The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

7261-7280hit(18690hit)

  • Characterization of DC Offset on Adaptive MIMO Direct Conversion Transceivers

    Mohammadreza KESHAVARZI  Abbas MOHAMMADI  Abdolali ABDIPOUR  Fadhel M. GHANNOUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:1
      Page(s):
    253-261

    The effect of DC offset on multi-input multi-output (MIMO) direct transceivers with adaptive modulation (AM) is discussed in this paper. A variable-rate variable-power (VRVP) AM system with perfect channel state information (P-CSI) at both the transmitter and receiver in a MIMO scenario is considered. The DC offset is modeled as a zero mean complex Gaussian distributed random variable. By this modeling of the DC offset, the analytical expression for degraded bit error rate (BER) is derived. To derive this analytical expression, we establish a reasonable approximation. The good agreement between the analytical and simulation results shows that the approximation is valid and confirms the accuracy of the analytical expressions. Moreover, an approach to improve the degraded BER in these systems is introduced. For this purpose, we introduce a design for AM MIMO systems that takes account of DC offset and its effectiveness is confirmed. Throughput analysis for the AM MIMO system in the presence of DC offset is presented in this paper too. An analytical expression for throughput is derived and approximated to a simpler equation. At last, throughput results are compared to the simulation outcomes.

  • Chaos-Based Communications Using Open-Plus-Closed-Loop Control

    Takaya MIYANO  Kazuhiro NISHIMURA  Yusuke YOSHIDA  

     
    PAPER-Nonlinear Problems

      Vol:
    E94-A No:1
      Page(s):
    282-289

    We have applied the open-plus-closed-loop control method, recently devised by Grosu et al., to chaos-based communications. In our method, a message is handled as if it were part of a parameter mismatch between the chaotic oscillators installed on a drive and a response system. In the drive system, the message is encrypted by adding it to a state variable of the oscillator as dynamical noise. In the response system, the message is decrypted by subtracting the chaotic signal reproduced by chaotic synchronization using the open-plus-closed-loop control method from the received signal, followed by differentiation with respect to time. When the oscillators have multiple parameter mismatches, multiple messages can be simultaneously encrypted and decrypted to achieve multiplex secure communications.

  • Design Methodology for Yield Enhancement of Switched-Capacitor Analog Integrated Circuits

    Pei-Wen LUO  Jwu-E CHEN  Chin-Long WEY  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:1
      Page(s):
    352-361

    Device mismatch plays an important role in the design of accurate analog circuits. The common centroid structure is commonly employed to reduce device mismatches caused by symmetrical layouts and processing gradients. Among the candidate placements generated by the common centroid approach, however, whichever achieves better matching is generally difficult to be determined without performing the time-consuming yield evaluation process. In addition, this rule-based methodology makes it difficult to achieve acceptable matching between multiple capacitors and to handle an irregular layout area. Based on a spatial correlation model, this study proposed a design methodology for yield enhancement of analog circuits using switched-capacitor techniques. An efficient and effective placement generator is developed to derive a placement for a circuit to achieve the highest or near highest correlation coefficient and thus accomplishing a better yield performance. A simple yield analysis is also developed to evaluate the achieved yield performance of a derived placement. Results show that the proposed methodology derives a placement which achieves better yield performance than those generated by the common centroid approach.

  • VLSI Implementation of a Scalable Pipeline MMSE MIMO Detector for a 44 MIMO-OFDM Receiver

    Shingo YOSHIZAWA  Hirokazu IKEUCHI  Yoshikazu MIYANAGA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:1
      Page(s):
    324-331

    MIMO-OFDM performs signal detection on a subcarrier basis which requires high speed computation in MIMO detection due to its large computational cost. Conventional designs in a MIMO detector increase processing time in proportion to the number of subcarriers and have difficulty in real-time processing for large numbers of subcarriers. A complete pipeline MMSE MIMO detector presented in our previous work can provide high speed computation. However, it tends to be excessive in a circuit scale for small numbers of subcarriers. We propose a new scalable architecture to reduce circuit scale by adjusting the number of iterative operations according to various types of OFDM system. The proposed detector has reduced circuit area to about 1/2 to 1/7 in the previous design with providing acceptable latency time.

