Joondoo KIM Jiwon KANG Chungyong LEE
We propose a multiuser MIMO precoding algorithm that combines the block Tomlinson-Harashima precoding and the vector perturbation (BTHP-VP). BTHP-VP supports multi-stream transmission without additional estimation of each user's effective channel and achieves full spatial diversity. Computer simulations show that BTHP-VP can achieve similar sum rate and improved BER performance compared to the BTHP with maximum likelihood receiver.
Pei-Wen LUO Jwu-E CHEN Chin-Long WEY
Device mismatch plays an important role in the design of accurate analog circuits. The common centroid structure is commonly employed to reduce device mismatches caused by symmetrical layouts and processing gradients. Among the candidate placements generated by the common centroid approach, however, whichever achieves better matching is generally difficult to be determined without performing the time-consuming yield evaluation process. In addition, this rule-based methodology makes it difficult to achieve acceptable matching between multiple capacitors and to handle an irregular layout area. Based on a spatial correlation model, this study proposed a design methodology for yield enhancement of analog circuits using switched-capacitor techniques. An efficient and effective placement generator is developed to derive a placement for a circuit to achieve the highest or near highest correlation coefficient and thus accomplishing a better yield performance. A simple yield analysis is also developed to evaluate the achieved yield performance of a derived placement. Results show that the proposed methodology derives a placement which achieves better yield performance than those generated by the common centroid approach.
Biometric authentication has attracted attention because of its high security and convenience. However, biometric feature such as fingerprint can not be revoked like passwords. Thus once the biometric data of a user stored in the system has been compromised, it can not be used for authentication securely for his/her whole life long. To address this issue, an authentication scheme called cancelable biometrics has been studied. However, there remains a major challenge to achieve both strong security and practical accuracy. In this paper, we propose a novel and fundamental algorithm for cancelable biometrics called correlation-invariant random filtering (CIRF) with provable security. Then we construct a method for generating cancelable fingerprint templates based on the chip matching algorithm and the CIRF. Experimental evaluation shows that our method has almost the same accuracy as the conventional fingerprint verification based on the chip matching algorithm.
Mohammadreza KESHAVARZI Abbas MOHAMMADI Abdolali ABDIPOUR Fadhel M. GHANNOUCHI
The effect of DC offset on multi-input multi-output (MIMO) direct transceivers with adaptive modulation (AM) is discussed in this paper. A variable-rate variable-power (VRVP) AM system with perfect channel state information (P-CSI) at both the transmitter and receiver in a MIMO scenario is considered. The DC offset is modeled as a zero mean complex Gaussian distributed random variable. By this modeling of the DC offset, the analytical expression for degraded bit error rate (BER) is derived. To derive this analytical expression, we establish a reasonable approximation. The good agreement between the analytical and simulation results shows that the approximation is valid and confirms the accuracy of the analytical expressions. Moreover, an approach to improve the degraded BER in these systems is introduced. For this purpose, we introduce a design for AM MIMO systems that takes account of DC offset and its effectiveness is confirmed. Throughput analysis for the AM MIMO system in the presence of DC offset is presented in this paper too. An analytical expression for throughput is derived and approximated to a simpler equation. At last, throughput results are compared to the simulation outcomes.
Shyr-Kuen CHEN Tay-Yu CHEN Pi-Chung WANG
A mobile ad-hoc network (MANET) consists of a collection of wireless mobile nodes without any fixed network infrastructure. Since the mobile nodes form a constantly changing topology, the design of efficient and scalable routing protocols is a fundamental challenge in MANETs. In the current literature, position-based routing protocols are regarded as having better scalability and lower control overhead than topology-based routing protocols. Since location services are the most critical part of position-based routing protocols, we present a multi-home-region scheme, Distributed Virtual Home Region with Spatial Awareness (DVHR-SA), to improve the performance of location service in this paper. Our scheme adaptively selects different update and query procedures according to the location of a source node. The simulation results show that DVHR-SA shortens the lengths of the update, query and reply paths. Our scheme also reduces the overall network message overhead. Therefore, DVHR-SA is considerably fast and stable.
Eun-Jun YOON Muhammad Khurram KHAN Kee-Young YOO
Quite recently [IEEE Commu. Letters, Vol.14, No.1, 2010], Choi et al. proposed a handover authentication scheme using credentials based on chameleon hashing, claiming to provide several security features including Perfect Forward/Backward Secrecy (PFS/PBS). This paper examines the security of the scheme and shows that the scheme still fails to achieve PFS/PBS unlike their claims.
