The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

7101-7120hit(20498hit)

  • Packet Scheduling and Traffic Differentiation in Femtocell Environment

    Volkan SEVINDIK  Oguz BAYAT  

     
    PAPER-Network

      Vol:
    E94-B No:11
      Page(s):
    3018-3025

    This paper proposes new scheduling algorithms for best effort (BE) traffic classification in business femtocell networks. The purpose of traffic classification is to provide differentiated services to BE users depending on their traffic classes, and the concept of traffic classification is called Inter User Best Effort (IUBE) in CDMA2000 1x Evolution Data Optimized (EVDO) standard. Traffic differentiation is achieved by introducing Grade of Service (GoS) as a quality of service (QoS) parameter into the scheduler's decision metric (DM). New scheduling algorithms are called QoS Round Robin (QoS-RR), QoS Proportionally Fair (QoS-PF), QoS maximum data rate control (DRC) (QoS-maxDRC), QoS average DRC (QoS-aveDRC), QoS exponent DRC (QoS-expDRC), QoS maxDRC-PF (QoS-maxDRC-PF). Two different femtocell throughput experiments are performed using real femtocell devices in order to collect real DRC values. The first experiment examines 4, 8, 12 and 16 IUBE users, while second experiment examines 4 IUBE + 2 Voice over IP (VoIP), 8 IUBE + 2 VoIP, 12 IUBE + 2 VoIP, 16 IUBE + 2 (VoIP) users. Average sector throughput, IUBE traffic differentiation, VoIP delay bound error values are investigated to compare the performance of the proposed scheduling algorithms. In conclusion, QoS-maxDRC-PF scheduler is proposed for business femtocell environment.

  • Impulsive Noise Suppression for ISDB-T Receivers Based on Adaptive Window Function

    Ziji MA  Minoru OKADA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2237-2245

    Impulsive noise interference is a significant problem for the Integrated Services Digital Broadcasting for Terrestrial (ISDB-T) receivers due to its effect on the orthogonal frequency division multiplexing (OFDM) signal. In this paper, an adaptive scheme to suppress the effect of impulsive noise is proposed. The impact of impulsive noise can be detected by using the guard band in the frequency domain; furthermore the position information of the impulsive noise, including burst duration, instantaneous power and arrived time, can be estimated as well. Then a time-domain window function with adaptive parameters, which are decided in terms of the estimated information of the impulsive noise and the carrier-to-noise ratio (CNR), is employed to suppress the impulsive interference. Simulation results confirm the validity of the proposed scheme, which improved the bit error rate (BER) performance for the ISDB-T receivers in both AWGN channel and Rayleigh fading channel.

  • A 1 V 200 kS/s 10-bit Successive Approximation ADC for a Sensor Interface

    Ji-Hun EO  Sang-Hun KIM  Young-Chan JANG  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E94-C No:11
      Page(s):
    1798-1801

    A 200 kS/s 10-bit successive approximation (SA) analog-to-digital converter (ADC) with a rail-to-rail input signal is proposed for acquiring biosignals such as EEG and MEG signals. A split-capacitor-based digital-to-analog converter (SC-DAC) is used to reduce the power consumption and chip area. The SC-DAC's linearity is improved by using dummy capacitors and a small bootstrapped analog switch with a constant on-resistance, without increasing its area. A time-domain comparator with a replica circuit for clock feed-through noise compensation is designed by using a highly differential digital architecture involving a small area. Its area is about 50% less than that of a conventional time-domain comparator. The proposed SA ADC is implemented by using a 0.18-µm 1-poly 6-metal CMOS process with a 1 V supply. The measured DNL and INL are +0.44/-0.4 LSB and +0.71/-0.62 LSB, respectively. The SNDR is 55.43 dB for a 99.01 kHz analog input signal at a sampling rate of 200 kS/s. The power consumption and core area are 5 µW and 0.126 mm2, respectively. The FoM is 47 fJ/conversion-step.

