The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

3421-3440hit(20498hit)

  • Design of High-ESD Reliability in HV Power pLDMOS Transistors by the Drain-Side Isolated SCRs

    Shen-Li CHEN  Yu-Ting HUANG  Yi-Cih WU  

     
    PAPER

      Vol:
    E100-C No:5
      Page(s):
    446-452

    Improving robustness in electrostatic discharge (ESD) protection by inserting drain-side isolated silicon-controlled rectifiers (SCRs) in a high-voltage (HV) p-channel lateral-diffused MOSFET (pLDMOS) device was investigated in this paper. Additionally, the effects of anti-ESD reliability in the HV pLDMOS transistors provided by this technique were evaluated. From the experimental data, it was determined that the holding voltage (Vh) values of the pLDMOS with an embedded npn-arranged SCR and discrete thin-oxide (OD) layout on the cathode side increased as the parasitic SCR OD row number decreased. Moreover, the trigger voltage (Vt1) and the Vh values of the pLDMOS with a parasitic pnp-arranged SCR and discrete OD layout on the drain side fluctuated slightly as the SCR OD-row number decreased. Furthermore, the secondary breakdown current (It2) values (i.e., the equivalent ESD-reliability robustness) of all pLDMOS-SCR npn-arranged types increased (>408.4%) to a higher degree than those of the pure pLDMOS, except for npn-DIS_3 and npn-DIS_2, which had low areas of SCRs. All pLDMOS-SCR pnp-arranged types exhibited an increase of up to 2.2A-2.4A, except for the pnp_DIS_3 and pnp_DIS_2 samples; the pnp_DIS_91 increased by approximately 2000.9% (249.1%), exhibiting a higher increase than that of the reference pLDMOS (i.e., the corresponding pnp-stripe type). The ESD robustness of the pLDMOS-SCR pnp-arranged type and npn-arranged type with a discrete OD layout on the SCR cathode side was greater than that of the corresponding pLDMOS-SCR stripe type and a pure pLDMOS, particularly in the pLDMOS-SCR pnp-arranged type.

  • Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering

    Bing CAO  Guorui FENG  Zhaoxia YIN  Lingyan FAN  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/02/18
      Vol:
    E100-D No:5
      Page(s):
    1144-1147

    Image steganography is a technique of embedding secret message into a digital image to securely send the information. In contrast, steganalysis focuses on detecting the presence of secret messages hidden by steganography. The modern approach in steganalysis is based on supervised learning where the training set must include the steganographic and natural image features. But if a new method of steganography is proposed, and the detector still trained on existing methods will generally lead to the serious detection accuracy drop due to the mismatch between training and detecting steganographic method. In this paper, we just attempt to process unsupervised learning problem and propose a detection model called self-learning ensemble discriminant clustering (SEDC), which aims at taking full advantage of the statistical property of the natural and testing images to estimate the optimal projection vector. This method can adaptively select the most discriminative subspace and then use K-means clustering to generate the ultimate class labels. Experimental results on J-UNIWARD and nsF5 steganographic methods with three feature extraction methods such as CC-JRM, DCTR, GFR show that the proposed scheme can effectively classification better than blind speculation.

  • A Method for FDOA Estimation with Expansion of RMS Integration Time

    Shangyu ZHANG  Zhen HUANG  Zhenqiang LI  Xinlong XIAO  Dexiu HU  

     
    PAPER-Sensing

      Pubricized:
    2016/11/29
      Vol:
    E100-B No:5
      Page(s):
    893-900

    The measurement accuracy of frequency difference of arrival (FDOA) is usually determinant for emitters location system using rapidly moving receivers. The classic technique of expanding the integration time of the cross ambiguity function (CAF) to achieve better performance of FDOA is likely to incur a significant computational burden especially for wideband signals. In this paper, a nonconsecutive short-time CAF's methods is proposed with expansion of root mean square (RMS) integration time, instead of the integration time, and a factor of estimation precision improvement is given which is relative to the general consecutive method. Furthermore, by analyzing the characteristic of coherent CAF and the influence of FDOA rate, an upper bound of the precision improvement factor is derived. Simulation results are provided to confirm the effectiveness of the proposed method.

