The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ASE(2849hit)

521-540hit(2849hit)

  • PPLN-Based Low-Noise In-Line Phase Sensitive Amplifier with Highly Sensitive Carrier-Recovery System

    Koji ENBUTSU  Takeshi UMEKI  Osamu TADANAGA  Masaki ASOBE  Hirokazu TAKENOUCHI  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E99-B No:8
      Page(s):
    1727-1733

    We propose a highly sensitive carrier-recovery system for in-line amplification for binary phase shift keying (BPSK) signals in a periodically poled LiNbO3 based phase sensitive amplifier (PSA). We applied a discrete two-stage second harmonic generation/difference frequency generation (SHG/DFG) parametric conversion scheme to enhance the sensitivity of the carrier recovery. Owing to this two-stage SHG/DFG scheme, the conversion efficiency of the seed light for the injection locking needed for the pump generation can be improved compared to that of the cascaded SHG/DFG scheme. The new discrete scheme might also prevent the SNR degradation of the seed light caused by the ASE from the booster EDFA compared with the previous system that used the cascaded scheme. This novel carrier-recovery system exhibits high sensitivity with the SNR of over 7.8dB of the seed light, while tapped signal power is as low as -50dBm, which is low enough for injection locking. The new in-line PSA with this carrier-recovery system exhibits high gain of over 11dB. Since we successfully obtained the high gain property, we tried multistage amplification taking into account practical use and achieved it with both a high gain of 20dB and a noise figure that is almost as low as the standard quantum limit of a PSA.

  • Optical DP-High Order-QAM Transmission System for High-Speed Short Links Utilizing Copropagating Twin Local Lights

    Hiroto KAWAKAMI  Takayuki KOBAYASHI  Yutaka MIYAMOTO  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E99-B No:8
      Page(s):
    1799-1804

    A novel optical high order quadrature amplitude modulation (QAM) transmission system for high-speed short links is described. Dual-polarization (DP) QAM and twin local lights are generated from one light source in the system, and these lightwaves are simultaneously transmitted via standard single mode fiber. The receiver can be constructed simply because it does not require a coherent light source under wavelength control. The system enables a 3.1 Gbaud DP-16-QAM signal to be successfully demodulated after 80-km transmission without using an optical dispersion compensator. It also achieves high tolerance against phase noise in the signal light source.

  • Linear Programming Phase Feeding Method for Phased-Array Scanning

    Yi ZHANG  Guoqiang ZHAO  Houjun SUN  Mang HE  Qiang CHEN  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E99-C No:7
      Page(s):
    892-894

    Digital phase shifters are widely used to achieve space scanning in phased array antenna, and beam pointing accuracy depends on the bit number and resolution of the digital phase shifter. This paper proposes a novel phase feeding method to reduce the phase quantization error effects. A linear formula for the beam pointing deviation of a linear uniform array in condition of phase quantization error is derived, and the linear programming algorithm is introduced to achieve the minimum beam pointing deviation. Simulations are based on the pattern of the phased array, which gives each element a certain quantization phase error to find the beam pointing deviation. The novel method is then compared with previous methods. Examples show that a 32-element uniform linear array with 5-bit phase shifters using the proposed method can achieve a higher beam-steering accuracy than the same array with 11-bit phase shifters.

  • Fast and Efficient Signature-Based Sub-Circuit Matching

    Amir Masoud GHAREHBAGHI  Masahiro FUJITA  

     
    PAPER

      Vol:
    E99-A No:7
      Page(s):
    1355-1365

    This paper presents a new approach for circuit matching using signatures. We have defined a signature based on topology of the fanin cones of the circuit elements. Given two circuits, first we find all the circuit elements with unique signature between the two input circuits. After that, we try to expand the matching area by our expansion rules as much as possible. We iteratively find the unique matches and expand the matching area until no further matching is possible. Our experiments on IWLS2005 benchmark suite show that our method is able to find the perfect matching between two 160,000-gate IP in 5 minutes. In addition, our method is more than one order of magnitude faster than our previous signature-based matching method, while the size of the matched area is comparable or larger.

