The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

6181-6200hit(20498hit)

  • Semi-Analytical Method for Scattering by Finite Array of Magnetized Ferrite Circular Cylinders Based on the Model of Cylindrical Structures

    Vakhtang JANDIERI  Kiyotoshi YASUMOTO  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E96-C No:1
      Page(s):
    115-118

    A semi-analytical method for a planar periodic array formed by a finite number of magnetized ferrite circular cylinders is presented using a model of layered cylindrical structures. The method uses the T-matrix approach and the extraction of the reflection and transmission matrices based on the cylindrical harmonic mode expansion. Based on the proposed method, plane wave scattering by the finite number of magnetized ferrite circular cylinders is numerically studied from the viewpoint of realization the electronic switching and electronic scanning effects by varying the applied magnetic field.

  • Implementation of Reflection on Curved Surfaces and Physical Optics in Ray Tracing for Tunnel Propagation

    Yukiko KISHIKI  Jun-ichi TAKADA  Gilbert Siy CHING  Hajime TAKAO  Yoshihiro SUGIHARA  Shigeaki MATSUNAGA  Fumiya UESAKA  

     
    PAPER-Radiowave Propagation

      Vol:
    E96-C No:1
      Page(s):
    42-50

    For the modeling of multipath propagation in every wireless systems, the ray tracing method has been widely studied. However, large errors may result due to the approximation of geometrical optics in curved surfaces. This paper therefore focused on the curved surfaces and edges, which are difficult to handle in ray tracing. Examples of curved surfaces can be found in arched cross-section tunnels which are common in highway networks of mountainous areas. The traditional ray tracing method of dividing the curved surface into smaller flat plates is not so accurate as the size of smaller plates may not satisfy the geometrical optics assumption, and the reflection point which satisfies Fermat's principle may not exist. In this work, a new ray tracing method is proposed with 2 contributions. The first one is the implementation of the reflection coefficient for curved surfaces in ray tracing. The second is applying the physical optics method on the caustics region. To evaluate these methods, path gain simulation results for an arched cross-section model are compared with measurements made inside an arched tunnel. To further improve the simulation results, the effect of rough surface is introduced, and the results are again compared with measurement.

  • Boundary Element Analysis of Beam Dynamics in Streak Camera Considering Space Charge Effects

    Hideki KAWAGUCHI  Kazunori MAEDA  Shohei KODATE  Yoshihiro ITO  

     
    PAPER-Numerical Techniques

      Vol:
    E96-C No:1
      Page(s):
    28-34

    Streak cameras are now widely used for measurements of ultra short phenomena, such as those in semi conductor luminescence and plasma gaseous discharge. To further improve the temporal resolution and carry out higher-dimensional measurements, it is necessary to understand the electron beam behavior in detail. Thus, numerical simulations play an important role in the analysis of the streak camera. The authors have been working on the development of a numerical simulation code that uses the finite difference method (FDM) for electric field analysis, the Runge-Kutta (R-K) method for charged particle motion determination, and the particle-in-cell (PIC) method for charge density calculation. However, the use of the PIC method leads to inaccuracy in the charge density calculation in cases of high-density electron beams. To improve the accuracy of the conventional analysis of the streak camera, we perform the boundary element (BE) analysis of the streak camera.

  • A New Type of Fault-Based Attack: Fault Behavior Analysis

    Yang LI  Kazuo OHTA  Kazuo SAKIYAMA  

     
    PAPER-Implementation

      Vol:
    E96-A No:1
      Page(s):
    177-184

    Fault-based attacks are very powerful to recover the secret key for cryptographic implementations. In this work, we consider the faulty output value under a certain fault injection intensity as a new type of leakage called faulty behavior. We examine the data-dependency of the faulty behavior and propose a related side-channel attack called fault behavior analysis (FBA). To verify the validity of the proposed attack, we first show that our attack can work effectively on AES-COMP of SASEBO-R. Then we show how to apply the similar attack on two AES implementations with masking countermeasures, i.e., AES-MAO and AES-TI. Finally we compare the proposed FBA attack with the DFA attack and the FSA attack, trying to complete the research map for the fault-based attack based on setup-time violations.