  • Robust Singing Transcription System Using Local Homogeneity in the Harmonic Structure

    Hoon HEO  Kyogu LEE  

     
    PAPER-Music Information Processing

      Pubricized:
    2017/02/18
      Vol:
    E100-D No:5
      Page(s):
    1114-1123

    Automatic music transcription from audio has long been one of the most intriguing problems and a challenge in the field of music information retrieval, because it requires a series of low-level tasks such as onset/offset detection and F0 estimation, followed by high-level post-processing for symbolic representation. In this paper, a comprehensive transcription system for monophonic singing voice based on harmonic structure analysis is proposed. Given a precise tracking of the fundamental frequency, a novel acoustic feature is derived to signify the harmonic structure in singing voice signals, regardless of the loudness and pitch. It is then used to generate a parametric mixture model based on the von Mises-Fisher distribution, so that the model represents the intrinsic harmonic structures within a region of smoothly connected notes. To identify the note boundaries, the local homogeneity in the harmonic structure is exploited by two different methods: the self-similarity analysis and hidden Markov model. The proposed system identifies the note attributes including the onset time, duration and note pitch. Evaluations are conducted from various aspects to verify the performance improvement of the proposed system and its robustness, using the latest evaluation methodology for singing transcription. The results show that the proposed system significantly outperforms other systems including the state-of-the-art systems.

  • Massive Antenna Systems for Wireless Entrance (MAS-WE): Practical Application of Massive MIMO with Simplified Space Division Multiplexing Schemes

    Kazuki MARUTA  Atsushi OHTA  Satoshi KUROSAKI  Takuto ARAI  Masataka IIZUKA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/16
      Vol:
    E100-B No:5
      Page(s):
    779-787

    This paper proposes a practical application of Massive MIMO technology, Massive Antenna Systems for Wireless Entrance (MAS-WE), and along with related inter-user interference cancellation (IUIC) and scheduling techniques. MAS-WE, in which the entrance base station (EBS) employs a large number of antennas, can effectively provide high capacity wireless entrance links to a large number of access points (APs) distributed over a wide coverage area. The proposed techniques are simplified to practical implementation; EBS side uses around 100 antenna elements to spatially multiplex more than 16 signal streams. SIR performance is evaluated by system level simulations that consider imperfect channel state information (CSI). The results show that MAS-WE with the proposed techniques can reliably achieve high spectral efficiency with high level space division multiplexing.

  • Bufferless Bidirectional Multi-Ring Networks with Sharing an Optical Burst Mode Transceiver for Any Route

    Kyota HATTORI  Masahiro NAKAGAWA  Toshiya MATSUDA  Masaru KATAYAMA  Katsutoshi KODA  

     
    PAPER

      Pubricized:
    2017/02/08
      Vol:
    E100-D No:5
      Page(s):
    948-962

    Improvement of conventional networks with an incremental approach is an important design method for the development of the future internet. For this approach, we are developing a future aggregation network based on passive optical network (PON) technology to achieve both cost-effectiveness and high reliability. In this paper, we propose a timeslot (TS) synchronization method for sharing a TS from an optical burst mode transceiver between any route of arbitrary fiber length by changing both the route of the TS transmission and the TS control timing on the optical burst mode transceiver. We show the effectiveness of the proposed method for exchanging TSs in bidirectional bufferless wavelength division multiplexing (WDM) and time division multiplexing (TDM) multi-ring networks under the condition of the occurrence of a link failure through prototype systems. Also, we evaluate the reduction of the required number of optical interfaces in a multi-ring network by applying the proposed method.