  • Memory Allocation for Window-Based Image Processing on Multiple Memory Modules with Simple Addressing Functions

    Hasitha Muthumala WAIDYASOORIYA  Masanori HARIYAMA  Michitaka KAMEYAMA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:1
      Page(s):
    342-351

    Accelerator cores in low-power embedded processors have on-chip multiple memory modules to increase the data access speed and to enable parallel data access. When large functional units such as multipliers and dividers are used for addressing, a large power and chip area are consumed. Therefore, recent low-power processors use small functional units such as adders and counters to reduce the power and area. Such small functional units make it difficult to implement complex addressing patterns without duplicating data among multiple memory modules. The data duplication wastes the memory capacity and increases the data transfer time significantly. This paper proposes a method to reduce the memory duplication for window-based image processing, which is widely used in many applications. Evaluations using an accelerator core show that the proposed method reduces the data amount and data transfer time by more than 50%.

  • BICM-ID with 3-Dimensional BPSK and Signal Space Diversity over Rayleigh Channel

    Qiuliang XIE  Kewu PENG  Fang YANG  Zhaocheng WANG  Zhixing YANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:1
      Page(s):
    282-284

    A BICM-ID system with 3-dimensional rotated BPSK constellation and signal space diversity (SSD) is proposed to combat the effect of Rayleigh fading. A new criterion based on mutual information is proposed to find the optimal rotation matrix, and the labeling that fits well with the outer code is presented. Simulation results show that at BER of 10-5 over a Rayleigh fading channel, with the code length of 192,000 bits and the iteration number of 100, the performance of the proposed system is only about 0.8 dB from the Gaussian-input Shannon limit and exceeds the limit constrained by the traditional QPSK input without rotation or SSD, at the spectrum efficiency of 1 bit/s/Hz.

  • Block Tomlinson-Harashima Precoding with Vector Perturbation for Multiuser MIMO Downlink

    Joondoo KIM  Jiwon KANG  Chungyong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:1
      Page(s):
    355-358

    We propose a multiuser MIMO precoding algorithm that combines the block Tomlinson-Harashima precoding and the vector perturbation (BTHP-VP). BTHP-VP supports multi-stream transmission without additional estimation of each user's effective channel and achieves full spatial diversity. Computer simulations show that BTHP-VP can achieve similar sum rate and improved BER performance compared to the BTHP with maximum likelihood receiver.

  • Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification

    Kenta TAKAHASHI  Shinji HIRATA  

     
    PAPER-Biometrics

      Vol:
    E94-A No:1
      Page(s):
    233-244

    Biometric authentication has attracted attention because of its high security and convenience. However, biometric feature such as fingerprint can not be revoked like passwords. Thus once the biometric data of a user stored in the system has been compromised, it can not be used for authentication securely for his/her whole life long. To address this issue, an authentication scheme called cancelable biometrics has been studied. However, there remains a major challenge to achieve both strong security and practical accuracy. In this paper, we propose a novel and fundamental algorithm for cancelable biometrics called correlation-invariant random filtering (CIRF) with provable security. Then we construct a method for generating cancelable fingerprint templates based on the chip matching algorithm and the CIRF. Experimental evaluation shows that our method has almost the same accuracy as the conventional fingerprint verification based on the chip matching algorithm.

  • Spatially Adaptive Noise Removal Algorithm Using Local Statistics

    Tuan-Anh NGUYEN  Won-Seon SONG  Min-Cheol HONG  

     
    LETTER-Image

      Vol:
    E94-A No:1
      Page(s):
    452-456

    In this letter, we propose a spatially adaptive noise removal algorithm using local statistics. The proposed algorithm consists of two stages: noise detection and removal. In order to solve the trade-off between the effective noise suppression and the over-smoothness of the reconstructed image, local statistics such as local maximum and the local weighted activity is defined. With the local statistics, the noise detection function is defined and a modified Gaussian filter is used to suppress the detected noise components. The experimental results demonstrate the effectiveness of the proposed algorithm.