  • Scattering of a Scalar Plane Wave by a Sinusoidal Edge

    Tomoya IZUTSU  Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E96-C No:1
      Page(s):
    55-59

    We deal with the scattering of a scalar plane wave by a half plane with a sinusoidally deformed edge from a straight edge by a physical optics approximation. The normal incidence of a plane wave to an edge is assumed. A contribution of an edge to the field integral is asymptotically evaluated and the basic properties of the scattering caused by the edge deformation is clarified. The scattering pattern has peaks at specific scattering angles, which agree with diffraction angles calculated by the well-known grating formula for normal incidence. Some numerical examples are shown and it is shown that the results are in good agreement with the results obtained by the GTD method for low angle incidence.

  • A Greedy Genetic Algorithm for the TDMA Broadcast Scheduling Problem

    Chih-Chiang LIN  Pi-Chung WANG  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E96-D No:1
      Page(s):
    102-110

    The broadcast scheduling problem (BSP) in wireless ad-hoc networks is a well-known NP-complete combinatorial optimization problem. The BSP aims at finding a transmission schedule whose time slots are collision free in a wireless ad-hoc network with time-division multiple access (TDMA). The transmission schedule is optimized for minimizing the frame length of the node transmissions and maximizing the utilization of the shared channel. Recently, many metaheuristics can optimally solve smaller problem instances of the BSP. However, for complex problem instances, the computation of metaheuristics can be quite time and memory consuming. In this work, we propose a greedy genetic algorithm for solving the BSP with a large number of nodes. We present three heuristic genetic operators, including a greedy crossover and two greedy mutation operators, to optimize both objectives of the BSP. These heuristic genetic operators can generate good solutions. Our experiments use both benchmark data sets and randomly generated problem instances. The experimental results show that our genetic algorithm is effective in solving the BSP problem instances of large-scale networks with 2,500 nodes.

  • An Asynchronous Striping-Aware Readahead Framework for Disk Arrays in Linux

    Sung Hoon BAEK  

     
    PAPER-Software System

      Vol:
    E96-D No:1
      Page(s):
    19-27

    Disk arrays and prefetching schemes are used to mitigate the performance gap between main memory and disks. This paper presents a new problem that arises if prefetching schemes that are widely used in operation systems are applied to disk arrays. The key point of the problem is that block address space from the viewpoint of the host is contiguous but from that of the disk array it is discontiguous and thus more disk accesses than expected are required. This paper presents two ways to resolve the problem that arises from the Linux readahead framework. The proposed scheme prevents a readahead window from being split into multiple requests from the viewpoint of the disk array but not from the viewpoint of the host thereby reducing disk head movements. In addition, it outperforms the prior work by adopting an asynchronous solution, improving performance for fragmented files, eliminating readahead size restriction, and improving disk parallelism. We implemented the proposed scheme and integrated it with Linux. Our experiment shows that the solution significantly improved the original Linux readahead framework when a storage server processes multiple concurrent requests.

  • Traffic Flow Simulator Using Virtual Controller Model

    Haijun LIANG  Hongyu YANG  Bo YANG  

     
    LETTER-Intelligent Transport System

      Vol:
    E96-A No:1
      Page(s):
    391-393

    A new paradigm for building Virtual Controller Model (VCM) for traffic flow simulator is developed. It is based on flight plan data and is applied to Traffic Flow Management System (TFMS) in China. The problem of interest is focused on the sectors of airspace and how restrictions to aircraft movement are applied by air traffic controllers and demand overages or capacity shortfalls in sectors of airspace. To estimate and assess the balance between the traffic flow and the capacity of sector in future, we apply Virtual Controller model, which models by the sectors airspace system and its capacity constraints. Numerical results are presented and illustrated by applying them to air traffic data for a typical day in the Traffic Flow Management System. The results show that the predictive capabilities of the model are successfully validated by showing a comparison between real flow data and simulated sector flow, making this method appropriate for traffic flow management system.

