The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

7281-7300hit(18690hit)

  • Block Tomlinson-Harashima Precoding with Vector Perturbation for Multiuser MIMO Downlink

    Joondoo KIM  Jiwon KANG  Chungyong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:1
      Page(s):
    355-358

    We propose a multiuser MIMO precoding algorithm that combines the block Tomlinson-Harashima precoding and the vector perturbation (BTHP-VP). BTHP-VP supports multi-stream transmission without additional estimation of each user's effective channel and achieves full spatial diversity. Computer simulations show that BTHP-VP can achieve similar sum rate and improved BER performance compared to the BTHP with maximum likelihood receiver.

  • Design Methodology for Yield Enhancement of Switched-Capacitor Analog Integrated Circuits

    Pei-Wen LUO  Jwu-E CHEN  Chin-Long WEY  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:1
      Page(s):
    352-361

    Device mismatch plays an important role in the design of accurate analog circuits. The common centroid structure is commonly employed to reduce device mismatches caused by symmetrical layouts and processing gradients. Among the candidate placements generated by the common centroid approach, however, whichever achieves better matching is generally difficult to be determined without performing the time-consuming yield evaluation process. In addition, this rule-based methodology makes it difficult to achieve acceptable matching between multiple capacitors and to handle an irregular layout area. Based on a spatial correlation model, this study proposed a design methodology for yield enhancement of analog circuits using switched-capacitor techniques. An efficient and effective placement generator is developed to derive a placement for a circuit to achieve the highest or near highest correlation coefficient and thus accomplishing a better yield performance. A simple yield analysis is also developed to evaluate the achieved yield performance of a derived placement. Results show that the proposed methodology derives a placement which achieves better yield performance than those generated by the common centroid approach.

  • Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification

    Kenta TAKAHASHI  Shinji HIRATA  

     
    PAPER-Biometrics

      Vol:
    E94-A No:1
      Page(s):
    233-244

    Biometric authentication has attracted attention because of its high security and convenience. However, biometric feature such as fingerprint can not be revoked like passwords. Thus once the biometric data of a user stored in the system has been compromised, it can not be used for authentication securely for his/her whole life long. To address this issue, an authentication scheme called cancelable biometrics has been studied. However, there remains a major challenge to achieve both strong security and practical accuracy. In this paper, we propose a novel and fundamental algorithm for cancelable biometrics called correlation-invariant random filtering (CIRF) with provable security. Then we construct a method for generating cancelable fingerprint templates based on the chip matching algorithm and the CIRF. Experimental evaluation shows that our method has almost the same accuracy as the conventional fingerprint verification based on the chip matching algorithm.

  • Characterization of DC Offset on Adaptive MIMO Direct Conversion Transceivers

    Mohammadreza KESHAVARZI  Abbas MOHAMMADI  Abdolali ABDIPOUR  Fadhel M. GHANNOUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:1
      Page(s):
    253-261

    The effect of DC offset on multi-input multi-output (MIMO) direct transceivers with adaptive modulation (AM) is discussed in this paper. A variable-rate variable-power (VRVP) AM system with perfect channel state information (P-CSI) at both the transmitter and receiver in a MIMO scenario is considered. The DC offset is modeled as a zero mean complex Gaussian distributed random variable. By this modeling of the DC offset, the analytical expression for degraded bit error rate (BER) is derived. To derive this analytical expression, we establish a reasonable approximation. The good agreement between the analytical and simulation results shows that the approximation is valid and confirms the accuracy of the analytical expressions. Moreover, an approach to improve the degraded BER in these systems is introduced. For this purpose, we introduce a design for AM MIMO systems that takes account of DC offset and its effectiveness is confirmed. Throughput analysis for the AM MIMO system in the presence of DC offset is presented in this paper too. An analytical expression for throughput is derived and approximated to a simpler equation. At last, throughput results are compared to the simulation outcomes.

