Separable 2D Lifting Using Discrete-Time Cellular Neural Networks for Lossless Image Coding

    Hisashi AOMORI  Kohei KAWAKAMI  Tsuyoshi OTAKE  Nobuaki TAKAHASHI  Masayuki YAMAUCHI  Mamoru TANAKA  

     
    PAPER

      Vol:
    E88-A No:10
      Page(s):
    2607-2614

    The lifting scheme is an efficient and flexible method for the construction of linear and nonlinear wavelet transforms. In this paper, a novel lossless image coding technique based on the lifting scheme using discrete-time cellular neural networks (DT-CNNs) is proposed. In our proposed method, the image is interpolated by using the nonlinear interpolative dynamics of DT-CNN, and since the output function of DT-CNN works as a multi-level quantization function, our method composes the integer lifting scheme for lossless image coding. Moreover, the nonlinear interpolative dynamics by A-template is used effectively compared with conventional CNN image coding methods using only B-template. The experimental results show a better coding performance compared with the conventional lifting methods using linear filters.

  • Discrimination of All Types of 4-Bit Optical Code by Optical Time-Gating and Designed Label Recognition Filter in Label Recognition Using Optical Correlation

    Hideaki FURUKAWA  Tsuyoshi KONISHI  Kazuyoshi ITOH  Naoya WADA  Tetsuya MIYAZAKI  

     
    PAPER

      Vol:
    E88-B No:10
      Page(s):
    3841-3847

    In label recognition based on optical correlation processing, to completely discriminate a 4-bit target optical code from all types of 4-bit nontarget ones, we propose a novel label recognition method using both optical time-gating and the designed label recognition filter. We experimentally demonstrate that the intensities of correlation signals of 4-bit similar optical codes can be suppressed by the designed label recognition filter and that only the correlation signal of a 4-bit target optical code can be detected by extraction with optical time-gating. The optical time-gating is realized by using organic nonlinear optical crystal: 2-adamantylamino-5-nitropyridine (AANP).

  • Route Selection Metrics in Wireless Mobile Ad Hoc Networks

    Md. Ifte Khairul HASAN  Saburo TAKAHASHI  Jun-ichi HAKODA  Hideyuki UEHARA  Mitsuo YOKOYAMA  

     
    LETTER-Communication Theory

      Vol:
    E88-A No:10
      Page(s):
    2952-2955

    In this study, we present a way to choose route selection metric while discovering a new route in ad hoc mobile networks. We have used link expiration time and busy rate to calculate the route cost. The route cost is compared to a threshold value to decide whether the traffic of the route is high or low. If it is high then the system chooses busy rate as a route selection metric to avoid traffic congestion and if it is low the link expiration time is used to select the longlasting route. We have examined the characteristics of the routing protocol by computer simulation and found that it over performs the conventional protocols.

  • Security Flaw in SAS-2 Protocol

    Eddy CIZERON  Hirohisa AMAN  Hiroshi KAI  Matu-Tarow NODA  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:10
      Page(s):
    4081-4082

    SAS-2 is an alternative of a one-time password authentication protocol SAS, and is developed in order to reduce overhead due to the use of hash functions. The idea of both algorithms is sharing a similar secret number called the verifier that allows a client to be authenticated and that is changed for each new session. However, some of the combinations proposed in [1] to transmit the verifier may contain a security flaw, and the insecure combination results in vulnerability to impersonation attacks.

1221-1240hit(2217hit)