The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] void(56hit)

41-56hit(56hit)

  • Vehicular-Collision Avoidance Support System (VCASS) by Inter-Vehicle Communications for Advanced ITS

    Jumpei UEKI  Sentarou TASAKA  Yuji HATTA  Hiromi OKADA  

     
    PAPER-Network Management/Operation

      Vol:
    E88-A No:7
      Page(s):
    1816-1823

    In advanced ITS, on-board intelligent systems by the Inter-Vehicle Communications (IVC) is essential technology to achieve a safe automotive society. We aim to avoid the vehicular collisions under almost all situations such as intersections, highways, and blind corners by using IVC technology through wireless ad hoc networks. The objectives of this paper are to develop Vehicular Collision Avoidance Support System (VCASS), and to show its performance by various experiments with two real vehicles. We have installed personal computers, telecommunication equipments, and GPS in two vehicles. In this system, the vehicles exchange the location information and the velocity vectors by the UDP broadcast with each other, and calculate the relative position/speed. The vehicles make the warning for drivers with the possibility of the collision. We verify the validity and the effectiveness of VCASS by the experiments.

  • Collision Avoidance and Recovery for Multicast Communications in Ad Hoc Networks

    Kwan Shek LAU  Derek C.W. PAO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:7
      Page(s):
    2937-2943

    The basic carrier sense multi-access control scheme for multicast communications in wireless ad hoc networks suffers from the well know hidden terminal problem. The data packet collision probability is relatively high, and the packet delivery ratio is sensitive to the network topology, nodes distribution and traffic load. In this paper, we generalize the virtual carrier sense collision avoidance approach to reduce packet collisions in multicast communications. The sender and receivers exchange RTS and CTS packets to reserve the channel. When more than one receivers reply with CTS packets, the sender will detect an "expected" collision which may be interpreted as a valid "clear-to-send" signal provided the collision satisfies the given timing requirements. Together with a receiver-initiated local recovery mechanism, the reliability and packet delivery ratio can be improved to close to 100%.

  • An Approach to the Piano Mover's Problem Using Hierarchic Reinforcement Learning

    Yuko ISHIWAKA  Tomohiro YOSHIDA  Hiroshi YOKOI  Yukinori KAKAZU  

     
    PAPER-Distributed Cooperation and Agents

      Vol:
    E87-D No:8
      Page(s):
    2106-2113

    We attempt to achieve corporative behavior of autonomous decentralized agents constructed via Q-Learning, which is a type of reinforcement learning. As such, in the present paper, we examine the piano mover's problem including a find-path problem. We propose a multi-agent architecture that has an external agent and internal agents. Internal agents are homogenous and can communicate with each other. The movement of the external agent depends on the composition of the actions of the internal agents. By learning how to move through the internal agents, avoidance of obstacles by the object is expected. We simulate the proposed method in a two-dimensional continuous world. Results obtained in the present investigation reveal the effectiveness of the proposed method.

  • Performance Evaluation of the Optical Packet Switch with Hybrid Buffer Structure for the Contention Resolution of Asynchronous Variable Length Packets

    Huhnkuk LIM  Chang-Soo PARK  

     
    LETTER-Switching

      Vol:
    E87-B No:5
      Page(s):
    1421-1426

    We propose an optical packet switch (OPS) using a hybrid buffer structure for the contention resolution of asynchronous variable length packets. The hybrid buffer consists of a fiber delay line (FDL) buffer as the prime buffer and a shared electronic buffer as the supplementary buffer. For the performance evaluation, a modified void filling scheduling algorithm that can be applied to the OPS was proposed. Simulation results show that the use of the electronic buffer together with the FDL buffer significantly reduce the number of FDLs required for contention resolution and considerably lower packet loss.

  • A New Low-Loss Microstrip Structure on LTCC Substrate

    Young Chul LEE  Ki Chan EUN  Chul Soon PARK  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E86-C No:5
      Page(s):
    867-869

    We have devised and implemented a new low-loss microstrip transmission structure on LTCC substrate by including void cavities in the dielectric layer between conductor strip and ground plane. Measurements of λ/4 T-resonators with the novel microstrip structure reveal total loss of 0.0126dB/mm and Q-factor of 267 at 15.85GHz. The dielectric loss is analyzed as small as 0.0005dB/mm at the frequency, and that is equivalent to an improvement of a factor of 18 compared to the conventional LTCC microstrip structure. The proposed microstrip structure with the embedded void cavities is suited for low loss LTCC based RF-MCM applications.

  • An Adaptive Grid Approach for the Simulation of Electromigration Induced Void Migration

    Hajdin CERIC  Siegfried SELBERHERR  

     
    INVITED PAPER

      Vol:
    E86-C No:3
      Page(s):
    421-426

    For tracking electromigration induced evolution of voids a diffuse interface model is applied. We assume an interconnect as two-dimensional electrically conducting via which contains initially a circular void. The diffuse interface governing equation was solved applying a finite element scheme with a robust local grid adaptation algorithm. Simulations were carried out for voids exposed to high current. An influence of the void dynamics on the resistance of interconnect is investigated. In the case of the interconnect via it was shown that a migrating void exactly follows the current flow, retaining its stability, but due to change of shape and position causes significant fluctuations in interconnect resistance.

