The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

9761-9780hit(42807hit)

  • Irregular Triangular Quadrature Amplitude Modulations

    Sung-Joon PARK  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E97-B No:7
      Page(s):
    1358-1364

    The recently suggested regular-type triangular quadrature amplitude modulation (TQAM) provides considerable power gain over square quadrature amplitude modulation (SQAM) at the expense of a slight increase in detection complexity. However, the power gain of the TQAM is limited due to the constraint that signal points should be regularly located at the vertexes of contiguous equilateral triangles. In this paper, we investigate two irregular (optimum and suboptimum) TQAMs where signal points are irregularly distributed while preserving the equilateral triangular lattice, and calculate achievable power gains of the proposed constellations. We also address optimum and suboptimum bit stream mapping methods and suggest a simple and optimum detection method for the constellations to be meaningful in practical implementation, and present analytical and simulation results. The proposed constellations can provide the asymptotic power gains of 0.825dB and 0.245dB over SQAM and regular TQAM, respectively.

  • Decomposing Approach for Error Vectors of k-Error Linear Complexity of Certain Periodic Sequences

    Ming SU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:7
      Page(s):
    1542-1555

    The k-error linear complexity of periodic sequences is an important security index of stream cipher systems. By using an interesting decomposing approach, we investigate the intrinsic structure for the set of 2n-periodic binary sequences with fixed complexity measures. For k ≤ 4, we construct the complete set of error vectors that give the k-error linear complexity. As auxiliary results we obtain the counting functions of the k-error linear complexity of 2n-periodic binary sequences for k ≤ 4, as well as the expectations of the k-error linear complexity of a random sequence for k ≤ 3. Moreover, we study the 2t-error linear complexity of the set of 2n-periodic binary sequences with some fixed linear complexity L, where t < n-1 and the Hamming weight of the binary representation of 2n-L is t. Also, we extend some results to pn-periodic sequences over Fp. Finally, we discuss some potential applications.

  • Salient Region Detection Based on Color Uniqueness and Color Spatial Distribution

    Xing ZHANG  Keli HU  Lei WANG  Xiaolin ZHANG  Yingguan WANG  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E97-D No:7
      Page(s):
    1933-1936

    In this study, we address the problem of salient region detection. Recently, saliency detection with contrast based approaches has shown to give promising results. However, different individual features exhibit different performance. In this paper, we show that the combination of color uniqueness and color spatial distribution is an effective way to detect saliency. A Color Adaptive Thresholding Watershed Fusion Segmentation (CAT-WFS) method is first given to retain boundary information and delete unnecessary details. Based on the segmentation, color uniqueness and color spatial distribution are defined separately. The color uniqueness denotes the color rareness of salient object, while the color spatial distribution represents the color attribute of the background. Aiming at highlighting the salient object and downplaying the background, we combine the two characters to generate the final saliency map. Experimental results demonstrate that the proposed algorithm outperforms existing salient object detection methods.

  • A Pseudo-TDMA MAC Protocol Using Randomly Determined Transmission Times for Landslide Prediction Wireless Sensor Networks

    David ASANO  Daichi KUROYANAGI  Hikofumi SUZUKI  Eiki MOTOYAMA  Yasushi FUWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1449-1456

    Landslides during heavy rainfall cause a great amount of damage in terms of both property and human life. To predict landslide disasters, we designed and implemented a wireless sensor network using our existing highly fault tolerant ad-hoc network. Since many sensors must be used, we propose a new MAC protocol that allows the network to support more sensor terminals. Our protocol is a hybrid CSMA/Psuedo-TDMA scheme which allows the terminals to decide their transmission timing independently in a random fashion. A timing beacon is not required, so power consumption can be reduced. Simulation results show that the number of terminals supported by the network can be greatly increased.

  • Perfect Gaussian Integer Sequence Pairs

    Chengqian XU  Xiuping PENG  Kai LIU  

     
    PAPER-Coding Theory

      Vol:
    E97-A No:7
      Page(s):
    1568-1575

    A novel class of signal of perfect Gaussian integer sequence pairs are put forward in this paper. The constructions of obtaining perfect Gaussian integer sequence pairs of odd length by using Chinese remainder theorem as well as perfect Gaussian integer sequence pairs of even length by using complex transformation and interleaving techniques are presented. The constructed perfect Gaussian integer sequence pairs can not only expand the existence range of available perfect Gaussian integer sequences and perfect sequence pairs signals but also overcome the energy loss defects.

  • Spectrum Sharing Overlay System with a Repeater for the Primary Signal

    Jun NAGANAWA  Kentaro KOBAYASHI  Hiraku OKADA  Masaaki KATAYAMA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E97-A No:7
      Page(s):
    1576-1586

    This paper proposes a new spectrum sharing scheme which uses one-sided collaboration. In the proposed system, the transmitter of the secondary system relays the primary signal and overlays its own data on the retransmitted primary signal. The results of the theoretical analysis show that the proposed scheme with regenerative relay allows the secondary system to communicate at the same speed as the primary system that disregards the presence of the secondary system.

