The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

4121-4140hit(8214hit)

  • On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes

    Todorka ALEXANDROVA  Hiroyoshi MORITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2138-2150

    Constructing ideal (t,n) threshold secret sharing schemes leads to some limitations on the maximum number of users, that are able to join the secret sharing scheme. We aim to remove these limitations by reducing the information rate of the constructed threshold secret sharing schemes. In this paper we propose recursive construction algorithms of (t,n) threshold secret sharing schemes, based on the generalized vector space construction. Using these algorithms we are able to construct a (t,n) threshold secret sharing scheme for any arbitrary n.

  • SPORT: An Algorithm for Divisible Load Scheduling with Result Collection on Heterogeneous Systems

    Abhay GHATPANDE  Hidenori NAKAZATO  Olivier BEAUMONT  Hiroshi WATANABE  

     
    PAPER-Network

      Vol:
    E91-B No:8
      Page(s):
    2571-2588

    Divisible Load Theory (DLT) is an established mathematical framework to study Divisible Load Scheduling (DLS). However, traditional DLT does not address the scheduling of results back to source (i.e., result collection), nor does it comprehensively deal with system heterogeneity. In this paper, the DLSRCHETS (DLS with Result Collection on HETerogemeous Systems) problem is addressed. The few papers to date that have dealt with DLSRCHETS, proposed simplistic LIFO (Last In, First Out) and FIFO (First In, First Out) type of schedules as solutions to DLSRCHETS. In this paper, a new polynomial time heuristic algorithm, SPORT (System Parameters based Optimized Result Transfer), is proposed as a solution to the DLSRCHETS problem. With the help of simulations, it is proved that the performance of SPORT is significantly better than existing algorithms. The other major contributions of this paper include, for the first time ever, (a) the derivation of the condition to identify the presence of idle time in a FIFO schedule for two processors, (b) the identification of the limiting condition for the optimality of FIFO and LIFO schedules for two processors, and (c) the introduction of the concept of equivalent processor in DLS for heterogeneous systems with result collection.

  • Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Hiroki IKEDA  Jun SUGAWA  Yoshihiro ASHI  Kenichi SAKAMOTO  

     
    PAPER

      Vol:
    E91-B No:8
      Page(s):
    2477-2484

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  • BER Analysis of Dual-Hop Amplify-and-Forward MIMO Relaying with Best Antenna Selection in Rayleigh Fading Channels

    Jung-Bin KIM  Dongwoo KIM  

     
    LETTER-Broadcast Systems

      Vol:
    E91-B No:8
      Page(s):
    2772-2775

    Combining relaying and multi-input multi-output (MIMO) transmission is a generic way to overcome the channel-fading impairments. Best antenna selection is a simple but efficient MIMO method that achieves the full diversity and also serves as a lower bound reference of MIMO performance. For a dual-hop MIMO system with an ideal amplify-and-forward (AF) relaying gain and best antenna selection, we provide a probability density function (PDF) of received signal-to-noise ratio (SNR) and an analytic BER equation when using M-ary PSK in Rayleigh fading channels. The analytic result is shown to exactly match with simulated one. Furthermore, the effect of link unbalance between the first hop and the second hop, due to differences in the number of antennas deployed in both hops as well as in the average power of channel coefficients, on the BER performance is numerically investigated and the results show that the links with better balance give better performance.

  • Extraction of Line Feature in Binary Images

    Shih-Chang LIANG  Wen-Jan CHEN  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1890-1897

    Thinning and line extraction of binary images not only reduces data storage amount, automatically creates the adjacency and relativity between line and points but also provides applications for automatic inspection systems, pattern recognition systems and vectorization. Based on the features of construction drawings, new thinning and line extraction algorithms were proposed in this study. The experimental results showed that the proposed method has a higher reliability and produces better quality than the various existing methods.

  • Executable Code Recognition in Network Flows Using Instruction Transition Probabilities

    Ikkyun KIM  Koohong KANG  Yangseo CHOI  Daewon KIM  Jintae OH  Jongsoo JANG  Kijun HAN  

     
    LETTER-Application Information Security

      Vol:
    E91-D No:7
      Page(s):
    2076-2078

    The ability to recognize quickly inside network flows to be executable is prerequisite for malware detection. For this purpose, we introduce an instruction transition probability matrix (ITPX) which is comprised of the IA-32 instruction sets and reveals the characteristics of executable code's instruction transition patterns. And then, we propose a simple algorithm to detect executable code inside network flows using a reference ITPX which is learned from the known Windows Portable Executable files. We have tested the algorithm with more than thousands of executable and non-executable codes. The results show that it is very promising enough to use in real world.

