The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

12861-12880hit(42807hit)

  • A 40-nm 0.5-V 12.9-pJ/Access 8T SRAM Using Low-Energy Disturb Mitigation Scheme

    Shusuke YOSHIMOTO  Masaharu TERADA  Shunsuke OKUMURA  Toshikazu SUZUKI  Shinji MIYANO  Hiroshi KAWAGUCHI  Masahiko YOSHIMOTO  

     
    PAPER

      Vol:
    E95-C No:4
      Page(s):
    572-578

    This paper presents a novel disturb mitigation scheme which achieves low-energy operation for a deep sub-micron 8T SRAM macro. The classic write-back scheme with a dedicated read port overcame both half-select and read-disturb problems. Moreover, it improved the yield, particularly in the low-voltage range. The conventional scheme, however, consumed more power because of charging and discharging all write bitlines in a sub-block. Our proposed scheme reduces the power overhead of the write-back scheme using a floating write bitline technique and a low-swing bitline driver (LSBD). The floating bitline and the LSBD respectively consist of a precharge-less CMOS equalizer (transmission gate) and an nMOS write-back driver. The voltage on the floating write bitline is at an intermediate voltage between the ground and the supply voltage before a write cycle. The write target cells are written by normal CMOS drivers, whereas the write bitlines in half-selected columns are driven by the LSBDs in the write cycle, which suppresses the write bitline voltage to VDD - Vtn and therefore saves the active power in the half-selected columns (where Vtn is a threshold voltage of an nMOS). In addition, the proposed scheme reduces a leakage current from the write bitline because of the floating write bitline. The active leakage is reduced by 33% at the FF corner, 125. The active energy in the write operation is reduced by 37% at the FF corner. In other process corners, more writing power reduction can be expected because it depends on the Vtn in the LSBD. We fabricated a 512-Kb 8T SRAM test chip that operates at a single 0.5-V supply voltage. The test chip with the proposed scheme respectively achieves 1.52-µW/MHz writing energy and 72.8-µW leakage power, which are 59.4% and 26.0% better than those of the conventional write-back scheme. The total energy is 12.9 µW/MHz (12.9 pJ/access) at a supply voltage of 0.5 V and operating frequency of 6.25 MHz in a 50%-read/50%-write operation.

  • Performance Analysis of MIMO Relay Network via Propagation Measurement in L-Shaped Corridor Environment

    Namzilp LERTWIRAM  Gia Khanh TRAN  Keiichi MIZUTANI  Kei SAKAGUCHI  Kiyomichi ARAKI  

     
    PAPER-Antennas and Propagation

      Vol:
    E95-B No:4
      Page(s):
    1345-1356

    Setting relays can address the shadowing problem between a transmitter (Tx) and a receiver (Rx). Moreover, the Multiple-Input Multiple-Output (MIMO) technique has been introduced to improve wireless link capacity. The MIMO technique can be applied in relay network to enhance system performance. However, the efficiency of relaying schemes and relay placement have not been well investigated with experiment-based study. This paper provides a propagation measurement campaign of a MIMO two-hop relay network in 5 GHz band in an L-shaped corridor environment with various relay locations. Furthermore, this paper proposes a Relay Placement Estimation (RPE) scheme to identify the optimum relay location, i.e. the point at which the network performance is highest. Analysis results of channel capacity show that relaying technique is beneficial over direct transmission in strong shadowing environment while it is ineffective in non-shadowing environment. In addition, the optimum relay location estimated with the RPE scheme also agrees with the location where the network achieves the highest performance as identified by network capacity. Finally, the capacity analysis shows that two-way MIMO relay employing network coding has the best performance while cooperative relaying scheme is not effective due to shadowing effect weakening the signal strength of the direct link.

