The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

4721-4740hit(20498hit)

  • Performance Analysis of Dual-Hop OFDM Relay System with Subcarrier Mapping in Nakagami-m Fading

    Raza Ali SHAH  Nandana RAJATHEVA  Yusheng JI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:4
      Page(s):
    723-735

    Subcarrier mapping (SCM) is considered to be crucial for capacity-maximization in orthogonal frequency division multiplexing (OFDM) relaying networks and has been investigated extensively. However, no study has examined its exact or approximate close-form analysis under Nakagami-m fading. This paper considers the ordered subcarrier pairing schemes, i.e., worst-to-best (WTB) SCM and best-to-best (BTB) SCM, for the analysis of bit error rate (BER) and capacity of a dual-hop OFDM amplify-and-forward (AF) relay system. The system-analysis is presented for Nakagami-m fading with emphasis on two special cases: one-sided Gaussian fading ($(m= rac{1}{2})$) and Rayleigh fading (m=1). Close-form expressions for the probability density function (PDF) and moment generating function (MGF) of end-to-end SNR are derived while considering fixed gain AF relays. The classical MGF and PDF based approaches are used to compare the BER performance of the system with WTB SCM and BTB SCM schemes. Close-form expressions for the upper bound on ergodic capacity are derived by analyzing Jensen's inequality. Accurate analysis is presented for integer m while the non-integer m values allow the derivations of approximate expressions. The accuracy of the suggested approximation is verified analytically as well as numerically. The simulation results validate the analysis in Nakagami-m fading channel.

  • Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks

    Hae Young LEE  

     
    LETTER-Information Network

      Vol:
    E98-D No:4
      Page(s):
    964-967

    This letter presents a method to adaptively counter false data injection attacks (FDIAs) in wireless sensor networks, in which a fuzzy rule-based system detects FDIAs and chooses the most appropriate countermeasures. The method does not require en-route verification processes and manual parameter settings. The effectiveness of the method is shown with simulation results.

  • Prediction of Common-Mode Radiated Emission of PCB with an Attached Cable Using Imbalance Difference Model

    Nan ZHANG  Jong-hyeon KIM  Soo-jung RYU  Wansoo NAH  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E98-B No:4
      Page(s):
    638-645

    An imbalance difference model has been developed to estimate the common-mode radiated emission of a PCB with an attached cable. This model, however, requires significant computation time for full-wave simulation, especially if the attached cable is long, even with a powerful computer configuration. To solve this problem, a method that approximates the imbalance difference model as an equivalent asymmetrical dipole antenna is proposed in this paper. The common-mode radiated emission can be predicted using a line integration of the common-mode current distribution which is directly estimated by the asymmetrical antenna model. Unlike existing methods, the proposed method avoids the circuit construction normally used to measure the common-mode current, and is still able to accurately predict the maximum common-mode radiation. The effectiveness of the proposed method is verified by comparing the predicted results with the 3D full-wave simulation and the measured data gathered in an anechoic chamber.

  • Millimeter-Wave Evolution for 5G Cellular Networks Open Access

    Kei SAKAGUCHI  Gia Khanh TRAN  Hidekazu SHIMODAIRA  Shinobu NANBA  Toshiaki SAKURAI  Koji TAKINAMI  Isabelle SIAUD  Emilio Calvanese STRINATI  Antonio CAPONE  Ingolf KARLS  Reza AREFI  Thomas HAUSTEIN  

     
    PAPER

      Vol:
    E98-B No:3
      Page(s):
    388-402

    Triggered by the explosion of mobile traffic, 5G (5th Generation) cellular network requires evolution to increase the system rate 1000 times higher than the current systems in 10 years. Motivated by this common problem, there are several studies to integrate mm-wave access into current cellular networks as multi-band heterogeneous networks to exploit the ultra-wideband aspect of the mm-wave band. The authors of this paper have proposed comprehensive architecture of cellular networks with mm-wave access, where mm-wave small cell basestations and a conventional macro basestation are connected to Centralized-RAN (C-RAN) to effectively operate the system by enabling power efficient seamless handover as well as centralized resource control including dynamic cell structuring to match the limited coverage of mm-wave access with high traffic user locations via user-plane/control-plane splitting. In this paper, to prove the effectiveness of the proposed 5G cellular networks with mm-wave access, system level simulation is conducted by introducing an expected future traffic model, a measurement based mm-wave propagation model, and a centralized cell association algorithm by exploiting the C-RAN architecture. The numerical results show the effectiveness of the proposed network to realize 1000 times higher system rate than the current network in 10 years which is not achieved by the small cells using commonly considered 3.5GHz band. Furthermore, the paper also gives latest status of mm-wave devices and regulations to show the feasibility of using mm-wave in the 5G systems.