  • Two-Step Boosting for OSN Based Sybil-Resistant Trust Value of Non-Sybil Identities

    Kyungbaek KIM  

     
    LETTER-Information Network

      Vol:
    E97-D No:7
      Page(s):
    1918-1922

    In the design of distributed systems, defending against Sybil attack is an important issue. Recently, OSN (Online Social Network)-based Sybil defending approaches, which use the fast mixing property of a social network graph with sufficient length of random walks and provide Sybil-resistant trust values, have been proposed. However, because of the probabilistic property of the previous approaches, some honest (non-Sybil) identities obtain low trust value and they are mistakenly considered as Sybil identities. A simple solution of boosting the trust value of honest identities is using longer random walks, but this direct boosting method also increases trust values of Sybil identities significantly. In this paper, a two-step boosting method is proposed to increase the Sybil-resistant trust value of honest identities reasonably and to prevent Sybil identities from having high trust values. The proposed boosting method is composed of two steps: initializing the trust value with a reasonably long random walks and boosting the trust value by using much longer random walks than the first step. The proposed method is evaluated by using sampled social network graphs of Facebook, and it is observed that the proposed method reduces the portion of honest identities mistakenly considered as Sybil identities substantially (from 30% to 1.3%) and keeps the low trust values of Sybil identities.

  • Bilayer Lengthened QC-LDPC Codes Design for Relay Channel

    Hua XU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E97-B No:7
      Page(s):
    1365-1374

    The relay channel is the common approach to cooperative communication. Quasi-cyclic low-density parity-check (QC-LDPC) code design for the relay channel is important to cooperative communication. This paper proposes a bilayer QC-LDPC code design scheme for the relay channel. Combined with the bilayer graphical code structure, an improved Chinese remainder theorem (CRT) method, the Biff-CRT method is presented. For the proposed method we introduce a finite field approach. The good performance of the finite field based QC-LDPC code can improve the performance of its corresponding objective QC-LDPC code in the proposed scheme. We construct the FF code and the FA code by the Biff-CRT method. The FF code and the FA code are both named as their two component codes. For the FF code, the two component code are both finite field based QC-LDPC codes. For the FA code, one of the component codes is the finite field based QC-LDPC code and the other is the array code. For the existing CRT method, the shortened array code and the array code are usually used as the component codes to construct the SA code. The exponent matrices of FF code, FA code and SA code are given both for the overall graph and the lower graph. Bit error rate (BER) simulation results indicate that the proposed FF code and FA code are superior to the SA code both at the relay node and the destination node. In addition, the theoretical limit and the BER of the bilayer irregular LDPC code are also given to compare with the BER of the proposed QC-LDPC codes. Moreover, the proposed Biff-CRT method is flexible, easy to implement and effective for constructing the QC-LDPC codes for the relay channel, and it is attractive for being used in the future cooperative communication systems.

  • Scan-Based Attack against Trivium Stream Cipher Using Scan Signatures

    Mika FUJISHIRO  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER

      Vol:
    E97-A No:7
      Page(s):
    1444-1451

    Trivium is a synchronous stream cipher using three shift registers. It is designed to have a simple structure and runs at high speed. A scan-based side-channel attack retrieves secret information using scan chains, one of design-for-test techniques. In this paper, a scan-based side-channel attack method against Trivium using scan signatures is proposed. In our method, we reconstruct a previous internal state in Trivium one by one from the internal state just when a ciphertext is generated. When we retrieve the internal state, we focus on a particular 1-bit position in a collection of scan chains and then we can attack Trivium even if the scan chain includes other registers than internal state registers in Trivium. Experimental results show that our proposed method successfully retrieves a plaintext from a ciphertext generated by Trivium.

  • SET Pulse-Width Measurement Suppressing Pulse-Width Modulation and Within-Die Process Variation Effects

    Ryo HARADA  Yukio MITSUYAMA  Masanori HASHIMOTO  Takao ONOYE  

     
    PAPER

      Vol:
    E97-A No:7
      Page(s):
    1461-1467

    This paper presents a measurement circuit structure for capturing SET pulse-width suppressing pulse-width modulation and within-die process variation effects. For mitigating pulse-width modulation while maintaining area efficiency, the proposed circuit uses massively parallelized short inverter chains as a target circuit. Moreover, for each inverter chain on each die, pulse-width calibration is performed. In measurements, narrow SET pulses ranging 5ps to 215ps were obtained. We confirm that an overestimation of pulse-width may happen when ignoring die-to-die and within-die variation of the measurement circuit. Our evaluation results thus point out that calibration for within-die variation in addition to die-to-die variation of the measurement circuit is indispensable.

