The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

6441-6460hit(20498hit)

  • Crosstalk Analysis and Measurement Technique for High Frequency Signal Transfer in MEMs Probe Pins

    Duc Long LUONG  Hyeonju BAE  Wansoo NAH  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1459-1464

    This paper develops a methodology of crosstalk analysis/measurement techniques for the design and fabrication of the MEMs (Micro-ElectroMichanical system) probe card. By introducing more ground pins into the connector pins, the crosstalk characteristics can be enhanced and a design guide for the parameters, such as pin's size and pitch is proposed to satisfy the given crosstalk limitation of -30 dB for reliable high speed signal transfer. The paper also presents a novel method to characterize scattering parameters of multiport interconnect circuits with a 4-port VNA (Vector Network Analyzer). By employing the re-normalization of scattering matrices with different reference impedances at other ports, data obtained from 4-port configuration measurements can be synthesized to build a full scattering matrix of the DUT (Device-Under-Test, MEMs probe connector pins). In comparison to the conventional 2-port VNA re-normalization method, proposed technique has two advantages: saving of measuring time, and enhanced accuracy even with open-ended unmeasured ports. A good agreement of the estimated and correct S parameters verifies the validness of the proposed algorithm.

  • CSMA/CA Unicast Communication Performance under Fading Environment with Two-Dimensional Distribution of Hidden Terminal

    Jingze DAI  Yasushi YAMAO  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2708-2717

    Performance of CSMA/CA wireless communication is severely affected by hidden terminal (HT) problem that results in failure of carrier sense and causes packet error due to collision. However, no mathematical analysis method for the HT problem has been available that takes into account actual radio environments including both fading and capture effect. This paper presents an analysis method that enables to well predict the probability of successful communication (PSC) and communication efficiency for CSMA/CA unicast communication including the interaction of data and ACK packets. Analysis of the PSC with two-dimensional HT distribution makes it easy to understand the influence of HT location and carrier sense level. Also it is shown that there is considerable difference on the PSC between fading and fading-free environments. The obtained results as well as the proposed analysis method are quite useful in CSMA/CA network design for WLAN and sensor network applications.

  • Environmentally-Friendly Switches: Arcing Phenomena in Vacuum and SF6 Substitutes

    Shenli JIA  Xingwen LI  Zongqian SHI  Lijun WANG  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1452-1458

    This paper focuses on the latest research of switching arc both in vacuum and SF6 substitutes in our group. The crucial characteristics of vacuum arc are illustrated, including the motion and distribution of single cathode spot and multiple cathode spots, the influence of axial magnetic field on arc plasma characteristics, the influence of composite magnetic field on cathode jets, and the study of anode activities. Meanwhile, the arc characteristics in SF6 and its substitutes (Ar, CO2 and N2) at different pressures and gap distances are investigated by experiments and simulation.

  • Efficient Voice Transmissions for MIL-STD-188-220-Based Wideband Tactical Systems

    Sewon HAN  Byung-Seo KIM  

     
    LETTER-Network

      Vol:
    E95-B No:9
      Page(s):
    2964-2967

    Unlike analogue voice signal-oriented and narrowband-based conventional tactical systems, the future tactical networks will deal with packet-based voice traffic over a wide channel bandwidth. In this paper, a method is proposed to improve the performance of voice packet transmission for MIL-STD-188-220 military standard-based wideband communication systems. By utilizing Bump-Slots for voice packet transmissions, significant improvements are achieved. This is confirmed by extensive simulations.

  • Delay Evaluation of Issue Queue in Superscalar Processors with Banking Tag RAM and Correct Critical Path Identification

    Kyohei YAMAGUCHI  Yuya KORA  Hideki ANDO  

     
    PAPER-Computer System

      Vol:
    E95-D No:9
      Page(s):
    2235-2246

    This paper evaluates the delay of the issue queue in a superscalar processor to aid microarchitectural design, where quick quantification of the complexity of the issue queue is needed to consider the tradeoff between clock cycle time and instructions per cycle. Our study covers two aspects. First, we introduce banking tag RAM, which comprises the issue queue, to reduce the delay. Unlike normal RAM, this is not straightforward, because of the uniqueness of the issue queue organization. Second, we explore and identify the correct critical path in the issue queue. In a previous study, the critical path of each component in the issue queue was summed to obtain the issue queue delay, but this does not give the correct delay of the issue queue, because the critical paths of the components are not connected logically. In the evaluation assuming 32-nm LSI technology, we obtained the delays of issue queues with eight to 128 entries. The process of banking tag RAM and identifying the correct critical path reduces the delay by up to 20% and 23% for 4- and 8-issue widths, respectively, compared with not banking tag RAM and simply summing the critical path delay of each component.