  • Simulation Study of Short-Channel Effect in MOSFET with Two-Dimensional Materials Channel

    Naoki HARADA  Shintaro SATO  Naoki YOKOYAMA  

     
    BRIEF PAPER-Semiconductor Materials and Devices

      Vol:
    E98-C No:3
      Page(s):
    283-286

    The short-channel effect (SCE) in a MOSFET with an atomically thin MoS$_{2}$ channel was studied using a TCAD simulator. We derived the surface potential roll-up, drain-induced barrier lowering (DIBL), threshold voltage, and subthreshold swing (SS) as indexes of the SCE and analyzed their dependency on the channel thickness (number of atomic layers) and channel length. The minimum scalable channel length for a one-atomic-layer-thick MoS$_{2}$ MOSFET was determined from the threshold voltage roll-off to be 7.6,nm. The one-layer-thick device showed a small DIBL of 87,mV/V at a 20 nm gate length. By using high-k gate insulator, an SS lower than 70,mV/dec is achievable in sub-10-nm-scale devices.

  • Development of Array Detectors with Three-Dimensional Structure toward 1000 Pixels of Superconducting Tunnel Junctions

    Go FUJII  Masahiro UKIBE  Shigetomo SHIKI  Masataka OHKUBO  

     
    BRIEF PAPER

      Vol:
    E98-C No:3
      Page(s):
    192-195

    Superconducting tunnel junction (STJ) array detectors can exhibit excellent performance with respect to energy resolution, detection efficiency, and counting rate in the soft X-ray energy range, by which those excellent properties STJ array detectors are well suited for detecting X-rays at synchrotron radiation facilities. However, in order to achieve a high throughput analysis for trace impurity elements such as dopants in structural or functional materials, the sensitive area of STJ array detectors should be further enlarged up to more than 10 times larger by increasing the pixel number in array detectors. In this work, for a large STJ-pixel number of up to 1000 within a 10,mm- square compact chip, we have introduced three-dimensional (3D) structure by embedding a wiring layer in a SiO$_{2}$ isolation layer underneath a base electrode layer of STJs. The 3D structure is necessary for close-packed STJ arrangement, avoiding overlay of lead wiring, which is common in conventional two-dimensional layout. The fabricated STJ showed excellent current-voltage characteristics having low subgap currents less than 2,nA, which are the same as those of conventional STJs. An STJ pixel has an energy resolution of 31,eV (FWHM) for C-K$alpha $ (277,eV).

  • Power Allocation for Two-Way OFDM-Based Spectrum Sharing Cognitive Radio Networks

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E98-A No:3
      Page(s):
    918-922

    This paper studies the problem of power allocation for a two-way orthogonal frequency division multiplexing (OFDM) based cognitive radio (CR) network to maximize the ergodic capacities of the secondary users (SUs). Under the assumption that the SUs know the channel state information (CSI) of the interference links between the SUs and the primary user (PU) perfectly, the optimal power allocation algorithm under the interference and transmit power constraints is derived. In addition, we further assume that the SUs only know the channel distribution information (CDI) of the interference links and propose a heuristic algorithm under the interference outage and transmit power constraints based on Gaussian approximation. It is shown that the ergodic capacity with CDI is not degraded compared to that with perfect CSI under tight transmit power constraint. Moreover, it is shown that the interference outage constraint is satisfied even for very small number of subcarriers if an interference power margin is adopted for Gaussian approximation.

  • Blind Carrier Frequency Offset Estimation Based on Weighted Subspace Projection Approach for Interleaved OFDMA Uplink

    Ann-Chen CHANG  Chih-Chang SHEN  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:3
      Page(s):
    878-880

    This letter deals with the carrier frequency offsets (CFO) estimation problem for orthogonal frequency division multiple access (OFDMA) uplink systems. Combined with centro-symmetric (CS) trimmed autocorrelation matrix and weighting subspace projection, the proposed estimator has better estimate performance than MVDR, MUSIC, CS-MUSIC, and ESPRIT estimators, especially in relatively less of OFDMA blocks and low SNR situations. Simulation results are presented to verify the efficiency of the proposed estimator.