  • Fast Persistent Heap Based on Non-Volatile Memory

    Wenzhe ZHANG  Kai LU  Xiaoping WANG  Jie JIAN  

     
    PAPER-Software System

      Pubricized:
    2017/02/01
      Vol:
    E100-D No:5
      Page(s):
    1035-1045

    New volatile memory (e.g. Phase Change Memroy) presents fast access, large capacity, byte-addressable, and non-volatility features. These features will bring impacts on the design of current software system. It has become a hot research topic of how to manage it and provide what kind of interface for upper application to use it. This paper proposes FP-Heap. FP-Heap supports direct access to non-volatile memory through a persistent heap interface. With FP-Heap, traditional persistent object systems can benefit directly from the byte-persistency of non-volatile memory. FP-Heap extends current virtual memory manager (VMM) to manage non-volatile memory and maintain a persistent mapping relationship. Also, FP-Heap offers a lightweight transaction mechanism to support atomic update of persistent data, a simple namespace to facilitate data indexing, and a basic access control mechanism to support data sharing. Compared with previous work Mnemosyne, FP-Heap achieves higher performance by its customized VMM and optimized transaction mechanism.

  • Improving Security Level of LTE Access Procedure by Using Short-Life Shared Key

    Fawad AHMAD  Marnel PERADILLA  Akanksha SAINI  Younchan JUNG  

     
    PAPER-Network

      Pubricized:
    2016/11/21
      Vol:
    E100-B No:5
      Page(s):
    738-748

    To ensure secure mobile communication, the communicating entities must know their mutual identities. The entities which need to be identified in a mobile communication system are mobile devices and the network. Third Generation Partnership Project (3GPP) has specified Evolved Packet System Authentication and Key Agreement (EPS AKA) procedure for the mutual authentication of user and the Long Term Evolution (LTE) network. EPS AKA certainly overcomes most of the vulnerabilities in the Global System for Mobile Communications (GSM) and Universal Mobile Telecommunication System (UMTS) access procedures. However, the LTE access procedure still has security weaknesses against some of the sophisticated security threats, such as, Denial-of-Service (DoS) attacks, Man-in-the-Middle (MitM) attacks, rogue base station attacks and fails to ensure privacy protection for some of the important parameters. This paper proposes an improved security framework for the LTE access procedure by ensuring the confidentiality protection of International Mobile Subscriber Identity (IMSI) and random-challenge RAND. Also, our proposed system is designed to reduce the impact of DoS attacks which try to overwhelm the network with useless computations. We use a one-time shared key with a short lifetime between the UE and MME to protect IMSI and RAND privacy. Finally, we explore the parameters design for the proposed system which leads to satisfy the requirements imposed on computational load and latency as well as security strength.

  • Non-Coherent MIMO of Per Transmit Antenna Differential Mapping (PADM) Employing Asymmetric Space-Time Mapping and Channel Prediction

    Hiroshi KUBO  Takuma YAMAGISHI  Toshiki MORI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/11/16
      Vol:
    E100-B No:5
      Page(s):
    808-817

    This paper proposes performance improvement schemes for non-coherent multiple-input multiple-output (MIMO) communication systems employing per transmit antenna differential mapping (PADM). PADM is one form of differential space-time coding (DSTC), which generates an independent differentially encoded sequence for each of the multiple transmit antennas by means of space-time coding and mapping. The features of the proposed schemes are as follows: 1) it employs an asymmetric space-time mapping instead of the conventional symmetric space-time mapping in order to lower the required signal to noise power ratio (SNR) for maintaining the bit error rate (BER) performance; 2) it employs an analytically derived branch metric criterion based on channel prediction for per-survivor processing (PSP) in order to track fast time-varying channels. Finally, computer simulation results confirm that the proposed schemes improve the required SNR by around 1dB and can track at the maximum Doppler frequency normalized by symbol rate of 5%.

