The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

11221-11240hit(20498hit)

  • A Compact Multi-Layered Wideband Bandpass Filter Exhibiting Left-Handed and Right-Handed Behaviors

    Yasushi HORII  Akira TANAKA  Takefumi HAYASHI  Yukio IIDA  

     
    LETTER

      Vol:
    E89-C No:9
      Page(s):
    1348-1350

    This letter proposes a compact multi-layered bandpass filter exhibiting left-handed and right-handed behaviors in its passband. This filter has a greatly expanded passband from 1.61 GHz to 4.16 GHz (88.4% bandwidth) with a maximum ripple of 1.2 dB and well-suppressed out-of-passbands with transmission zeros at 1.15 GHz and 4.52 GHz. The physical mechanisms are studied with FEM-based full-wave simulations, equivalent circuit analysis and careful experiments.

  • Reduction of Mutual Coupling in a Microstrip Patch Array Fed by a Triplate Waveguide with EBG Elements

    Toru OKAGAKI  Kazuo NAKANO  Yuichi KIMURA  Misao HANEISHI  

     
    LETTER

      Vol:
    E89-C No:9
      Page(s):
    1345-1347

    This letter presents mutual coupling reduction in an E-plane arranged microstrip patch array fed by a triplate waveguide. Five mushroom-like electromagnetic band-gap (EBG) elements arranged in one column are embedded both between two radiating patches and between the feeding lines for suppression of the surface wave and the parallel plate mode, respectively. Validity of the proposed EBG elements is confirmed by the measurement.

  • New Group Rekeying Algorithm Using Combination of Secret Mask Patterns and Hash Values

    Yaser M. ASEM  Atsushi KARA  

     
    PAPER-Application Information Security

      Vol:
    E89-D No:9
      Page(s):
    2525-2532

    Efficient group rekeying is an important issue for secure group communications. Most of the proposed group rekeying methods require expensive encryption and decryption operations to rekey the group. However, in a model where a trusted server is used to distribute group keys, the trusted server may become a bottleneck because of the expensive computation operations, such as encryption, that it has to perform. In this paper, we propose a new stateless group rekeying scheme to solve the multicast group rekeying problem. In our proposed scheme, the trusted server combines mask-based key-location hiding with the simple XOR-encryption using secret hash values to rekey the group. Without affecting the system security, our approach reduces the processing cost of the trusted server by eliminating the need to encrypt the group key. Moreover, to acquire the group key, the computational cost of the group members is low and stable regardless of the rekeying message size.

  • Performance Analysis of the Normalized LMS Algorithm for Complex-Domain Adaptive Filters in the Presence of Impulse Noise at Filter Input

    Shin'ichi KOIKE  

     
    LETTER-Digital Signal Processing

      Vol:
    E89-A No:9
      Page(s):
    2422-2428

    This letter develops theoretical analysis of the normalized LMS algorithm (NLMSA) for use in complex-domain adaptive filters in the presence of impulse noise at filter input. We propose a new "stochastic" model for such impulse noise, and assume that filter reference input process is a white process, e.g., digital QAM data, White & Gaussian process, etc. In the analysis, we derive a simple difference equation for mean square tap weight misalignment (MSTWM). Experiment is carried out to demonstrate effectiveness of the NLMSA in robust filtering in the presence of the impulse noise at the filter input. Good agreement between simulated and theoretically calculated filter convergence, in a transient phase as well as in a steady-state, proves the validity of the analysis.

  • Grid Resource Monitoring and Selection for Rapid Turnaround Applications

    Kensuke MURAKI  Yasuhiro KAWASAKI  Yasuharu MIZUTANI  Fumihiko INO  Kenichi HAGIHARA  

     
    PAPER-Computer Systems

      Vol:
    E89-D No:9
      Page(s):
    2491-2501

    In this paper, we present a resource monitoring and selection method for rapid turnaround grid applications (for example, within 10 seconds). The novelty of our method is the distributed evaluation of resources for rapidly selecting the appropriate idle resources. We integrate our method with a widely used resource management system, namely the Monitoring and Discovery System 2 (MDS2), and compare our method with the original MDS2 in terms of the performance and the scalability. The performance is measured using a 64-node cluster of PCs and the scalability is analyzed using a theoretical model and the measured performance. The experimental results show that our method reduces the resource selection time by 82%, as compared with the original MDS2. The scalability analysis also indicates that our method can keep the resource selection time within 1 second, up to 500 nodes in local-area-network (LAN) environments. In addition, some simulation results are presented to estimate the impact of our method for wide-area-network (WAN) environments.