  • Distributed Location Service with Spatial Awareness for Mobile Ad Hoc Networks

    Shyr-Kuen CHEN  Tay-Yu CHEN  Pi-Chung WANG  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3400-3408

    A mobile ad-hoc network (MANET) consists of a collection of wireless mobile nodes without any fixed network infrastructure. Since the mobile nodes form a constantly changing topology, the design of efficient and scalable routing protocols is a fundamental challenge in MANETs. In the current literature, position-based routing protocols are regarded as having better scalability and lower control overhead than topology-based routing protocols. Since location services are the most critical part of position-based routing protocols, we present a multi-home-region scheme, Distributed Virtual Home Region with Spatial Awareness (DVHR-SA), to improve the performance of location service in this paper. Our scheme adaptively selects different update and query procedures according to the location of a source node. The simulation results show that DVHR-SA shortens the lengths of the update, query and reply paths. Our scheme also reduces the overall network message overhead. Therefore, DVHR-SA is considerably fast and stable.

  • Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing

    Eun-Jun YOON  Muhammad Khurram KHAN  Kee-Young YOO  

     
    LETTER-Information Network

      Vol:
    E93-D No:12
      Page(s):
    3400-3402

    Quite recently [IEEE Commu. Letters, Vol.14, No.1, 2010], Choi et al. proposed a handover authentication scheme using credentials based on chameleon hashing, claiming to provide several security features including Perfect Forward/Backward Secrecy (PFS/PBS). This paper examines the security of the scheme and shows that the scheme still fails to achieve PFS/PBS unlike their claims.

  • Task Allocation with Algorithm Transformation for Reducing Data-Transfer Bottlenecks in Heterogeneous Multi-Core Processors: A Case Study of HOG Descriptor Computation

    Hasitha Muthumala WAIDYASOORIYA  Daisuke OKUMURA  Masanori HARIYAMA  Michitaka KAMEYAMA  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E93-A No:12
      Page(s):
    2570-2580

    Heterogeneous multi-core processors are attracted by the media processing applications due to their capability of drawing strengths of different cores to improve the overall performance. However, the data transfer bottlenecks and limitations in the task allocation due to the accelerator-incompatible operations prevents us from gaining full potential of the heterogeneous multi-core processors. This paper presents a task allocation method based on algorithm transformation to increase the freedom of task allocation. We use approximation methods such as CORDIC algorithms to map the accelerator-incompatible operations to accelerator cores. According to the experimental results using HOG descriptor computation, the proposed task allocation method reduces the data transfer time by more than 82% and the total processing time by more than 79% compared to the conventional task allocation method.

  • Statistical Timing Analysis Considering Clock Jitter and Skew due to Power Supply Noise and Process Variation

    Takashi ENAMI  Shinyu NINOMIYA  Ken-ichi SHINKAI  Shinya ABE  Masanori HASHIMOTO  

     
    PAPER-Device and Circuit Modeling and Analysis

      Vol:
    E93-A No:12
      Page(s):
    2399-2408

    Clock driver suffers from delay variation due to manufacturing and environmental variabilities as well as combinational cells. The delay variation causes clock skew and jitter, and varies both setup and hold timing margins. This paper presents a timing verification method that takes into consideration delay variation inside a clock network due to both manufacturing variability and dynamic power supply noise. We also discuss that setup and hold slack computation inherently involves a structural correlation problem due to common paths, and demonstrate that assigning individual random variables to upstream clock drivers provides a notable accuracy improvement in clock skew estimation with limited increase in computational cost. We applied the proposed method to industrial designs in 90 nm process. Experimental results show that dynamic delay variation reduces setup slack by over 500 ps and hold slack by 16.4 ps in test cases.

  • A Usability Evaluation on the XVC Framework for In-Vehicle User Interfaces

    Soonghwan RO  Hanh Van NGUYEN  Woochul JUNG  Young Woo PAE  Jonathan P. MUNSON  Jinmyung WOO  Sibok YU  Kisung LEE  

     
    PAPER-Information Network

      Vol:
    E93-D No:12
      Page(s):
    3321-3330

    XVC (eXtensible Viewer Composition) is an in-vehicle user interface framework for telematics applications. It provides a document-oriented application model, which enables drivers to simultaneously make use of multiple information services, while maintaining satisfactory control of their vehicles. XVC is a new client model that makes use of the beneficial functions of in-vehicle navigation devices. This paper presents the results from usability tests performed on the XVC framework in order to evaluate how the XVC client affects drivers' navigation while using its functions. The evaluations are performed using the Advanced Automotive Simulator System located at KATECH (Korea Automobile Technology Institute). The advantages of the XVC framework are evaluated and compared to a non-XVC framework. The test results show that the XVC framework navigation device significantly reduces the scanning time needed while a driver obtains information from the navigation device.

