The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

8561-8580hit(42807hit)

  • WSN-HaDaS: A Cross-Layer Handoff Management Protocol for Wireless Sensor Networks, a Practical Approach to Mobility

    Raymundo BUENROSTRO-MARISCAL  Maria COSIO-LEON  Juan-Ivan NIETO-HIPOLITO  Juan-Antonio GUERRERO-IBANEZ  Mabel VAZQUEZ-BRISENO  Juan-de-Dios SANCHEZ-LOPEZ  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:7
      Page(s):
    1333-1344

    Wireless Sensor Networks (WSNs) have been proposed for monitoring vital signs of patients at home. This scenario requires inter-cell mobility; however, WSNs are not designed to support this characteristic. In this paper we propose a cross-layer protocol to manage the handoff, called WSN-HaDaS (Handoff aware of Data Sending), which operates in the transport layer and medium access control (MAC) sub-layer based on an interaction between the layers (transport and MAC). This protocol interacts with a sending data mechanism (like TCP protocol) to notify the beginning or ending of the handoff process; therefore, the mechanism can stop or resume data sending, respectively. Therefore, WSN-HaDaS prevents packet loss during the handoff process. WSN-HaDaS comprises two main processes to manage mobility: Monitoring Handoff Trigger (MHT) and Handoff Execution Process (HEP); they are responsible for generating the handoff warning messages and executing the handoff process, respectively. Therefore, MHT delay and HEP delay are used as the key performance metrics. To evaluate the proposal, we use a physical test-bed in an indoor environment with the intention of obtaining practical results. The results demonstrate that the proposed protocol performs the handoff process with less delay than the selected reference work. They also show that WSN-HaDaS is an appropriate solution to provide inter-cell mobility in WSNs. Furthermore, we demonstrate the possibility of embedding the WSN-HaDaS in devices with limited resources using the IEEE 802.1.5.4 standard.

  • Inter-Cell Interference Coordination Method Based on Coordinated Inter-Cell Interference Power Control in Uplink

    Kenichi HIGUCHI  Yoshiko SAITO  Seigo NAKAO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E98-B No:7
      Page(s):
    1357-1362

    We propose an inter-cell interference coordination (ICIC) method that employs inter-cell coordinated transmission power control (TPC) based on inter-cell interference power in addition to conventional received signal power-based TPC in the cellular uplink. We assume orthogonal multiple-access as is used in 3GPP LTE. In the proposed method, an ICIC effect similar to that for conventional fractional frequency reuse (FFR) is obtained. This is achieved by coordinating the allowable inter-cell interference power level at the appropriate frequency blocks within the system bandwidth among neighboring cells in a semi-static manner. Different from conventional FFR, since all users within a cell can access all the frequency blocks, the reduction in multiuser diversity gain is abated. Computer simulation results show that the proposed method enhances both the cell-edge and average user throughput simultaneously compared to conventional universal frequency reuse (UFR) and FFR.

  • FOREWORD Open Access

    Osami WADA  

     
    FOREWORD

      Vol:
    E98-B No:7
      Page(s):
    1142-1142
  • Method of Spread Spectrum Watermarking Using Quantization Index Modulation for Cropped Images

    Takahiro YAMAMOTO  Masaki KAWAMURA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2015/04/16
      Vol:
    E98-D No:7
      Page(s):
    1306-1315