  • Signal Activity Detection of Offset-QPSK in Colored Gaussian Noise

    Sayed Jalal ZAHABI  Mohammadali KHOSRAVIFARD  Ali A. TADAION  T. Aaron GULLIVER  

     
    LETTER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2226-2229

    This letter considers the problem of detecting an offset quadrature phase shift keying (O-QPSK) modulated signal in colored Gaussian noise. The generalized likelihood ratio test (GLRT) is employed for detection. By deriving the GLRT, it is shown that the assumption of colored Gaussian noise results in a more complicated problem than with the white noise assumption that was previously examined in the literature. An efficient solution for the detection maximization problem is proposed, based on which the GLRT is implemented. Performance results are presented to illustrate the detector performance.

  • Decoupled 3-D Near-Field Source Localization with UCA via Centrosymmetric Subarrays

    Bum-Soo KWON  Tae-Jin JUNG  Chang-Hong SHIN  Kyun-Kyung LEE  

     
    LETTER-Antennas and Propagation

      Vol:
    E94-B No:11
      Page(s):
    3143-3146

    A novel algorithm is presented for estimating the 3-D location (azimuth angle, elevation angle, and range) of multiple sources with a uniform circular array (UCA). Based on its centrosymmetric property, a UCA is divided into two subarrays. The steering vectors for these subarrays then yield a 2-D direction of arrival (DOA)-related rotational invariance property in the signal subspace, which enables 2-D DOA estimations using a generalized-ESPRIT algorithm. Based on the estimated 2-D DOAs, a range estimation can then be obtained for each source by defining the 1-D MUSIC spectrum. Despite its low computational complexity, the proposed algorithm can almost match the performance of the benchmark estimator 3-D MUSIC.

  • Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function

    Eun-Jun YOON  Kee-Young YOO  

     
    LETTER

      Vol:
    E94-D No:11
      Page(s):
    2167-2170

    In 2010, Guo and Zhang proposed a group key agreement protocol based on the chaotic hash function. This letter points out that Guo-Zhang's protocol is still vulnerable to off-line password guessing attacks, stolen-verifier attacks and reflection attacks.

  • Wire Planning for Electromigration and Interference Avoidance in Analog Circuits

    Hsin-Hsiung HUANG  Jui-Hung HUNG  Cheng-Chiang LIN  Tsai-Ming HSIEH  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:11
      Page(s):
    2402-2411

    This study formulates and solves the wire planning problem with electro-migration and interference using an effective integer linear programming (ILP)-based approach. For circuits without obstacles, the proposed approach obtains a wire planning with the minimum wiring area. An effective approach for estimating the length of feasible routing wire is proposed to handle circuits with obstacles. In addition, the space reservation technique, which allocates the ring of the free silicon space around obstacles, is presented to improve interference among routing wires and on-obstacle wires. For circuits with obstacles, the proposed method minimizes total wiring area and reduces interference. Experimental results show that the integer linear-programming-based approach effectively and efficiently minimizes wiring area of routing wires.

  • Simplified Block Diagonalization for Multiuser MIMO Systems with Gram-Schmidt Orthogonalization

    Yuyuan CHANG  Kiyomichi ARAKI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2263-2270

    In multiuser multiple-input multiple-output (MU-MIMO) wireless downlink systems, block diagonalization (BD) is a technique, where the transmit precoding matrix of each user is designed such that its subspace lies in the null space of all the other remaining users, so that multiuser interference (MUI) is completely canceled. In low signal to noise power ratio (SNR) or low signal to interference plus noise power ratio (SINR) environments, regularized BD, that lets some MUI remain and maximizes the sum rate capacity of the BD MIMO channel, was also proposed. One of the problems of both the approaches is high complexity of computation due to a lot of singular value decomposition (SVD) processes. In this paper we propose new BD techniques utilizing QR decomposition (QRD) which can be practically achieved by Gram-Schmidt orthogonalization (GSO) with lower complexity compared to the conventional method employing SVD. We can show that the performance of the proposed approaches is close to the conventional approaches, while the proposed approaches have much lower complexity.