  • Facial Micro-Expression Detection in Hi-Speed Video Based on Facial Action Coding System (FACS)

    Senya POLIKOVSKY  Yoshinari KAMEDA  Yuichi OHTA  

     
    PAPER-Pattern Recognition

      Vol:
    E96-D No:1
      Page(s):
    81-92

    Facial micro-expressions are fast and subtle facial motions that are considered as one of the most useful external signs for detecting hidden emotional changes in a person. However, they are not easy to detect and measure as they appear only for a short time, with small muscle contraction in the facial areas where salient features are not available. We propose a new computer vision method for detecting and measuring timing characteristics of facial micro-expressions. The core of this method is based on a descriptor that combines pre-processing masks, histograms and concatenation of spatial-temporal gradient vectors. Presented 3D gradient histogram descriptor is able to detect and measure the timing characteristics of the fast and subtle changes of the facial skin surface. This method is specifically designed for analysis of videos recorded using a hi-speed 200 fps camera. Final classification of micro expressions is done by using a k-mean classifier and a voting procedure. The Facial Action Coding System was utilized to annotate the appearance and dynamics of the expressions in our new hi-speed micro-expressions video database. The efficiency of the proposed approach was validated using our new hi-speed video database.

  • A Thermal-Aware High-Level Synthesis Algorithm for RDR Architectures through Binding and Allocation

    Kazushi KAWAMURA  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E96-A No:1
      Page(s):
    312-321

    With process technology scaling, a heat problem in ICs is becoming a serious issue. Since high temperature adversely impacts on reliability, design costs, and leakage power, it is necessary to incorporate thermal-aware synthesis into IC design flows. In particular, hot spots are serious concerns where a chip is locally too much heated and reducing the peak temperature inside a chip is very important. On the other hand, increasing the average interconnect delays is also becoming a serious issue. By using RDR architectures (Regular-Distributed-Register architectures), the interconnect delays can be easily estimated and their influence can be much reduced even in high-level synthesis. In this paper, we propose a thermal-aware high-level synthesis algorithm for RDR architectures. The RDR architecture divides the entire chip into islands and each island has uniform area. Our algorithm balances the energy consumption among islands through re-binding to functional units. By allocating some new additional functional units to vacant areas on islands, our algorithm further balances the energy consumption among islands and thus reduces the peak temperature. Experimental results demonstrate that our algorithm reduces the peak temperature by up to 9.1% compared with the conventional approach.

  • Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines

    Kuniyasu SUZAKI  Kengo IIJIMA  Toshiki YAGI  Cyrille ARTHO  

     
    PAPER-System Security

      Vol:
    E96-A No:1
      Page(s):
    215-224

    Memory deduplication improves the utilization of physical memory by sharing identical blocks of data. Although memory deduplication is most effective when many virtual machines with same operating systems run on a CPU, cross-user memory deduplication is a covert channel and causes serious memory disclosure attack. It reveals the existence of an application or file on another virtual machine. The covert channel is a difference in write access time on deduplicated memory pages that are re-created by Copy-On-Write, but it has some interferences caused by execution environments. This paper indicates that the attack includes implementation issues caused by memory alignment, self-reflection between page cache and heap, and run-time modification (swap-out, anonymous pages, ASLR, preloading mechanism, and self-modification code). However, these problems are avoidable with some techniques. In our experience on KSM (kernel samepage merging) with the KVM virtual machine, the attack could detect the security level of attacked operating systems, find vulnerable applications, and confirm the status of attacked applications.

  • Analysis of Two-Dimensional Photonic Crystal Optical Power Splitter with Microcavity

    Yoshihiro NAKA  Yusui NAKAMURA  

     
    BRIEF PAPER-Periodic Structures

      Vol:
    E96-C No:1
      Page(s):
    73-76

    An efficient 12 optical power splitter constructed by a two-dimensional photonic crystal has been analyzed using the finite difference time domain (FD-TD) method. The power splitter has a microcavity which is coupled to an input and two output waveguides. We have confirmed that all optical power is transmitted into output waveguides due to resonant tunneling caused by the microcavity.

  • Channel Localization Mechanism for Wi-Fi Systems

    Sungho HWANG  Kyungjun KIM  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:1
      Page(s):
    383-386

    This paper identifies a ripple effect problem (REP) that spreads interference to neighbors and proposes a novel channel localization mechanism to decrease the REP in a Wi-Fi system. The proposed mechanism has less blocking probability when compared to a random channel allocation mechanism and also has increased channel reusability. The proposed mechanism in simulation yields less channels BEm as the number of users and Tused increase.