    We propose a method of spread spectrum digital watermarking with quantization index modulation (QIM) and evaluate the method on the basis of IHC evaluation criteria. The spread spectrum technique can make watermarks robust by using spread codes. Since watermarks can have redundancy, messages can be decoded from a degraded stego-image. Under IHC evaluation criteria, it is necessary to decode the messages without the original image. To do so, we propose a method in which watermarks are generated by using the spread spectrum technique and are embedded by QIM. QIM is an embedding method that can decode without an original image. The IHC evaluation criteria include JPEG compression and cropping as attacks. JPEG compression is lossy compression. Therefore, errors occur in watermarks. Since watermarks in stego-images are out of synchronization due to cropping, the position of embedded watermarks may be unclear. Detecting this position is needed while decoding. Therefore, both error correction and synchronization are required for digital watermarking methods. As countermeasures against cropping, the original image is divided into segments to embed watermarks. Moreover, each segment is divided into 8×8 pixel blocks. A watermark is embedded into a DCT coefficient in a block by QIM. To synchronize in decoding, the proposed method uses the correlation between watermarks and spread codes. After synchronization, watermarks are extracted by QIM, and then, messages are estimated from the watermarks. The proposed method was evaluated on the basis of the IHC evaluation criteria. The PSNR had to be higher than 30 dB. Ten 1920×1080 rectangular regions were cropped from each stego-image, and 200-bit messages were decoded from these regions. Their BERs were calculated to assess the tolerance. As a result, the BERs were less than 1.0%, and the average PSNR was 46.70 dB. Therefore, our method achieved a high image quality when using the IHC evaluation criteria. In addition, the proposed method was also evaluated by using StirMark 4.0. As a result, we found that our method has robustness for not only JPEG compression and cropping but also additional noise and Gaussian filtering. Moreover, the method has an advantage in that detection time is small since the synchronization is processed in 8×8 pixel blocks.

  • RX v2: Renesas's New-Generation MCU Processor

    Sugako OTANI  Hiroyuki KONDO  

     
    PAPER

      Vol:
    E98-C No:7
      Page(s):
    544-549

    RXv2 is the new generation of Renesas's processor architecture for microcontrollers with high-capacity flash memory. An enhanced instruction set and pipeline structure with an advanced fetch unit (AFU) provide an effective balance between power consumption performance and high processing performance. Enhanced instructions such as DSP function and floating point operation and a five-stage dual-issue pipeline synergistically boost the performance of digital signal applications. The RXv2 processor delivers 1.9 - 3.7 the cycle performance of the RXv1 in these applications. The decrease of the number of Flash memory accesses by AFU is a dominant determiner of reducing power consumption. AFU of RXv2 benefits from adopting branch target cache, which has a comparatively smaller area than that of typical cache systems. High code density delivers low power consumption by reducing instruction memory bandwidth. The implementation of RXv2 delivers up to 46% reduction in static code size, up to 30% reduction in dynamic code size relative to RISC architectures. RXv2 reaches 4.0 Coremark per MHz and operates up to 240MHz. The RXv2 processor delivers approximately more than 2.2 - 5.7x the power efficiency of the RXv1. The RXv2 microprocessor achieves the best possible computing performance in various applications such as building automation, medical, motor control, e-metering, and home appliances which lead to the higher memory capacity, frequency and processing performance.

  • An Evaluation on Two-Handed and One-Handed Control Methods for Positioning Object in Immersive Virtual Environments

    Noritaka OSAWA  Kikuo ASAI  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2015/03/20
      Vol:
    E98-D No:7
      Page(s):
    1316-1324

    A two-handed distance control method is proposed for precisely and efficiently manipulating a virtual 3D object by hand in an immersive virtual reality environment. The proposed method enhances direct manipulation by hand and is used to precisely control and efficiently adjust the position of an object and the viewpoint using the distance between the two hands. The two-handed method is evaluated and compared with the previously proposed one-handed speed control method, which adjusts the position of an object in accordance with the speed of one hand. The results from experimental evaluation show that two-handed methods, which make position and viewpoint adjustments, are the best among six combinations of control and adjustment methods.

  • Suppression of Mode Conversion by Using Tightly Coupled Asymmetrically Tapered Bend in Differential Lines

    Yoshitaka TOYOTA  Shohei KAN  Kengo IOKIBE  

     
    PAPER

      Vol:
    E98-B No:7
      Page(s):
    1188-1195

    In this paper, we propose a tightly coupled asymmetrically tapered bend to suppress differential-to-common mode conversion caused by bend discontinuity in a pair of differential lines. Tightly coupled symmetrically tapered bends have been so far proposed to suppress the mode conversion by decreasing the path difference in the bend. This approach makes the path difference shorter so that the differential lines are coupled more tightly but the path difference of twice the sum of the line width and the line separation still remains. To suppress the remaining path difference, this paper introduces the use of asymmetric tapers. In addition, two-section tapers are applied to reduce differential-mode reflection increased by the tapers and hence improve differential-mode propagation. A full-wave simulation of a right-angled bend demonstrates that the forward differential-to-common mode conversion is decreased by almost 30 dB compared to the symmetrically tapered bend and that the differential-mode reflection coefficient is reduced to the same amount as that of the classic bend. Also, the generality of the proposed bend structure is discussed.