  • Ring Theoretic Approach to Reversible Codes Based on Circulant Matrices

    Tomoharu SHIBUYA  

     
    PAPER-Coding Theory

      Vol:
    E94-A No:11
      Page(s):
    2121-2126

    Recently, Haley and Grant introduced the concept of reversible codes – a class of binary linear codes that can reuse the decoder architecture as the encoder and encodable by the iterative message-passing algorithm based on the Jacobi method over F2. They also developed a procedure to construct parity check matrices of a class of reversible codes named type-I reversible codes by utilizing properties specific to circulant matrices. In this paper, we refine a mathematical framework for reversible codes based on circulant matrices through a ring theoretic approach. This approach enables us to clarify the necessary and sufficient condition on which type-I reversible codes exist. Moreover, a systematic procedure to construct all circulant matrices that constitute parity check matrices of type-I reversible codes is also presented.

  • Design and Performance of Rate-Compatible Non-binary LDPC Convolutional Codes

    Hironori UCHIKAWA  Kenta KASAI  Kohichi SAKANIWA  

     
    PAPER-Coding Theory

      Vol:
    E94-A No:11
      Page(s):
    2135-2143

    In this paper, we present a construction method of non-binary low-density parity-check (LDPC) convolutional codes. Our construction method is an extension of Felstrom and Zigangirov construction [1] for non-binary LDPC convolutional codes. The rate-compatibility of the non-binary convolutional code is also discussed. The proposed rate-compatible code is designed from one single mother (2,4)-regular non-binary LDPC convolutional code of rate 1/2. Higher-rate codes are produced by puncturing the mother code and lower-rate codes are produced by multiplicatively repeating the mother code. Simulation results show that non-binary LDPC convolutional codes of rate 1/2 outperform state-of-the-art binary LDPC convolutional codes with comparable constraint bit length. Also the derived low-rate and high-rate non-binary LDPC convolutional codes exhibit good decoding performance without loss of large gap to the Shannon limits.

  • Spatially-Coupled MacKay-Neal Codes and Hsu-Anastasopoulos Codes

    Kenta KASAI  Kohichi SAKANIWA  

     
    PAPER-Coding Theory

      Vol:
    E94-A No:11
      Page(s):
    2161-2168

    Kudekar et al. recently proved that for transmission over the binary erasure channel (BEC), spatial coupling of LDPC codes increases the BP threshold of the coupled ensemble to the MAP threshold of the underlying LDPC codes. One major drawback of the capacity-achieving spatially-coupled LDPC codes is that one needs to increase the column and row weight of parity-check matrices of the underlying LDPC codes. It is proved, that Hsu-Anastasopoulos (HA) codes and MacKay-Neal (MN) codes achieve the capacity of memoryless binary-input symmetric-output channels under MAP decoding with bounded column and row weight of the parity-check matrices. The HA codes and the MN codes are dual codes each other. The aim of this paper is to present an empirical evidence that spatially-coupled MN (resp. HA) codes with bounded column and row weight achieve the capacity of the BEC. To this end, we introduce a spatial coupling scheme of MN (resp. HA) codes. By density evolution analysis, we will show that the resulting spatially-coupled MN (resp. HA) codes have the BP threshold close to the Shannon limit.

  • Rethinking Business Model in Cloud Computing: Concept and Example

    Ping DU  Akihiro NAKAO  

     
    PAPER

      Vol:
    E94-D No:11
      Page(s):
    2119-2128

    In cloud computing, a cloud user pays proportionally to the amount of the consumed resources (bandwidth, memory, and CPU cycles etc.). We posit that such a cloud computing system is vulnerable to DDoS (Distributed Denial-of-Service) attacks against quota. Attackers can force a cloud user to pay more and more money by exhausting its quota without crippling its execution system or congesting links. In this paper, we address this issue and claim that cloud should enable users to pay only for their admitted traffic. We design and prototype such a charging model in a CoreLab testbed infrastructure and show an example application.

