Shuichi NAGASAWA Kenji HINODE Tetsuro SATOH Mutsuo HIDAKA Hiroyuki AKAIKE Akira FUJIMAKI Nobuyuki YOSHIKAWA Kazuyoshi TAKAGI Naofumi TAKAGI
We describe the recent progress on a Nb nine-layer fabrication process for large-scale single flux quantum (SFQ) circuits. A device fabricated in this process is composed of an active layer including Josephson junctions (JJ) at the top, passive transmission line (PTL) layers in the middle, and a DC power layer at the bottom. We describe the process conditions and the fabrication equipment. We use both diagnostic chips and shift register (SR) chips to improve the fabrication process. The diagnostic chip was designed to evaluate the characteristics of basic elements such as junctions, contacts, resisters, and wiring, in addition to their defect evaluations. The SR chip was designed to evaluate defects depending on the size of the SFQ circuits. The results of a long-term evaluation of the diagnostic and SR chips showed that there was fairly good correlation between the defects of the diagnostic chips and yields of the SRs. We could obtain a yield of 100% for SRs including 70,000JJs. These results show that considerable progress has been made in reducing the number of defects and improving reliability.
Kazuyoshi TAKAGI Nobutaka KITO Naofumi TAKAGI
Superconducting Single-Flux-Quantum (SFQ) devices have been paid much attention as alternative devices for digital circuits, because of their high switching speed and low power consumption. For large-scale circuit design, the role of computer-aided design environment is significant. As the characteristics of the SFQ devices are different from conventional devices, a new design environment is required. In this paper, we propose a new timing-aware circuit description method which can be used for SFQ circuit design. Based on the description and the dedicated algorithms we have been developing for SFQ logic circuit design, we propose an integrated design flow for SFQ logic circuits. We have designed a circuit using our developed design tools along with the design flow and demonstrated the correct operation.
A self-powered urinary-incontinence sensor with a flexible wire-type urine-activated battery has been developed as an application for wireless biosensor networks. It is disposable and can be embedded in a diaper. The battery consists of two long film-type line electrodes printed on a flexible plastic sheet that abuts the absorbent material of the diaper. It conforms to the shape of the diaper when the diaper is worn. The stress produced by the curvature of the diaper presses the electrodes firmly against the diaper material, providing greater contact with any urine present. Thus, the battery generates more power than when it is flat, as in an unworn diaper. To verify the effectiveness of the battery, we fabricated a battery and a prototype sensor, which consists of an intermittent-power-supply circuit and a wireless transmitter, and embedded the battery in a diaper. The anode of the battery also acts as a wide ground plane for the antenna of the wireless transmitter, which radiates a large amount of power. When 80cc of urine is poured onto the diaper, the battery outputs a voltage of around 1V, which allows the sensor to transmit an ID signal over a distance of 5m every 40 seconds or so.
This paper summarizes the current status of regulations, standardization efforts and trials around the world regarding white space (WS) communications, especially television band WS (TVWS). After defining WS communication systems configurations and function and the categories of white space database, the TVWS regulations in United States, United Kingdom, and Japan are summarized. Then regarding status of standardization for TVWS devices, IEEE 802 and IEEE 1900 standards are summarized. Finally ongoing pilot projects and trials of WS communications in the world are summarized, and trends and future direction of research on WS communication systems are summarized.
Ji-Hyun SONG Hong-Sub AN Sangmin LEE
In this paper, we propose a robust speech/music classification algorithm to improve the performance of speech/music classification in the selectable mode vocoder (SMV) of 3GPP2 using deep belief networks (DBNs), which is a powerful hierarchical generative model for feature extraction and can determine the underlying discriminative characteristic of the extracted features. The six feature vectors selected from the relevant parameters of the SMV are applied to the visible layer in the proposed DBN-based method. The performance of the proposed algorithm is evaluated using the detection accuracy and error probability of speech and music for various music genres. The proposed algorithm yields better results when compared with the original SMV method and support vector machine (SVM) based method.
Daisuke OCHI Hideaki KIMATA Yoshinori KUSACHI Kosuke TAKAHASHI Akira KOJIMA
Due to the recent progress made in camera and network environments, on-line video services enable people around the world to watch or share high-quality HD videos that can record a wider angle without losing objects' details in each image. As a result, users of these services can watch videos in different ways with different ROIs (Regions of Interest), especially when there are multiple objects in a scene, and thus there are few common ways for them to transfer their impressions for each scene directly. Posting messages is currently the usual way but it does not sufficiently enable all users to transfer their impressions. To transfer a user's impressions directly and provide users with a richer video watching experience, we propose a system that enables them to extract their favorite parts of videos as ROI trajectories through simple and intuitive manipulation of their tablet device. It also enables them to share a recorded trajectory with others after stabilizing it in a manner that should be satisfactory to every user. Using statistical analysis of user manipulations, we have demonstrated an approach to trajectory stabilization that can eliminate undesirable or uncomfortable elements due to tablet-specific manipulations. The system's validity has been confirmed by subjective evaluations.