  • Smaller Bound of Superconcentrator

    Chen YUAN  Haibin KAN  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E95-D No:9
      Page(s):
    2339-2342

    A Superconcentrator is a directed acyclic graph with specific properties. The existence of linear-sized supercentrator has been proved in [4]. Since then, the size has been decreased significantly. The best known size is 28N which is proved by U. Schöning in [8]. Our work follows their construction and proves a smaller size superconcentrator.

  • CompSize: A Model-Based and Automated Approach to Size Estimation of Embedded Software Components

    Kenneth LIND  Rogardt HELDAL  

     
    PAPER

      Vol:
    E95-D No:9
      Page(s):
    2183-2192

    Accurate estimation of Software Code Size is important for developing cost-efficient embedded systems. The Code Size affects the amount of system resources needed, like ROM and RAM memory, and processing capacity. In our previous work, we have estimated the Code Size based on CFP (COSMIC Function Points) within 15% accuracy, with the purpose of deciding how much ROM memory to fit into products with high cost pressure. Our manual CFP measurement process would require 2.5 man years to estimate the ROM size required in a typical car. In this paper, we want to investigate how the manual effort involved in estimation of Code Size can be minimized. We define a UML Profile capturing all information needed for estimation of Code Size, and develop a tool for automated estimation of Code Size based on CFP. A case study will show how UML models save manual effort in a realistic case.

  • Novel Watermarked MDC System Based on SFQ Algorithm

    Lin-Lin TANG  Jeng-Shyang PAN  Hao LUO  Junbao LI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2922-2925

    A novel watermarked MDC system based on the SFQ algorithm and the sub-sampling method is proposed in this paper. Sub-sampling algorithm is applied onto the transformed image to introduce some redundancy between different channels. Secret information is embedded into the preprocessed sub-images. Good performance of the new system to defense the noise and the compression attacks is shown in the experimental results.

  • Wireless Secure Communications via Cooperative Relaying and Jamming

    Ling TANG  Hao CHEN  Jianhui WU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2774-2784

    We consider wireless secure communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored: cooperative relaying (CR) and cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdropper's channel state information (ECSI). Then, for the case with ECSI, we derive the conditions under which CR achieves a higher secrecy rate than CJ; for the case without ECSI, we compare the secrecy rates of CR and CJ in high transmit power regimes. Building on this, we propose a novel hybrid scheme in which the relay utilizes both CR and CJ, and study the power allocation of the relay between CR and CJ for maximizing the secrecy rate under individual power constraints. Further, we study the case with imperfect channel state information (CSI) for both CR and CJ. At last, extensive numerical results are provided.

  • Event Information Based Optimal Sensor Deployment for Large-Scale Wireless Sensor Networks

    Yunbum CHOI  Ikram SYED  Hoon KIM  

     
    LETTER-Network

      Vol:
    E95-B No:9
      Page(s):
    2944-2947

    Sensor deployment to achieve better system performance is one of the critical issues in wireless sensor networks (WSN). This letter proposes an effective sensor deployment scheme for large area sensor networks, where the event occurrence rate varies over the sensor-deployed region. Based on local event occurrence rate, the proposed scheme determines the number of sensors that should be deployed in each local region to maximize the overall detection probability. Simulation results show that the sensor deployment by the proposed scheme improves detection capability by 21% in comparison to the Incidence algorithm.

