Fuminori SAKAI Kazuo OHTA Kunio SAWAYA
A UWB impulse array antenna (IAA) utilizing a novel electrical scanning system with tapped delay lines is proposed and its usefulness is experimentally verified. The experimental antenna is composed of impulse generators installed in each antenna element and tapped delay lines used for creating transmitting trigger signals, which is a simple circuit configuration. It is shown that the output phase of the transmitting wave can be controlled by controlling the period of the trigger signal, and beam direction can be controlled from -30 deg to +30 deg by changing the trigger frequency from Fc-2 kHz to Fc+2 kHz. Evaluation of this antenna as a short range radar is carried out and distance resolution of 25 cm and angle resolution below 10 deg are obtained.
Dongwan HONG Jeehee YOON Jongkeun LEE Sanghyun PARK Jongil KIM
By converting the expression values of each sample into the corresponding rank values, the rank-based approach enables the direct integration of multiple microarray data produced by different laboratories and/or different techniques. In this study, we verify through statistical and experimental methods that informative genes can be extracted from multiple microarray data integrated by the rank-based approach (briefly, integrated rank-based microarray data). First, after showing that a nonparametric technique can be used effectively as a scoring metric for rank-based microarray data, we prove that the scoring results from integrated rank-based microarray data are statistically significant. Next, through experimental comparisons, we show that the informative genes from integrated rank-based microarray data are statistically more significant than those of single-microarray data. In addition, by comparing the lists of informative genes extracted from experimental data, we show that the rank-based data integration method extracts more significant genes than the z-score-based normalization technique or the rank products technique. Public cancer microarray data were used for our experiments and the marker genes list from the CGAP database was used to compare the extracted genes. The GO database and the GSEA method were also used to analyze the functionalities of the extracted genes.
Yuta YAMATO Xiaoqing WEN Kohei MIYASE Hiroshi FURUKAWA Seiji KAJIHARA
Power-aware X-filling is a preferable approach to avoiding IR-drop-induced yield loss in at-speed scan testing. However, the ability of previous X-filling methods to reduce launch switching activity may be unsatisfactory, due to low effect (insufficient and global-only reduction) and/or low scalability (long CPU time). This paper addresses this reduction quality problem with a novel GA (Genetic Algorithm) based X-filling method, called GA-fill. Its goals are (1) to achieve both effectiveness and scalability in a more balanced manner and (2) to make the reduction effect of launch switching activity more concentrated on critical areas that have higher impact on IR-drop-induced yield loss. Evaluation experiments are being conducted on both benchmark and industrial circuits, and the results have demonstrated the usefulness of GA-fill.
Satoshi DENNO Ke LIU Tatsuo FURUNO Masahiro MORIKURA
It is known that a heterodyne multimode receiver implemented with a single RF (Radio Frequency) receiver suffers from image-band interference due to imbalance, i.e. the phase error and the gain imbalance of the RF Hilbert transformer. The blind image band interference canceler with deterministic imbalance estimation that has been proposed mitigates the image-band interference. This performance of the image-band interference canceler is analyzed theoretically in this paper. As a result, it is revealed that estimation accuracy of the deterministic imbalance estimation is improved slightly as the imbalance becomes greater. In addition, it is also shown that the deterministic estimation achieves better performance as the power of image-band interference increases. The performance is confirmed by computer simulation.
Toyoshi SHIMOMAI Kentaro ADACHI Toshiaki KOZU
Wide-band noise modulation is added to the adaptive scan technique for spaceborne rain radar. The performance of this technique is studied by simulation using one month of TRMM (Tropical Rainfall Measuring Mission) Precipitation Radar (PR) data from the viewpoints of improving the sensitivity and reducing power consumption. The results show that the adaptive scan technique with wide-band noise modulation uses about 25% less energy than the conventional scanning technique. The adaptive scan using wide-band noise modulation is more effective than that using a normal pulse for localized rainy areas. Surface data as well as rainfall data can be obtained by using the adaptive scan using wide-band noise modulation.