  • Universal Construction of a 12th Degree Extension Field for Asymmetric Pairing

    Masaaki SHIRASE  

     
    PAPER-Mathematics

      Vol:
    E94-A No:1
      Page(s):
    156-164

    It is necessary to perform arithmetic in Fp12 to use an Ate pairing on a Barreto-Naehrig (BN) curve, where p is a prime given by p(z)=36z4+36z3+24z2+6z+1 for some integer z. In many implementations of Ate pairings, Fp12 has been regarded as a 6th degree extension of Fp2, and it has been constructed by Fp12=Fp2[v]/(v6-ξ) for an element ξ ∈ Fp2 such that v6-ξ is irreducible in Fp2[v]. Such a ξ depends on the value of p, and we may use a mathematical software package to find ξ. In this paper it is shown that when z ≡ 7,11 (mod 12), we can universally construct Fp12 as Fp12=Fp2[v]/(v6-u-1), where Fp2=Fp[u]/(u2+1).

  • How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation

    Daisuke SUZUKI  Tsutomu MATSUMOTO  

     
    PAPER-Implementation

      Vol:
    E94-A No:1
      Page(s):
    211-222

    This paper describes a modular exponentiation processing method and circuit architecture that can exhibit the maximum performance of FPGA resources. The modular exponentiation architecture proposed by us comprises three main techniques. The first one is to improve the Montgomery multiplication algorithm in order to maximize the performance of the multiplication unit in an FPGA. The second one is to balance and improve the circuit delay. The third one is to ensure scalability of the circuit. Our architecture can perform fast operations using small-scale resources; in particular, it can complete a 512-bit modular exponentiation as fast as in 0.26 ms with the smallest Virtex-4 FPGA, XC4VF12-10SF363. In fact the number of SLICEs used is approx. 4200, which proves the compactness of our design. Moreover, the scalability of our design also allows 1024-, 1536-, and 2048-bit modular exponentiations to be processed in the same circuit.

  • Efficient Context-Sensitive Intrusion Detection Based on State Transition Table

    Jingyu HUA  Mingchu LI  Yizhi REN  Kouichi SAKURAI  

     
    PAPER-Network Security

      Vol:
    E94-A No:1
      Page(s):
    255-264

    Those host-based intrusion detection models like VPStatic first construct a model of acceptable behaviors for each monitored program via static analysis, and then perform intrusion detection by comparing them with programs' runtime behaviors. These models usually share the highly desirable feature that they do not produce false alarms but face the conflicts between accuracy and efficiency. For instance, the high accuracy of the VPStatic model is at the cost of high space complexity. In this paper, we use a statically-constructed state transition table (STT), which records expected transitions among system calls as well as their stack states (return address lists), as a behavior model to perform context-sensitive intrusion detection. According to our analysis, our STT model improves the space efficiency of the VPStatic model without decreasing its high precision and time efficiency. Experiments show that for three test programs, memory uses of our STT models are all much less than half of the VPStatic models'. Thereby, we alleviate the conflicts between the accuracy and the efficiency.

  • Improving Power Spectra Estimation in 2-Dimensional Areas Using Number of Active Sound Sources

    Yusuke HIOKA  Ken'ichi FURUYA  Yoichi HANEDA  Akitoshi KATAOKA  

     
    PAPER-Engineering Acoustics

      Vol:
    E94-A No:1
      Page(s):
    273-281

    An improvement of estimating sound power spectra located in a particular 2-dimensional area is proposed. We previously proposed a conventional method that estimates sound power spectra using multiple fixed beamformings in order to emphasize speech located in a particular 2-dimensional area. However, the method has one drawback that the number of areas where the active sound sources are located must be restricted. This restriction makes the method less effective when many noise source located in different areas are simultaneously active. In this paper, we reveal the cause of this restriction and determine the maximum number of areas for which the method is able to simultaneously estimate sound power spectra. Then we also introduce a procedure for investigating areas that include active sound sources to reduce the number of unknown power spectra to be estimated. The effectiveness of the proposed method is examined by experimental evaluation applied to sounds recorded in a practical environment.