  • ZCZ Codes for ASK-CDMA System

    Shinya MATSUFUJI  Takahiro MATSUMOTO  Yoshihiro TANADA  Noriyoshi KUROYANAGI  

     
    PAPER

      Vol:
    E89-A No:9
      Page(s):
    2268-2274

    This paper presents two kinds of new ZCZ codes consisting of trios of two binary sequences and a bi-phase sequence, which can reach the upper bound on the ZCZ codes. From the viewpoint of sequence design, it is shown that they can provide the most effective ASK-CDMA system, which can remove co-channel interference.

  • Parametric Uncertainty Bounds for Stabilizing Receding Horizon H Controls

    ChoonKi AHN  SooHee HAN  WookHyun KWON  

     
    LETTER-Systems and Control

      Vol:
    E89-A No:9
      Page(s):
    2433-2436

    This letter presents parametric uncertainty bounds (PUBs) for stabilizing receding horizon H∞ control (RHHC). The proposed PUBs are obtained easily by solving convex optimization problems represented by linear matrix inequalities (LMIs). We show, by numerical example, that the RHHC can guarantee a H∞ norm bound for a larger class of uncertain systems than conventional infinite horizon H∞ control (IHHC).

  • Large-Throughput Anomaly Prevention Mechanism Implemented in Dynamic Reconfigurable Processor

    Takashi ISOBE  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2440-2447

    Large-throughput anomaly prevention mechanism in the upstream side of high-speed (over 10-Gbps) networks is required to prevent various anomalies such as distributed denial of service (DDoS) from causing various network problems. This mechanism requests the processors achieving not only high-speed response for analyzing many packets in a short time but also the flexibility to update the anomaly prevention algorithm. In this research, I assumed a dynamic reconfigurable processor (DRP) was most effective in achieving this anomaly prevention mechanism, for processors used in nodes with the mechanism, and I designed an anomaly prevention mechanism using DRPs. The mechanism can shorten anomaly prevention time in high-speed (10 Gbps) lines using an all-packet analysis. Through a simulation, I achieved the goal of the mechanism achieving a throughput of 83-M packets per second using three DRPs (432 execution elements used). Moreover, with the prototype, it was confirmed that the proposed mechanism prevented anomalies in a short time (constant 0.01 second), which was 3000 times faster than that of a legacy mechanism using a packet sampling method. I also proposed integrated prevention, which was able to reduce the number of execution elements comprising anomaly prevention algorithm against various kinds of anomalies. It was achieved with a simulation that the proposed integrated prevention against three kinds of anomalies (DDoS, worm, and peer to peer (P2P)) reduced the number of execution elements by 24% compared to legacy prevention. In addition, non-stop update was proposed to maintain throughput when updating an anomaly prevention algorithm without packet loss. It was confirmed with a simulation that there was enough time for non-stop update in 10 Gbps 4 lines.

  • Novel Planar Composite Right/Left-Handed Transmission Line with Double-Sided Metal Patterns

    Shuji ASOU  Atsushi SANADA  Hiroshi KUBO  

     
    PAPER

      Vol:
    E89-C No:9
      Page(s):
    1299-1305

    A novel planar composite right/left handed (CRLH) transmission line (TL) with double-sided metal patterns, which is advantageous in high scalability and low-cost fabrication, is proposed. Fundamental characteristics of the unbalanced and balanced CRLH TLs are confirmed numerically and theoretically both by full-wave finite-element method (FEM) simulations and the equivalent circuit analysis in terms of dispersion characteristics and characteristic impedances for the periodic structure. It is also shown that the relations between the left-handed circuit parameters and the geometrical parameters of the unit cell are simple and intuitive, which is useful for designing the CRLH TL. Experiments on 10-cell unbalanced and balanced CRLH TLs are carried out and the left-handed and right-handed wave propagations are confirmed by scattering parameter and near field measurements.

  • Composite Right/Left-Handed Transmission Lines Based on Conductor-Backed Coplanar Strips

    Rei GOTO  Hiroyuki DEGUCHI  Mikio TSUJI  

     
    PAPER

      Vol:
    E89-C No:9
      Page(s):
    1306-1311

    We propose here a composite right/left handed transmission line constructed by using conductor-backed coplanar strips. In this line, we can easily realize a shunt inductor without via because it has the electric-wall symmetry at the guide center. The left-handed nature is verified by both the finite difference time-domain (FDTD) and the equivalent-circuit calculations. Furthermore, we demonstrate the proposed line can easily satisfy the balanced condition for no band gap between the right-handed and the left-handed modes, and can be applied to a leaky-wave antenna, numerically and experimentally.