  • A Scheduling Algorithm for Connected Target Coverage in Rotatable Directional Sensor Networks

    Youn-Hee HAN  Chan-Myung KIM  Joon-Min GIL  

     
    PAPER-Network

      Vol:
    E95-B No:4
      Page(s):
    1317-1328

    A key challenge in developing energy-efficient sensor networks is to extend network lifetime in resource-limited environments. As sensors are often densely distributed, they can be scheduled on alternative duty cycles to conserve energy while satisfying the system requirements. Directional sensor networks composed of a large number of directional sensors equipped with a limited battery and with a limited angle of sensing have recently attracted attention. Many types of directional sensors can rotate to face a given direction. Maximizing network lifetime while covering all of the targets in a given area and forwarding sensor data to the sink is a challenge in developing such rotatable directional sensor networks. In this paper, we address the maximum directional cover tree (MDCT) problem of organizing directional sensors into a group of non-disjoint subsets to extend network lifetime. One subset, in which the directional sensors cover all of the targets and forward the data to the sink, is activated at a time, while the others sleep to conserve energy. For the MDCT problem, we first present an energy-consumption model that mainly takes into account the energy expenditure for sensor rotation as well as for the sensing and relaying of data. We also develop a heuristic scheduling algorithm called directional coverage and connectivity (DCC)-greedy to solve the MDCT problem. To verify and evaluate the algorithm, we conduct extensive simulations and show that it extends network lifetime to a reasonable degree.

  • A Scheme to Update OSPF Network Metrics without Loops while Minimizing Routing Instability Duration

    Yutaka ARAI  Eiji OKI  

     
    LETTER-Network

      Vol:
    E95-B No:4
      Page(s):
    1423-1426

    This letter proposes a scheme to update metrics without loops while minimizing routing instability time in an Open Shortest Path First (OSPF) network. The original OSPF network enters the transient state when metrics are being updated to improve the routing performance, and in this state packets may fall into loops. This may cause packet loss and inefficient network resource utilization. To avoid transient loops, a conventional scheme gives each router a priority that reflects the optimum time for metric update. However, when the updated metrics include both larger and smaller values than the preceding ones, two sequential updating processes, one for larger values and one for smaller values, are required. It takes time to converge on the final metric values in the conventional scheme, given that the interval time between the two processes is not insignificant. The second process starts only when the first process is confirmed to be completed. The interval time including the confirmation time and the time needed to reconfigure the metrics in all routers, lengthens the transient state duration; from several seconds to several tens of seconds. This causes routing instability. The proposed scheme transforms the set of updated metrics into an equivalent set of metrics that are either all larger or all smaller (if changed at all) than the ones before the update. The set of equivalent metrics yield exactly the same results in terms of routing as the conventional scheme, i.e. the result desired by the network operator. The non-mixture update requires only one updating process and so eliminates the interval time. Numerical results indicate that the probability that the proposed scheme can achieve non-mixture update is more than 67% in the networks examined.

  • Analysis on the Capacity of a Cognitive Radio Network under Delay Constraints

    Yuehong GAO  Yuming JIANG  

     
    PAPER

      Vol:
    E95-B No:4
      Page(s):
    1180-1189

    In this paper, performance analysis of a cognitive radio network is conducted. In the network, there is imperfect sensing and the wireless channel is a Gilbert-Elliott channel. The focus is on the network's capacity in serving traffic with delay constraints. Specifically, the maximum traffic arrival rates of both primary users and secondary users, which the network can support with guaranteed delay bounds, are investigated. The analysis is based on stochastic network calculus. A general relationship between delay bounds, traffic patterns and important characteristics such as spectrum sensing errors and channel fading of the cognitive radio network is derived. This relationship lays a foundation for finding the capacity under different traffic scenarios. Two specific traffic types are exemplified, namely periodic traffic and Poisson traffic. Analytical results are presented in comparison with simulation results. The comparison shows a good match between them, validating the analysis.

  • Reversible Implementations of Irreversible Component Transforms and Their Comparisons in Image Compression

    Junghyeun HWANG  Hisakazu KIKUCHI  Shogo MURAMATSU  Kazuma SHINODA  Jaeho SHIN  

     
    LETTER-Digital Signal Processing

      Vol:
    E95-A No:4
      Page(s):
    824-828

    Reversible color component transforms derived by the LU factorization are briefly described. It is possible to obtain an reversible implementation to a given component transform, even if the original transform is irreversible. Some examples are presented and their performances are compared in image compression.