  • Filter-Induced Bifurcation of Simple Spike-Train Dynamics

    Shota KIRIKAWA  Toshimichi SAITO  

     
    PAPER-Nonlinear Problems

      Vol:
    E97-A No:7
      Page(s):
    1508-1515

    This paper studies spike-train dynamics of the bifurcating neuron and its pulse-coupled system. The neuron has periodic base signal that is given by applying a periodic square wave to a basic low-pass filter. As key parameters of the filter vary, the systems can exhibit various bifurcation phenomena. For example, the neuron exhibits period-doubling bifurcation through which the period of spike-train is doubling. The coupled system exhibits two kinds of (smooth and non-smooth) tangent bifurcations that can induce “chaos + chaos = order”: chaotic spike-trains of two neurons are changed into periodic spike-train by the pulse-coupling. Using the mapping procedure, the bifurcation phenomena can be analyzed precisely. Presenting simple test circuits, typical phenomena are confirmed experimentally.

  • Learning Co-occurrence of Local Spatial Strokes for Robust Character Recognition

    Song GAO  Chunheng WANG  Baihua XIAO  Cunzhao SHI  Wen ZHOU  Zhong ZHANG  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E97-D No:7
      Page(s):
    1937-1941

    In this paper, we propose a representation method based on local spatial strokes for scene character recognition. High-level semantic information, namely co-occurrence of several strokes is incorporated by learning a sparse dictionary, which can further restrain noise brought by single stroke detectors. The encouraging results outperform state-of-the-art algorithms.

  • Cooperative Diversity Technique Using Spatial Phase Coding Based on OFDMA System

    Ki-Ro KIM  Seung-Jun YU  Hyoung-Kyu SONG  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E97-D No:7
      Page(s):
    1897-1900

    Transmit diversity generally requires more than one antenna at the transmitter. However, many wireless devices are limited by size or hardware complexity. Cooperative diversity techniques were proposed to overcome this limitation. Cooperative communication has been widely investigated to improve the performance of wireless communication. Unfortunately, most existing cooperative schemes have the common fault of decreased transmission rate because the destination should receive the decodable compositions of symbols from the source and the relay. In this letter, we propose a new cooperative model that uses spatial phase coding (SPC) for orthogonal frequency division multiple access (OFDMA). This technique is free from the rate-loss and allows seamless cooperative communication while its diversity gain matches that of the conventional multiple antenna technique. The proposed technique is evaluated in terms of bit error rate (BER) and simulation results show that the proposed cooperative scheme approaches the performance of conventional multiple antenna system when the link between users is guaranteed.

  • Maximally Permissive Similarity Enforcing Supervisors for Nondeterministic Discrete Event Systems under Event and State Observations

    Katsuyuki KIMURA  Shigemasa TAKAI  

     
    PAPER-Systems and Control

      Vol:
    E97-A No:7
      Page(s):
    1500-1507

    In this paper, we consider a similarity control problem for plants and specifications, modeled as nondeterministic automata. This problem requires us to synthesize a nondeterministic supervisor such that the supervised plant is simulated by a given specification. We assume that a supervisor can observe not only the event occurrence but also the current state of the plant. First, we derive a necessary and sufficient condition for the existence of a complete supervisor, which is a solution to the similarity control problem. Then, we present a method for synthesizing a maximally permissive similarity enforcing supervisor when the existence condition is satisfied.

  • A Novel Test Data Compression Scheme for SoCs Based on Block Merging and Compatibility

    Tiebin WU  Hengzhu LIU  Botao ZHANG  

     
    PAPER

      Vol:
    E97-A No:7
      Page(s):
    1452-1460

    This paper presents a novel test data compression scheme for SoCs based on block merging and compatibility. The technique exploits the properties of compatibility and inverse compatibility between consecutive blocks, consecutive merged blocks, and two halves of the encoding merged block itself to encode the pre-computed test data. The decompression circuit is simple to be implemented and has advantage of test-independent. In addition, the proposed scheme is applicable for IP cores in SoCs since it compresses the test data without requiring any structural information of the circuit under test. Experimental results demonstrate that the proposed technique can achieve an average compression ratio up to 68.02% with significant low test application time.