  • A Proof of Turyn's Conjecture: Nonexistence of Circulant Hadamard Matrices for Order Greater than Four

    Yoshimasa OH-HASHI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:7
      Page(s):
    1395-1407

    Biphase periodic sequences having elements +1 or -1 with the two-level autocorrelation function are desirable in communications and radars. However, in case of the biphase orthogonal periodic sequences, Turyn has conjectured that there exist only sequences with period 4, i.e., there exist the circulant Hadamard matrices for order 4 only. In this paper, it is described that the conjecture is proved to be true by means of the isomorphic mapping, the Chinese remainder theorem, the linear algebra, etc.

  • Value-Driven V-Model: From Requirements Analysis to Acceptance Testing

    Youngsub HAN  Dong-hyun LEE  Byoungju CHOI  Mike HINCHEY  Hoh Peter IN  

     
    PAPER-Software Engineering

      Pubricized:
    2016/04/05
      Vol:
    E99-D No:7
      Page(s):
    1776-1785

    The goal of software testing should go beyond simply finding defects. Ultimately, testing should be focused on increasing customer satisfaction. Defects that are detected in areas of the software that the customers are especially interested in can cause more customer dissatisfaction. If these defects accumulate, they can cause the software to be shunned in the marketplace. Therefore, it is important to focus on reducing defects in areas that customers consider valuable. This article proposes a value-driven V-model (V2 model) that deals with customer values and reflects them in the test design for increasing customer satisfaction and raising test efficiency.

  • Miniaturization of Double Stub Resonators Using Lumped-Element Capacitors for MMIC Applications

    Shinichi TANAKA  Takao KATAYOSE  Hiroki NISHIZAWA  Ken'ichi HOSOYA  Ryo ISHIKAWA  Kazuhiko HONJO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E99-C No:7
      Page(s):
    830-836

    We present a design method for miniaturizing double stub resonators that are potentially very useful for wide range of applications but have limited usage for MMICs due to their large footprint. The analytical design model, which we introduce in this paper, allows for determining the capacitances needed to achieve the targeted shrinking ratio while maintaining the original loaded-Q before miniaturization. To verify the model, 18-GHz stub resonators that are around 40% of the original sizes were designed and fabricated in GaAs MMIC technology. The effectiveness of the proposed technique is also demonstrated by a 9-GHz low phase-noise oscillator using the miniaturized resonator.

  • Transmission Properties of Electromagnetic Wave in Pre-Cantor Bar: Scaling and Double-Exponetiality

    Ryota SATO  Keimei KAINO  Jun SONODA  

     
    BRIEF PAPER

      Vol:
    E99-C No:7
      Page(s):
    801-804

    Pre-Cantor bar, the one-dimensional fractal media, consists of two kinds of materials. Using the transmission-line theory we will explain the double-exponential behavior of the minimum of the transmittance as a function of the stage number n, and obtain formulae of two kinds of scaling behaviors of the transmittance. From numerical calculations for n=1 to 5 we will find that the maximum of field amplitudes of resonance which increases double-exponentially with n is well estimated by the theoretical upper bound. We will show that after sorting field amplitudes for resonance frequencies of the 5th stage their distribution is a staircase function of the index.

  • Multilayer Four-Way Out-of-Phase Power Divider Based on Substrate Integrated Waveguide Technology

    Zhitao XU  Jun XU  Shuai LIU  Yaping ZHANG  

     
    BRIEF PAPER-Microwaves, Millimeter-Waves

      Vol:
    E99-C No:7
      Page(s):
    895-898

    In this paper, a novel multilayer substrate integrated waveguide (SIW) four-way out-of-phase power divider is proposed. It is realized by 3D mode coupling, on multilayer substrates. The structure consists of vertical Y-junction, lateral T-junction of SIW and lateral Y-junction of half-mode SIW. The advantages of the proposed structure are its low cost and ease of fabrication. Also, it can be integrated easily with other planar circuits such as microstrip circuits. An experimental circuit is designed and fabricated using the traditional printed circuit board technology. The simulated and measured results show that the return loss of the input port is above 15 dB over 8 to 11.8 GHz and transmissions are about -7.6±1.6 dB in the passband. It is expected that the proposed the proposed power divider will play an important role in the future integration of compact multilayer SIW circuits and systems.

