The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

7881-7900hit(18690hit)

  • Consistency Checking of Safety and Availability in Access Control

    Ruixuan LI  Jianfeng LU  Zhengding LU  Xiaopu MA  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    491-502

    The safety and availability policies are very important in an access control system for ensuring security and success when performing a certain task. However, conflicts may arise between safety and availability policies due to their opposite focuses. In this paper, we address the problem of consistency checking for safety and availability policies, especially for the co-existence of static separation-of-duty (SSoD) policies with availability policies, which determines whether there exists an access control state that satisfies all of these policies. We present criteria for determining consistency with a number of special cases, and show that the general case and partial subcases of the problem are intractable (NP-hard) and in the Polynomial Hierarchy NPNP. We design an algorithm to efficiently solve the nontrivial size instances for the intractable cases of the problem. The running example shows the validity of the proposed algorithm. The investigation will help the security officer to specify reasonable access control policies when both safety and availability policies coexist.

  • Architectures and Technologies for the Future Mobile Internet Open Access

    Dipankar RAYCHAUDHURI  

     
    INVITED LETTER

      Vol:
    E93-B No:3
      Page(s):
    436-441

    This position paper outlines the author's view on architectural directions and key technology enablers for the future mobile Internet. It is pointed out that mobile and wireless services will dominate Internet usage in the near future, and it is therefore important to design next-generation network protocols with features suitable for efficiently serving emerging wireless scenarios and applications. Several key requirements for mobile/wireless scenarios are identified - these include new capabilities such as dynamic spectrum coordination, cross-layer support, disconnection tolerant routing, content addressing, and location awareness. Specific examples of enabling technologies which address some of these requirements are given from ongoing research projects at WINLAB. Topics covered briefly include wireless network virtualization, the cache-and-forward (CNF) protocol, geographic (GEO) protocol stack, cognitive radio protocols, and open networking testbeds.

  • NICT New-Generation Network Vision and Five Network Targets Open Access

    Nozomu NISHINAGA  

     
    INVITED LETTER

      Vol:
    E93-B No:3
      Page(s):
    446-449

    The National Institute of Information and Communications Technology (NICT) vision and five network targets of research and development (R&D) of the NeW-Generation Network (NWGN) are presented in this letter. The NWGN is based on new design concepts that look beyond the next generation network (NGN). The NWGN will maintain the sustainability of our prosperous civilization and help resolve various social issues and problems by using information and communication technologies (ICTs). NICT's vision for NWGN is also presented in this letter. Based on this vision, 19 items concerning social issues and future social outlook are analyzed, and the functional requirements of the NWGN are extracted. The requirements are refined and categorized into five network targets that must be developed for realizing the vision.

  • A Novel Resource Allocation and Admission Control in LTE Systems

    Abhishek ROY  Navrati SAXENA  Jitae SHIN  

     
    LETTER-Network

      Vol:
    E93-B No:3
      Page(s):
    721-724

    In this letter we propose a novel resource allocation and admission control strategy for OFDMA-based emerging LTE systems. Considering users' reneging and migration between service providers, we first prove that the optimal resource allocation problem, which maximizes the service provider's gross income is, NP-complete. Subsequently, we propose two different heuristics based on dynamic programming and greedy algorithms to get a near-optimal resource allocation and admission control strategy in computationally feasible time. Simulation results point out that the solutions offer increased gross income of the service provider, while offering low latency, adequate throughput and session acceptance.

  • Improved SISO MMSE Detection for Joint Coded-Precoded OFDM under Imperfect Channel Estimation

    Guomei ZHANG  Shihua ZHU  Feng LI  Pinyi REN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:3
      Page(s):
    757-761

    An improved soft-input soft-output (SISO) minimum mean-squared error (MMSE) detection method is proposed for joint coding and precoding OFDM systems under imperfect channel estimation. Compared with the traditional mismatched detection which uses the channel estimate as its exact value, the signal model of the proposed detector is more accurate and the influence of channel estimation error (CEE) can be effectively mitigated. Simulations indicate that the proposed scheme can improve the bit error rate (BER) performance with fewer pilot symbols.

  • Fixed Point Data Type Modeling for High Level Synthesis

    Benjamin CARRION SCHAFER  Yusuke IGUCHI  Wataru TAKAHASHI  Shingo NAGATANI  Kazutoshi WAKABAYASHI  

     
    PAPER

      Vol:
    E93-C No:3
      Page(s):
    361-368

    A methodology to automatically convert fixed point data type representations into integer data types for high level synthesis is presented in this work. Our method converts all major C operations using fixed point data types into integer data types, models quantization and overflow modes, type conversion and casting. The conversion rule for each operation is described in detail as well as a regression test environment with 600 test cases to validate the method and to verify the correctness of each conversion compared to the same cases written in SystemC. The test environment converts each test case with fixed point data types into integer data types and synthesizes them with a high level synthesis tool to generate RTL. An RTL simulation is ran and the results in turn compared to the SystemC's OSCI simulation. For all of the 600 test cases the RTL simulation results matched the SystemC results proving that each conversion is accurately modeled. A larger real test case is also presented to validate the conversion method in a complex case.