  • Multidimensional QoE Estimation of Multi-View Video and Audio (MVV-A) IP Transmission

    Toshiro NUNOME  Shuji TASAKA  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E98-B No:3
      Page(s):
    515-524

    In this paper, we propose a framework for the real-time estimation of a multidimensional QoE of Multi-View Video and Audio (MVV-A) IP transmission. The framework utilizes linear multiple regression analysis with application-level and transport-level QoS parameters which can be measured in real time. In order to cope with a variety of MVV-A usage-situations, we introduce the concept of usage-situation type for grouping usage-situations with similar features to apply a representative regression line. We deal with two contents, two camera arrangements, and two user interfaces for viewpoint change as representative examples of the usage-situations. We assess multidimensional QoE of MVV-A with various types of average load, playout buffering time, and delay in the network. We then conduct the multiple regression analysis for the multidimensional QoE values represented by a psychological scale. From the comparison of measured values and estimated ones, we notice that real-time estimation of QoE is feasible in MVV-A IP transmission.

  • Response of a Superconducting Transition-Edge Sensor Microcalorimeter with a Mushroom-shaped Absorber to L X-rays Emitted by Transuranium Elements Open Access

    Keisuke MAEHATA  Makoto MAEDA  Naoko IYOMOTO  Kenji ISHIBASHI  Keisuke NAKAMURA  Katsunori AOKI  Koji TAKASAKI  Kazuhisa MITSUDA  Keiichi TANAKA  

     
    INVITED PAPER

      Vol:
    E98-C No:3
      Page(s):
    178-185

    A four-pixel-array superconducting transition-edge sensor (TES) microcalorimeter with a mushroom-shaped absorber was fabricated for the energy dispersive spectroscopy performed on a transmission electron microscope. The TES consists of a bilayer of Au/Ti with either a 50-nm or 120-nm thickness. The absorber of 5.0,$mu$m thick is made from a Au layer and its stem is deposited in the center of the TES surface. A Ta$_{2}$O$_{5}$ insulating layer of 100-nm thickness is inserted between the overhang region of the absorber and the TES surface. A selected pixel of the TES microcalorimeter was operated for the detection of Np L X-rays emitted from an $^{241}$Am source. A response of the TES microcalorimeter to L X-rays was obtained by analyzing detection signal pulses with using the optimal filter method. An energy resolution was obtained to be 33,eV of the full width at half maximum value at 17.751,keV of Np L$_{eta 1}$ considering its natural width of 13.4,eV. Response to L X-rays emitted from a mixture source of $^{238}$Pu, $^{239}$Pu and $^{241}$Am was obtained by operating the selected pixel of the TES microcalorimeter. Major L X-ray peaks of progeny elements of $alpha$ decay of Pu and Am isotopes were clearly identified in the obtained energy spectrum. The experimental results demonstrated the separation of $^{241}$Am and plutonium isotopes by L X-ray spectroscopy.

  • Multiple Impossible Differential Cryptanalysis on Reduced FOX

    Xinran LI  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:3
      Page(s):
    906-911

    FOX is a family of block ciphers published in 2004 and is famous for its provable security to cryptanalysis. In this paper, we present multiple 4-round impossible differentials and several new results of impossible differential attacks on 5,6,7-round FOX64 and 5-round FOX128 with the multiple differentials and the new early abort technique which shall reduce the data complexity and the time complexity respectively. In terms of the data complexity and the time complexity, our results are better than any of the previously known attacks.

  • Two-Step Pairing Algorithm for Target Range and Velocity Detection in FMCW Automotive Radar