  • Adaptive MIMO-MLSE Blind Detection in Heterogeneous Stream Transmission for Mobile Radio Communications

    Issei KANNO  Hiroshi SUZUKI  Kazuhiko FUKAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:7
      Page(s):
    2346-2356

    This paper proposes a novel MIMO system that introduces a heterogeneous stream (HTS) scheme and a blind signal detection method for mobile radio communications. The HTS scheme utilizes different modulation or coding methods for different MIMO streams, and the blind detection method requires no training sequences for signal separation, detection, and channel estimation. The HTS scheme can remove the ambiguity in identifying separated streams without unique words that are necessary in conventional MIMO blind detection. More specifically, two examples of HTS are considered: modulation type HTS (MHTS) and timing-offset type HTS (THTS). MHTS, which utilizes different modulation constellations with the same bandwidth for different streams, has been previously investigated. This paper proposes THTS which utilizes different transmission timing with the same modulation. THTS can make the blind detection more robust and effective with fractional sampling. The blind joint processing of detection and channel estimation performs adaptive blind MIMO-MLSE and is derived from an adaptive blind MLSE equalizer that employs the recursive channel estimation with the Moore-Penrose generalized inverse. Computer simulations show that the proposed system can achieve superior BER performance with Eb/N0 degradation of 1 dB in THTS and 2.5 dB in MHTS compared with the ideal maximum likelihood detection.

  • Fuzzy Controlled Individual Cell Equalizers for Lithium-Ion Batteries

    Yuang-Shung LEE  Ming-Wang CHENG  Shun-Ching YANG  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E91-B No:7
      Page(s):
    2380-2392

    A fuzzy logic control battery equalizing controller (FLC-BEC) is adopted to control the cell voltage balancing process for a series connected Li-ion battery string. The proposed individual cell equalizer (ICE) is based on the bidirectional Cuk converter operated in the discontinuous capacitor voltage mode (DCVM) to reduce the switching loss and improve equalization efficiency. The ICE with the proposed FLC-BEC can reduce the equalizing time, maintain safe operations during the charge/discharge state and increase the battery string capacity.

  • Indexing of Continuously Moving Objects on Road Networks

    Kyoung Soo BOK  Ho Won YOON  Dong Min SEO  Myoung Ho KIM  Jae Soo YOO  

     
    LETTER-Database

      Vol:
    E91-D No:7
      Page(s):
    2061-2064

    In this paper, a new access method is proposed for current positions of moving objects on road networks in order to efficiently update their positions. In the existing index structures, the connectivity of edges is lost because the intersection points in which three or more edges are split. The proposed index structure preserves the network connectivity, which uses intersection oriented network model by not splitting intersection nodes that three or more edges meet for preserving the connectivity of adjacent road segments. The data node stores not only the positions of moving object but also the connectivity of networks.

  • Wavelength Switching Using GaInAs/InP MQW Variable Refractive-Index Arrayed Waveguides by Thermo-Optic Effect

    Yu SHIMIZU  Sou KAWABE  Hiroya IWASAKI  Takayuki SUGIO  Kazuhiko SHIMOMURA  

     
    PAPER

      Vol:
    E91-C No:7
      Page(s):
    1110-1116

    We have successfully demonstrated a GaInAs/InP multiple quantum well (MQW)-based wavelength switch composed of the straight arrayed waveguide with linearly varying refractive index distribution by changing the refractive index using thermo-optic effect. Since optical path length differences between waveguides in the array were achieved through refractive index differences that were controlled by SiO2 mask design in selective metal-organic vapor phase epitaxy (MOVPE), wavelength demultiplexing, and the output port switching in each wavelength of light by the refractive index change in the array waveguides through the thermo-optic effect were achieved. We have obtained the wavelength switching and the change of transmission spectra in each output ports.

  • An Efficient Radio Resource Allocation Scheme for Minimum Outage Probability Using Cooperation in OFDMA Systems

    Junwoo JUNG  Hyungwon PARK  Jae-Sung LIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:7
      Page(s):
    2321-2330

    Cooperation can increase the system performance by obtaining the spatial diversity. While most of the present works concentrate on the analysis of the cooperation based on the inter-user channel response and developing a scheme for higher cooperative diversity, in this paper, we focus on practical resource allocation in OFDMA systems. Since the user who uses the same center frequency can not receive the signal when transmitting, this constraint should be considered to apply the cooperation to OFDMA systems. In this paper, we propose the pair-based OFDMA frame structure that overcomes this constraint. Also in this frame structure to achieve the minimum outage probability of system, we select the best partner among the candidate neighbors and allocate the suitable subchannels to bandwidth requested users through a cooperative subchannel allocation (CSA) algorithm. In order to evaluate the proposed resource allocation scheme, we carry out simulations based on IEEE 802.16e. The simulation results show that our proposed algorithm offers smaller outage probability than one based on non-cooperative communications and we get the minimum outage probability when a threshold for selection of candidate neighbors is 10 dB. We analyze that these results can be achieved by helping users located around the edge of the cell.