  • Autonomous Coordination Technology through Community Organization for Resource Utilization

    Titichaya THANAMITSOMBOON  Kotaro HAMA  Riyako SAKAMOTO  Xiaodong LU  Kinji MORI  

     
    PAPER-Community

      Vol:
    E94-D No:1
      Page(s):
    11-18

    The challenge in resource utilization under dynamic environment is how to utilize appropriate resources to the right users at the right time and the right location. In conventional system, centralized management system is applied but it tends to congest when user requests increase or resources rapidly move. Therefore, this paper proposes Autonomous Coordination Technology (ACT) through community organization for resource utilization. In ACT, a node which has surplus resources autonomously constructs community with a surplus-level based size and distributes resources to members which are deficient in resources. ACT consists of autonomous coordination within community and among communities. According to community organization, online property and flexibility can be satisfied. However, it is difficult to achieve service provision timeliness and resource allocation operatability in the mean time. Thus, ACT includes successive transportation method, and autonomous resource allocation which dynamic decision is made by a tradeoff between timeliness and operatability. As a result, the service assurance in terms of timeliness and operatability can be assured. The effectiveness of proposed technology is affirmed through the simulation of taxi dispatching application in terms of response time and standard deviation versus user rates.

  • Scattering of Light by a Single Imperfection Core in a Waveguide System

    Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E94-C No:1
      Page(s):
    59-62

    An asymptotic expansion of the amplitude of the scattered wave by an imperfection core in a waveguide system is derived and it is shown that the scattered wave is partially canceled by the direct wave at large distance and a shadow takes place. For z→ ∞ where z is the distance along the waveguide axis the amplitudes of the direct and scattered waves decrease in proportion to z- and in the shadow region the amplitude of the sum of both waves decreases in proportion to z-. To supplement the analytical results some numerical examples are shown.

  • Propagation Analysis of Electromagnetic Waves in 700 MHz Band at Intersection for Inter-Vehicle Communications Using the FDTD Method

    Kenji TAGUCHI  Tatsuya KASHIWA  Kohzoh OHSHIMA  Takeshi KAWAMURA  

     
    PAPER-Radiation and Propagation

      Vol:
    E94-C No:1
      Page(s):
    18-23

    Inter-vehicle communication (IVC) system using 700 MHz band to prevent car crashes has been proposed recently. In this paper, we first apply the FDTD method to the analyses of propagation characteristics at an intersection for IVC. We investigate the propagation characteristics considering the electrical conductivities, thickness and windows of building wall and pedestrians. As a result, it is shown that the electrical conductivities and thickness of building wall have a slight influence. In contrast, windows and pedestrians have a great influence on the propagation characteristics. Furthermore, the azimuth delay profiles are obtained by using the MUSIC algorithm.

  • HDAR: Highly Distributed Adaptive Service Replication for MANETs

    Asaad AHMED  Keiichi YASUMOTO  Minoru ITO  Naoki SHIBATA  Tomoya KITANI  

     
    PAPER-Information Network

      Vol:
    E94-D No:1
      Page(s):
    91-103

    Mobile Ad Hoc Networks (MANETs) offer quick and easy network deployment in situations where it is not possible otherwise and they can be used to provide mobile users with a temporary infrastructure to use services in the absence of fixed infrastructure. Nodes in MANETs are free to move and organize themselves in an arbitrary fashion. The challenging task in such dynamic environments is how to improve the service availability. Replicating a service at some nodes distributed across the network is an effective strategy. However, service replication can considerably impact the system energy consumption. Since mobile devices have limited battery resources, a dynamic and efficient service replication is necessary to support such environments. In this paper, we propose a distributed service replication scheme for achieving high service availability with reasonable energy consumption for MANETs. The proposed method called HDAR (Highly Distributed Adaptive Service Replication) divides the whole network into disjoint zones of at most 2-hops in diameter and builds a dynamic replication mechanism which selects new replica zones depending on their service demand and the tradeoff between the communication and replication energy consumption costs. Through simulations, we confirmed that our approach can achieve higher service availability with reasonable energy consumption than existing methods.