Hasitha Muthumala WAIDYASOORIYA Daisuke OKUMURA Masanori HARIYAMA Michitaka KAMEYAMA
Heterogeneous multi-core processors are attracted by the media processing applications due to their capability of drawing strengths of different cores to improve the overall performance. However, the data transfer bottlenecks and limitations in the task allocation due to the accelerator-incompatible operations prevents us from gaining full potential of the heterogeneous multi-core processors. This paper presents a task allocation method based on algorithm transformation to increase the freedom of task allocation. We use approximation methods such as CORDIC algorithms to map the accelerator-incompatible operations to accelerator cores. According to the experimental results using HOG descriptor computation, the proposed task allocation method reduces the data transfer time by more than 82% and the total processing time by more than 79% compared to the conventional task allocation method.
Takashi ENAMI Shinyu NINOMIYA Ken-ichi SHINKAI Shinya ABE Masanori HASHIMOTO
Clock driver suffers from delay variation due to manufacturing and environmental variabilities as well as combinational cells. The delay variation causes clock skew and jitter, and varies both setup and hold timing margins. This paper presents a timing verification method that takes into consideration delay variation inside a clock network due to both manufacturing variability and dynamic power supply noise. We also discuss that setup and hold slack computation inherently involves a structural correlation problem due to common paths, and demonstrate that assigning individual random variables to upstream clock drivers provides a notable accuracy improvement in clock skew estimation with limited increase in computational cost. We applied the proposed method to industrial designs in 90 nm process. Experimental results show that dynamic delay variation reduces setup slack by over 500 ps and hold slack by 16.4 ps in test cases.
Soonghwan RO Hanh Van NGUYEN Woochul JUNG Young Woo PAE Jonathan P. MUNSON Jinmyung WOO Sibok YU Kisung LEE
XVC (eXtensible Viewer Composition) is an in-vehicle user interface framework for telematics applications. It provides a document-oriented application model, which enables drivers to simultaneously make use of multiple information services, while maintaining satisfactory control of their vehicles. XVC is a new client model that makes use of the beneficial functions of in-vehicle navigation devices. This paper presents the results from usability tests performed on the XVC framework in order to evaluate how the XVC client affects drivers' navigation while using its functions. The evaluations are performed using the Advanced Automotive Simulator System located at KATECH (Korea Automobile Technology Institute). The advantages of the XVC framework are evaluated and compared to a non-XVC framework. The test results show that the XVC framework navigation device significantly reduces the scanning time needed while a driver obtains information from the navigation device.
Weile ZHANG Huiming WANG Qinye YIN Wenjie WANG
In this letter, we propose a simple distributed space-frequency code with both timing errors and multiple carrier frequency offsets (CFO) in asynchronous cooperative communications. By employing both the Alamouti coding approach and the transmit repetition diversity technique, full diversity gain can be achieved by the fast symbol-wise maximum likelihood (ML) decoding at the destination node. Analysis and simulations demonstrate the effectiveness of the proposed method.
Mahmoud MOMTAZPOUR Maziar GOUDARZI Esmaeil SANAEI
Parameter variations reveal themselves as different frequency and leakage powers per instances of the same MPSoC. By the increasing variation with technology scaling, worst-case-based scheduling algorithms result in either increasingly less optimal schedules or otherwise more lost yield. To address this problem, this paper introduces a variation-aware task and communication scheduling algorithm for multiprocessor system-on-chip (MPSoC). We consider both delay and leakage power variations during the process of finding the best schedule so that leakier processors are less utilized and can be more frequently put in sleep mode to reduce power. Our algorithm takes advantage of event tables to accelerate the statistical timing and power analysis. We use genetic algorithm to find the best schedule that maximizes power-yield under a performance-yield constraint. Experimental results on real world benchmarks show that our proposed algorithm achieves 16.6% power-yield improvement on average over deterministic worst-case-based scheduling.
A cognitive radio will have to sense and discover the spectral environments where it would not cause primary radios to interfere. Because the primary radios have the right to use the frequency, the cognitive radios as the secondary radios must detect radio signals before use. However, the secondary radios also need identifying the primary and other secondary radios where the primary radios are vulnerable to interference. In this paper, a method of simultaneously identifying signals of primary and secondary radios is proposed. The proposed bandwidth differentiation assumes the primary and secondary radios use orthogonal frequency division multiplexing (OFDM), and the secondary radios use at the lower number of subcarriers than the primary radios. The false alarm and detection probabilities are analytically evaluated using the characteristic function method. Numerical evaluations are also conducted on the assumption the primary radio is digital terrestrial television broadcasting. Result showed the proposed method could achieve the false alarm probability of 0.1 and the detection probability of 0.9 where the primary and secondary radio powers were 2.5 dB and 3.6 dB higher than the noise power. In the evaluation, the reception signals were averaged over the successive 32 snapshots, and the both the primary and secondary radios used QPSK. The power ratios were 4.7 dB and 8.4 dB where both the primary and secondary radios used 64QAM.