  • Overlay Network Technologies for QoS Control Open Access

    Tutomu MURASE  Hideyuki SHIMONISHI  Masayuki MURATA  

     
    INVITED PAPER

      Vol:
    E89-B No:9
      Page(s):
    2280-2291

    Overlay networks are expected to be a promising technology for the realization of QoS (Quality of Service) control. Overlay networks have recently attracted considerable attention due to the following advantages: a new service can be developed in a short duration and it can be started with a low cost. The definition and necessity of the overlay network is described, and the classification of various current and future overlay networks, particularly according to the QoS feature, is attempted. In order to realize QoS control, it is considered that routing overlay and session overlay are promising solutions. In particular, session and overlay networks are explained in detail since new TCP protocols for QoS instead of current TCP protocols that control congestion in the Internet can be used within overlay networks. However, many open issues such as scalability still need further research and development although overlay networks have many attractive features and possess the potential to become a platform for the deployment of new services.

  • On the Classification of Cyclic Hadamard Sequences

    Solomon W. GOLOMB  

     
    INVITED PAPER

      Vol:
    E89-A No:9
      Page(s):
    2247-2253

    Binary sequences with two-level periodic autocorrelation correspond directly to cyclic (v, k, λ)-designs. When v = 4t-1, k = 2t -1 and λ = t-1, for some positive integer t, the sequence (or design) is called a cyclic Hadamard sequence (or design). For all known examples, v is either a prime number, a product of twin primes, or one less than a power of 2. Except when v = 2k-1, all known examples are based on quadratic residues (using the Legendre symbol when v is prime, and the Jacobi symbol when v = p(p+2) where both p and p+2 are prime); or sextic residues (when v is a prime of the form 4a2 + 27). However, when v = 2k-1, many constructions are now known, including m-sequences (corresponding to Singer difference sets), quadratic and sextic residue sequences (when 2k-1 is prime), GMW sequences and their generalizations (when k is composite), certain term-by-term sums of three and of five m-sequences and more general sums of trace terms, several constructions based on hyper-ovals in finite geometries (found by Segre, by Glynn, and by Maschietti), and the result of performing the Welch-Gong transformation on some of the foregoing.

  • Redundant Design for Wallace Multiplier

    Kazuteru NAMBA  Hideo ITO  

     
    PAPER-Dependable Computing

      Vol:
    E89-D No:9
      Page(s):
    2512-2524

    To increase the yield of data processing circuits such as adders and logic operation circuits, the bit-slice reconfiguration design has been proposed as an efficient redundant technology for defect-tolerance. Wallace multipliers are a well-known class of high-speed parallel multipliers. Unfortunately, the bit-slice reconfiguration design is not applicable to Wallace multipliers because Wallace multipliers do not have regular bit-slice structure. Therefore, redundant designs for Wallace multipliers have been regarded impossible. This paper proposes a redundant design for Wallace multipliers. In order to design redundant Wallace multipliers, first, 2n heterogeneous slices are considered in a non-redundant nn Wallace multiplier. The proposed redundant Wallace multipliers contain reconfigurable slices which can play the role of both i-th and (i+1)-th slices. Since the i-th slice has a similar structure to the (i+1)-th slice, the reconfigurable slice is not much larger than the i-th slice. This paper also shows a repair procedure for the proposed design. This paper evaluates the proposed design from the viewpoint of the yield, area, effective yield and delay time. For example, the yield of a 3232 Wallace multiplier increases from 0.30 to 0.41 by applying the proposed design while the area increases by a factor of 1.21.

  • A New Two-Phase Approach to Fuzzy Modeling for Nonlinear Function Approximation

    Wooyong CHUNG  Euntai KIM  

     
    PAPER-Computation and Computational Models

      Vol:
    E89-D No:9
      Page(s):
    2473-2483

    Nonlinear modeling of complex irregular systems constitutes the essential part of many control and decision-making systems and fuzzy logic is one of the most effective algorithms to build such a nonlinear model. In this paper, a new approach to fuzzy modeling is proposed. The model considered herein is the well-known Sugeno-type fuzzy system. The fuzzy modeling algorithm suggested in this paper is composed of two phases: coarse tuning and fine tuning. In the first phase (coarse tuning), a successive clustering algorithm with the fuzzy validity measure (SCFVM) is proposed to find the number of the fuzzy rules and an initial fuzzy model. In the second phase (fine tuning), a moving genetic algorithm with partial encoding (MGAPE) is developed and used for optimized tuning of membership functions of the fuzzy model. Two computer simulation examples are provided to evaluate the performance of the proposed modeling approach and compare it with other modeling approaches.

  • A Dynamic Index Allocation Scheme for Data Retrieval and Provision in Peer-to-Peer Networks

    Atsushi ITO  Tomoyuki OHTA  Kouichi MITSUKAWA  Yoshiaki KAKUDA  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2336-2346

    File-sharing Peer-to-Peer systems are effective for autonomous data retrieval and provision over the networks. However, the early data retrieval schemes such as Gnutella and Local Indices have low performance and large overhead. In order to solve weakness of early schemes, this paper proposes a dynamic scheme for data retrieval and provision, in which indices are adaptively allocated in appropriate nodes to variation of traffic patterns caused by query messages. The simulation experimental results show that the proposed scheme has good performance with reasonable overhead even when the traffic patterns vary as time proceeds.