  • API-Based Software Birthmarking Method Using Fuzzy Hashing

    Donghoon LEE  Dongwoo KANG  Younsung CHOI  Jiye KIM  Dongho WON  

     
    PAPER-Information Network

      Pubricized:
    2016/04/15
      Vol:
    E99-D No:7
      Page(s):
    1836-1851

    The software birthmarking technique has conventionally been studied in fields such as software piracy, code theft, and copyright infringement. The most recent API-based software birthmarking method (Han et al., 2014) extracts API call sequences in entire code sections of a program. Additionally, it is generated as a birthmark using a cryptographic hash function (MD5). It was reported that different application types can be categorized in a program through pre-filtering based on DLL/API numbers/names. However, similarity cannot be measured owing to the cryptographic hash function, occurrence of false negatives, and it is difficult to functionally categorize applications using only DLL/API numbers/names. In this paper, we propose an API-based software birthmarking method using fuzzy hashing. For the native code of a program, our software birthmarking technique extracts API call sequences in the segmented procedures and then generates them using a fuzzy hash function. Unlike the conventional cryptographic hash function, the fuzzy hash is used for the similarity measurement of data. Our method using a fuzzy hash function achieved a high reduction ratio (about 41% on average) more than an original birthmark that is generated with only the API call sequences. In our experiments, when threshold ε is 0.35, the results show that our method is an effective birthmarking system to measure similarities of the software. Moreover, our correlation analysis with top 50 API call frequencies proves that it is difficult to functionally categorize applications using only DLL/API numbers/names. Compared to prior work, our method significantly improves the properties of resilience and credibility.

  • Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme

    Seunghwan PARK  Dong Hoon LEE  

     
    LETTER-Information Network

      Pubricized:
    2016/03/30
      Vol:
    E99-D No:7
      Page(s):
    1933-1936

    Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks.

  • Q-Value Fine-Grained Adjustment Based RFID Anti-Collision Algorithm

    Jian SU  Xuefeng ZHAO  Danfeng HONG  Zhongqiang LUO  Haipeng CHEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:7
      Page(s):
    1593-1598

    Fast identification is an urgent demand for modern RFID systems. In this paper, we propose a novel algorithm, access probability adjustment based fine-grained Q-algorithm (APAFQ), to enhance the efficiency of RFID identification with low computation overhead. Specifically, instead of estimation accuracy, the target of most proposed anti-collision algorithms, the APAFQ scheme is driven by updating Q value with two different weights, slot by slot. To achieve higher identification efficiency, the reader adopts fine-grained access probability during the identification process. Moreover, based on the responses from tags, APAFQ adjusts the access probability adaptively. Simulations show the superiority of APAFQ over existing Aloha-based algorithms.

  • Improved Liquid-Phase Detection of Biological Targets Based on Magnetic Markers and High-Critical-Temperature Superconducting Quantum Interference Device Open Access

    Masakazu URA  Kohei NOGUCHI  Yuta UEOKA  Kota NAKAMURA  Teruyoshi SASAYAMA  Takashi YOSHIDA  Keiji ENPUKU  

     
    INVITED PAPER

      Vol:
    E99-C No:6
      Page(s):
    669-675

    In this paper, we propose improved methods of liquid-phase detection of biological targets utilizing magnetic markers and a high-critical-temperature superconducting quantum interference device (SQUID). For liquid-phase detection, the bound and unbound (free) markers are magnetically distinguished by using Brownian relaxation of free markers. Although a signal from the free markers is zero in an ideal case, it exists in a real sample on account of the aggregation and precipitation of free markers. This signal is called a blank signal, and it degrades the sensitivity of target detection. To solve this problem, we propose improved detection methods. First, we introduce a reaction field, Bre, during the binding reaction between the markers and targets. We additionally introduce a dispersion process after magnetization of the bound markers. Using these methods, we can obtain a strong signal from the bound markers without increasing the aggregation of the free markers. Next, we introduce a field-reversal method in the measurement procedure to differentiate the signal from the markers in suspension from that of the precipitated markers. Using this procedure, we can eliminate the signal from the precipitated markers. Then, we detect biotin molecules by using these methods. In an experiment, the biotins were immobilized on the surfaces of large polymer beads with diameters of 3.3 µm. They were detected with streptavidin-conjugated magnetic markers. The minimum detectable molecular number concentration was 1.8×10-19 mol/ml, which indicates the high sensitivity of the proposed method.