  • Dosimetry and Verification for 6-GHz Whole-Body Non-Constraint Exposure of Rats Using Reverberation Chamber

    Jingjing SHI  Jerdvisanop CHAKAROTHAI  Jianqing WANG  Kanako WAKE  Soichi WATANABE  Osamu FUJIWARA  

     
    PAPER

      Vol:
    E98-B No:7
      Page(s):
    1164-1172

    With the rapid increase of various uses of wireless communications in modern life, the high microwave and millimeter wave frequency bands are attracting much attention. However, the existing databases on above 6GHz radio-frequency (RF) electromagnetic (EM) field exposure of biological bodies are obviously insufficient. An in-vivo research project on local and whole-body exposure of rats to RF-EM fields above 6GHz was started in Japan in 2013. This study aims to perform a dosimetric design for the whole-body-average specific absorption rates (WBA-SARs) of unconstrained rats exposed to 6GHz RF-EM fields in a reverberation chamber (RC). The required input power into the RC is clarified using a two-step evaluation method in order to achieve a target exposure level in rats. The two-step method, which incorporates the finite-difference time-domain (FDTD) numerical solutions with electric field measurements in an RC exposure system, is used as an evaluation method to determine the whole-body exposure level in the rats. In order to verify the validity of the two-step method, we use S-parameter measurements inside the RC to experimentally derive the WBA-SARs with rat-equivalent phantoms and then compare those with the FDTD-calculated ones. It was shown that the difference between the two-step method and the S-parameter measurements is within 1.63dB, which reveals the validity and usefulness of the two-step technique.

  • An Effective Suspicious Timing-Error Prediction Circuit Insertion Algorithm Minimizing Area Overhead

    Shinnosuke YOSHIDA  Youhua SHI  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER

      Vol:
    E98-A No:7
      Page(s):
    1406-1418

    As process technologies advance, timing-error correction techniques have become important as well. A suspicious timing-error prediction (STEP) technique has been proposed recently, which predicts timing errors by monitoring the middle points, or check points of several speed-paths in a circuit. However, if we insert STEP circuits (STEPCs) in the middle points of all the paths from primary inputs to primary outputs, we need many STEPCs and thus require too much area overhead. How to determine these check points is very important. In this paper, we propose an effective STEPC insertion algorithm minimizing area overhead. Our proposed algorithm moves the STEPC insertion positions to minimize inserted STEPC counts. We apply a max-flow and min-cut approach to determine the optimal positions of inserted STEPCs and reduce the required number of STEPCs to 1/10-1/80 and their area to 1/5-1/8 compared with a naive algorithm. Furthermore, our algorithm realizes 1.12X-1.5X overclocking compared with just inserting STEPCs into several speed-paths.

  • Modeling the Effect of Global Layout Pattern on Wire Width Variation for On-the-Fly Etching Process Modification

    Daisuke FUKUDA  Kenichi WATANABE  Yuji KANAZAWA  Masanori HASHIMOTO  

     
    PAPER

      Vol:
    E98-A No:7
      Page(s):
    1467-1474

    As the technology of VLSI manufacturing process continues to shrink, it becomes a challenging problem to generate layout patterns that can satisfy performance and manufacturability requirements. Wire width variation is one of the main issues that have a large impact on chip performance and yield loss. Particularly, etching process is the last and most influential process to wire width variation, and hence models for predicting etching induced variation have been proposed. However, they do not consider an effect of global layout variation. This work proposes a prediction model of etching induced wire width variation which takes into account global layout pattern variation. We also present a wire width adjustment method that modifies etching process on the fly according to the critical dimension loss estimated by the proposed prediction model and wire space measurement just before etching process. Experimental results show that the proposed model achieved good performance in prediction, and demonstrated that the potential reduction of the gap between the target wire width and actual wire width thanks to the proposed on-the-fly etching process modification was 68.9% on an average.