  • Analysis of Electromagnetic Bandgap Based Filters in a Rectangular Waveguide

    Kiyotoshi YASUMOTO  Naoya KOIKE  Hongting JIA  Bhaskar GUPTA  

     
    PAPER

      Vol:
    E89-C No:9
      Page(s):
    1324-1329

    Electromagnetic crystals formed by vertical full posts stacked in a rectangular waveguide are analyzed using the image theory and the lattice sums technique. It is shown that the frequency response of the crystals consisting of circular posts can be obtained by a simpler matrix calculus based on the one-dimensional lattice sums, the T-matrix of a circular cylinder in free space, and the generalized reflection and transmission matrices.

  • Modal Analysis of Finite-Thickness Slab with Single-Negative Tensor Material Parameters

    Masashi HOTTA  Mitsuo HANO  Ikuo AWAI  

     
    PAPER

      Vol:
    E89-C No:9
      Page(s):
    1283-1290

    Eigenvalue equations and expressions of EM fields for volume modes in an anisotropic single-negative slab with tensor material parameters is presented. By the comparison with the eigenvalue equation of surface modes along single-negative slab with negative scalar permeability, the validity of the present study is confirmed. We have also made clear which elements of the material parameter tensors affect existence of TE and TM modes in the slab. Taking the dispersion of material parameters into consideration, we demonstrate in detail that TE modes propagate in a slab with one negative element of the permeability tensor numerically. These TE modes turn out to be the magnetostatic waves (MSWs), which is the first demonstration of the MSW in a nonmagnetic material.

  • Metamaterial-Based Antennas: Research and Developments

    Richard W. ZIOLKOWSKI  

     
    INVITED PAPER

      Vol:
    E89-C No:9
      Page(s):
    1267-1275

    A brief review of metamaterials and their applications to antenna systems is given. Artificial magnetic conductors and electrically small radiating and scattering systems are emphasized. Single negative, double negative, and zero-index metamaterial systems are discussed as a means to manipulate their size, efficiency, bandwidth, and directivity characteristics.

  • Secure Host Name Resolution Infrastructure for Overlay Networks

    Ayumu KUBOTA  Yutaka MIYAKE  Toshiaki TANAKA  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2434-2439

    In order to introduce new routing functionality without changing the Internet infrastructure, many routing overlays have been proposed in recent years. Although such overlays allow us to dynamically and flexibly form various types of networks, the current host name resolution mechanism used in the Internet, i.e. DNS, cannot provide us such flexibility in host name referencing because of its delegation-based administration scheme of domain names. And also, it cannot provide us security because of the lack of wide deployment of its security extension, DNSSEC. In this paper, we propose a generic framework for secure and flexible host name resolution infrastructure that can be shared among many routing overlays. In contrast to DNS with which users are forced to use the domain name space managed by IANA/ICANN, our framework separates the name resolution mechanism from the name spaces it handles, which allows users to choose whatever name space they think appropriate for the identity scheme of their overlay-networking community. This realizes decentralized management of domain names and gives users freedom in domain name acquisition. The basic idea to achieve this is to use a cryptographically generated identifier (i.e. a hash of a public key) as a reference to an administrative domain of overlay networking hosts and allow the owner of the domain to securely publish host information using the corresponding private key. We show that a referencing mechanism for such host information can be easily implemented by using distributed hash tables (DHTs), and then show how such "semantic-free" references to domains can be linked to existing identity scheme in order to allow "human-friendly" referencing.

  • A Study on Non-octave Scalable Image Coding and Its Performance Evaluation Using Digital Cinema Test Material

    Takayuki NAKACHI  Tomoko SAWABE  Junji SUZUKI  Tetsuro FUJII  

     
    PAPER-Image

      Vol:
    E89-A No:9
      Page(s):
    2405-2414

    JPEG2000, an international standard for still image compression, offers 1) high coding performance, 2) unified lossless/lossy compression, and 3) resolution and SNR scalability. Resolution scalability is an especially promising attribute given the popularity of Super High Definition (SHD) images like digital-cinema. Unfortunately, its current implementation of resolution scalability is restricted to powers of two. In this paper, we introduce non-octave scalable coding (NSC) based on the use of filter banks. Two types of non-octave scalable coding are implemented. One is based on a DCT filter bank and the other uses wavelet transform. The latter is compatible with JPEG2000 Part2. By using the proposed algorithm, images with rational scale resolutions can be decoded from a compressed bit stream. Experiments on digital cinema test material show the effectiveness of the proposed algorithm.

11221-11240hit(20498hit)