  • A 58-µW Single-Chip Sensor Node Processor with Communication Centric Design

    Shintaro IZUMI  Takashi TAKEUCHI  Takashi MATSUDA  Hyeokjong LEE  Toshihiro KONISHI  Koh TSURUDA  Yasuharu SAKAI  Hiroshi KAWAGUCHI  Chikara OHTA  Masahiko YOSHIMOTO  

     
    PAPER

      Vol:
    E93-C No:3
      Page(s):
    261-269

    This paper presents an ultra-low-power single-chip sensor-node VLSI for wireless-sensor-network applications. A communication centric design approach has been introduced to reduce the power consumption of the RF circuits and the entire sensor network system, through a vertical cooperative design among circuits, architecture, and communication protocols. The sensor-node LSI features a synchronous media access control (MAC) protocol and integrates a transceiver, i8051 microcontroller, and dedicated MAC processor. The test chip occupies 33 mm2 in a 180-nm CMOS process, including 1.38 M transistors. It dissipates 58.0 µW under a network environment.

  • Global Asymptotic Stability of FAST TCP Network with Heterogeneous Feedback Delays

    Joon-Young CHOI  Kyungmo KOO  Jin Soo LEE  

     
    PAPER-Network

      Vol:
    E93-B No:3
      Page(s):
    571-580

    We consider a single-link multi-source network with FAST TCP sources. We adopt a continuous-time dynamic model for FAST TCP sources, and propose a static model to adequately describe the queuing delay dynamics at the link. The proposed model turns out to have a structure that reveals the time-varying network feedback delay, which allows us to analyze FAST TCP with due consideration of the time-varying network feedback delay. Based on the proposed model, we establish sufficient conditions for the boundedness of congestion window of each source and for the global asymptotic stability. The asymptotic stability condition shows that the stability property of each source is affected by all other sources sharing the link. Simulation results illustrate the validity of the sufficient condition for the global asymptotic stability.

  • Split Capacitor DAC Mismatch Calibration in Successive Approximation ADC

    Yanfei CHEN  Xiaolei ZHU  Hirotaka TAMURA  Masaya KIBUNE  Yasumoto TOMITA  Takayuki HAMADA  Masato YOSHIOKA  Kiyoshi ISHIKAWA  Takeshi TAKAYAMA  Junji OGAWA  Sanroku TSUKAMOTO  Tadahiro KURODA  

     
    PAPER

      Vol:
    E93-C No:3
      Page(s):
    295-302

    Charge redistribution based successive approximation (SA) analog-to-digital converter (ADC) has the advantage of power efficiency. Split capacitor digital-to-analog converter (CDAC) technique implements two sets of binary-weighted capacitor arrays connected by a bridge capacitor so as to reduce both input load capacitance and area. However, capacitor mismatches degrade ADC performance in terms of DNL and INL. In this work, a split CDAC mismatch calibration method is proposed. A bridge capacitor larger than conventional design is implemented so that a tunable capacitor can be added in parallel with the lower-weight capacitor array to compensate for mismatches. To guarantee correct CDAC calibration, comparator offset is cancelled using a digital timing control charge compensation technique. To further reduce the input load capacitance, an extra unit capacitor is added to the higher-weight capacitor array. Instead of the lower-weight capacitor array, the extra unit capacitor and the higher-weight capacitor array sample analog input signal. An 8-bit SA ADC with 4-bit + 4-bit split CDAC has been implemented in a 65 nm CMOS process. The ADC has an input capacitance of 180 fF and occupies an active area of 0.03 mm2. Measured results of +0.2/-0.3LSB DNL and +0.3/-0.3LSB INL have been achieved after calibration.