  • Transverse Characteristics of Two-Dimensional Imaging by Fourier Domain Optical Coherence Tomography

    Yu SUGITA  Yoshifumi TAKASAKI  Keiji KURODA  Yuzo YOSHIKUNI  

     
    BRIEF PAPER-Optoelectronics

      Vol:
    E95-C No:4
      Page(s):
    761-764

    A Fourier domain optical coherence tomography system for obtaining a two-dimensional image is constructed. Imaging characteristics of the OCT system in a transverse direction are experimentally investigated. Angle dependence of reflection intensity from a smooth surface is clearly observed and analyzed with consideration of spatial mode coupling to a fiber.

  • Extracting Communities of Interests for Semantics-Based Graph Searches

    Makoto NAKATSUJI  Akimichi TANAKA  Toshio UCHIYAMA  Ko FUJIMURA  

     
    PAPER

      Vol:
    E95-D No:4
      Page(s):
    932-941

    Users recently find their interests by checking the contents published or mentioned by their immediate neighbors in social networking services. We propose semantics-based link navigation; links guide the active user to potential neighbors who may provide new interests. Our method first creates a graph that has users as nodes and shared interests as links. Then it divides the graph by link pruning to extract practical numbers, that the active user can navigate, of interest-sharing groups, i.e. communities of interests (COIs). It then attaches a different semantic tag to the link to each representative user, which best reflects the interests of COIs that they are included in, and to the link to each immediate neighbor of the active user. It finally calculates link attractiveness by analyzing the semantic tags on links. The active user can select the link to access by checking the semantic tags and link attractiveness. User interests extracted from large scale actual blog-entries are used to confirm the efficiency of our proposal. Results show that navigation based on link attractiveness and representative users allows the user to find new interests much more accurately than is otherwise possible.

  • Optimizing Protograph Coded BICM for Half-Duplex DF Relay

    Xiaojun SUN  Ming JIANG  Wei XU  Pengcheng ZHU  Chunming ZHAO  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:4
      Page(s):
    1397-1401

    In this letter, we use the the protograph low-density parity check (LDPC) codes to create bit-interleaved coded modulation (BICM) for the half-duplex decode-and-forward (DF) relay network. The DF relay BICM design problem can be transformed into a problem of rate-compatible BICM design, where the different segments of modulated symbols experience different signal-to-noise ratios (SNRs). To optimize the BICM based on the protograph structure, we use the protograph extrinsic information transfer (EXIT) to evaluate the thresholds of different mapping patterns between the variable nodes and the modulated bits. With this tool, we search for the most efficient mapping pattern of BICM for the half-duplex DF relay network. Our work can achieve significant gains over the existing work.

  • Almost Quadriphase Sequences with Even Period and Low Autocorrelation

    XiuPing PENG  Chengqian XU  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E95-A No:4
      Page(s):
    832-834

    A new class of almost quadriphase sequences with four zero elements of period 4N, where N ≡ 1(mod 4) being a prime, is constructed. The maximum nontrivial autocorrelations of the constructed almost quadriphase sequences are shown to be 4.

  • Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters

    Osamu WATANABE  Takahiro FUKUHARA  Hitoshi KIYA  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E95-D No:4
      Page(s):
    1120-1129

    A method of identifying JPEG 2000 images with different coding parameters, such as code-block sizes, quantization-step sizes, and resolution levels, is presented. It does not produce false-negative matches regardless of different coding parameters (compression rate, code-block size, and discrete wavelet transform (DWT) resolutions levels) or quantization step sizes. This feature is not provided by conventional methods. Moreover, the proposed approach is fast because it uses the number of zero-bit-planes that can be extracted from the JPEG 2000 codestream by only parsing the header information without embedded block coding with optimized truncation (EBCOT) decoding. The experimental results revealed the effectiveness of image identification based on the new method.

