The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

10721-10740hit(20498hit)

  • Designing a Packet Scheduler for Proportional Delay Differentiation Model

    Yi-Hung HUANG  Wang-Hsai YANG  

     
    PAPER-Network

      Vol:
    E90-B No:5
      Page(s):
    1098-1103

    We investigate the issues involved in designing a packet scheduler for the proportional delay differentiation (PDD) model in differentiated services (DiffServ) networks. The PDD model controls the average waiting time of each class such that the average waiting time is proportional to its corresponding delay differentiation parameter. This paper proposes a novel packet scheduler for PDD referred to as the longest waiting time first (LWTF). By adding certain conditions, we found that the LWTF scheduler can be reduced to a known packet scheduler-priority queue with linear priorities (PQ-LP). The properties and behaviors of LWTF can be predicted from the analysis of PQ-LP. The simulation results in comparison with other PDD algorithms have also revealed that LWTF provides no worse level of service quality in long timescales and affords more accurate and robust control over the delay ratio in short timescales.

  • A PND (PMOS-NMOS-Depletion MOS) Type Single Poly Gate Non-Volatile Memory Cell Design with a Differential Cell Architecture in a Pure CMOS Logic Process for a System LSI

    Yasue YAMAMOTO  Masanori SHIRAHAMA  Toshiaki KAWASAKI  Ryuji NISHIHARA  Shinichi SUMI  Yasuhiro AGATA  Hirohito KIKUKAWA  Hiroyuki YAMAUCHI  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E90-C No:5
      Page(s):
    1129-1137

    A novel PND (PMOS-NMOS-Depletion MOS) technology for a single poly gate non-volatile memory cell design has been reported for the first time. This technology features memory cell design with a differential cell architecture which enables to provide the higher performance for the key specifications such as programming time, erasing time, and endurance characteristics. This memory cell consists of 3-Transistors, PMOS, NMOS, and Depletion MOS transistors (hereafter PND). The DMOS in this cell is used for the tunneling device in the erasing operation, while the NMOS and the PMOS are used for the tunneling device and the coupling capacitor in the programming operation, respectively. The proposed PND design can allow lower applied voltage of the erase-gate (EG) and control-gate (CG) in the erasing and the programming operations so that the endurance characteristics can be improved because the DMOS suppresses the potential of floating-gate (FG) and hence the effective potential difference between the EG and the FG can be increased in the erasing operation. Based on the measured data, it can be expected that the erasing speed of the PND cell can be 125-fold faster than that of our previously reported work (PN type). Therefore, high performance and high reliability CMOS non-volatile memory without any additional process can be realized using this proposed PND technology.

  • A New Equivalence Relation of Logic Functions and Its Application in the Design of AND-OR-EXOR Networks

    Debatosh DEBNATH  Tsutomu SASAO  

     
    PAPER

      Vol:
    E90-A No:5
      Page(s):
    932-940

    This paper presents a design method for AND-OR-EXOR three-level networks, where a single two-input exclusive-OR (EXOR) gate is used. The network realizes an EXOR of two sum-of-products expressions (EX-SOPs). The problem is to minimize the total number of products in the two sum-of-products expressions (SOPs). We introduce the notion of µ-equivalence of logic functions to develop exact minimization algorithms for EX-SOPs with up to five variables. We minimized all the NP-representative functions for up to five variables and showed that five-variable functions require 9 or fewer products in minimum EX-SOPs. For n-variable functions, minimum EX-SOPs require at most 9·2n-5 (n ≤ 6) products. This upper bound is smaller than 2n-1, which is the upper bound for SOPs. We also found that, for five-variable functions, on the average, minimum EX-SOPs require about 40% fewer literals than minimum SOPs.