    Eugin HYUN  Woojin OH  Jong-Hun LEE  

     
    PAPER-Digital Signal Processing

      Vol:
    E98-A No:3
      Page(s):
    801-810

    In automotive frequency modulated continuous wave (FMCW) radar based on multiple ramps with different slope, an effective pairing algorithm is required to simultaneously detect the target range and velocity. That is, as finding beat-frequencies intersecting at a single point of the range-Doppler map, we extract the range and velocity of a target. Unlike the ideal case, however, in a real radar system, even though multiple beat frequencies are originated from the same target, these beat frequencies have many different intersection values, resulting in mismatch pairing during the pairing step. Moreover, this problem also reduces the detection accuracy and the radar detection performance. In this study, we found that mismatch pairing is caused by the round-off errors of the range-beat frequency and Doppler frequency, as well as their various combinations in the discrete frequency domain. We also investigated the effect of mismatch pairing on detection performance, and proposed a new approach to minimize this problem. First, we propose integer and half-integer frequency position-based pairing method during extraction of the range and Doppler frequencies in each ramp to increase detection accuracy. Second, we propose a window-based pairing method to identify the same target from range-Doppler frequencies extracted in the first step. We also find the appropriate window size to overcome pairing mismatch. Finally, we propose the method to obtain a higher accuracy of range and velocity by weighting the values determined in one window. To verify the detection performance of the proposed method by comparison with the typical method, simulations were conducted. Then, in a real field test using the developed radar prototype, the detection probability of the proposed algorithm showed more than 60% improvement in comparison with the conventional method.

  • Dual-Band Sensor Network for Accurate Device-Free Localization in Indoor Environment with WiFi Interference

    Manyi WANG  Zhonglei WANG  Enjie DING  Yun YANG  

     
    PAPER-Network Computing and Applications

      Pubricized:
    2014/12/11
      Vol:
    E98-D No:3
      Page(s):
    596-606

    Radio Frequency based Device-Free Localization (RFDFL) is an emerging localization technique without requirements of attaching any electronic device to a target. The target can be localized by means of measuring the shadowing of received signal strength caused by the target. However, the accuracy of RFDFL deteriorates seriously in environment with WiFi interference. State-of-the-art methods do not efficiently solve this problem. In this paper, we propose a dual-band method to improve the accuracy of RFDFL in environment without/with severe WiFi interference. We introduce an algorithm of fusing dual-band images in order to obtain an enhanced image inferring more precise location and propose a timestamp-based synchronization method to associate the dual-band images to ensure their one-one correspondence. With real-world experiments, we show that our method outperforms traditional single-band localization methods and improves the localization accuracy by up to 40.4% in real indoor environment with high WiFi interference.

  • Low-Energy Optical-to-Electrical Converters Based on Superconducting Nanowire for Single-Flux-Quantum Circuits Open Access

    Kemmei KAJINO  Shigehito MIKI  Taro YAMASHITA  Hirotaka TERAI  

     
    INVITED PAPER

      Vol:
    E98-C No:3
      Page(s):
    227-231

    We report the energy-efficient optical input interface using NbN superconducting nanowire-based optical-to-electrical (SN-OE) converters for a single-flux-quantum (SFQ) data processing system. The SN-OE converters with small active areas ranging from 1$, imes,$1 to 10$, imes,$10,$mu$m$^2$ were fabricated to improve the recovery time by reducing the kinetic inductance of the nanowire. The SN-OE with the smallest area of 1$, imes,$1 $mu$m$^2$ showed the recovery time of around 0.3 ns, while its detection efficiency for a single photon was reduced below 0.1% due to insufficient coupling efficiency with a single-mode optical fiber. However, the optical power dependence of the error rate of this device showed that the required optical power to achieve the error rate below $10^{-12}$ at 10 GHz operation is as large as 70 $mu$W, which is still one order of magnitude lower than semiconductor photo diodes. We also demonstrated the operation of the SN-OE converters combined with the SFQ readout circuit and confirmed the operating speed up to 77~MHz.

  • Computational Complexity of Generalized Golf Solitaire

    Chuzo IWAMOTO  

     
    LETTER

      Vol:
    E98-D No:3
      Page(s):
    541-544

    Golf is a solitaire game, where the object is to move all cards from a 5×8 rectangular layout of cards to the foundation. A top card in each column may be moved to the foundation if it is either one rank higher or lower than the top card of the foundation. If no cards may be moved, then the top card of the stock may be moved to the foundation. We prove that the generalized version of Golf Solitaire is NP-complete.

  • Discrete-Time Linear Quadratic Optimal Control via Double Generating Functions

    Dijian CHEN  Zhiwei HAO  Kenji FUJIMOTO  Tatsuya SUZUKI  

     
    PAPER-Systems and Control

      Vol:
    E98-A No:3
      Page(s):
    833-842

    This paper develops the double generating function method for the discrete-time linear quadratic optimal control problem. This method can give generators for optimal solutions only in terms of pre-computed coefficients and boundary conditions, which is useful for the on-line repetitive computation for different boundary conditions. Moreover, since each generator contains inverse terms, the invertibility analysis is also performed to conclude that the terms in the generators constructed by double generating functions with opposite time directions are invertible under some mild conditions, while the terms with the same time directions will become singular when the time goes infinity which may cause instability in numerical computations. Examples demonstrate the effectiveness of the developed method.