  • Adaptive Circuits for the 0.5-V Nanoscale CMOS Era Open Access

    Kiyoo ITOH  Masanao YAMAOKA  Takashi OSHIMA  

     
    INVITED PAPER

      Vol:
    E93-C No:3
      Page(s):
    216-233

    The minimum operating voltage, Vmin, of nanoscale CMOS LSIs is investigated to breach the 1-V wall that we are facing in the 65-nm device generation, and open the door to the below 0.5-V era. A new method using speed variation is proposed to evaluate Vmin. It shows that Vmin is very sensitive to the lowest necessary threshold voltage, Vt0, of MOSFETs and to threshold-voltage variations, Δ Vt, which become more significant with device scaling. There is thus a need for low-Vt0 circuits and ΔVt-immune MOSFETs to reduce Vmin. For memory-rich LSIs, the SRAM block is particularly problematic because it has the highest Vmin. Various techniques are thus proposed to reduce the Vmin: using RAM repair, shortening the data line, up-sizing, and using more relaxed MOSFET scaling. To effectively reduce Vmin of other circuit blocks, dual-Vt0 and dual-VDD circuits using gate-source reverse biasing, temporary activation, and series connection of another small low-Vt0 MOSFET are proposed. They are dynamic logic circuits enabling the power-delay product of the conventional static CMOS inverter to be reduced to 0.09 at a 0.2-V supply, and a DRAM dynamic sense amplifier and power switches operable at below 0.5 V. In addition, a fully-depleted structure (FD-SOI) and fin-type structure (FinFET) for ΔVt-immune MOSFETs are discussed in terms of their low-voltage potential and challenges. As a result, the height up-scalable FinFETs turns out to be quite effective to reduce Vmin to less than 0.5 V, if combined with the low-Vt0 circuits. For mixed-signal LSIs, investigation of low-voltage potential of analog circuits, especially for comparators and operational amplifiers, reveals that simple inverter op-amps, in which the low gain and nonlinearity are compensated for by digitally assisted analog designs, are crucial to 0.5-V operations. Finally, it is emphasized that the development of relevant devices and fabrication processes is the key to the achievement of 0.5-V nanoscale LSIs.

  • Orbital Systolic Algorithms and Array Processors for Solution of the Algebraic Path Problem

    Stanislav G. SEDUKHIN  Toshiaki MIYAZAKI  Kenichi KURODA  

     
    PAPER-Computation and Computational Models

      Vol:
    E93-D No:3
      Page(s):
    534-541

    The algebraic path problem (APP) is a general framework which unifies several solution procedures for a number of well-known matrix and graph problems. In this paper, we present a new 3-dimensional (3-D) orbital algebraic path algorithm and corresponding 2-D toroidal array processors which solve the nn APP in the theoretically minimal number of 3n time-steps. The coordinated time-space scheduling of the computing and data movement in this 3-D algorithm is based on the modular function which preserves the main technological advantages of systolic processing: simplicity, regularity, locality of communications, pipelining, etc. Our design of the 2-D systolic array processors is based on a classical 3-D2-D space transformation. We have also shown how a data manipulation (copying and alignment) can be effectively implemented in these array processors in a massively-parallel fashion by using a matrix-matrix multiply-add operation.

  • Optimization of Linear Dispersion Codes for Two-Way Wireless Relay Networks

    Ha X. NGUYEN  Ha H. NGUYEN  Tho LE-NGOC  

     
    LETTER-Communication Theory and Signals

      Vol:
    E93-A No:3
      Page(s):
    656-659

    A stochastic quasi-gradient algorithm is applied to design linear dispersion (LD) codes for two-way wireless relay networks under Rayleigh fading channels. The codes are designed to minimize an upper bound of the average pairwise error probability. Simulation results show that the codes obtained by the optimization technique achieve a coding gain over codes that are randomly generated based on the isotropic distribution.

  • Equations of States in Statistical Learning for an Unrealizable and Regular Case

    Sumio WATANABE  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E93-A No:3
      Page(s):
    617-626

    Many learning machines that have hierarchical structure or hidden variables are now being used in information science, artificial intelligence, and bioinformatics. However, several learning machines used in such fields are not regular but singular statistical models, hence their generalization performance is still left unknown. To overcome these problems, in the previous papers, we proved new equations in statistical learning, by which we can estimate the Bayes generalization loss from the Bayes training loss and the functional variance, on the condition that the true distribution is a singularity contained in a learning machine. In this paper, we prove that the same equations hold even if a true distribution is not contained in a parametric model. Also we prove that, the proposed equations in a regular case are asymptotically equivalent to the Takeuchi information criterion. Therefore, the proposed equations are always applicable without any condition on the unknown true distribution.

  • Integer Frequency Offset Estimator by Frequency Domain Spreading for UWB Multiband-OFDM

    Hyun YANG  Kwang-Soo JEONG  Jae-Hoon YI  Young-Hwan YOU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E93-A No:3
      Page(s):
    648-650

    In this letter, we propose an integer carrier frequency offset (IFO) estimator in the presence of symbol timing error for an ultra-wideband multi-band orthogonal frequency division multiplexing (UWB MB-OFDM) system. The proposed IFO estimator uses frequency-domain spreaded data symbol which is provided in the MB-OFDM system. To demonstrate the accuracy of the proposed IFO estimator, comparisons are made with conventional estimators via computer simulation.