  • Minimizing False Peak Errors in Generalized Cross-Correlation Time Delay Estimation Using Subsample Time Delay Estimation

    SooHwan CHOI  DooSeop EOM  

     
    PAPER-Digital Signal Processing

      Vol:
    E96-A No:1
      Page(s):
    304-311

    The Generalized cross-correlation (GCC) method is most commonly used for time delay estimation (TDE). However, the GCC method can result in false peak errors (FPEs) especially at a low signal to noise ratio (SNR). These FPEs significantly degrade TDE, since the estimation error, which is the difference between a true time delay and an estimated time delay, is larger than at least one sampling period. This paper introduces an algorithm that estimates two peaks for two cross-correlation functions using three types of signals such as a reference signal, a delayed signal, and a delayed signal with an additional time delay of half a sampling period. A peak selection algorithm is also proposed in order to identify which peak is closer to the true time delay using subsample TDE methods. This paper presents simulations that compare the algorithms' performance for varying amounts of noise and delay. The proposed algorithms can be seen to display better performance, in terms of the probability of the integer TDE errors, as well as the mean and standard deviation of absolute values of the time delay estimation errors.

  • Thresholding Process Based Dynamic Programming Track-Before-Detect Algorithm

    Wei YI  Lingjiang KONG  Jianyu YANG  

     
    PAPER-Sensing

      Vol:
    E96-B No:1
      Page(s):
    291-300

    Dynamic Programming (DP) based Track-Before-Detect (TBD) algorithm is effective in detecting low signal-to-noise ratio (SNR) targets. However, its complexity increases exponentially as the dimension of the target state space increases, so the exact implementation of DP-TBD will become computationally prohibitive if the state dimension is more than two or three, which greatly prevents its applications to many realistic problems. In order to improve the computational efficiency of DP-TBD, a thresholding process based DP-TBD (TP-DP-TBD) is proposed in this paper. In TP-DP-TBD, a low threshold is first used to eliminate the noise-like (with low-amplitude) measurements. Then the DP integration process is modified to only focuses on the thresholded higher-amplitude measurements, thus huge amounts of computation devoted to the less meaningful low-amplitude measurements are saved. Additionally, a merit function transfer process is integrated into DP recursion to guarantee the inheritance and utilization of the target merits. The performance of TP-DP-TBD is investigated under both optical style Cartesian model and surveillance radar model. The results show that substantial computation reduction is achieved with limited performance loss, consequently TP-DP-TBD provides a cost-efficient tradeoff between computational cost and performance. The effect of the merit function transfer on performance is also studied.

  • A Novel Low-Complexity Channel Estimation Approach for Single Carrier MIMO Frequency Selective Channels

    Suyue LI  Jian XIONG  Lin GUI  Youyun XU  Baoyu ZHENG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    233-241

    A simple yet effective time domain correlation channel estimation method is proposed for multiple-input multiple-output (MIMO) systems over dispersive channels. It is known that the inherent co-channel interference (CCI) and inter-symbol interference (ISI) coexist when the signals propagate through MIMO frequency selective channels, which renders the MIMO channel estimation intractable. By elaborately devising the quasi-orthogonal training sequences between multiple antennas which have constant autocorrelation property with different cyclic shifts in the time domain, the interferences induced by ISI and CCI can be simultaneously maintained at a constant and identical value under quasi-static channels. As a consequence, it is advisable to implement the joint ISI and CCI cancelation by solving the constructed linear equation on the basis of the correlation output with optional correlation window. Finally, a general and simplified closed-form expression of the estimated channel impulse response can be acquired without matrix inversion. Additionally, the layered space-time (LST) minimum mean square error (MMSE) (LST-MMSE) frequency domain equalization is briefly described. We also provide some meaningful discussions on the beginning index of the variable correlation window and on the cyclic shift number of m-sequence of other antennas relative to the first antenna. Simulation results demonstrate that the proposed channel estimation approach apparently outperforms the existing schemes with a remarkable reduction in computational complexity.