  • Superconducting On-Chip Spectrometery for Millimeter-submillimeter Wave Astronomy Open Access

    Akira ENDO  

     
    INVITED PAPER

      Vol:
    E98-C No:3
      Page(s):
    219-226

    Since the birth of astrophysics, astronomers have been using free-space optics to analyze light falling on Earth. In the future however, thanks to the advances in photonics and nanoscience/nanotechnology, much of the manipulation of light might be carried out using not optics but confined waveguides, or circuits, on a chip. This new generation of instruments will be not only extremely compact, but also powerful in performance because the integration enables a greater degree of multiplexing. The benefit is especially profound for space- or air-borne observatories, where size, weight, and mechanical reliability are of top priority. Recently, several groups around the world are trying to integrate ultra-wideband (UWB), low-resolution spectrometers for millimeter-submillimeter waves onto microchips, using superconducting microelectronics. The scope of this Paper is to provide a general introduction and a review of the state-of-the-art of this rapidly advancing field.

  • Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model

    Eiichiro FUJISAKI  Akinori KAWACHI  Ryo NISHIMAKI  Keisuke TANAKA  Kenji YASUNAGA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:3
      Page(s):
    853-862

    Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f(x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient PKE scheme exists if the adversary may have access to the secret-key leakage oracle to receive only one bit after it was given the challenge ciphertext. Similarly, there exists no sender-randomness leakage resilient PKE scheme if one-bit leakage occurs after the target public key was given to the adversary. At TCC 2011, Halevi and Lin have broken the barrier of after-the-fact leakage, by proposing the so-called split state model, where a secret key of a party is explicitly divided into at least two pieces, and the adversary may have not access to the entire secret at once, but each divided pieces, one by one. In the split-state model, they have constructed post-challenge secret-key leakage resilient CPA secure PKEs from hash proof systems, but the construction of CCA secure post-challenge secret-key leakage PKE has remained open. They have also remained open to construct sender-randomness leakage PKE in the split state model. This paper provides a solution to the open issues. We also note that the proposal of Halevi and Lin is post-challenge secret-key leakage CPA secure against a single challenge ciphertext; not against multiple challenges. We present an efficient generic construction that converts any CCA secure PKE scheme into a multiple-challenge CCA secure PKE that simultaneously tolerates post-challenge secret-key and sender-randomness leakage in the split state model, without any additional assumption. In addition, our leakage amount of the resulting schemes is the same as that of Halevi and Lin CPA PKE, i.e., (1/2+γ)l/2 where l denotes the length of the entire secret (key or randomness) and γ denotes a universal (possitive) constant less than 1/2. Our conversion is generic and available for many other public-key primitives. For instance, it can convert any identity-based encryption (IBE) scheme to a post-challenge master-key leakage and sender-randomness leakage secure IBE.

  • Trigger Circuit of Hardware Trojan Based on Up/Down Counter

    Zhe HUANG  Ruohe YAO  Fei LUO  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E98-C No:3
      Page(s):
    279-282

    A new trigger circuit based on up/down counter is proposed. This trigger circuit consists of a up/down counter and a pulse conversion circuit. Compared with a trigger circuit based on 32-bit counter, the proposed trigger circuit occupies less circuit area and consumes less power consumption, while the trigger process can be inversed, increasing the controllability of the Trojan.

  • An Efficient Filtering Method for Scalable Face Image Retrieval

    Deokmin HAAM  Hyeon-Gyu KIM  Myoung-Ho KIM  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2014/12/11
      Vol:
    E98-D No:3
      Page(s):
    733-736

    This paper presents a filtering method for efficient face image retrieval over large volume of face databases. The proposed method employs a new face image descriptor, called a cell-orientation vector (COV). It has a simple form: a 72-dimensional vector of integers from 0 to 8. Despite of its simplicity, it achieves high accuracy and efficiency. Our experimental results show that the proposed method based on COVs provides better performance than a recent approach based on identity-based quantization in terms of both accuracy and efficiency.

4721-4740hit(20498hit)