  • Fast Verification of Hash Chains with Reduced Storage

    Dae Hyun YUM  Jin Seok KIM  Pil Joong LEE  Sung Je HONG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:1
      Page(s):
    383-391

    A hash chain H for a hash function hash(·) is a sequence of hash values ⟨ xn, xn-1,..., x0 ⟩, where x0 is a secret value, xi is generated by xi = hash(xi-1) for 1 ≤ i ≤ n, and xn is a public value. Hash values of H are disclosed gradually from xn-1 to x0. The correctness of a disclosed hash value xi can be verified by checking the equation xn =? hashn-i(xi). To speed up the verification, Fischlin introduced a check-bit scheme at CT-RSA 2004. The basic idea of the check-bit scheme is to output some extra information cb, called a check-bit vector, in addition to the public value xn, which allows each verifier to perform only a fraction of the original work according to his or her own security level. We revisit the Fischlin's check-bit scheme and show that the length of the check-bit vector cb can be reduced nearly by half. The reduced length of cb is close to the theoretic lower bound.

  • MCFO Compensation and Performance Analysis for Localized DFT-S-OFDM Uplink Cooperative System

    Zhiyan ZHANG  Jianhua ZHANG  Wei XU  Yanyan ZHANG  Yi LIU  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E94-B No:1
      Page(s):
    285-289

    In the localized Discrete Fourier Transform-Spread-Orthogonal Frequency Division Multiplexing (DFT-S-OFDM) uplink cooperative system, multiple carrier frequency offsets (MCFO), arising from the nodes' separate oscillators and Doppler spreads, drastically degrade the performance of the receiver. To solve the problem, this letter proposes an efficient MCFO compensation method which fully exploits the diversity gain of space frequency block coded (SFBC) and the characteristic of inter-carrier interference (ICI). Moreover, the bit error ratio (BER) lower bound of the proposed algorithm is theoretically derived. Simulation results validate the theoretical analysis and demonstrate that the proposed MCFO compensation method can achieve robust BER performance in a wide range of MCFO in the multipath Rayleigh fading channel.

  • Robust Subthreshold CMOS Digital Circuit Design with On-Chip Adaptive Supply Voltage Scaling Technique

    Yuji OSAKI  Tetsuya HIROSE  Kei MATSUMOTO  Nobutaka KUROKI  Masahiro NUMA  

     
    PAPER-Electronic Circuits

      Vol:
    E94-C No:1
      Page(s):
    80-88

    A delay-compensation circuit for low-power subthreshold digital circuits is proposed. Delay in digital circuits operating in the subthreshold region of MOSFETs changes exponentially with process and temperature variations. Threshold-voltage monitoring and supply-voltage scaling techniques are adopted to mitigate such variations. The variation in the delay can be significantly reduced by monitoring the threshold voltage of a MOSFET in each LSI chip and exploiting the voltage as the supply voltage for subthreshold digital circuits. The supply voltage generated by the threshold voltage monitoring circuit can be regarded as the minimum supply voltage to meet the delay constraint. Monte Carlo SPICE simulations demonstrated that a delay-time variation can be improved from having a log-normal to having a normal distribution. A prototype in a 0.35-µm standard CMOS process showed that the exponential delay variation with temperature of the ring-oscillator frequency in the range from 0.321 to 212 kHz can remain by using compensation in the range from 5.26 to 19.2 kHz.

7261-7280hit(18690hit)