  • Response-Time Acceleration of a Frontend Amplifier for High Output Impedance Sensors

    Kamel MARS  Shoji KAWAHITO  

     
    PAPER-Electronic Circuits

      Vol:
    E95-C No:9
      Page(s):
    1543-1548

    This paper presents a response time acceleration technique in a high-gain capacitive-feedback frontend amplifier (FA) for high output impedance sensors. Using an auxiliary amplifier as a unity-gain buffer, a sample-and-hold capacitor which is used for band-limiting and sampling the FA output is driven at the beginning of the transient response to make the response faster and then it is re-charged directly by the FA output. A condition and parameters for the response time acceleration using this technique while maintaining the noise level unaffected are discussed. Theoretical analysis and simulation results show that the response time can be less than half of the case without the acceleration technique for the specified settling error of less than 0.5%.

  • Resource Allocation for Scalable Video Multicast over OFDMA Systems

    Zan YANG  Yuping ZHAO  

     
    LETTER-Network

      Vol:
    E95-B No:9
      Page(s):
    2948-2951

    In this letter, we propose a framework for scalable video multicast, which exploits the scalability of scalable video and the multiuser diversity of OFDMA systems. We further propose a resource allocation algorithm which guarantees the base-quality video for all users, and improves the transmission efficiency for users with good channel conditions.

  • Arc Duration of Break Arcs Magnetically Blown-Out in a DC 450 V Resistive Circuit

    Hitoshi ONO  Junya SEKIKAWA  Takayoshi KUBONO  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1515-1521

    Silver electrical contacts are separated at constant speed and break arcs are generated in a DC100 V–450 V/10 A resistive circuit. The transverse magnetic field of a permanent magnet is applied to the break arcs. Dependences of the arc duration, arc dwell time and arc lengthening time on the strength of the magnetic field and supply voltage are investigated. The characteristics of the re-ignition of the break arc are also discussed. Following results are shown. The arc duration D is increased due to the increase of the arc lengthening time tm when the supply voltage E is increased for each magnetic flux density Bx, because the arc dwell time ts is almost constant. The arc duration D is increased due to the increase of both of the arc lengthening time tm and the arc dwell time ts when the magnetic flux density Bx is decreased. The arc lengthening time tended to become long when the re-ignition of the break arc is occurred. The lengthening time tends to become longer when the duration tm1 from the start of the arc lengthening to the start of the re-ignition is increased. Re-ignitions occurred frequently when the magnetic flux density of the transverse magnetic field is increased and the supply voltage is increased.

  • Robust Generalized-Sidelobe-Cancellation-Based Receivers for MC-CDMA Uplink against Carrier Frequency Offsets

    Tsui-Tsai LIN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3011-3014

    This letter presents a robust receiver using the generalized sidelobe canceller aided with the high-order derivative constraint technique for multicarrier code-division multiple-access (MC-CDMA) uplink against carrier frequency offset (CFO). Numerical results demonstrate the efficacy of the proposed receiver.

  • Throughput Scaling of Ultra-Wide Band Ad Hoc Networks with Infrastructure

    Won-Yong SHIN  Koji ISHIBASHI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2918-2921

    The impact and benefits of infrastructure support are shown by introducing an achievable throughput scaling law of a ultra-wide band (UWB) ad hoc network in which m base stations (BSs) are regularly located. The existing multi-hop scheme consisting of two variants, with and without BS help, is utilized with a slight modification. Our result indicates that the derived throughput scaling depends on the path-loss exponent due to the power-limited characteristics for all operating regimes examined. Furthermore, it is shown that the total throughput scales linearly with parameter m as m is larger than a certain level. It thus turns out the use of infrastructure is also helpful in improving the throughput scaling of UWB networks in some conditions.

  • Call Admission Control with Fractional Buffer Size

    Ruben Pavel MURILLO-PEREZ  Carmen Beatriz RODRIGUEZ-ESTRELLO  Felipe CRUZ-PEREZ  

     
    LETTER-Network Management/Operation

      Vol:
    E95-B No:9
      Page(s):
    2972-2975

    In this letter a general admission control strategy is proposed and mathematically analyzed. Fractional buffering finely adjusts different QoS metrics allowing them to simultaneously achieve their maximum acceptable values, maximizing system capacity. Fractional buffering also allows the adequate and fair performance comparison among different resource management strategies and/or evaluation scenarios.