  • A New High-Density 10T CMOS Gate-Array Base Cell for Two-Port SRAM Applications

    Nobutaro SHIBATA  Yoshinori GOTOH  Takako ISHIHARA  

     
    PAPER-Integrated Electronics

      Vol:
    E99-C No:6
      Page(s):
    717-726

    Two-port SRAMs are frequently installed in gate-array VLSIs to implement smart functions. This paper presents a new high-density 10T CMOS base cell for gate-array-based two-port SRAM applications. Using the single base cell alone, we can implement a two-port memory cell whose bitline contacts are shared with the memory cell adjacent to one of two dedicated sides, resulting in greatly reduced parasitic capacitance in bitlines. To throw light on the total performance derived from the base cell, a plain two-port SRAM macro was designed and fabricated with a 0.35-µm low cost, logic process. Each of two 10-bit power-saved address decoders was formed with 36% fewer base cells by employing complex gates and a subdecoder. The new sense amplifier with a complementary sensing scheme had a fine sensitivity of 35 mVpp, and so we successfully reduced the required read bitline signal from 250 to 70 mVpp. With the macro with 1024 memory cells per bitline, the address access time under typical conditions of a 2.5-V power supply and 25°C was 4.0 ns (equal to that obtained with full-custom style design) and the power consumption at 200-MHz simultaneous operations of two ports was 6.7 mW for an I/O-data width of 1 bit.

  • A Practical Extended Harmonic Disturbance Observer Design for Robust Current Control of Speed Sensorless DC Motor Drives

    In Hyuk KIM  Young Ik SON  

     
    LETTER-Systems and Control

      Vol:
    E99-A No:6
      Page(s):
    1243-1246

    An extended harmonic disturbance observer is designed for speed (or position) sensorless current control of DC motor subject to a biased sinusoidal disturbance and parameter uncertainties. The proposed method does not require the information on the mechanical part of the motor equation. Theoretical analysis via the singular perturbation theory is performed to verify that the feedforward compensation using the estimation can improve the robust transient performance of the closed-loop system. A stability condition is derived against parameter uncertainties. Comparative experimental results validate the robustness of the proposed method against the uncertainties.

  • A Similarity Study of Interactive Content-Based Image Retrieval Scheme for Classification of Breast Lesions

    Hyun-chong CHO  Lubomir HADJIISKI  Berkman SAHINER  Heang-Ping CHAN  Chintana PARAMAGUL  Mark HELVIE  Alexis V. NEES  Hyun Chin CHO  

     
    PAPER-Biological Engineering

      Pubricized:
    2016/02/29
      Vol:
    E99-D No:6
      Page(s):
    1663-1670

    To study the similarity between queries and retrieved masses, we design an interactive CBIR (Content-based Image Retrieval) CADx (Computer-aided Diagnosis) system using relevance feedback for the characterization of breast masses in ultrasound (US) images based on radiologists' visual similarity assessment. The CADx system retrieves masses that are similar to query masses from a reference library based on six computer-extracted features that describe the texture, width-to-height, and posterior shadowing of the mass. The k-NN retrieval with Euclidean distance similarity measure and the Rocchio relevance feedback algorithm (RRF) are used. To train the RRF parameters, the similarities of 1891 image pairs from 62 (31 malignant and 31 benign) masses are rated by 3 MQSA (Mammography Quality Standards Act) radiologists using a 9-point scale (9=most similar). The best RRF parameters are chosen based on 3 observer experiments. For testing, 100 independent query masses (49 malignant and 51 benign) and 121 reference masses on 230 (79 malignant and 151 benign) images were collected. Three radiologists rated the similarity between the query masses and the computer-retrieved masses. Average similarity ratings without and with RRF were 5.39 and 5.64 for the training set and 5.78 and 6.02 for the test set, respectively. Average AUC values without and with RRF were, respectively, 0.86±0.03 and 0.87±0.03 for the training set and 0.91±0.03 and 0.90±0.03 for the test set. On average, masses retrieved using the CBIR system were moderately similar to the query masses based on radiologists' similarity assessments. RRF improved the similarity of the retrieved masses.