  • Current Status and Future Prospects of SiC Power JFETs and ICs

    Jian H. ZHAO  Kuang SHENG  Yongxi ZHANG  Ming SU  

     
    INVITED PAPER

      Vol:
    E91-C No:7
      Page(s):
    1031-1041

    This paper will review the development of SiC power devices especially SiC power junction field-effect transistors (JFETs). Rationale and different approaches to the development of SiC power JFETs will be presented, focusing on normally-OFF power JFETs that can provide the highly desired fail-save feature for reliable power switching applications. New results for the first demonstration of SiC Power ICs will be presented and the potential for distributed DC-DC power converters at frequencies higher than 35 MHz will be discussed.

  • Investigation on Current Collapse of AlGaN/GaN HFET by Gate Bias Stress

    Jin-Ping AO  Yuya YAMAOKA  Masaya OKADA  Cheng-Yu HU  Yasuo OHNO  

     
    PAPER-Nitride-based Devices

      Vol:
    E91-C No:7
      Page(s):
    1004-1008

    The mechanism of current collapse of AlGaN/GaN heterojunction field-effect transistors (HFETs) was investigated by gate bias stress with and without illumination. It is clarified that there are two positions where negative charges accumulate, at the gate edge and in the bulk epi-layer. In the gate-edge mode, the charge comes either through the passivation film or the AlGaN layer, depending on the resistance of the films. Reduction of leakage current in the passivation film will be important to suppress the surface-related collapse.

  • 3D Precise Inspection of Terminal Lead for Electronic Devices by Single Camera Stereo Vision

    Takashi WATANABE  Akira KUSANO  Takayuki FUJIWARA  Hiroyasu KOSHIMIZU  

     
    PAPER

      Vol:
    E91-D No:7
      Page(s):
    1885-1892

    It is very important to guarantee the quality of the industrial products by means of visual inspection. In order to reduce the soldering defect with terminal deformation and terminal burr in the manufacturing process, this paper proposes a 3D visual inspection system based on a stereo vision with single camera. It is technically noted that the base line of this single camera stereo was precisely calibrated by the image processing procedure. Also to extract the measuring point coordinates for computing disparity; the error is reduced with original algorithm. Comparing its performance with that of human inspection using industrial microscope, the proposed 3D inspection could be an alternative in precision and in processing cost. Since the practical specification in 3D precision is less than 1 pixel and the experimental performance was around the same, it was demonstrated by the proposed system that the soldering defect with terminal deformation and terminal burr in inspection, especially in 3D inspection, was decreased. In order to realize the inline inspection, this paper will suggest how the human inspection of the products could be modeled and be implemented by the computer system especially in manufacturing process.

  • A Nonlinear Approach to Robust Routing Based on Reinforcement Learning with State Space Compression and Adaptive Basis Construction

    Hideki SATOH  

     
    PAPER-Nonlinear Problems

      Vol:
    E91-A No:7
      Page(s):
    1733-1740

    A robust routing algorithm was developed based on reinforcement learning that uses (1) reward-weighted principal component analysis, which compresses the state space of a network with a large number of nodes and eliminates the adverse effects of various types of attacks or disturbance noises, (2) activity-oriented index allocation, which adaptively constructs a basis that is used for approximating routing probabilities, and (3) newly developed space compression based on a potential model that reduces the space for routing probabilities. This algorithm takes all the network states into account and reduces the adverse effects of disturbance noises. The algorithm thus works well, and the frequencies of causing routing loops and falling to a local optimum are reduced even if the routing information is disturbed.

  • Excitation Phenomena of Plasma Display Panel

    Teruo KURAI  

     
    PAPER-Electronic Displays

      Vol:
    E91-C No:7
      Page(s):
    1158-1166

    We formulated the excitation rate of VUV and emitted visible light from rare gas on PDP by using the Boltzmann equation with electron-atom collision integral term and obtained the excitation rate as the function of Temperature and Mass. This form of excitation rate was firstly derived in PDP area. In addition we showed the Pressure dependence of intensity ratio of Ne/VUV as the application of our excitation rate formulae.