  • Linear Complexity over Fq of Generalized Cyclotomic Quaternary Sequences with Period 2p

    Minglong QI  Shengwu XIONG  Jingling YUAN  Wenbi RAO  Luo ZHONG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:7
      Page(s):
    1569-1575

    Let r be an odd prime, such that r≥5 and r≠p, m be the order of r modulo p. Then, there exists a 2pth root of unity in the extension field Frm. Let G(x) be the generating polynomial of the considered quaternary sequences over Fq[x] with q=rm. By explicitly computing the number of zeros of the generating polynomial G(x) over Frm, we can determine the degree of the minimal polynomial, of the quaternary sequences which in turn represents the linear complexity. In this paper, we show that the minimal value of the linear complexity is equal to $ rac{1}{2}(3p-1) $ which is more than p, the half of the period 2p. According to Berlekamp-Massey algorithm, these sequences viewed as enough good for the use in cryptography.

  • Statistical Timing Modeling Based on a Lognormal Distribution Model for Near-Threshold Circuit Optimization

    Jun SHIOMI  Tohru ISHIHARA  Hidetoshi ONODERA  

     
    PAPER

      Vol:
    E98-A No:7
      Page(s):
    1455-1466

    Near-threshold computing has emerged as one of the most promising solutions for enabling highly energy efficient and high performance computation of microprocessors. This paper proposes architecture-level statistical static timing analysis (SSTA) models for the near-threshold voltage computing where the path delay distribution is approximated as a lognormal distribution. First, we prove several important theorems that help consider architectural design strategies for high performance and energy efficient near-threshold computing. After that, we show the numerical experiments with Monte Carlo simulations using a commercial 28nm process technology model and demonstrate that the properties presented in the theorems hold for the practical near-threshold logic circuits.

  • Modeling Wireless Sensor Network Based on Non-Volatile Cellular Automata

    Qin YU  Wei JIANG  Supeng LENG  Yuming MAO  

     
    PAPER-Network

      Vol:
    E98-B No:7
      Page(s):
    1294-1301

    In this paper, we propose a modeling approach for wireless sensor networks (WSNs) that is based on non-volatile two-dimensional cellular automata (CA) and analyze the space-time dynamics of a WSN based on the proposed model. We introduce the fourth circuit element with memory function — memristor into the cells of CA to model a non-volatile CA and employ the non-volatile CA in modeling a WSN. A state transition method is designed to implement the synchronous updates of the states between the central sensor nodes and its neighbors which might behave asynchronously in sending messages to the central one. Therefore, the energy consumption in sensor nodes can be reduced by lessening the amount of exchanged information. Simulations demonstrate that the energy consumption of a WSN can be reduced greatly based on the proposed model and the lifetime of the whole network can be increased.

  • Equation-Based Transmission Power Control for Wearable Sensor Systems

    Namgi KIM  Jin-a HONG  Byoung-Dai LEE  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:7
      Page(s):
    1558-1561

    In emerging wearable sensor systems, it is crucial to save energy because these systems are severely energy-constrained. For making the sensors in these systems energy efficient, transmission power control (TPC) is widely used, and thus far, many TPC algorithms have been proposed in the literature. However, these TPC algorithms do not always work well in all wireless body channel conditions, which are capriciously varied due to diverse sensor environments such as sensor placements, body movements, and body locations. In this paper, we propose a simple TPC algorithm that quickly and stably approaches the optimal transmission power level and works well in all wearable sensor environments. We experimentally evaluated the proposed TPC algorithm and proved that it works well under all wireless body channel conditions.

  • Intra Prediction Using an Advanced Most Probable Mode in H.264/AVC

    Yeon-Kyeong JEONG  Woon-Young YEO  Jong-Ki HAN  

     
    LETTER-Image

      Vol:
    E98-A No:7
      Page(s):
    1588-1591

    The mode of intra prediction in H.264/AVC is encoded based on the most probable mode (MPM). To increase coding efficiency, the probability of the case that MPM is equal to coding mode of the current block should increase. In this paper we propose an efficient scheme to make MPM which is matched for the spatial direction property of pixels in the current block. Simulation results show that the proposed scheme gives significant coding gains when compared with the conventional techniques.

  • Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function

    Nam-Su JHO  Ku-Young CHANG  Do-Won HONG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:7
      Page(s):
    1276-1283

    Order-Preserving Encryption (OPE) is an encryption system that preserves the numerical (or alphabetical) order of plaintexts. Since many operations of communications and databases are based on order relations of data (plaintexts), OPE is regarded as a core technique for various applications. However, the intrinsic property of OPE makes constructing an efficient and secure OPE system hard to achieve. In particular, OPE can guarantee only limited security compared to general encryption systems. Only a few results on OPE systems were presented, and no theoretical research based on provable security has been presented until recently. Lately, some approaches have been suggested. However, every known result is unsatisfactory for formalizing the provable security of OPE systems. In this paper, we propose a new OPE system that employs only a simple pseudorandom number function, and therefore has an advantage for practical usage.

  • New Numerical Target SAR Values and an Optimized Flat Phantom for SAR Validation Tests in the 150MHz Band

    Dong-Geun CHOI  Ki-Hwea KIM  Jaehoon CHOI  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:7
      Page(s):
    1323-1332

    New target specific absorption rate (SAR) values, calculated using a proposed reference dipole antenna and the reference flat phantom, are presented for an SAR validation test at 150MHz. The reference flat phantom recommended by the International Electrotechnical Commission (IEC) standard for 150MHz requires a significant amount of liquid owing to its large size. We conduct a numerical analysis in order to reduce the size of the flat phantom. The optimum size of the flat phantom is 780 (L1) × 540 (W) × 200 (H)mm3, which is approximately a 64% reduction in volume compared to the reference flat phantom. The length of the reference dipole antenna required for the optimized flat phantom (extrapolated from the reference values at 300MHz) becomes 760mm. The calculated and measured return losses (S11) of the antenna at 150MHz are 24.1dB and 22dB, respectively. The calculated and measured results for the return loss of the dipole antenna agree well and satisfy the IEC standard (> 20dB). The target SAR values derived from the numerical analysis are 1.08W/kg for 1g of tissue and 0.77W/kg for 10g of tissue for an SAR validation test at 150MHz.

  • Objective No-Reference Video Quality Assessment Method Based on Spatio-Temporal Pixel Analysis

    Wyllian B. da SILVA  Keiko V. O. FONSECA  Alexandre de A. P. POHL  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2015/04/03
      Vol:
    E98-D No:7
      Page(s):
    1325-1332

    Digital video signals are subject to several distortions due to compression processes, transmission over noisy channels or video processing. Therefore, the video quality evaluation has become a necessity for broadcasters and content providers interested in offering a high video quality to the customers. Thus, an objective no-reference video quality assessment metric is proposed based on the sigmoid model using spatial-temporal features weighted by parameters obtained through the solution of a nonlinear least squares problem using the Levenberg-Marquardt algorithm. Experimental results show that when it is applied to MPEG-2 streams our method presents better linearity than full-reference metrics, and its performance is close to that achieved with full-reference metrics for H.264 streams.

  • Low-Jitter Design for Second-Order Time-to-Digital Converter Using Frequency Shift Oscillators

    Keisuke OKUNO  Toshihiro KONISHI  Shintaro IZUMI  Masahiko YOSHIMOTO  Hiroshi KAWAGUCHI  

     
    PAPER

      Vol:
    E98-A No:7
      Page(s):
    1475-1481

    We present a low-jitter design for a 10-bit second-order frequency shift oscillator time-to-digital converter (FSOTDC). As described herein, we analyze the relation between performance and FSOTDC parameters and provide insight to support the design of the FSOTDC. Results show that an oscillator jitter limits the FSOTDC resolution, particularly during the first stage. To estimate and design an FSOTDC, the frequency shift oscillator requires an inverter of a certain size. In a standard 65-nm CMOS process, an SNDR of 64dB is achievable at an input signal frequency of 10kHz and a sampling clock of 2MHz. Measurements of the test chip confirmed that the measurements match the analyses.

  • Historical Review of Research and Development of Linear Antennas in Tohoku University Open Access

    Kunio SAWAYA  

     
    INVITED PAPER

      Vol:
    E98-C No:7
      Page(s):
    616-620

    Invention and development of the Yagi-Uda antenna in Tohoku University, Japan are described. Communication experiments in VHF and UHF frequency bands using transmitter and receiver developed in the same university as well as the Yagi-Uda antenna are also presented. Then, self-complementary antennas, which is the frequency independent antenna invented in Tohoku University are described. Analysis methods of large loop antennas is also presented.

8561-8580hit(42807hit)