Dipankar RAYCHAUDHURI Akash BAID
This paper presents the design and proof-of-concept validation of a novel network-assisted spectrum coordination (NASCOR) service for improved radio coexistence in future shared spectrum bands. The basic idea is to create an overlay network service for dissemination of spectrum usage information between otherwise independent radio devices and systems, enabling them to implement decentralized spectrum coexistence policies that reduce interference and improve spectrum packing efficiency. The proposed method is applicable to unlicensed band and shared spectrum systems in general (including femtocells), but is particularly relevant to emerging TV white spaces and cognitive radio systems which are still in need of scalable and accurate solutions for both primary-to-secondary and secondary-to-secondary coordination. Key challenges in enabling a network layer spectrum coordination service are discussed along with the description of our system architecture and a detailed case-study for a specific example of spectrum coordination: client-AP association optimization in dense networks. Performance gains are evaluated through large-scale simulations with multiple overlapping networks, each consisting of 15-35 access points and 50-250 clients in a 0.5×0.5 sq.km. urban setting. Results show an average of 150% improvement in random deployments and upto 7× improvements in clustered deployments for the least-performing client throughputs with modest reductions in the mean client throughputs.
In this paper, we present a new four parameter estimator of sampled sinusoidal signals that does not require iteration. Mathematically, the four parameters (frequency, phase, magnitude, and dc offset) of sinusoidal signals can be obtained when four data points are given. In general, the parameters have to be calculated with iteration since the equations are nonlinear. In this paper, we point out that the four parameters can be obtained analytically if the four data points given are measured using a fixed sampling interval. Analytical expressions for the four parameters are derived using the signal differences. Based on this analysis, we suggest an algorithm of estimating the four parameters from N data samples corrupted by noise without iteration. When comparing with the IEEE-1057 method which is based on the least-square method, the proposed algorithm does not require the initial guess of the parameters for iteration and avoid the convergence problem. Also, the number of required numerical operations for estimation is fixed if N is determined. As a result, the processing time of parameter estimation is much faster than the least-square method which has been confirmed by numerical simulations. Simulation results and the quantitative analysis show that the estimation error of the estimated parameters is less than 1.2 times the square root of the Cramer-Rao bounds when the signal to noise ratio is larger than 20dB.
Outsourcing to a cloud storage brings forth new challenges for the efficient utilization of computing resources as well as simultaneously maintaining privacy and security for the outsourced data. Data deduplication refers to a technique that eliminates redundant data on the storage and the network, and is considered to be one of the most-promising technologies that offers efficient resource utilization in the cloud computing. In terms of data security, however, deduplication obstructs applying encryption on the outsourced data and even causes a side channel through which information can be leaked. Achieving both efficient resource utilization and data security still remains open. This paper addresses this challenging issue and proposes a novel solution that enables data deduplication while also providing the required data security and privacy. We achieve this goal by constructing and utilizing equality predicate encryption schemes which allow to know only equivalence relations between encrypted data. We also utilize a hybrid approach for data deduplication to prevent information leakage due to the side channel. The performance and security analyses indicate that the proposed scheme is efficient to securely manage the outsourced data in the cloud computing.
Chaoqing WANG Tielong SHEN Haibo JI
This paper presents sufficient conditions for the existence of a common quadratic Lyapunov functions for two classes of switched linear systems which possess negative row strictly diagonally dominant and diagonalizable stable state matrices, respectively. Numerical examples will be given to verify the correctness of the proposed theorems.
A data-driven controller has been proposed for nonlinear systems, and its effectiveness has been also shown. However, according to this control scheme, considerable large computation burden is required in on-line learning to update the database. The on-line limit its implementation in industrial processes. In this paper, a controller design scheme is proposed, which enables us to update the database in an off-line manner.
Arthur D.D. LIMA Carlos A. BARROS Luiz Felipe Q. SILVEIRA Samuel XAVIER-DE-SOUZA Carlos A. VALDERRAMA
The evolution of wireless communication systems leads to Dynamic Spectrum Allocation for Cognitive Radio, which requires reliable spectrum sensing techniques. Among the spectrum sensing methods proposed in the literature, those that exploit cyclostationary characteristics of radio signals are particularly suitable for communication environments with low signal-to-noise ratios, or with non-stationary noise. However, such methods have high computational complexity that directly raises the power consumption of devices which often have very stringent low-power requirements. We propose a strategy for cyclostationary spectrum sensing with reduced energy consumption. This strategy is based on the principle that p processors working at slower frequencies consume less power than a single processor for the same execution time. We devise a strict relation between the energy savings and common parallel system metrics. The results of simulations show that our strategy promises very significant savings in actual devices.
Sang-Uk PARK Jung-Hyun PARK Dong-Jo PARK
This letter deals with a new cell clustering problem subject to signal-to-interference-plus-noise-ratio (SINR) constraints in uplink network MIMO systems, where multiple base stations (BSs) cooperate for joint processing as forming a cluster. We first prove that the SINRs of users in a certain cluster always increase monotonically as the cluster size increases when the receiver filter that maximizes the SINR is used. Using this result, we propose an efficient clustering algorithm to minimize the maximum number of cooperative BSs in a cluster. Simulation results show that the maximum number of cooperative BSs minimized by the proposed method is close to that minimized by the exhaustive search and the proposed scheme outperforms the conventional one in terms of the outage probability.