  • Development of Low Loss Ultra-High Δ ZrO2-SiO2 PLC for Next Generation Compact and High-Density Integrated Devices Open Access

    Masanori TAKAHASHI  Yasuyoshi UCHIDA  Shintaro YAMASAKI  Junichi HASEGAWA  Takeshi YAGI  

     
    INVITED PAPER

      Vol:
    E97-C No:7
      Page(s):
    725-730

    For next generation planar lightwave circuit (PLC) devices, high function and high-density integration are required as well as downsizing and cost reduction. To realize these needs, high refractive index difference between a core and a clad $(Delta)$ is required. To use PLC for practical applications, silica-based PLC is one of the most attractive candidate. However, degradation of the optical properties and productivity occur when $Delta$ of the core becomes high. Thus, $Delta$ of most of the conventional PLC with GeO$_2$-SiO$_2$ core is designed less than 2.5%. In this paper, we report a silica-based ultra-high $Delta $ PLC with ZrO$_2$-SiO$_2$ core. 5.5%-$Delta$ ZrO$_2$-SiO$_2$ PLC has been realized with low propagation loss and basic characteristics has been confirmed. Potential of chip size reduction of the ZrO$_2$-SiO$_2$ PLC is shown.

  • Optical Network Management System for Instant Provisioning of QoS-Aware Path and Its Software Prototyping with OpenFlow

    Masashi TAKADA  Akira FUKUSHIMA  Yosuke TANIGAWA  Hideki TODE  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1313-1324

    In conventional networks, service control function and network control function work independently. Therefore, stereotypical services are provided via fixed routes or selected routes in advance. Recently, advanced network services have been provided by assortment of distributed components at low cost. Furthermore, service platform, which unifies componentized network control and service control in order to provide advanced services with flexibility and stability, has attracted attention. In near future, network management system (NMS) is promising, which replies an answer quickly for such advanced service platforms when route setting is requested with some parameters: quality of service (QoS), source and destination addresses, cost (money) and so on. In addition, the NMS is required to provide routes exploiting functions such as path computation element (PCE) actually. This paper proposes scalable network architecture that can quickly reply an answer by pre-computing candidate routes when route setting is requested to a control unit like an Autonomous System (AS). Proposed architecture can manage network resources scalably, and answer the availability of the requested QoS-aware path settings instantaneously for the forthcoming service platform that finds an adequate combination of a server and a route. In the proposed method, hierarchical databases are established to manage the information related to optical network solution and their data are updated at fewer times by discretized states and their boundaries with some margin. Moreover, with multiple and overlapped overlay, it pre-computes multiple candidate routes with different characteristics like available bandwidth and the number of hops, latency, BER (bit error rate), before route set-up request comes. We present simulation results to verify the benefits of our proposed system. Then, we implement its prototype using OpenFlow, and evaluate its effectiveness in the experimental environment.

  • Dynamic Consolidation of Virtual Machines in Cloud Datacenters

    Han-Peng JIANG  Ming-Lung WENG  Wei-Mei CHEN  

     
    LETTER

      Vol:
    E97-D No:7
      Page(s):
    1727-1730

    Now that the subject of green computing is receiving a lot of attention, the energy consumption of datacenters has emerged as a significant issue. Consolidation of Virtual Machines (VMs) reduces the energy consumption since VM live migration not only optimizes VM placement, but also switches idle nodes to sleep mode. However, VM migration may negatively impact the performance of the system and lead to violations in SLA (Service Level Agreement) requirements between end users and cloud providers. In this study, we propose a VM consolidation mechanism that reduces the energy consumption of datacenters, eliminates unnecessary migrations, and minimizes the SLA violations. Compared to previous studies, the proposed policy shows a reduction of 2% to 3% in energy consumption, 13% to 41% in VM migration frequency, and 15% to 50% in SLA violations.

  • Hierarchical Time-Slot Allocation for Dynamic Bandwidth Control in Optical Layer-2 Switch Network

    Masahiro NAKAGAWA  Kyota HATTORI  Naoki KIMISHIMA  Masaru KATAYAMA  Akira MISAWA  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1303-1312

    We are developing an optical layer-2 switch network that uses both wavelength-division multiplexing and time-division multiplexing technologies for efficient traffic aggregation in metro networks. For efficient traffic aggregation, path bandwidth control is key because it strongly affects bandwidth utilization efficiency. We propose a fast time-slot allocation method that uses hierarchical calculation, which divides the network-wide bandwidth-allocation problem into small-scale local bandwidth-allocation problems and solves them independently. This method has a much shorter computation complexity and enables dynamic path bandwidth control in large-scale networks. Our network will be able to efficiently accommodate dynamic traffic with limited resources by using the proposed method, leading to cost-effective metro networks.

  • Paging out Multiple Clusters to Improve Virtual Memory System Performance

    Woo Hyun AHN  Joon-Woo CHOI  Jaewon OH  Seung-Ho LIM  Kyungbaek KIM  

     
    LETTER-Software System

      Vol:
    E97-D No:7
      Page(s):
    1905-1909

    Virtual memory systems page out a cluster of contiguous modified pages in virtual memory to a swap disk at one disk I/O but cannot find large clusters in applications mainly changing non-contiguous pages. Our proposal stores small clusters at one disk I/O. This decreases disk writes for paging out small clusters, thus improving page-out performance.

9761-9780hit(42807hit)