  • SCAP: Energy Efficient Event Detection in Large-Scale Wireless Sensor Networks with Multiple Sinks

    Jungmin SO  Heejung BYUN  

     
    LETTER-Network

      Vol:
    E95-B No:4
      Page(s):
    1435-1438

    For large-scale sensor networks, multiple sinks are often deployed in order to reduce source-to-sink distance and thus cost of data delivery. However, having multiple sinks may work against cost reduction, because routes from sources can diverge towards different sinks which reduces the benefit of in-network data aggregation. In this letter we propose a self-clustering data aggregation protocol (SCAP) that can benefit from having multiple sinks as well as joint routes. In SCAP, nodes which detect the event communicate with each other to aggregate data between themselves, before sending the data to the sinks. The self-clustering extends network lifetime by reducing energy consumption of nodes near the sinks, because the number of paths in which the packets are delivered is reduced. A performance comparison with existing protocols L-PEDAP and LEO shows that SCAP can conserve energy and extend network lifetime significantly, in a multi-sink environment.

  • Support Efficient and Fault-Tolerant Multicast in Bufferless Network-on-Chip

    Chaochao FENG  Zhonghai LU  Axel JANTSCH  Minxuan ZHANG  Xianju YANG  

     
    PAPER-Computer System

      Vol:
    E95-D No:4
      Page(s):
    1052-1061

    In this paper, we propose three Deflection-Routing-based Multicast (DRM) schemes for a bufferless NoC. The DRM scheme without packets replication (DRM_noPR) sends multicast packet through a non-deterministic path. The DRM schemes with adaptive packets replication (DRM_PR_src and DRM_PR_all) replicate multicast packets at the source or intermediate node according to the destination position and the state of output ports to reduce the average multicast latency. We also provide fault-tolerant supporting in these schemes through a reinforcement-learning-based method to reconfigure the routing table to tolerate permanent faulty links in the network. Simulation results illustrate that the DRM_PR_all scheme achieves 41%, 43% and 37% less latency on average than that of the DRM_noPR scheme and 27%, 29% and 25% less latency on average than that of the DRM_PR_src scheme under three synthetic traffic patterns respectively. In addition, all three fault-tolerant DRM schemes achieve acceptable performance degradation at various link fault rates without any packet lost.

  • Accuracy of Gradient-Based Optical Flow Estimation in High-Frame-Rate Video Analysis

    Lei CHEN  Takeshi TAKAKI  Idaku ISHII  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E95-D No:4
      Page(s):
    1130-1141

    This study investigates the effect of frame intervals on the accuracy of the Lucas–Kanade optical flow estimates for high-frame-rate (HFR) videos, with a view to realizing accurate HFR-video-based optical flow estimation. For 512 512 pixels videos of patterned objects moving at different speeds and captured at 1000 frames per second, the averages and standard deviations of the estimated optical flows were determined as accuracy measures for frame intervals of 1–40 ms. The results showed that the accuracy was highest when the displacement between frames was around 0.6 pixel/frame. This common property indicates that accurate optical flow estimation for HFR videos can be realized by varying frame intervals according to the motion field: a small frame interval for high-speed objects and a large frame interval for low-speed objects.

  • Ultra High Speed Modified Booth Encoding Architecture for High Speed Parallel Accumulations

    Amir FATHI  Sarkis AZIZIAN  Khayrollah HADIDI  Abdollah KHOEI  

     
    BRIEF PAPER

      Vol:
    E95-C No:4
      Page(s):
    706-709

    This paper presents design of a novel high speed booth encoder-decoder in a 0.35 µm CMOS technology. Focusing on transistor level implementation of the new architecture and employing newly designed truth table, the gate level delay of the whole system is reduced to one logic gate plus one transistor delay which is the main advantage of the proposed circuit. Simulation results indicate high speed performance of the designed circuit and depict low power dissipation feature of implemented architecture which makes this work suitable for extensive use in high speed arithmetic blocks.