Junya NAKAMURA Tadashi ARARAGI Shigeru MASUYAMA Toshimitsu MASUZAWA
We propose a fast and resource-efficient agreement protocol on a request set, which is used to realize Byzantine fault tolerant server replication. Although most existing randomized protocols for Byzantine agreement exploit a modular approach, that is, a combination of agreement on a bit value and a reduction of request set values to the bit values, our protocol directly solves the multi-valued agreement problem for request sets. We introduce a novel coin tossing scheme to select a candidate of an agreed request set randomly. This coin toss allows our protocol to reduce resource consumption and to attain faster response time than the existing representative protocols.
This letter proposes a noise spectrum estimation algorithm for speech enhancement. The algorithm incorporates the speech presence probability, which is calculated from SNR (signal-to-noise ratio) discrepancy. The discrepancy is measured based on the estimation of the a priori and a posteriori SNR. The proposed algorithm is found to be effective in rapidly switched noise environments. This is confirmed by the experimental results which indicate that the proposed algorithm when integrated in a speech enhancement scheme performs better than conventional noise estimation algorithms.
Ichiro TOYOSHIMA Shota NAKANO Shingo YAMAGUCHI
In this paper, we proposed reduction operators of timed Petri net for efficient model checking. Timed Petri nets are used widely for modeling and analyzing systems which include time concept. Analysis of the system can be done comprehensively with model checking, but there is a state-space explosion problem. Therefore, previous researchers proposed reduction methods and translation methods to timed automata to perform efficient model checking. However, there is no reduction method which consider observability and there is a trade-off between the amount of description and the size of state space. In this paper, first, we have defined a concept of timed behavioral inheritance. Next, we have proposed reduction operators of timed Petri nets based on timed behavioral inheritance. Then, we have applied our proposed operators to an artificial timed Petri net. Moreover, the results show that the reduction operators which consider observability can reduce the size of state space of the original timed Petri nets within the experiment.
Chia-Shao HUNG Shanq-Jang RUAN
Image binarization refers to convert gray-level images into binary ones, and many binarization algorithms have been developed. The related algorithms can be classified as either high quality computation or high speed performance. This letter presents an algorithm that ensures both benefits at the same time. The proposed algorithm intelligently segments input images into several sub-image, after which the sub-image binarization is performed independently. Experimental results reveal that our algorithm provides the appropriate quality with the medium speed.
Shun-ichi AZUMA George J. PAPPAS
This paper addresses the discrete abstraction problem for stochastic nonlinear systems with continuous-valued state. The proposed solution is based on a function, called the bisimulation function, which provides a sufficient condition for the existence of a discrete abstraction for a given continuous system. We first introduce the bisimulation function and show how the function solves the problem. Next, a convex optimization based method for constructing a bisimulation function is presented. Finally, the proposed framework is demonstrated by a numerical simulation.
Jun TAKEUCHI Akihiko HIRATA Hiroyuki TAKAHASHI Naoya KUKUTSU Yoshiaki YAMADA Kei KITAMURA Mitsuhiro TESHIMA
This paper presents 10-Gbit/s bidirectional and 20-Gbit/s unidirectional wireless data transmission systems using 120-GHz-band finline orthomode transducers (OMTs). A new finline OMT was fabricated with two improved designs, to adapt it to the data transmission characteristics of the 120-GHz-band wireless link. One improvement is higher isolation between orthogonal ports and the other is lower group delay variation. The measured isolation is more than 59dB at the carrier frequency of the 120-GHz-band wireless link, and the measured group delay variation is 43ps. Using the finline OMT, we developed 10-Gbit/s bidirectional and 20-Gbit/s unidirectional wireless equipment that can transmit two channels of 10-Gbit/s data using polarization multiplexing. With this wireless equipment, we succeeded in 10-Gbit/s bidirectional and 20-Gbit/s unidirectional wireless data transmission, which leads to successful seamless connection to 10 Gigabit Ethernet and 12-ch high definition television signal transmission.
Jinxiao ZHU Yulong SHEN Xiaohong JIANG Osamu TAKAHASHI Norio SHIRATORI
The fading channel model is seen as an important approach that can efficiently capture the basic time-varying properties of wireless channels, while physical layer security is a promising approach to providing a strong form of security. This paper focuses on the fundamental performance study of applying physical layer security to achieve secure and reliable information transmission over the fading wire-tap channel. For the practical scenario where the main channel is correlated with the eavesdropper channel but only the real time channel state information (CSI) of the main channel is known at the transmitter, we conduct a comprehensive study on the fundamental performance limits of this system by theoretically modeling its secrecy capacity, transmission outage probability and secrecy outage probability. With the help of these theoretical models, we then explore the inherent performance tradeoffs under fading wire-tap channel and also the potential impact of channel correlation on such tradeoffs.