  • Temperature Effects on Anomalous Radio Duct Propagation in Korean Coastal Area

    Yong-Ki KWON  Man-Seop LEE  Hakyong KIM  

     
    LETTER-Antennas and Propagation

      Vol:
    E93-B No:3
      Page(s):
    784-787

    Atmospheric radio ducts can trap VHF/UHF radio waves and propagate them over long distances. 284.4625 MHz Japanese radio wave signal measurements show that the radio waves are propagated to Korea coastal regions when ground temperatures exceed 10C. This paper discusses the reasons for the existence of this critical temperature threshold.

  • Permutation Network for Reconfigurable LDPC Decoder Based on Banyan Network

    Xiao PENG  Zhixiang CHEN  Xiongxin ZHAO  Fumiaki MAEHARA  Satoshi GOTO  

     
    PAPER

      Vol:
    E93-C No:3
      Page(s):
    270-278

    Since the structured quasi-cyclic low-density parity-check (QC-LDPC) codes for most modern wireless communication systems include multiple code rates, various block lengths, and the corresponding different sizes of submatrices in parity check matrix (PCM), the reconfigurable LDPC decoder is desirable and the permutation network is needed to accommodate any input number (IN) and shift number (SN) for cyclic shift. In this paper, we propose a novel permutation network architecture for the reconfigurable QC-LDPC decoders based on Banyan network. We prove that Banyan network has the nonblocking property for cyclic shift when the IN is power of 2, and give the control signal generating algorithm. Through introducing the bypass network, we put forward the nonblocking scheme for any IN and SN. In addition, we present the hardware design of the control signal generator, which can greatly reduce the hardware complexity and latency. The synthesis results using the TSMC 0.18 µm library demonstrate that the proposed permutation network can be implemented with the area of 0.546 mm2 and the frequency of 292 MHz.

  • Throughput Estimation Method in Burst ACK Scheme for Optimizing Frame Size and Burst Frame Number Appropriate to SNR-Related Error Rate

    Shoko OHTERU  Keiji KISHINE  

     
    PAPER-Network

      Vol:
    E93-B No:3
      Page(s):
    590-599

    The Burst ACK scheme enhances effective throughput by reducing ACK overhead when a transmitter sends sequentially multiple data frames to a destination. IEEE 802.11e is one such example. The size of the data frame body and the number of burst data frames are important burst transmission parameters that affect throughput. The larger the burst transmission parameters are, the better the throughput under error-free conditions becomes. However, large data frame could reduce throughput under error-prone conditions caused by signal-to-noise ratio (SNR) deterioration. If the throughput can be calculated from the burst transmission parameters and error rate, the appropriate ranges of the burst transmission parameters could be narrowed down, and the necessary buffer size for storing transmit data or received data temporarily could be estimated. In this paper, we present a method that features a simple algorithm for estimating the effective throughput from the burst transmission parameters and error rate. The calculated throughput values agree well with the measured ones for actual wireless boards based on the IEEE 802.11-based original MAC protocol. We also calculate throughput values for larger values of the burst transmission parameters outside the assignable values of the wireless boards and find the appropriate values of the burst transmission parameters.

  • Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    Daigo MURAMATSU  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    448-457

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  • Virtualized Optical Network (VON) for Future Internet and Applications

    Masahiko JINNO  Yukio TSUKISHIMA  Hidehiko TAKARA  Bartlomiej KOZICKI  Yoshiaki SONE  Toshikazu SAKANO  

     
    PAPER

      Vol:
    E93-B No:3
      Page(s):
    470-477

    A virtualized optical network (VON) is proposed as a key to implementing increased agility and flexibility into the future Internet and applications by providing any-to-any connectivity with the appropriate optical bandwidth at the appropriate time. The VON is enabled by introducing optical transparentization and optical fine granular grooming based on optical orthogonal frequency division multiplexing.

  • Robust Object Tracking via Combining Observation Models

    Fan JIANG  Guijin WANG  Chang LIU  Xinggang LIN  Weiguo WU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E93-D No:3
      Page(s):
    662-665

    Various observation models have been introduced into the object tracking community, and combining them has become a promising direction. This paper proposes a novel approach for estimating the confidences of different observation models, and then effectively combining them in the particle filter framework. In our approach, spatial Likelihood distribution is represented by three simple but efficient parameters, reflecting the overall similarity, distribution sharpness and degree of multi peak. The balance of these three aspects leads to good estimation of confidences, which helps maintain the advantages of each observation model and further increases robustness to partial occlusion. Experiments on challenging video sequences demonstrate the effectiveness of our approach.

7881-7900hit(18690hit)