  • Performance Analysis of Distributed OSTBC-MIMO Systems Using Adaptive M-QAM Transmission over i.n.i.d. Generalized-K Fading Channels

    Jie HE  Kun XIAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/12/06
      Vol:
    E100-B No:5
      Page(s):
    843-851

    In this paper, the performance of orthogonal space-time block codes (OSTBC) for distributed multiple-input multiple-output (MIMO) systems employing adaptive M-QAM transmission is investigated over independent but not necessarily identically distributed (i.n.i.d.) generalized-K fading channels with arbitrary positive integer-valued k(inversely reflects the shadowing severity) and m (inversely reflects the fading severity). Before this, i.n.i.d. generalized-K fading channel has never been considered for distributed OSTBC-MIMO systems. Especially, the effects of the shape parameter k on the distributed OSTBC-MIMO system performance are unknown. Thus, we investigate mainly the significance of the shape parameter k on the distributed OSTBC-MIMO system performance, in terms of the average symbol error probability (SEP), outage probability, and spectral efficiency (SE). By establishing the system model, the approximated probability density function (PDF) of the equivalent signal to noise ratio (SNR) is derived and thereafter the approximated closed-form expressions of the above performance metrics are obtained successively. Finally, the derived expressions are validated via a set of Monte-Carlo simulations and the implications of the shape parameter k on the overall performance are highlighted.

  • MAC Protocol for Improving Throughput and Balancing Uplink/Downlink Throughput for Wireless Local Area Networks with Long Propagation Delays

    Takayuki NISHIO  Kaito FUNABIKI  Masahiro MORIKURA  Koji YAMAMOTO  Daisuke MURAYAMA  Katsuya NAKAHIRA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/11/25
      Vol:
    E100-B No:5
      Page(s):
    874-883

    Long-distance wireless local area networks (WLANs) are the key enablers of wide-area and low-cost access networks in rural areas. In a WLAN, the long propagation delay between an access point (AP) and stations (STAs) significantly degrades the throughput and creates a throughput imbalance because the delay causes unexpected frame collisions. This paper summarizes the problems caused in the medium access control (MAC) mechanism of the WLAN by a long propagation delay. We propose a MAC protocol for solving the delay-induced throughput degradation and the throughput imbalance between the uplink and the downlink in WLANs to address these problems. In the protocol, the AP extends NAV duration of CTS frame to protect an ACK frame and transmits its data frame to avoid delay induced frame collisions by piggybacking on the ACK frame transmission. We also provide a throughput model for the proposed protocol based on the Bianchi model. A numerical analysis using the proposed throughput model and simulation evaluation demonstrate that the proposed protocol increases the system throughput by 150% compared with that obtained using the conventional method, and the uplink throughput can be increased to the same level as the downlink throughput.

  • Change-Prone Java Method Prediction by Focusing on Individual Differences in Comment Density

    Aji ERY BURHANDENNY  Hirohisa AMAN  Minoru KAWAHARA  

     
    LETTER-Software Engineering

      Pubricized:
    2017/02/15
      Vol:
    E100-D No:5
      Page(s):
    1128-1131

    This paper focuses on differences in comment densities among individual programmers, and proposes to adjust the conventional code complexity metric (the cyclomatic complexity) by using the abnormality of the comment density. An empirical study with nine popular open source Java products (including 103,246 methods) shows that the proposed metric performs better than the conventional one in predicting change-prone methods; the proposed metric improves the area under the ROC curve (AUC) by about 3.4% on average.

  • Resource Sharing Strategy for D2D Communication Underlaying Multichannel Cellular Networks

    Yingjing QIAN  Ni ZHOU  Dajiang HE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/11/21
      Vol:
    E100-B No:5
      Page(s):
    818-825

    Device-to-device (D2D) communication enables two local users to communicate with each other directly instead of relaying through a third party, e.g., base station. In this paper, we study a subchannel sharing strategy underlaying multichannel cellular network for D2D pairs and existing cellular users (CUs). In the investigated scenario, we try to improve the spectrum efficiency of D2D pairs, but inevitably brings cross interference between two user groups. To combat interference, we attempt to assign each D2D pair with appropriate subchannels, which may belong to different CUs, and manipulate transmission power of all users so as to maximize the sum rate of all D2D pairs, while assuring each CU with a minimum data rate on its subchannel set. The formulated problem is a nonconvex problem and thus, obtaining its optimal solution is a tough task. However, we can find optimal power and subchannel assignment for a special case by setting an independent data rate constraint on each subchannel. Then we find an efficient method to calculate a gradient for our original problem. Finally, we propose a gradient-based search method to address the problem with coupled minimum data rate constraint. The performance of our proposed subchannel sharing strategy is illustrated via extensive simulation results.