Junfeng JIN Yusheng JI Baohua ZHAO Hao ZHOU
With the increasing popularity of multicast and real-time streaming service applications, efficient channel assignment algorithms that handle both multicast and unicast traffic in wireless mesh networks are needed. One of the most effective approaches to enhance the capacity of wireless networks is to use systems with multiple channels and multiple radio interfaces. However, most of the past works focus on vertex coloring of a general contention graph, which is NP-Complete, and use the greedy algorithm to achieve a suboptimal result. In this paper, we combine unicast and multicast with a transmission set, and propose a framework named Chordal Graph Based Channel Assignment (CGCA) that performs channel assignment for multicast and unicast traffic in multi-channel multi-radio wireless mesh networks. The proposed framework based on chordal graph coloring minimizes the interference of the network and prevents unicast traffic from starvation. Simulation results show that our framework provides high throughput and low end-to-end delay for both multicast and unicast traffic. Furthermore, our framework significantly outperforms other well-known schemes that have a similar objective in various scenarios.
Doohwan LEE Takayuki YAMADA Hiroyuki SHIBA Yo YAMAGUCHI Kazuhiro UEHARA
To satisfy the requirement of a unified platform which can flexibly deal with various wireless radio systems, we proposed and implemented a heterogeneous network system composed of distributed flexible access points and a protocol-free signal processing unit. Distributed flexible access points are remote RF devices which perform the reception of multiple types of radio wave data and transfer the received data to the protocol-free signal processing unit through wired access network. The protocol-free signal processing unit performs multiple types of signal analysis by software. To realize a highly flexible and efficient radio wave data reception and transfer, we employ the recently developed compressed sensing technology. Moreover, we propose a combined Nyquist and compressed sampling method for the decoding signals to be sampled at the Nyquist rate and for the sensing signals to be sampled at the compressed rate. For this purpose, the decoding signals and the sensing signals are converted into the intermediate band frequency (IF) and mixed. In the IF band, the decoding signals are set at lower center frequencies than those of the sensing signals. The down converted signals are sampled at the rate of four times of the whole bandwidth of the decoding signals plus two times of the whole bandwidth of the sensing signals. The purpose of above setting is to simultaneously conduct Nyquist rate and compressed rate sampling in a single ADC. Then, all of odd (or even) samples are preserved and some of even (or odd) samples are randomly discarded. This method reduces the data transfer burden in dealing with the sensing signals while guaranteeing the realization of Nyquist-rate decoding performance. Simulation and experiment results validate the efficiency of the proposed method.
Koichi NISHIDE Hiroyuki KUBO Ryoichi SHINKUMA Tatsuro TAKAHASHI
The demand of using applications that assume bidirectional communication such as voice telephony and peer-to-peer using wireless stations has been increasing and especially, the rapid increase of uplink traffic from wireless terminals is expected. However, in uplink WLANs, the hidden-station problem remains to be solved. In this paper, we point out this hidden-station problem and clarify the following unfairness between UDP and TCP uplink flows: 1) the effect of collision caused by hidden-station relationship on throughput and 2) the instability of the throughput depending on the number of hidden stations. To solve these problems, we propose a virtual multi-AP access mechanism. Our mechanism first groups stations according to the hidden-station relationship and type of transport protocol they use then assigns a virtually isolated channel to each group, which enables STAs to communicate as if STAs in different groups are connected to different isolated APs (virtual APs: VAPs). It can mitigate the effect caused by collisions between hidden stations and eliminate the contention between UDP and TCP uplink flows. Its performance is shown through simulation.
Kentaro KOBAYASHI Takaya YAMAZATO Masaaki KATAYAMA
We develop a mathematical framework for the extrinsic information transfer (EXIT) analysis to assess the convergence behavior of maximum a posteriori (MAP)-based joint iterative decoding of correlated sources, which are separately encoded and transmitted over noisy channels. Unlike the previous work, our approach focuses on the case side information about the correlation is not perfectly given at the joint decoder but is extracted from decoder output and updated in an iterative manner. The presented framework provides a convenient way to compare between schemes. We show that it allows us to easily and accurately predict joint decoding gain and turbo cliff position.