Dang Hung TRAN Tu Bao HO Tho Hoan PHAM Kenji SATOU
One kind of functional noncoding RNAs, microRNAs (miRNAs), form a class of endogenous RNAs that can have important regulatory roles in animals and plants by targeting transcripts for cleavage or translation repression. Researches on both experimental and computational approaches have shown that miRNAs indeed involve in the human cancer development and progression. However, the miRNAs that contribute more information to the distinction between the normal and tumor samples (tissues) are still undetermined. Recently, the high-throughput microarray technology was used as a powerful technique to measure the expression level of miRNAs in cells. Analyzing this expression data can allow us to determine the functional roles of miRNAs in the living cells. In this paper, we present a computational method to (1) predicting the tumor tissues using high-throughput miRNA expression profiles; (2) finding the informative miRNAs that show strong distinction of expression level in tumor tissues. To this end, we perform a support vector machine (SVM) based method to deeply examine one recent miRNA expression dataset. The experimental results show that SVM-based method outperforms other supervised learning methods such as decision trees, Bayesian networks, and backpropagation neural networks. Furthermore, by using the miRNA-target information and Gene Ontology annotations, we showed that the informative miRNAs have strong evidences related to some types of human cancer including breast, lung, and colon cancer.
Hirokazu KAMODA Thomas DERHAM Toru IWASAKI Takao KUKI
We fabricated and evaluated a prototype imaging system using the Simultaneous Frequency-Encoding technique, which is an active imaging technique that is potentially capable of fast frame-frequency imaging using a frequency-scanning antenna with only a single transceiver. The prototype performed simultaneous acquisition of pixels in elevation using Simultaneous Frequency-Encoding and performed a mechanical scan in azimuth. We also studied a ranging technique and incorporated it into the prototype. The ranging technique for Simultaneous Frequency-Encoding must take into account the characteristics of the frequency-scanning antenna, which are fundamental to Simultaneous Frequency-Encoding. We verified that ordinary range processing can be performed before frequency analysis with Simultaneous Frequency-Encoding, giving both range and angular profiles. The prototype was evaluated based on the radiation patterns of a receiver antenna comprising the frequency-scanning antenna and a reflector, on which both the image quality and ranging performance depend. Finally we conducted actual imaging tests and confirmed the capability of through-obstacle imaging. The frame frequency was only 0.1 Hz, which was due to the use of a slow mechanical scan in azimuth. However, assuming electronic beam forming is used instead of the mechanical scan, the frame frequency can be improved to several Hertz.
Marie Engelene J. OBIEN Satoshi OHTAKE Hideo FUJIWARA
Due to the difficulty of test pattern generation for sequential circuits, several design-for-testability (DFT) approaches have been proposed. An improvement to these current approaches is needed to cater to the requirements of today's more complicated chips. This paper introduces a new DFT method applicable to high-level description of circuits, which optimally utilizes existing functional elements and paths for test. This technique, called F-scan, effectively reduces the hardware overhead due to test without compromising fault coverage. Test application time is also kept at the minimum. The comparison of F-scan with the performance of gate-level full scan design is shown through the experimental results.
Jae-Ho LEE Jiro HIROKAWA Makoto ANDO
Post-wall waveguide with a linear array of reflection-canceling slot pairs and center-feed is designed to cancel the frequency dependent tilting of the main beam and enhance the bandwidth of the antenna boresight gain. The array is fed at the center of the waveguide from the backside; the length of the radiating waveguide is halved and the long line effect in traveling wave operation is suppressed. Authors establish the array design procedure in separate steps to reduce the computational load in the iterative optimization by using Ansoft HFSS simulator. A center-feed linear array as well as an end-feed equivalent with uniform excitation is designed for 25.6 GHz operation and measured. The measured performances confirm the design and the advantage of the centre-feed; a frequency independent boresight beam is observed and the frequency bandwidth for 3 dB gain reduction is enhanced by 1.5 times compared to the end-feed array.
In this paper, we propose two authenticated key exchange(AKE) protocols and prove their security in the extended Canetti-Krawczyk model. The first protocol, called NAXOS+, is obtained by slightly modifying the NAXOS protocol proposed by LaMacchia, Lauter and Mityagin [15]. We prove its security under the Computational Diffie-Hellman (CDH) assumption by using the trapdoor test introduced in [6]. To the authors' knowledge, this is the first AKE protocol which is secure under the CDH assumption in the eCK model. The second protocol, called NETS, enjoys a simple and tight security reduction compared to existing schemes including HMQV and CMQV without using the Forking Lemma. Since each session of the NETS protocol requires only three exponentiations per party, its efficiency is also comparable to MQV, HMQV and CMQV.