  • Space Frequency Code for Cooperative Communications with both Timing Errors and Carrier Frequency Offsets

    Weile ZHANG  Huiming WANG  Qinye YIN  Wenjie WANG  

     
    LETTER

      Vol:
    E93-B No:12
      Page(s):
    3505-3508

    In this letter, we propose a simple distributed space-frequency code with both timing errors and multiple carrier frequency offsets (CFO) in asynchronous cooperative communications. By employing both the Alamouti coding approach and the transmit repetition diversity technique, full diversity gain can be achieved by the fast symbol-wise maximum likelihood (ML) decoding at the destination node. Analysis and simulations demonstrate the effectiveness of the proposed method.

  • Variation-Aware Task and Communication Scheduling in MPSoCs for Power-Yield Maximization

    Mahmoud MOMTAZPOUR  Maziar GOUDARZI  Esmaeil SANAEI  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E93-A No:12
      Page(s):
    2542-2550

    Parameter variations reveal themselves as different frequency and leakage powers per instances of the same MPSoC. By the increasing variation with technology scaling, worst-case-based scheduling algorithms result in either increasingly less optimal schedules or otherwise more lost yield. To address this problem, this paper introduces a variation-aware task and communication scheduling algorithm for multiprocessor system-on-chip (MPSoC). We consider both delay and leakage power variations during the process of finding the best schedule so that leakier processors are less utilized and can be more frequently put in sleep mode to reduce power. Our algorithm takes advantage of event tables to accelerate the statistical timing and power analysis. We use genetic algorithm to find the best schedule that maximizes power-yield under a performance-yield constraint. Experimental results on real world benchmarks show that our proposed algorithm achieves 16.6% power-yield improvement on average over deterministic worst-case-based scheduling.

  • A Method of Cognizing Primary and Secondary Radio Signals

    Satoshi TAKAHASHI  

     
    PAPER

      Vol:
    E93-A No:12
      Page(s):
    2682-2690

    A cognitive radio will have to sense and discover the spectral environments where it would not cause primary radios to interfere. Because the primary radios have the right to use the frequency, the cognitive radios as the secondary radios must detect radio signals before use. However, the secondary radios also need identifying the primary and other secondary radios where the primary radios are vulnerable to interference. In this paper, a method of simultaneously identifying signals of primary and secondary radios is proposed. The proposed bandwidth differentiation assumes the primary and secondary radios use orthogonal frequency division multiplexing (OFDM), and the secondary radios use at the lower number of subcarriers than the primary radios. The false alarm and detection probabilities are analytically evaluated using the characteristic function method. Numerical evaluations are also conducted on the assumption the primary radio is digital terrestrial television broadcasting. Result showed the proposed method could achieve the false alarm probability of 0.1 and the detection probability of 0.9 where the primary and secondary radio powers were 2.5 dB and 3.6 dB higher than the noise power. In the evaluation, the reception signals were averaged over the successive 32 snapshots, and the both the primary and secondary radios used QPSK. The power ratios were 4.7 dB and 8.4 dB where both the primary and secondary radios used 64QAM.

  • Chordal Graph Based Channel Assignment for Multicast and Unicast Traffic in Wireless Mesh Networks

    Junfeng JIN  Yusheng JI  Baohua ZHAO  Hao ZHOU  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3409-3416

    With the increasing popularity of multicast and real-time streaming service applications, efficient channel assignment algorithms that handle both multicast and unicast traffic in wireless mesh networks are needed. One of the most effective approaches to enhance the capacity of wireless networks is to use systems with multiple channels and multiple radio interfaces. However, most of the past works focus on vertex coloring of a general contention graph, which is NP-Complete, and use the greedy algorithm to achieve a suboptimal result. In this paper, we combine unicast and multicast with a transmission set, and propose a framework named Chordal Graph Based Channel Assignment (CGCA) that performs channel assignment for multicast and unicast traffic in multi-channel multi-radio wireless mesh networks. The proposed framework based on chordal graph coloring minimizes the interference of the network and prevents unicast traffic from starvation. Simulation results show that our framework provides high throughput and low end-to-end delay for both multicast and unicast traffic. Furthermore, our framework significantly outperforms other well-known schemes that have a similar objective in various scenarios.