  • Analysis and Design of a Stable Congestion Avoidance Algorithm for ABR Service in ATM Networks

    Tanun JARUVITAYAKOVIT  Naris RANGSINOPPAMAS  Prasit PRAPINMONGKOLKARN  

     
    PAPER-Network

      Vol:
    E85-B No:9
      Page(s):
    1714-1730

    This paper proposes a stable rate allocation algorithm for ABR service in ATM networks. The main goals in designing this algorithm are to speed up the convergence according to the max-min fairness criterion and to maximize the network utilization while the switch queue length can be properly controlled. Importantly, the set goals should be achieved in a wide range of network conditions without the need for adjusting the algorithm parameters. The algorithm is targeted to work in various networking environments with additional criteria as extended from the work of E-FMMRA (Enhanced Fast Max-Min Rate Allocation) and ERICA+ (Explicit Rate Indication for Congestion Avoidance) . The additional design criteria include the ability to enhance a large number of ABR connections and staggered TCP connections as well as to perform an accurate traffic averaging. The algorithm is analytically proved to be convergent. Simulation results indicate that the proposed algorithm achieves the goals in all evaluated configurations. However, it has some limitations when working in the large-scale network due to its per-connection accounting. It is not recommended to implement the algorithm with a switch that has a small buffer size due to its relatively long averaging interval.

  • Avoiding Faulty Privileges in Fast Stabilizing Rings

    Jun KINIWA  

     
    PAPER

      Vol:
    E85-A No:5
      Page(s):
    949-956

    Most conventional studies on self-stabilization have been indifferent to the vulnerability under convergence. This paper investigates how mutual exclusion property can be achieved in self-stabilizing rings even for illegitimate configurations. We present a new method which uses a state with a large state space to detect faults. If some faults are detected, every process is reset and not given a privilege. Even if the reset values are different between processes, our protocol mimics the behavior of Dijkstra's unidirectional K-state protocol. Then we have a fast and safe mutual exclusion protocol. Simulation study also examines its performance.

  • A Study on Active Collision Avoidance System for the Road Vehicle

    Joo-Han KIM  Zeungnam BIEN  

     
    PAPER-Artificial Intelligence, Cognitive Science

      Vol:
    E84-D No:6
      Page(s):
    717-726

    A great deal of effort has been concentrated on the longitudinal control for the collision avoidance of moving vehicles. In an emergency as well as in a normal situation, however, the steering control can be a very effective alternative as observed in the practice of manual evasive driving. In the reported methods of steering control, it is found that the dynamic motions of the neighboring vehicles are often ignored, which may result in some danger of 2nd collision. Therefore, it is necessary to assess the surrounding traffic situation to prevent 2nd collision that can occur just after escaping from the 1st collision situation. In this paper, we tackle the collision avoidance problem when steering actuation control is allowed in consideration of the dynamic motion of the neighboring vehicles. Specifically, a hierarchical control scheme is suggested as a feasible solution, and the proposed system is verified via simulation using a software simulator called DevACAS (DEVeolper of Active Collision Avoidance System), which we have developed.

  • Projecting Risks in a Software Project through Kepner-Tregoe Program and Schedule Re-Planning for Avoiding the Risks

    Seiichi KOMIYA  Atsuo HAZEYAMA  

     
    PAPER-Theory and Methodology

      Vol:
    E83-D No:4
      Page(s):
    627-639

    There are the following three targets to be achieved in a software project from the three viewpoints of process management (or progress management), cost management, and quality management for software project to be successful: (a) drafting a software development plan based on accurate estimation, (b) early detection of risks that the project includes based on correct situation appraisal, (c) early avoidance of risks that the project includes. In this paper, the authors propose a method and facilities to project risks in a software project through Kepner-Tregoe program, and propose schedule re-planning by using genetic algorithm for avoiding the projected risks. Furthermore the authors show, from the results of execution of the system, that the system is effective in early avoidance of risks that the software project includes.

  • An Algorithm for Petri Nets Reachability by Unfoldings

    Toshiyuki MIYAMOTO  Shun-ichiro NAKANO  Sadatoshi KUMAGAI  

     
    LETTER

      Vol:
    E82-A No:3
      Page(s):
    500-503

    This paper proposes an algorithm for analyzing the reachability property of Petri nets by the use of unfoldings. It is known that analyzing the reachability by using unfoldings requires exponential time and space to the size of unfolding. The algorithm is based on the branch and bound technique, and experimental results show efficiency of the algorithm.