  • Low-Complexity Sign Detection Algorithm for RNS {2n-1, 2n, 2n+1}

    Minghe XU  Ruohe YAO  Fei LUO  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E95-C No:9
      Page(s):
    1552-1556

    Based on a reverse converter algorithm derived from the New Chinese Remainder Theorem I, an algorithm for sign detection of RNS {2n-1, 2n, 2n+1} is presented in this paper. The hardware of proposed algorithm can be implemented using two n-bit additions and one (n+1)-bit comparator. Comparing with the previous paper, the proposed algorithm has reduced the number of additions used in the circuit. The experimental results show that the proposed circuit achieves 17.3% savings in area for small moduli and 10.5% savings in area for large moduli on an average, with almost the same speed. The power dissipations obtain 12.6% savings in average.

  • InfluenceRank: Trust-Based Influencers Identification Using Social Network Analysis in Q&A Sites

    GunWoo PARK  SungHoon SEO  SooJin LEE  SangHoon LEE  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:9
      Page(s):
    2343-2346

    Question and Answering (Q&A) sites are recently gaining popularity on the Web. People using such sites are like a community-anyone can ask, anyone can answer, and everyone can share, since all of the questions and answers are public and searchable immediately. This mechanism can reduce the time and effort to find the most relevant answer. Unfortunately, the users suffer from answer quality problem due to several reasons including limited knowledge about the question domain, bad intentions (e.g. spam, making fun of others), limited time to prepare good answers, etc. In order to identify the credible users to help people find relevant answer, in this paper, we propose a ranking algorithm, InfluenceRank, which is basis of analyzing relationship in terms of users' activities and their mutual trusts. Our experimental studies show that the proposed algorithm significantly outperforms the baseline algorithms.

  • A Locality-Aware Hybrid NoC Configuration Algorithm Utilizing the Communication Volume among IP Cores

    Seungju LEE  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E95-A No:9
      Page(s):
    1538-1549

    Network-on-chip (NoC) architectures have emerged as a promising solution to the lack of scalability in multi-processor systems-on-chips (MPSoCs). With the explosive growth in the usage of multimedia applications, it is expected that NoC serves as a multimedia server supporting multi-class services. In this paper, we propose a configuration algorithm for a hybrid bus-NoC architecture together with simulation results. Our target architecture is a hybrid bus-NoC architecture, called busmesh NoC, which is a generalized version of a hybrid NoC with local buses. In our BMNoC configuration algorithm, cores which have a heavy communication volume between them are mapped in a cluster node (CN) and connected by a local bus. CNs can have communication with each other via edge switches (ESes) and mesh routers (MRs). With this hierarchical communication network, our proposed algorithm can improve the latency as compared with conventional methods. Several realistic applications applied to our algorithm illustrate the better performance than earlier studies and feasibility of our proposed algorithm.

  • Effective Fault Localization Approach Using Feedback

    Yan LEI  Xiaoguang MAO  Ziying DAI  Dengping WEI  

     
    PAPER-Software Engineering

      Vol:
    E95-D No:9
      Page(s):
    2247-2257

    At the stage of software debugging, the effective interaction between software debugging engineers and fault localization techniques can greatly improve fault localization performance. However, most fault localization approaches usually ignore this interaction and merely utilize the information from testing. Due to different goals of testing and fault localization, the lack of interaction may lead to the issue of information inadequacy, which can substantially degrade fault localization performance. In addition, human work is costly and error-prone. It is vital to study and simulate the pattern of debugging engineers as they apply their knowledge and experience to this interaction to promote fault localization effectiveness and reduce their workload. Thus this paper proposes an effective fault localization approach to simulate this interaction via feedback. Based on results obtained from fault localization techniques, this approach utilizes test data generation techniques to automatically produce feedback for interacting with these fault localization techniques, and then iterate this process to improve fault localization performance until a specific stopping condition is satisfied. Experiments on two standard benchmarks demonstrate the significant improvement of our approach over a promising fault localization technique, namely the spectrum-based fault localization technique.

6441-6460hit(20498hit)