  • Combined Nyquist and Compressed Sampling Method for Radio Wave Data Compression of a Heterogeneous Network System Open Access

    Doohwan LEE  Takayuki YAMADA  Hiroyuki SHIBA  Yo YAMAGUCHI  Kazuhiro UEHARA  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3238-3247

    To satisfy the requirement of a unified platform which can flexibly deal with various wireless radio systems, we proposed and implemented a heterogeneous network system composed of distributed flexible access points and a protocol-free signal processing unit. Distributed flexible access points are remote RF devices which perform the reception of multiple types of radio wave data and transfer the received data to the protocol-free signal processing unit through wired access network. The protocol-free signal processing unit performs multiple types of signal analysis by software. To realize a highly flexible and efficient radio wave data reception and transfer, we employ the recently developed compressed sensing technology. Moreover, we propose a combined Nyquist and compressed sampling method for the decoding signals to be sampled at the Nyquist rate and for the sensing signals to be sampled at the compressed rate. For this purpose, the decoding signals and the sensing signals are converted into the intermediate band frequency (IF) and mixed. In the IF band, the decoding signals are set at lower center frequencies than those of the sensing signals. The down converted signals are sampled at the rate of four times of the whole bandwidth of the decoding signals plus two times of the whole bandwidth of the sensing signals. The purpose of above setting is to simultaneously conduct Nyquist rate and compressed rate sampling in a single ADC. Then, all of odd (or even) samples are preserved and some of even (or odd) samples are randomly discarded. This method reduces the data transfer burden in dealing with the sensing signals while guaranteeing the realization of Nyquist-rate decoding performance. Simulation and experiment results validate the efficiency of the proposed method.

  • Virtual Multi-AP Access for Transport-Level Quality Improvement in Wireless Local Area Networks with Hidden Stations

    Koichi NISHIDE  Hiroyuki KUBO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E93-D No:12
      Page(s):
    3251-3259

    The demand of using applications that assume bidirectional communication such as voice telephony and peer-to-peer using wireless stations has been increasing and especially, the rapid increase of uplink traffic from wireless terminals is expected. However, in uplink WLANs, the hidden-station problem remains to be solved. In this paper, we point out this hidden-station problem and clarify the following unfairness between UDP and TCP uplink flows: 1) the effect of collision caused by hidden-station relationship on throughput and 2) the instability of the throughput depending on the number of hidden stations. To solve these problems, we propose a virtual multi-AP access mechanism. Our mechanism first groups stations according to the hidden-station relationship and type of transport protocol they use then assigns a virtually isolated channel to each group, which enables STAs to communicate as if STAs in different groups are connected to different isolated APs (virtual APs: VAPs). It can mitigate the effect caused by collisions between hidden stations and eliminate the contention between UDP and TCP uplink flows. Its performance is shown through simulation.

  • EXIT Analysis for MAP-Based Joint Iterative Decoding of Separately Encoded Correlated Sources

    Kentaro KOBAYASHI  Takaya YAMAZATO  Masaaki KATAYAMA  

     
    LETTER

      Vol:
    E93-B No:12
      Page(s):
    3509-3513

    We develop a mathematical framework for the extrinsic information transfer (EXIT) analysis to assess the convergence behavior of maximum a posteriori (MAP)-based joint iterative decoding of correlated sources, which are separately encoded and transmitted over noisy channels. Unlike the previous work, our approach focuses on the case side information about the correlation is not perfectly given at the joint decoder but is extracted from decoder output and updated in an iterative manner. The presented framework provides a convenient way to compare between schemes. We show that it allows us to easily and accurately predict joint decoding gain and turbo cliff position.

  • Enhancement of CSMA/CA and Network Coding in Single-Relay Multi-User Wireless Networks

    Chun-Hsiang HUANG  Daisuke UMEHARA  Satoshi DENNO  Masahiro MORIKURA  Takatoshi SUGIYAMA  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3371-3380

    Network coding is a promising technique for improving system performance in wireless multihop networks. In this paper, the throughput and fairness in single-relay multi-user wireless networks are evaluated. The carrier sense multiple access with collision avoidance (CSMA/CA) protocol and network coding are used in the medium access control (MAC) sublayer in such networks. The fairness of wireless medium access among stations (STAs), the access point (AP), and the relay station (RS) results in asymmetric bidirectional flows via the RS; as a result the wireless throughput decreases substantially. To overcome this problem, an autonomous optimization of minimum contention window size is developed for CSMA/CA and network coding to assign appropriate transmission opportunities to both the AP and RS. By optimizing the minimum contention window size according to the number of STAs, the wireless throughput in single-relay multi-user networks can be improved and the fairness between bidirectional flows via the RS can be achieved. Numerical analysis and computer simulations enable us to evaluate the performances of CSMA/CA and network coding in single-relay multi-user wireless networks.