  • An Efficient Algorithm for Deriving Logic Functions of Asynchronous Circuits

    Toshiyuki MIYAMOTO  Sadatoshi KUMAGAI  

     
    PAPER

      Vol:
    E79-A No:6
      Page(s):
    818-824

    Signal Transition Graphs (STG'S) [1] are Petrinets [2], which were introduced to represent a behavior of asynchronous circuits. To derive logic functions from an STG, the reachability graph should be constructed. In the verification of STG's some method based on Occurrence nets (OCN) and its prefix, called unfollding, has been proposed [3], [4]. OCN's can represent both causality and concurrency between two nodes by net stryctyre. In this paper, we propose an efficient algorithm to derive a logic function by generating sub-state space of a given STG using the structural properties of OCN. The proposed algorithm can be seem as a parallel algorithm for deriving a logic function.

  • Congestion Avoidance Networks Based on congestion Estimation Feedback by Limited Acceleration-Rate/-Ratio: CEFLAR

    Nobuyuki TOKURA  Hideo TATSUNO  Yoshio KAJIYAMA  

     
    PAPER-Communication Networks and Services

      Vol:
    E79-B No:4
      Page(s):
    550-559

    This paper shows that a network supplying variable bit rate services can be prevented from becoming congested if each terminal limits the capacity of its connection in terms of its rate of increase. Variable bit rate sources are adequately assessed with two new concepts: the bit rate increase per unit time (acceleration-rate=αbit/sec2) or the bit rate increase ratio (acceleration-ratio=exp (β) ). The dimension of the acceleration-ratio coefficient βis seconds-1. The upper limits α and β are regulated to guarantee the network's QoS. The proposed concepts allow the network state to be accurately estimated and avoid congestion. The proposed method can be applied to ATM networks, Frame Relay networks, Fast Reservation Protocol systems and so on.

  • Contactless Evaluation Using a Laser/Microwave Method for the Silicon-on-Insulator Made by Wafer Bonding

    Akira USAMI  Takahisa NAKAI  Hideki FUJIWARA  Shun-ichiro ISHIGAMI  Takao WADA  

     
    PAPER

      Vol:
    E75-C No:9
      Page(s):
    1043-1048

    In this study, we evaluate the electrical characteristics of the SOI layer made by the wafer bonding method using a laser/microwave method. We use a He-Ne laser pulse for the photoconductivity modulation method and a semiconductor laser diode for the photoconductivity decay method as the carrier injection light source. The detected signal intensity at the void area decreases as compared with that at the center area of the SOI layer where there are no voids. The positions of the voids revealed by the proposed method are in good agreement with those by X-ray topography. We also measure the lifetime by the photoconductivity decay method using a laser diode. The lifetime at the void area is much shorter than that at the center area. It is considered that the decrease in the detected signal intensity at the void area is due to reduction in the minority carrier lifetime.

  • Evaluation of Bonding Silicon-on-Insulator Films with Deep-Level Transient Spectroscopy Measurements

    Akira USAMI  Taichi NATORI  Akira ITO  Shun-ichiro ISHIGAMI  Yutaka TOKUDA  Takao WADA  

     
    PAPER

      Vol:
    E75-C No:9
      Page(s):
    1049-1055

    Silicon-on-insulator (SOI) films fabricated by the wafer bonding technique were studies with capacitance-voltage (C-V) and deep-level transient spectroscopy (DLTS) measurements. For our expereiments, two kinds of SOI wafers were prepared. Many voids were present in one sample (void sample), but few voids were in the other sample (no void sample). Before annealing, two DLTS peaks (Ec-0.48 eV and Ec-0.38 eV) were observed in the SOI layer of the void sample. For the no void sample, different two DLTS peaks (Ec-0.16 eV and Ec-0.12 eV) were observed. The trap with an activation energy of 0.48 eV was annealed out after 450 annealing for 24 h. On the other hand, other traps were annealed out after 450 annealing for several hours. During annealing at 450, thermal donors (TDs) were formed simultaneously. In usual CZ silicon, a DLTS peak of TD was observed around 60 K. In the no void sample, however, a TD peak was observed at a temperature lower than 30 K. This TD was annihilated by rapid thermal annealing. This suggests that the TD with a shallower level was formed in the no void sample after annealing at 450.

  • A Simple Method for Avoiding Numerical Errors and Degeneracy in Voronoi Diagram Construction

    Kokichi SUGIHARA  

     
    PAPER

      Vol:
    E75-A No:4
      Page(s):
    468-477

    This paper presents a simple method for avoiding both numerical errors and degeneracy in an incremental-type algorithm for constructing the Voronoi diagram with respect to points on a plane. It is assumed that the coordinates of the given points are represented with a certain fixed number of bits. All the computations in the algorithm are carried out in four times higher precision, so that degeneracy can be discerned precisely. Every time degeneracy is found, the points are perturbed symbolically according to a very simple rule and thus are reduced to a nondegenerate case. The present technique makes a computer program simple in the sense that it avoids all numerical errors and requires no exceptional branches of processing for degenerate cases.

41-56hit(56hit)