  • 3D Face and Motion from Feature Points Using Adaptive Constrained Minima

    Varin CHOUVATUT  Suthep MADARASMI  Mihran TUCERYAN  

     
    PAPER-Image, Vision

      Vol:
    E94-A No:11
      Page(s):
    2207-2219

    This paper presents a novel method for reconstructing 3D geometry of camera motion and human-face model from a video sequence. The approach combines the concepts of Powell's line minimization with gradient descent. We adapted the line minimization with bracketing used in Powell's minimization to our method. However, instead of bracketing and searching deep down a direction for the minimum point along that direction as done in their line minimization, we achieve minimization by bracketing and searching for the direction in the bracket which provides a lower energy than the previous iteration. Thus, we do not need a large memory as required by Powell's algorithm. The approach to moving in a better direction is similar to classical gradient descent except that the derivative calculation and a good starting point are not needed. The system's constraints are also used to control the bracketing direction. The reconstructed solution is further improved using the Levenberg Marquardt algorithm. No average face model or known-coordinate markers are needed. Feature points defining the human face are tracked using the active appearance model. Occluded points, even in the case of self occlusion, do not pose a problem. The reconstructed space is normalized where the origin can be arbitrarily placed. To use the obtained reconstruction, one can rescale the computed volume to a known scale and transform the coordinate system to any other desired coordinates. This is relatively easy since the 3D geometry of the facial points and the camera parameters of all frames are explicitly computed. Robustness to noise and lens distortion, and 3D accuracy are also demonstrated. All experiments were conducted with an off-the-shelf digital camera carried by a person walking without using any dolly to demonstrate the robustness and practicality of the method. Our method does not require a large memory or the use of any particular, expensive equipment.

  • A Ternary Zero-Correlation Zone Sequence Set Having Wide Inter-Subset Zero-Correlation Zone

    Takafumi HAYASHI  Takao MAEDA  Shinya MATSUFUJI  Satoshi OKAWA  

     
    LETTER-Sequence

      Vol:
    E94-A No:11
      Page(s):
    2230-2235

    The present paper introduces a novel construction of ternary sequences having a zero-correlation zone. The cross-correlation function and the side-lobe of the auto-correlation function of the proposed sequence set is zero for the phase shifts within the zero-correlation zone. The proposed sequence set consists of more than one subset having the same member size. The correlation function of the sequences of a pair of different subsets, referred to as the inter-subset correlation function, has a wider zero-correlation zone than that of the correlation function of sequences of the same subset (intra-subset correlation function). The wide inter-subset zero-correlation enables performance improvement during application of the proposed sequence set. The proposed sequence set has a zero-correlation zone for periodic, aperiodic, and odd correlation functions.

  • A Low Complexity 1D-Based Successive GSC Structure for 2D Adaptive Beamformer Implementation

    Yung-Yi WANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E94-A No:11
      Page(s):
    2448-2452

    In this study, we propose a one dimensional (1D) based successive generalized sidelobe canceller (GSC) structure for the implementation of 2D adaptive beamformers using a uniform rectangular antenna array (URA). The proposed approach takes advantage of the URA feature that the 2D spatial signature of the receive signal can be decomposed into an outer product of two 1D spatial signatures. The 1D spatial signatures lie in the column and the row spaces of the receive signal matrix, respectively. It follows that the interferers can be successively eliminated by two rounds of 1D-based GSC structure. As compared to the conventional 2D-GSC structure, computer simulations show that in addition to having significantly low computational complexity, the proposed adaptive approach possesses higher convergence rate.

  • Characterization of Vertical Alignment Film by X-Ray Reflectivity

    Ichiro HIROSAWA  Tomoyuki KOGANEZAWA  Hidenori ISHII  

     
    PAPER

      Vol:
    E94-C No:11
      Page(s):
    1755-1759

    Depth profile of mass density of vertical alignment film was investigated by X-ray reflectivity, in order to characterize side chains at film surface for vertical alignment of liquid crystals. Existence thin and low density top layer at surface of polyimide film, which was considered to be side chains, was clearly detected. Furthermore, existence of high density layer just below side chain layer was also found, and it is suggested that backbone chain ordering at film surface. Effect of rubbing on VA film was not detected. However, density growth by annealing just below side chain layer of rubbed VA film suggests more ordered backbone chain alignment induced by rubbing.