  • Random Texture Defect Detection Using 1-D Hidden Markov Models Based on Local Binary Patterns

    Hadi HADIZADEH  Shahriar BARADARAN SHOKOUHI  

     
    PAPER

      Vol:
    E91-D No:7
      Page(s):
    1937-1945

    In this paper a novel method for the purpose of random texture defect detection using a collection of 1-D HMMs is presented. The sound textural content of a sample of training texture images is first encoded by a compressed LBP histogram and then the local patterns of the input training textures are learned, in a multiscale framework, through a series of HMMs according to the LBP codes which belong to each bin of this compressed LBP histogram. The hidden states of these HMMs at different scales are used as a texture descriptor that can model the normal behavior of the local texture units inside the training images. The optimal number of these HMMs (models) is determined in an unsupervised manner as a model selection problem. Finally, at the testing stage, the local patterns of the input test image are first predicted by the trained HMMs and a prediction error is calculated for each pixel position in order to obtain a defect map at each scale. The detection results are then merged by an inter-scale post fusion method for novelty detection. The proposed method is tested with a database of grayscale ceramic tile images.

  • Estimating Anomality of the Video Sequences for Surveillance Using 1-Class SVM

    Kyoko SUDO  Tatsuya OSAWA  Kaoru WAKABAYASHI  Hideki KOIKE  Kenichi ARAKAWA  

     
    PAPER

      Vol:
    E91-D No:7
      Page(s):
    1929-1936

    We have proposed a method to detect and quantitatively extract anomalies from surveillance videos. Using our method, anomalies are detected as patterns based on spatio-temporal features that are outliers in new feature space. Conventional anomaly detection methods use features such as tracks or local spatio-temporal features, both of which provide insufficient timing information. Using our method, the principal components of spatio-temporal features of change are extracted from the frames of video sequences of several seconds duration. This enables anomalies based on movement irregularity, both position and speed, to be determined and thus permits the automatic detection of anomal events in sequences of constant length without regard to their start and end. We used a 1-class SVM, which is a non-supervised outlier detection method. The output from the SVM indicates the distance between the outlier and the concentrated base pattern. We demonstrated that the anomalies extracted using our method subjectively matched perceived irregularities in the pattern of movements. Our method is useful in surveillance services because the captured images can be shown in the order of anomality, which significantly reduces the time needed.

  • 1.8 V Operation Power Amplifier IC for Bluetooth Class 1 Utilizing p+-GaAs Gate Hetero-Junction FET

    Fumio HARIMA  Yasunori BITO  Hidemasa TAKAHASHI  Naotaka IWATA  

     
    PAPER-GaAs- and InP-Based Devices

      Vol:
    E91-C No:7
      Page(s):
    1104-1108

    We have developed a power amplifier IC for Bluetooth Class 1 operating at single low voltage of 1.8 V for both control and drain voltages. We can realize it due to fully enhancement-mode hetero-junction FETs utilizing a re-grown p +-GaAs gate technology. The power amplifier is a highly compact design as a small package of 1.5 mm1.5 mm0.4 mm with fully integrated gain control and shutdown functions. An impressive power added efficiency of 52% at an output power of 20 dBm is achieved with an associated gain of 22 dB. Also, sufficiently low leakage current of 0.25 µA at 27 is exhibited, which is comparable to conventional HBT power amplifiers.

  • Adopting the Drowsy Technique for Instruction Caches: A Soft Error Perspective

    Soong Hyun SHIN  Sung Woo CHUNG  Eui-Young CHUNG  Chu Shik JHON  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E91-A No:7
      Page(s):
    1772-1779

    As technology scales down, leakage energy accounts for a greater proportion of total energy. Applying the drowsy technique to a cache, is regarded as one of the most efficient techniques for reducing leakage energy. However, it increases the Soft Error Rate (SER), thus, many researchers doubt the reliability of the drowsy technique. In this paper, we show several reasons why the instruction cache can adopt the drowsy technique without reliability problems. First, an instruction cache always stores read-only data, leading to soft error recovery by re-fetching the instructions from lower level memory. Second, the effect of the re-fetching caused by soft errors on performance is negligible. Additionally, a considerable percentage of soft errors can occur without harming the performance. Lastly, unrecoverable soft errors can be controlled by the scrubbing method. The simulation results show that the drowsy instruction cache rarely increases the rate of unrecoverable errors and negligibly degrades the performance.

4121-4140hit(8214hit)