  • Accurate Nanopower Supply-Insensitive CMOS Unit Vth Extractor and αVth Extractor with Continuous Variety

    Jing WANG  Li DING  Qiang LI  Hirofumi SHINOHARA  Yasuaki INOUE  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E100-A No:5
      Page(s):
    1145-1155

    In this paper, a nanopower supply-insensitive complementary metal-oxide-semiconductor (CMOS) unit threshold voltage (Vth) extractor circuit is proposed. It meets the contemporary industry demand for portable devices that operate with very low power consumption and small output sensitivity. An α times Vth (αVth) extractor is also described, in which α varies continuously. Both incremental and decremental αVth voltages are obtained. A post-layout simulation results using HSPICE with CMOS 0.18um process show that the proposed unit Vth extractor consumes 265nW of power given a 1.6V power supply. Sensitivity to temperature is 0.022%/°C ranging from 0°C to 100°C. Sensitivity to supply voltage is 0.027%/V.

  • Analysis of Effective Material Properties of Metal Dummy Fills in a CMOS Chip

    Takuichi HIRANO  Ning LI  Kenichi OKADA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/21
      Vol:
    E100-B No:5
      Page(s):
    793-798

    The equivalent anisotropic material parameters of metal dummy fills in a CMOS chip were extracted through an eigenmode analysis of a unit-cell of a space filled with metal dummies. The validity of the parameters was confirmed by comparing the S-parameters of a parallel-plate waveguide with the metal dummy fills and their effective material properties. The validity of the effective material properties was also confirmed by using them in a simulation of an on-chip dipole antenna.

  • Optimizing Sensing Scheduling for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Tran-Nhut-Khai HOAN  Vu-Van HIEP  Insoo KOO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/12/01
      Vol:
    E100-B No:5
      Page(s):
    884-892

    In this paper, we consider optimal sensing scheduling for sequential cooperative spectrum sensing (SCSS) technique in cognitive radio networks (CRNs). Activities of primary users (PU) on a primary channel are captured by using a two states discrete time Markov chain process and a soft combination is considered at the FC. Based on the theory of optimal stopping, we propose an algorithm to optimize the cooperative sensing process in which the FC sequentially asks each CU to report its sensing result until the stopping condition that provides the maximum expected throughput for the CRN is satisfied. Simulation result shows that the performance of the proposed scheme can be improved by further shortening the reporting overhead and reducing the probability of false alarm in comparison to other schemes in literature. In addition, the collision ratio on the primary channel is also investigated.

  • Improving the Performance of DOA Estimation Using Virtual Antenna in Automotive Radar

    Seokhyun KANG  Seongwook LEE  Jae-Eun LEE  Seong-Cheol KIM  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/25
      Vol:
    E100-B No:5
      Page(s):
    771-778

    In this paper, the virtual antenna technique is applied to a single input multiple output (SIMO) radar system to enhance the performance of the conventional beamforming direction of arrival (DOA) estimation method. Combining the virtual array generated by the interpolated array technique and the real array, the angular resolution of the DOA estimation algorithm is improved owing to the extended number of antennas and aperture size. Based on the proposed interpolation technique, we transform the position of the antenna elements in a uniform linear array (ULA) to the arbitrary positions to suppress the grating lobe and side lobe levels. In simulations, the pseudo spectrum of the Bartlett algorithm and the root mean square error (RMSE) of the DOA estimation with the signal-to-noise ratio (SNR) are analyzed for the real array and the proposed virtually extended array. Simulation results show that the angular resolution of the proposed array is better than that of the real array using the same aperture size of array and the number of antennas. The proposed technique is verified with the practical data from commercialized radar system.