Biometric authentication has attracted attention because of its high security and convenience. However, biometric feature such as fingerprint can not be revoked like passwords. Thus once the biometric data of a user stored in the system has been compromised, it can not be used for authentication securely for his/her whole life long. To address this issue, an authentication scheme called cancelable biometrics has been studied. However, there remains a major challenge to achieve both strong security and practical accuracy. In this paper, we propose a novel and fundamental algorithm for cancelable biometrics called correlation-invariant random filtering (CIRF) with provable security. Then we construct a method for generating cancelable fingerprint templates based on the chip matching algorithm and the CIRF. Experimental evaluation shows that our method has almost the same accuracy as the conventional fingerprint verification based on the chip matching algorithm.
One of the major drawbacks of orthogonal frequency division multiplexing (OFDM) systems is their vulnerability to synchronization errors. To remedy the inter-carrier interference (ICI) effect caused by carrier frequency offset (CFO) estimation errors, this paper proposes a weighted linear parallel ICI cancellation (WLPICIC) equalizer. The optimal weights in the WLPICIC scheme are derived in closed-form expressions by maximizing the average signal-to-interference ratio (SIR) at the WLPICIC output of each sub-carrier. The simulation results show that the WLPICIC equalizer significantly improves the performance of OFDM systems with frequency estimation errors in both AWGN channels and frequency selective fading channels.
Ryuta NARA Kei SATOH Masao YANAGISAWA Tatsuo OHTSUKI Nozomu TOGAWA
Scan-based side-channel attacks retrieve a secret key in a cryptography circuit by analyzing scanned data. Since they must be considerable threats to a cryptosystem LSI, we have to protect cryptography circuits from them. RSA is one of the most important cryptography algorithms because it effectively realizes a public-key cryptography system. RSA is extensively used but conventional scan-based side-channel attacks cannot be applied to it because it has a complicated algorithm. This paper proposes a scan-based side-channel attack which enables us to retrieve a secret key in an RSA circuit. The proposed method is based on detecting intermediate values calculated in an RSA circuit. We focus on a 1-bit time-sequence which is specific to some intermediate values. By monitoring the 1-bit time-sequence in the scan path, we can find out the register position specific to the intermediate value and we can know whether this intermediate value is calculated or not in the target RSA circuit. We can retrieve a secret key one-bit by one-bit from MSB to LSB. The experimental results demonstrate that a 1,024-bit secret key used in the target RSA circuit can be retrieved using 30.2 input messages within 98.3 seconds and its 2,048-bit secret key can be retrieved using 34.4 input within 634.0 seconds.
Satoshi NAKANOBU Yasunori IWANAMI Eiji OKAMOTO
In this paper, we investigate two receiver structures for spatially multiplexed transmission on MIMO frequency selective fading channels. Those receivers compensate the IAI (Inter-Antenna Interference) and ISI (Inter-Symbol Interference) in the time domain. We first propose the MIMO sequential equalizer in which the block of several receives symbols is processed symbol by symbol by MLD (Maximum Likelihood Detection). Next we investigate the MIMO MLSE (Maximum Likelihood Sequence Estimation) receiver in which the terminated block trellis is decoded by the Viterbi algorithm. The bit error rates of two time domain receivers are examined through computer simulations and we also compare their BER characteristics to those of the conventional MIMO SC-FDE.
Yoshifumi KAWAMURA Takashi HIKAGE Toshio NOJIMA
The purpose of this study is to establish a whole-body averaged specific absorption rate (WB-SAR) estimation method using the power absorbed by humans; a cylindrical-external field scanning technique is used to measure the radiated RF (radio-frequency) power. This technique is adopted with the goal of simplifying the estimation of the exposure dosimetry of humans who have different postures and/or sizes. In this paper, to validate the proposed measurement method, we subject numerical human phantom models and cylindrical scanning conditions to FDTD analysis. We design a radiation system that uses a dielectric lens to achieve plane-wave irradiation of tested human phantoms in order to develop an experimental WB-SAR measurement system for UHF far-field exposure condition. In addition, we use a constructed SAR measurement system to confirm absorbed power estimations of simple geometrical phantoms and so estimate measurement error of the measurement system. Finally, we discuss the measurement results of WB-SARs for male adult and child human phantom models.