  • Doppler Spread Mitigation Using Harmonic Transform for Wireless OFDM Systems in Mobile Communications

    Saiyan SAIYOD  Sakchai THIPCHAKSURAT  Ruttikorn VARAKULSIRIPUNTH  

     
    PAPER

      Vol:
    E93-A No:12
      Page(s):
    2634-2645

    In wireless OFDM systems, the system performance is suffered from frequency offset and symbol timing offset due to the Doppler effect. Using the discrete Fourier transform (DFT) and inverse discrete Fourier transform (IDFT) for traditional signal transformation from the time-domain into frequency-domain, and vice versa, the system performance may be severely degraded. To make the OFDM system that can tolerate the above problems, we have considered that the harmonic transform can be applicable to the traditional signal transformation, thereby improving the system performance. In this paper, we combine the good characteristics of harmonic transform and instantaneous frequency to be a novel transformation for wireless OFDM systems. We propose a modified discrete harmonic transform (MDHT) which can be performed adaptively. Our proposed scheme called the modified discrete harmonic transform OFDM (MDHT-OFDM scheme). We derive the equations of the novel discrete harmonic transform which are suitable for wireless OFDM systems and the novel channel estimation cooperated with the novel transformation. The proposed channel estimation is performed in both time-domain and frequency-domain. The performance of a MDHT-OFDM scheme is evaluated by means of a simulation. We compare the performance of a MDHT-OFDM scheme with one of the conventional DFT-OFDM scheme in the term of symbol error rate (SER). MDHT-OFDM scheme can achieve better performance than that of the conventional DFT-OFDM scheme in mitigating the Doppler spread.

  • Measurements and Modeling of Ultra-Wideband Propagation Losses around the Human Body Dependent on Room Volume

    Hironobu YAMAMOTO  Masato KOIWAI  Takehiko KOBAYASHI  

     
    PAPER

      Vol:
    E93-A No:12
      Page(s):
    2624-2633

    This paper describes ultra wideband (UWB) radio propagation measurements and modeling for wireless body area network (WBAN) applications in different environments. Several propagation measurement campaigns and associated modelings were carried out in either a radio anechoic chamber or a specific room type; however, dependence of the radio propagation on surrounding environments was not studied. Multipaths (mainly reflected from floor, ceiling, and walls) highly depend on the environment. To address this problem, radio propagation around the human body was measured in a radio anechoic chamber and four different-sized rooms. Parameters in a conventional loss model derived from the measurements were found to significantly diverge and depend on room volume and line-of-sight (LOS)/non-LOS (NLOS) cases. A modified model considering the impact of room volume has been proposed for the LOS/NLOS cases. Different propagation mechanisms were discussed along with parameter derivation. Probability distributions for the UWB propagation losses were also examined.

  • Rule-Based Ad-Hoc Workflow Modeling for Service Coordination: A Case Study of a Telecom Operational Support System

    Jae-Yoon JUNG  Joonsoo BAE  

     
    LETTER

      Vol:
    E93-A No:12
      Page(s):
    2740-2743

    Workflow technology has spread over the wide areas which require process control (e.g. logistics and e-business) or resource coordination (e.g. cooperative work and grid computing). Among various types of workflow, we introduce a case of ad-hoc workflow process in a Korean telecom company. Since such a service process is generally accompanied with customer's participation, the procedure and state are flexibly changed and sometimes capricious to cope with customer's request and operator's unexpected situation. In case of network service provisioning or problem shooting processes, customers often request the changes of their service types or visit appointments, which result in flexible and adaptive management of the process instances. In this paper, we present a novel approach to workflow modeling based on modified ECA rules (named P-ECA) for the purpose of ad-hoc workflow process modeling. The rule-based workflow modeling is comprehensible to engineers and can be implemented in programs at ease; therefore it is expected that it can be widely adopted for the ad-hoc and adaptive workflow modeling which requires dynamic changes of its states by internal or external events.

7281-7300hit(18690hit)