  • Design of a Dual-Band Dual-Polarization Array Antenna with Improved Bandwidth for AMRFC Radar Application

    Youngki LEE  Deukhyeon GA  Daesung PARK  Seokgon LEE  Jaehoon CHOI  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:1
      Page(s):
    182-189

    A dual-band dual-polarization array antenna with improved bandwidth for an advanced multi-function radio function concept (AMRFC) radar application is proposed. To improve the S-band impedance bandwidth, the proposed antenna uses modified coupling feed patch. The measured bandwidth of the prototype array is 19.8% and 25.7% for the S- and X-band, respectively. The isolation between the two orthogonal polarizations is higher than 15 dB and cross-polarization level is less than -17 dB for both S- and X-bands.

  • Adaptive Limited Dynamic Bandwidth Allocation Scheme to Improve Bandwidth Sharing Efficiency in Hybrid PON Combining FTTH and Wireless Sensor Networks

    Monir HOSSEN  Masanori HANAWA  

     
    PAPER-Network

      Vol:
    E96-B No:1
      Page(s):
    127-134

    This paper proposes a dynamic bandwidth allocation algorithm that improves the network performance and bandwidth sharing efficiency in the upstream channels of a hybrid passive optical network (PON) that combines a fiber-to-the-home (FTTH) access network and wireless sensor networks (WSNs). The algorithm is called the adaptive limited dynamic bandwidth allocation (ALDBA) algorithm. Unlike existing algorithms, the ALDBA algorithm is not limited to controlling just FTTH access networks, it also supports WSNs. For the proposed algorithm, we investigate the difference in the lengths of generated data packets between the FTTH terminals and sensor nodes of WSN to effectively evaluate the end-to-end average packet delay, bandwidth utilization, time jitter, and upstream efficiency. Two variants of the proposed algorithm and a limited service (LS) scheme, which is an existing well-known algorithm, are compared under non-uniform traffic conditions without taking into consideration priority scheduling. We demonstrate the proposed scheme through simulation by generating a realistic network traffic model, called self-similar network traffic. We conducted a detailed simulation using several performance parameters to validate the effectiveness of the proposed scheme. The results of the simulation showed that both ALDBA variants outperformed the existing LS scheme in terms of average packet delay, bandwidth utilization, jitter, and upstream efficiency for both low and high traffic loads.

  • Provable Security against Cryptanalysis with Impossible Differentials

    Kazumaro AOKI  

     
    LETTER

      Vol:
    E96-A No:1
      Page(s):
    233-236

    This letter discusses with cryptanalysis with impossible differentials. After Biham et al. presented an attack on Skipjack, the applications to many ciphers were done, and we think that the attack is one of the most effective tool to cryptanalyze a block cipher. However, unfortunately, there is no construction method that provably resists the attack. This letter first introduces the measure that can evaluate the resistance against cryptanalysis with impossible differentials. Then, we propose a construction that resists cryptanalysis with impossible differentials. Moreover, a cipher that is based on the construction also provably resists differential cryptanalysis and linear cryptanalysis.

  • Network-Resource Isolation for Virtualization Nodes

    Yasusi KANADA  Kei SHIRAISHI  Akihiro NAKAO  

     
    PAPER

      Vol:
    E96-B No:1
      Page(s):
    20-30

    One key requirement for achieving network virtualization is resource isolation among slices (virtual networks), that is, to avoid interferences between slices of resources. This paper proposes two methods, per-slice shaping and per-link policing for network-resource isolation (NRI) in terms of bandwidth and delay. These methods use traffic shaping and traffic policing, which are widely-used traffic control methods for guaranteeing QoS. Per-slice shaping utilizes weighted fair queuing (WFQ) usually applied to a fine-grained flow such as a flow from a specific server application to a user. Since the WFQ for fine-grained flows requires many queues, it may not scale to a large number of slices with a large number of virtual nodes. Considering that the purpose of NRI is not thoroughly guaranteeing QoS but avoiding interferences between slices, we believe per-slice (not per virtual link) shaping satisfies our objective. In contrast, per-link policing uses traffic policing per virtual link. It requires less resource and achieves less-strict but more-scalable isolation between hundreds of slices (500 to 700 slices in estimation). Our results show that both methods perform NRI well but the performance of the former is better in terms of delay. Accordingly, per-slice shaping (with/without policing) is effective for delay-sensitive services while per-link policing may be sufficiently used for the other types of services.

6181-6200hit(20498hit)