  • Approximation Algorithms for Optimal RNA Secondary Structures Common to Multiple Sequences

    Takeyuki TAMURA  Tatsuya AKUTSU  

     
    PAPER

      Vol:
    E90-A No:5
      Page(s):
    917-923

    It is well known that a basic version (i.e., maximizing the number of base-pairs) of the RNA secondary structure prediction problem can be solved in O(n3) time by using simple dynamic programming procedures. For this problem, an O(n3(log log n)1/2/(log n)1/2) time exact algorithm and an O(n2.776+(1/ε)O(1)) time approximation algorithm which has guaranteed approximation ratio 1-ε for any positive constant ε are also known. Moreover, when two RNA sequences are given, there is an O(n6) time exact algorithm which can optimize structure and alignments. In this paper, we show an O(n5) time approximation algorithm for optimizing structure and alignments of two RNA sequences with assuming that the optimal number of base-pairs is more than O(n0.75). We also show that the problem to optimize structure and alignments for given N sequences is NP-hard and introduce a constant-factor approximation algorithm.

  • Design and Analysis of Scalable WDM-Based Ethernet Hybrid-PON Architecture

    Tae-Yeon KIM  NamUk KIM  Sang-Ho LEE  Jeong-Ju YOO  Byong-Whi KIM  

     
    PAPER

      Vol:
    E90-B No:5
      Page(s):
    1032-1041

    To overcome the demerits of two passive optical networks; the small link capacity of the TDM-PON, and the ineffective link utilization of the WDM-PON; we propose a novel access network architecture featuring a WDM-based feeder network and a TDM-based distribution network. In this paper, we examine the design issues of the key constituent of SWE-PON (Scalable WDM-based Ethernet hybrid-PON) to validate its economic and practical feasibility. For flawless network operation, the wavelength tuning rule is investigated so that it does not collide between wavelengths from the tunable lasers belonging to the WDM coupler. Also, the potential problem between the tunable laser and the reflective operational device is analyzed in detail. From the numerical analysis and simulation, we demonstrate the variation of the network performance in terms of the upstream traffic delay and throughput of the ONU in accordance with the sharing structure of distribution network and the number of tunable laser devices (TLDs) at the feeder network.

  • Constant Time Generation of Integer Partitions

    Katsuhisa YAMANAKA  Shin-ichiro KAWANO  Yosuke KIKUCHI  Shin-ichi NAKANO  

     
    PAPER

      Vol:
    E90-A No:5
      Page(s):
    888-895

    In this paper we give a simple algorithm to generate all partitions of a positive integer n. The problem is one of the basic problems in combinatorics, and has been extensively studied for a long time. Our algorithm generates each partition of a given integer in constant time for each without repetition, while best known algorithm generates each partition in constant time on "average." Also, we propose some algorithms to generate all partitions of an integer with some additional property in constant time.

  • Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems

    Shigeo TSUJII  Kohtaro TADAKI  Ryou FUJITA  

     
    PAPER

      Vol:
    E90-A No:5
      Page(s):
    992-999

    It is widely believed to take exponential time to find a solution of a system of random multivariate polynomials because of the NP-completeness of such a task. On the other hand, in most of multivariate public key cryptosystems proposed so far, the computational complexity of cryptanalysis is polynomial time due to the trapdoor structure. In this paper, we introduce a new concept, piece in hand (soldiers in hand) matrix, which brings the computational complexity of cryptanalysis of multivariate public key cryptosystems close to exponential time by adding random polynomial terms to original cryptosystems. This is a general concept which can be applicable to any type of multivariate public key cryptosystems for the purpose of enhancing their security. As an implementation of the concept, we propose the linear PH matrix method with random variables. In 2003 Faugere and Joux broke the first HFE challenge (80 bits), where HFE is one of the major variants of multivariate public key cryptosystem, by computing a Grobner basis of the public key of the cryptosystem. We show, in an experimental manner, that the linear PH matrix method with random variables can enhance the security of HFE even against the Grobner basis attack. In what follows, we consider the strength of the linear PH matrix method against other possible attacks.

  • Schmidt Decomposition for Quantum Entanglement in Quantum Algorithms

    Kazuto OSHIMA  

     
    LETTER

      Vol:
    E90-A No:5
      Page(s):
    1012-1013

    We study quantum entanglement by Schmidt decomposition for some typical quantum algorithms. In the Shor's exponentially fast algorithm the quantum entanglement holds almost maximal, which is a major factor that a classical computer is not adequate to simulate quantum efficient algorithms.