  • Quadratic Compressed Sensing Based SAR Imaging Algorithm for Phase Noise Mitigation

    Xunchao CONG  Guan GUI  Keyu LONG  Jiangbo LIU  Longfei TAN  Xiao LI  Qun WAN  

     
    LETTER-Digital Signal Processing

      Vol:
    E99-A No:6
      Page(s):
    1233-1237

    Synthetic aperture radar (SAR) imagery is significantly deteriorated by the random phase noises which are generated by the frequency jitter of the transmit signal and atmospheric turbulence. In this paper, we recast the SAR imaging problem via the phase-corrupted data as for a special case of quadratic compressed sensing (QCS). Although the quadratic measurement model has potential to mitigate the effects of the phase noises, it also leads to a nonconvex and quartic optimization problem. In order to overcome these challenges and increase reconstruction robustness to the phase noises, we proposed a QCS-based SAR imaging algorithm by greedy local search to exploit the spatial sparsity of scatterers. Our proposed imaging algorithm can not only avoid the process of precise random phase noise estimation but also acquire a sparse representation of the SAR target with high accuracy from the phase-corrupted data. Experiments are conducted by the synthetic scene and the moving and stationary target recognition Sandia laboratories implementation of cylinders (MSTAR SLICY) target. Simulation results are provided to demonstrate the effectiveness and robustness of our proposed SAR imaging algorithm.

  • Secure Computation Protocols Using Polarizing Cards

    Kazumasa SHINAGAWA  Takaaki MIZUKI  Jacob C. N. SCHULDT  Koji NUIDA  Naoki KANAYAMA  Takashi NISHIDE  Goichiro HANAOKA  Eiji OKAMOTO  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1122-1131

    It is known that, using just a deck of cards, an arbitrary number of parties with private inputs can securely compute the output of any function of their inputs. In 2009, Mizuki and Sone constructed a six-card COPY protocol, a four-card XOR protocol, and a six-card AND protocol, based on a commonly used encoding scheme in which each input bit is encoded using two cards. However, up until now, there are no known results to construct a set of COPY, XOR, and AND protocols based on a two-card-per-bit encoding scheme, which all can be implemented using only four cards. In this paper, we show that it is possible to construct four-card COPY, XOR, and AND protocols using polarizing plates as cards and a corresponding two-card-per-bit encoding scheme. Our protocols use a minimum number of cards in the setting of two-card-per-bit encoding schemes since four cards are always required to encode the inputs. Moreover, we show that it is possible to construct two-card COPY, two-card XOR, and three-card AND protocols based on a one-card-per-bit encoding scheme using a common reference polarizer which is a polarizing material accessible to all parties.

  • A Study of Striped Inductor for K- and Ka-Band Voltage-Controlled Oscillators Open Access

    Nobuyuki ITOH  Hiroki TSUJI  Yuka ITANO  Takayuki MORISHITA  Kiyotaka KOMOKU  Sadayuki YOSHITOMI  

     
    INVITED PAPER

      Vol:
    E99-C No:6
      Page(s):
    614-622

    A striped inductor and its utilization of a voltage-controlled oscillator (VCO) are studied with the aim of suppressing phase noise degradation in K- and Ka-bands. The proposed striped inductor exhibits reduced series resistance in the high frequency region by increasing the cross-sectional peripheral length, as with the Litz wire, and the VCO of the striped inductor simultaneously exhibits a lower phase noise than that of the conventional inductor. Striped and conventional inductors and VCOs are designed and fabricated, and their use of K- and Ka-bands is measured. Results show that the Q factor and corner frequency of the striped inductor are approximately 1.3 and 1.6 times higher, respectively, than that of the conventional inductor. Moreover, the 1-MHz-offset phase noise of the striped inductor's VCO in the K- and Ka-bands was approximately 3.5 dB lower than that of the conventional inductor. In this study, a 65-nm standard CMOS process was used.

  • Choreography Realization by Re-Constructible Decomposition of Acyclic Relations

    Toshiyuki MIYAMOTO  

     
    PAPER-Formal Methods

      Pubricized:
    2016/05/02
      Vol:
    E99-D No:6
      Page(s):
    1420-1427

    For a service-oriented architecture-based system, the problem of synthesizing a concrete model (i.e., a behavioral model) for each peer configuring the system from an abstract specification — which is referred to as choreography — is known as the choreography realization problem. In this paper, we consider the condition for the behavioral model when choreography is given by an acyclic relation. A new notion called re-constructible decomposition of acyclic relations is introduced, and a necessary and sufficient condition for a decomposed relation to be re-constructible is shown. The condition provides lower and upper bounds of the acyclic relation for the behavioral model. Thus, the degree of freedom for behavioral models increases; developing algorithms for synthesizing an intelligible model for users becomes possible. It is also expected that the condition is applied to the case where choreography is given by a set of acyclic relations.

521-540hit(2849hit)