  • A 4 Gb/s Adaptive FFE/DFE Receiver with a Data-Dependent Jitter Measurement

    Tae-Ho KIM  Yong-Hwan MOON  Jin-Ku KANG  

     
    PAPER-Electronic Circuits

      Vol:
    E94-C No:11
      Page(s):
    1779-1786

    This paper presents an adaptive FFE/DFE receiver with an algorithm that measures the data-dependent jitter. The proposed adaptive algorithm determines the compensation level by measuring the input data-dependent jitter. The adaptive algorithm is combined with a clock and data recovery phase detector. The receiver is fabricated in with 0.13 µm CMOS technology, and the compensation range of equalization is up to 26 dB at 2 GHz. The test chip is verified for a 40 inch FR4 trace and a 53 cm flexible printed circuit channel. The receiver occupies an area of 440 µm 520 µm and has a power dissipation of 49 mW (excluding the I/O buffers) from a 1.2 V supply.

  • An Advanced 405-nm Laser Diode Crystallization Method of a-Si Film for Fabricating Microcrystalline-Si TFTs Open Access

    Kiyoshi MORIMOTO  Nobuyasu SUZUKI  Kazuhiko YAMANAKA  Masaaki YURI  Janet MILLIEZ  Xinbing LIU  

     
    INVITED PAPER

      Vol:
    E94-C No:11
      Page(s):
    1733-1738

    This report describes a crystallization method we developed for amorphous (a)-Si film by using 405-nm laser diodes (LDs). The proposed method has been used to fabricate bottom gate (BG) microcrystalline (µc)-Si TFTs for the first time. A µc-Si film with high crystallinity was produced and high-performance BG µc-Si TFTs with a field effect mobility of 3.6 cm2/Vs and a current on/off ratio exceeding 108 were successfully demonstrated. To determine the advantages of a 405-nm wavelength, a heat flow simulation was performed with full consideration of light interference effects. Among commercially available solid-state lasers and LDs with wavelengths having relatively high optical absorption coefficients for a-Si, three (405, 445, and 532 nm) were used in the simulation for comparison. Results demonstrated that wavelength is a crucial factor for the uniformity, efficiency, and process margin in a-Si crystallization for BG µc-Si TFTs. The 405-nm wavelength had the best simulation results. In addition, the maximum temperature profile on the gate electrode through the simulation well explained the actual crystallinity distributions of the µc-Si films.

  • A Fast Systematic Optimized Comparison Algorithm for CNU Design of LDPC Decoders

    Jui-Hui HUNG  Sau-Gee CHEN  

     
    PAPER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2246-2253

    This work first investigates two existing check node unit (CNU) architectures for LDPC decoding: self-message-excluded CNU (SME-CNU) and two-minimum CNU (TM-CNU) architectures, and analyzes their area and timing complexities based on various realization approaches. Compared to TM-CNU architecture, SME-CNU architecture is faster in speed but with much higher complexity for comparison operations. To overcome this problem, this work proposes a novel systematic optimization algorithm for comparison operations required by SME-CNU architectures. The algorithm can automatically synthesize an optimized fast comparison operation that guarantees a shortest comparison delay time and a minimized total number of 2-input comparators. High speed is achieved by adopting parallel divide-and-conquer comparison operations, while the required comparators are minimized by developing a novel set construction algorithm that maximizes shareable comparison operations. As a result, the proposed design significantly reduces the required number of comparison operations, compared to conventional SME-CNU architectures, under the condition that both designs have the same speed performance. Besides, our preliminary hardware simulations show that the proposed design has comparable hardware complexity to low-complexity TM-CNU architectures.

  • Analysis on the Sequential Behavior of Malware Attacks

    Nur Rohman ROSYID  Masayuki OHRUI  Hiroaki KIKUCHI  Pitikhate SOORAKSA  Masato TERADA  

     
    PAPER

      Vol:
    E94-D No:11
      Page(s):
    2139-2149

    Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the bots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.

7101-7120hit(20498hit)