  • Sufficient Condition and Algorithm for List Total Colorings of Series-Parallel Graphs

    Yuki MATSUO  Xiao ZHOU  Takao NISHIZEKI  

     
    PAPER

      Vol:
    E90-A No:5
      Page(s):
    907-916

    A total coloring of a graph G is a coloring of all elements of G, i.e. vertices and edges, such that no two adjacent or incident elements receive the same color. Let L(x) be a set of colors assigned to each element x of G. Then a list total coloring of G is a total coloring such that each element x receives a color contained in L(x). The list total coloring problem asks whether G has a list total coloring for given L. In this paper, we give a sufficient condition for a series-parallel graph to have a list total coloring, and we present a linear-time algorithm to find a list total coloring of a given series-parallel graph G if G and L satisfy the sufficient condition.

  • Design and Simulation of Asymmetric MOSFETs

    Jong Pil KIM  Woo Young CHOI  Jae Young SONG  Seongjae CHO  Sang Wan KIM  Jong Duk LEE  Byung-Gook PARK  

     
    PAPER-Junction Formation and TFT Reliability

      Vol:
    E90-C No:5
      Page(s):
    978-982

    A novel asymmetric MOSFET with no LDD on the source side is simulated on bulk-Si using a device simulator (SILVACO). In order to overcome the problems of the conventional asymmetric process, a novel asymmetric MOSFET using mesa structure and sidewall spacer gate is proposed which provides self-alignment process, aggressive scaling, and uniformity. First of all, we have simulated to compare the characteristics between asymmetric and symmetric MOSFETs. Basically, both asymmetric and symmetric MOSFETs have an n-type channel (25-nm) and the same physical parameters. When we compare this with the 25-nm symmetric MOSFET, the proposed asymmetric MOSFET shows better device performances.

  • A Resonant Type LiNbO3 Optical Modulator Array with Micro-Strip Antennas

    Satoshi SHINADA  Tetsuya KAWANISHI  Masayuki IZUTSU  

     
    PAPER-LiNbO3 Devices

      Vol:
    E90-C No:5
      Page(s):
    1090-1095

    For the uplink of a radio-on-fiber system or an electromagnetic field sensor, a resonant type optical modulator array connected with antennas can effectively convert a micro/millimeter-wave to a light wave. We designed and fabricated 10 GHz band resonant modulators and micro-strip antennas. And we demonstrated the simultaneous operation of four modulators using power received by micro strip antennas connected to each modulator. We confirmed that the optical phase change induced by the received power could be proportionally increased with the number of arrays.

  • Novel Functions in Microscopy Realized by Patterned Photonic Crystals

    Shojiro KAWAKAMI  Yoshihiko INOUE  

     
    INVITED PAPER

      Vol:
    E90-C No:5
      Page(s):
    1046-1054

    Autocloned photonic crystals have corrugated multilayer structure. By related process technology, we can easily fabricate an array of polarizers or waveplates. Patterned photonic crystals are versatile component of many optical systems. This paper focuses on their use in optical microscopy. The main topics are: 1. Use of polarization imaging in microscopy, 2. generation of radial/circular polarization by a polarizer having concentric corrugations, 3. a "longitudinal polarization slit" (a new component) and its function in confocal microscopy, and 4. a polarization converter for generating "z-polarized" light at the focal point. In every application above, autocloned photonic crystals play a central role.