Kenji HOSHINO Atsushi NAGATE Teruya FUJII
In next-generation mobile communications, it is important to improve the throughput of the cell edge as well as that of the whole cell. Multi-link transmission from two adjacent BSs has been studied for improving the throughput at the cell edge in OFDM-based cellular systems, which are major candidates for next-generation mobile communication systems. In multi-link transmission, an MS at a cell edge receives signals from both adjacent BSs by orthogonally multiplexing those signals in the frequency domain. Therefore, the cell-edge MS can utilize the frequency and power resources of both adjacent BSs, which improves the cell-edge throughput. However, when the received timing difference between the signals from both BSs exceeds the maximum permissible value, adjacent-channel interference is caused by the collapse of the orthogonality. In this paper, to resolve this issue, we propose a novel timing-offset interference canceller. To clarify the performance of the proposed canceller, this paper evaluates its performance with respect to the residual interference power and the BER by computer simulation.
Hideyuki ICHIHARA Kenta SUTOH Yuki YOSHIKAWA Tomoo INOUE
Threshold testing, which is an LSI testing method based on the acceptability of faults, is effective in yield enhancement of LSIs and selective hardening for LSI systems. In this paper, we propose test generation models for threshold test generation. Using the proposed models, we can efficiently identify acceptable faults and generate test patterns for unacceptable faults with a general test generation algorithm, i.e., without a test generation algorithm specialized for threshold testing. Experimental results show that our approach is, in practice, effective.
Yan YING Dan BAO Zhiyi YU Xiaoyang ZENG Yun CHEN
In this paper, a cost-efficient LDPC decoder for DVB-S2 is presented. Based on the Normalized Min-Sum algorithm and the turbo-decoding message-passing (TDMP) algorithm, a dual line-scan scheduling is proposed to enable hardware reusing. Furthermore, we present the solution to the address conflict issue caused by the characteristic of the parity-check matrix defined by DVB-S2 LDPC codes. Based on SMIC 0.13 µm standard CMOS process, the LDPC decoder has an area of 12.51 mm2. The required operating frequency to meet the throughput requirement of 135 Mbps with maximum iteration number of 30 is 105 MHz. Compared with the latest published DVB-S2 LDPC decoder, the proposed decoder reduces area cost by 34%.
Scanning quantized transform coefficients is an important tool for video coding. For example, the MPEG-4 video coder adopts three different scans to get better coding efficiency. This paper proposes an adaptive zero-coefficient distribution scan in inter block coding. The proposed method attempts to improve H.264/AVC zero coefficient coding by modifying the scan operation. Since the zero-coefficient distribution is changed by the proposed scan method, new VLC tables for syntax elements used in context-adaptive variable length coding (CAVLC) are also provided. The savings in bit-rate range from 2.2% to 5.1% in the high bit-rate cases, depending on different test sequences.
Osama OUDA Norimichi TSUMURA Toshiya NAKAGUCHI
Despite their usability advantages over traditional authentication systems, biometrics-based authentication systems suffer from inherent privacy violation and non-revocability issues. In order to address these issues, the concept of cancelable biometrics was introduced as a means of generating multiple, revocable, and noninvertible identities from true biometric templates. Apart from BioHashing, which is a two-factor cancelable biometrics technique based on mixing a set of tokenized user-specific random numbers with biometric features, cancelable biometrics techniques usually cannot preserve the recognition accuracy achieved using the unprotected biometric systems. However, as the employed token can be lost, shared, or stolen, BioHashing suffers from the same issues associated with token-based authentication systems. In this paper, a reliable tokenless cancelable biometrics scheme, referred to as BioEncoding, for protecting IrisCodes is presented. Unlike BioHashing, BioEncoding can be used as a one-factor authentication scheme that relies only on sole IrisCodes. A unique noninvertible compact bit-string, referred to as BioCode, is randomly derived from a true IrisCode. Rather than the true IrisCode, the derived BioCode can be used efficiently to verify the user identity without degrading the recognition accuracy obtained using original IrisCodes. Additionally, BioEncoding satisfies all the requirements of the cancelable biometrics construct. The performance of BioEncoding is compared with the performance of BioHashing in the stolen-token scenario and the experimental results show the superiority of the proposed method over BioHashing-based techniques.