  • Performance Evaluation of an Option-Based Learning Algorithm in Multi-Car Elevator Systems

    Alex VALDIVIELSO CHIAN  Toshiyuki MIYAMOTO  

     
    LETTER-Concurrent Systems

      Vol:
    E95-A No:4
      Page(s):
    835-839

    In this letter, we present the evaluation of an option-based learning algorithm, developed to perform a conflict-free allocation of calls among cars in a multi-car elevator system. We evaluate its performance in terms of the service time, its flexibility in the task-allocation, and the load balancing.

  • Third-Harmonic Envelope Feedback Method for High-Efficiency Linear Power Amplifiers

    Shoichi OSHIMA  Mamoru UGAJIN  Mitsuru HARADA  

     
    BRIEF PAPER

      Vol:
    E95-C No:4
      Page(s):
    713-716

    A new low-power feedback structure for a power amplifier (PA) reduces signal distortion while keeping the power efficiency of the PA high. The feedback structure injects the envelope of the third-order harmonics into the input signal. In adopting this method for a class-A amplifier, we obtain over 10% higher efficiency while maintaining the same adjacent channel power ratio (ACPR). The power consumption of additional circuit is 200 µW.

  • Reticella: An Execution Trace Slicing and Visualization Tool Based on a Behavior Model

    Kunihiro NODA  Takashi KOBAYASHI  Shinichiro YAMAMOTO  Motoshi SAEKI  Kiyoshi AGUSA  

     
    PAPER

      Vol:
    E95-D No:4
      Page(s):
    959-969

    Program comprehension using dynamic information is one of key tasks of software maintenance. Software visualization with sequence diagrams is a promising technique to help developer comprehend the behavior of object-oriented systems effectively. There are many tools that can support automatic generation of a sequence diagram from execution traces. However it is still difficult to understand the behavior because the size of automatically generated sequence diagrams from the massive amounts of execution traces tends to be beyond developer's capacity. In this paper, we propose an execution trace slicing and visualization method. Our proposed method is capable of slice calculation based on a behavior model which can treat dependencies based on static and dynamic analysis and supports for various programs including exceptions and multi-threading. We also introduce our tool that perform our proposed slice calculation on the Eclipse platform. We show the applicability of our proposed method by applying the tool to two Java programs as case studies. As a result, we confirm effectiveness of our proposed method for understanding the behavior of object-oriented systems.

  • Scenario Generation Using Differential Scenario Information

    Masayuki MAKINO  Atsushi OHNISHI  

     
    PAPER

      Vol:
    E95-D No:4
      Page(s):
    1044-1051

    A method of generating scenarios using differential scenaro information is presented. Behaviors of normal scenarios of similar purpose are quite similar each other, while actors and data in scenarios are different among these scenarios. We derive the differential information between them and apply the differential information to generate new alternative/exceptional scenarios. Our method will be illustrated with examples. This paper describes (1) a language for describing scenarios based on a simple case grammar of actions, (2) introduction of the differential scenario, and (3) method and examples of scenario generation using the differential scenario.

  • Development and Experimental Evaluation of Cyclostationarity-Based Signal Identification Equipment for Cognitive Radios

    Hiroki HARADA  Hiromasa FUJII  Shunji MIURA  Hidetoshi KAYAMA  Yoshiki OKANO  Tetsuro IMAI  

     
    PAPER

      Vol:
    E95-B No:4
      Page(s):
    1100-1108

    An important and widely considered signal identification technique for cognitive radios is cyclostationarity-based feature detection because this method does not require time and frequency synchronization and prior information except for information concerning cyclic autocorrelation features of target signals. This paper presents the development and experimental evaluation of cyclostationarity-based signal identification equipment. A spatial channel emulator is used in conjunction with the equipment that provides an environment to evaluate realistic spectrum sharing scenarios. The results reveal the effectiveness of the cyclostationarity-based signal identification methodology in realistic spectrum sharing scenarios, especially in terms of the capability to identify weak signals.

12861-12880hit(42807hit)