  • Ridge Semiconductor Laser with Laterally Undercut Etched Current Confinement Structure

    Nong CHEN  Jesse DARJA  Shinichi NARATA  Kenji IKEDA  Kazuhiro NISHIDE  Yoshiaki NAKANO  

     
    PAPER-Semiconductor Devices

      Vol:
    E90-C No:5
      Page(s):
    1105-1110

    In this paper we modeled and analyzed the ridge type InGaAlAs/InP semiconductor laser with lateral current confinement structure, and optimized the design for the ridge wave guide with the current confinement. We proposed and fabricated the ridge type InGaAlAs/InP laser with a cost effective selective undercut etching method and demonstrated the improvement of the ridge laser performance. This paper provides a solution to solve the cost/yield issue for conventional BH (buried hetero-structure) type laser and performance issue for conventional ridge type laser.

  • A Modification Strategy of Maximum Likelihood Method for Location Estimation Based on Received Signal Strength in Sensor Networks

    Jumpei TAKETSUGU  Jiro YAMAKITA  

     
    PAPER-General Fundamentals and Boundaries

      Vol:
    E90-A No:5
      Page(s):
    1093-1104

    This paper investigates a scheme to improve a location estimation method for higher estimation accuracy in sensor networks. For the location estimation method, we focus on the maximum likelihood method based on the measurements of received signal strength and its known probability distribution. Using some statistical properties of the estimate obtained by the maximum likelihood method in a simplified situation, we propose a modification of likelihood function in order to improve the estimation accuracy for arbitrary situation. However, since the proposed scheme is derived under a special assumption for the simplification, we should examine the impact of the proposed scheme in more general situations by numerical simulation. From the simulation results, we show the effectiveness of the proposed modification especially in the cases of small number of samples (namely, the measurements of received signal strength) and the channel model with exponential distribution.

  • Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service

    Kazuto OGAWA  Goichiro HANAOKA  Hideki IMAI  

     
    PAPER

      Vol:
    E90-A No:5
      Page(s):
    1000-1011

    Copyright protection is a major issue in distributing content on Internet or broadcasting service. One well-known method of protecting copyright is a traitor tracing scheme. With this scheme, if a pirate decoder is made, the content provider can check the secret key contained in it and trace the authorized user/subscriber (traitor). Furthermore, users require that they could obtain services anywhere they want (Anywhere TV). For this purpose, they would need to take along their secret keys and therefore key exposure has to be kept in mind. As one of countermeasures against key exposure, a forward secure public key cryptosystem has been developed. In this system, the user secret key remains valid for a limited period of time. It means that even if it is exposed, the user would be affected only for the limited time period. In this paper, we propose a traitor tracing scheme secure against adaptive key exposure (TTaKE) which contains the properties of both a traitor tracing scheme and a forward secure public key cryptosystem. It is constructed by using two polynomials with two variables to generate user secret keys. Its security proof is constructed from scratch. Moreover we confirmed its efficiency through comparisons. Finally, we show the way how its building blocks can be applied to anywhere TV service. Its structure fits current broadcasting systems.

  • A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power

    Isao YAGI  Yoshiaki TAKATA  Hiroyuki SEKI  

     
    PAPER-Automata and Formal Language Theory

      Vol:
    E90-D No:5
      Page(s):
    799-807

    This paper proposes an event-based transition system called A-LTS. An A-LTS is a simple system consisting of two agents, a basic program and a monitor. The monitor observes the behavior of the basic program and if the behavior matches some pre-defined pattern, then the monitor interrupts the execution of the basic program and possibly triggers the execution of another specific program. An A-LTS models a common feature found in recent software technologies such as Aspect-Oriented Programming (AOP), history-based access control and active database. We investigate the expressive power of A-LTS and show that it is strictly stronger than finite state machines and strictly weaker than pushdown automata (PDA). This implies that the model checking problem for A-LTS is decidable. It is also shown that the expressive power of A-LTS, linear context-free grammar and deterministic PDA are mutually incomparable. We also discuss the relationship between A-LTS and pointcut/advice in AOP.