  • Statistical Analysis of Phase-Only Correlation Functions between Real Signals with Stochastic Phase-Spectrum Differences

    Shunsuke YAMAKI  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Vol:
    E100-A No:5
      Page(s):
    1097-1108

    This paper proposes the statistical analysis of phase-only correlation functions between two real signals with phase-spectrum differences. For real signals, their phase-spectrum differences have odd-symmetry with respect to frequency indices. We assume phase-spectrum differences between two signals to be random variables. We next derive the expectation and variance of the POC functions considering the odd-symmetry of the phase-spectrum differences. As a result, the expectation and variance of the POC functions can be expressed by characteristic functions or trigonometric moments of the phase-spectrum differences. Furthermore, it is shown that the peak value of the POC function monotonically decreases and the sidelobe values monotonically increase as the variance of the phase-spectrum differences increases.

  • A Novel Procedure for Implementing a Turbo Decoder on a GPU with Coalesced Memory Access

    Heungseop AHN  Seungwon CHOI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:5
      Page(s):
    1188-1196

    The sub-blocking algorithm has been known as a core component in implementing a turbo decoder using a Graphic Processing Unit (GPU) to use as many cores in the GPU as possible for parallel processing. However, even though the sub-blocking algorithm allows a large number of threads in a given GPU to be adopted for processing a large number of sub-blocks in parallel, each thread must access the global memory with strided addresses, which results in uncoalesced memory access. Because uncoalesced memory access causes a lot of unnecessary memory transactions, the memory bandwidth efficiency drops significantly, possibly as low as 1/8 in the case of an Long Term Evolution (LTE) turbo decoder, depending upon the compute capability of a GPU. In this paper, we present a novel method for converting uncoalesced memory access into coalesced access in a way that completely recovers the memory bandwidth efficiency to 100% without additional overhead. Our experimental tests, performed with NVIDIA's Geforce GTX 780 Ti GPU, show that the proposed method can enhance the throughput by nearly 30% compared with a conventional turbo decoder that suffers from uncoalesced memory access. Throughput provided by the proposed method has been observed to be 51.4Mbps when the number of iterations and that of sub-blocks are set to 6 and 32, respectively, in our experimental tests, which far exceeds the performance of previous works implemented the Max-Log-MAP algorithm.

  • Network Assisted Wi-Fi Direct Based on Media Independent Services Framework for Allocating Optimized Radio Resources

    Hyunho PARK  Hyeong Ho LEE  Yong-Tae LEE  

     
    PAPER-Network

      Pubricized:
    2016/11/29
      Vol:
    E100-B No:5
      Page(s):
    728-737

    Wi-Fi Direct is a promising and available technology for device-to-device (D2D) proximity communications. To improve the performances of Wi-Fi Direct communication, optimized radio resource allocations are important. This paper proposes network assisted Wi-Fi Direct (NAWD), which operates based on the media independent services framework of IEEE 802.21 standard, for optimizing radio resource allocations. The NAWD is enhanced Wi-Fi Direct with the assistance of infrastructure networks (e.g., cellular network) and allocates radio resources (e.g., frequency channels and transmit power) to reduce radio interferences among Wi-Fi Direct devices (e.g., smart phones and set-top boxes). The NAWD includes mechanisms for gathering configuration information (e.g., location information and network connection information) of Wi-Fi Direct devices and allocating optimized radio resources (e.g., frequency channels and transmit power) to reduce radio interferences among Wi-Fi Direct devices. Simulation results show that the proposed NAWD increases significantly SINR, power efficiency, and areal capacity compared to legacy Wi-Fi Direct, where areal capacity is total traffic throughput per unit area.

3421-3440hit(20498hit)