Chun-Hsiang HUANG Daisuke UMEHARA Satoshi DENNO Masahiro MORIKURA Takatoshi SUGIYAMA
Network coding is a promising technique for improving system performance in wireless multihop networks. In this paper, the throughput and fairness in single-relay multi-user wireless networks are evaluated. The carrier sense multiple access with collision avoidance (CSMA/CA) protocol and network coding are used in the medium access control (MAC) sublayer in such networks. The fairness of wireless medium access among stations (STAs), the access point (AP), and the relay station (RS) results in asymmetric bidirectional flows via the RS; as a result the wireless throughput decreases substantially. To overcome this problem, an autonomous optimization of minimum contention window size is developed for CSMA/CA and network coding to assign appropriate transmission opportunities to both the AP and RS. By optimizing the minimum contention window size according to the number of STAs, the wireless throughput in single-relay multi-user networks can be improved and the fairness between bidirectional flows via the RS can be achieved. Numerical analysis and computer simulations enable us to evaluate the performances of CSMA/CA and network coding in single-relay multi-user wireless networks.
Saiyan SAIYOD Sakchai THIPCHAKSURAT Ruttikorn VARAKULSIRIPUNTH
In wireless OFDM systems, the system performance is suffered from frequency offset and symbol timing offset due to the Doppler effect. Using the discrete Fourier transform (DFT) and inverse discrete Fourier transform (IDFT) for traditional signal transformation from the time-domain into frequency-domain, and vice versa, the system performance may be severely degraded. To make the OFDM system that can tolerate the above problems, we have considered that the harmonic transform can be applicable to the traditional signal transformation, thereby improving the system performance. In this paper, we combine the good characteristics of harmonic transform and instantaneous frequency to be a novel transformation for wireless OFDM systems. We propose a modified discrete harmonic transform (MDHT) which can be performed adaptively. Our proposed scheme called the modified discrete harmonic transform OFDM (MDHT-OFDM scheme). We derive the equations of the novel discrete harmonic transform which are suitable for wireless OFDM systems and the novel channel estimation cooperated with the novel transformation. The proposed channel estimation is performed in both time-domain and frequency-domain. The performance of a MDHT-OFDM scheme is evaluated by means of a simulation. We compare the performance of a MDHT-OFDM scheme with one of the conventional DFT-OFDM scheme in the term of symbol error rate (SER). MDHT-OFDM scheme can achieve better performance than that of the conventional DFT-OFDM scheme in mitigating the Doppler spread.
Hironobu YAMAMOTO Masato KOIWAI Takehiko KOBAYASHI
This paper describes ultra wideband (UWB) radio propagation measurements and modeling for wireless body area network (WBAN) applications in different environments. Several propagation measurement campaigns and associated modelings were carried out in either a radio anechoic chamber or a specific room type; however, dependence of the radio propagation on surrounding environments was not studied. Multipaths (mainly reflected from floor, ceiling, and walls) highly depend on the environment. To address this problem, radio propagation around the human body was measured in a radio anechoic chamber and four different-sized rooms. Parameters in a conventional loss model derived from the measurements were found to significantly diverge and depend on room volume and line-of-sight (LOS)/non-LOS (NLOS) cases. A modified model considering the impact of room volume has been proposed for the LOS/NLOS cases. Different propagation mechanisms were discussed along with parameter derivation. Probability distributions for the UWB propagation losses were also examined.
Workflow technology has spread over the wide areas which require process control (e.g. logistics and e-business) or resource coordination (e.g. cooperative work and grid computing). Among various types of workflow, we introduce a case of ad-hoc workflow process in a Korean telecom company. Since such a service process is generally accompanied with customer's participation, the procedure and state are flexibly changed and sometimes capricious to cope with customer's request and operator's unexpected situation. In case of network service provisioning or problem shooting processes, customers often request the changes of their service types or visit appointments, which result in flexible and adaptive management of the process instances. In this paper, we present a novel approach to workflow modeling based on modified ECA rules (named P-ECA) for the purpose of ad-hoc workflow process modeling. The rule-based workflow modeling is comprehensible to engineers and can be implemented in programs at ease; therefore it is expected that it can be widely adopted for the ad-hoc and adaptive workflow modeling which requires dynamic changes of its states by internal or external events.