  • Improvement of CCI and Residual Frequency Offset Compensation Using Feedback Phase Tracking in MIMO-OFDM Systems

    Naoto EGASHIRA  Hiroo TAKAYAMA  Takahiko SABA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:4
      Page(s):
    934-942

    In multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) systems, phase tracking schemes suffer from co-channel interference (CCI) and inter-carrier interference (ICI) caused by residual frequency offset. In this paper, we propose a residual frequency offset compensation scheme using feedback phase tracking to eliminate the effect of both ICI and CCI for MIMO-OFDM systems. The proposed phase tracking scheme estimates the amount of residual frequency offset in the frequency domain, and compensates for it in the time domain, periodically. Thus, the effect of ICI can be reduced. Furthermore, we consider two methods of channel estimation that enable the system to estimate the channel response several times within a packet to eliminate the effect of CCI. This is because the channel is generally estimated at the beginning of a packet, and this estimation is affected by residual frequency offset. First is the method that employs midambles. Second is the one that reuses the preamble. When the channel is estimated several times within a packet, the effect of CCI can be reduced. Simulation results show the proposed scheme can compensate for residual frequency offset and CCI more accurately than the conventional scheme, and improve the packet error rate (PER) performance.

  • The Asymptotic Performance of the Linear MMSE Receiver for Spatial Multiplexing System with Channel Estimation Errors

    Qiang LI  Jiansong GAN  Yunzhou LI  Shidong ZHOU  Yan YAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:4
      Page(s):
    994-997

    Spatial multiplexing (SM) offers a linear increase in transmission rate without bandwidth expansion or power increase. In SM systems, the LMMSE receiver establishes a good tradeoff between the complexity and performance. The performance of the LMMSE receiver would be degraded by MIMO channel estimation errors. This letter focus on obtaining the asymptotic convergence of output interference power and SIR performance for the LMMSE receiver with channel uncertainty. Exactly matched simulation results verify the validity of analysis in the large-system assumption. Furthermore, we find that the analytical results are also valid in the sense of average results for limited-scale system in spite of the asymptotic assumption used in derivation.

  • Adaptive Parallel Downloading Method for Proxy Systems

    Junichi FUNASAKA  Atsushi KAWANO  Kenji ISHIDA  

     
    PAPER

      Vol:
    E90-B No:4
      Page(s):
    720-727

    Parallel downloading retrieves different pieces of a file from different servers simultaneously and so is expected to greatly shorten file fetch times. A key requirement is that the different servers must hold the same file. We have already proposed a proxy system that can ensure file freshness and concordance. In this paper, we combine parallel downloading with the proxy server technology in order to download a file quickly and ensure that it is the latest version. Our previous paper on parallel downloading took neither the downloading order of file fragments nor the buffer space requirements into account; this paper corrects those omissions. In order to provide the user with the required file in correct order as a byte stream, the proxy server must reorder the pieces fetched from multiple servers and shuffle in the delayed blocks as soon as possible. Thus, "substitution download" is newly introduced, which requests delayed blocks from other servers to complete downloading earlier. Experiments on substitution download across the Internet clarify the tradeoff between the buffering time and the redundant traffic generated by duplicate requests to multiple servers. As a result, the pseudo-optimum balance is discovered and our method is shown both not to increase downloading time and to limit the buffer space. This network software can be applied to download files smoothly absorbing the difference in performance characteristics among heterogeneous networks.

  • Scenario-Aware Bus Functional Modeling for Architecture-Level Performance Analysis

    Eui-Young CHUNG  Hyuk-Jun LEE  Sung Woo CHUNG  

     
    LETTER-VLSI Design Technology and CAD

      Vol:
    E90-A No:4
      Page(s):
    875-878

    We present a scenario-aware bus functional modeling method which improves the accuracy of traditional methods without sacrificing the simulation run time. Existing methods focused on the behavior of individual IP (Intellectual Property) components and neglected the interplay effects among them, resulting in accuracy degradation from the system perspective. On the other hand, our method thoroughly considers such effects and increases the analysis accuracy by adopting control signal modeling and hierarchical stochastic modeling. Furthermore, our method minimizes the additional design time by reusing the simulation results of each IP component and an automated design flow. The experimental results show that the accuracy of our method is over 90% of RTL simulation in a multimedia SoC (System-on-Chip) design.

10721-10740hit(20498hit)