The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

1561-1580hit(8214hit)

  • Two Classes of New Zero Difference Balanced Functions from Difference Balanced Functions and Perfect Ternary Sequences

    Wei SU  

     
    PAPER-Coding Theory

      Vol:
    E100-A No:3
      Page(s):
    839-845

    In this paper, we present two classes of zero difference balanced (ZDB) functions, which are derived by difference balanced functions, and a class of perfect ternary sequences respectively. The proposed functions have parameters not covered in the literature, and can be used to design optimal constant composition codes, and perfect difference systems of sets.

  • Polynomial Time Inductive Inference of Languages of Ordered Term Tree Patterns with Height-Constrained Variables from Positive Data

    Takayoshi SHOUDAI  Kazuhide AIKOH  Yusuke SUZUKI  Satoshi MATSUMOTO  Tetsuhiro MIYAHARA  Tomoyuki UCHIDA  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E100-A No:3
      Page(s):
    785-802

    An efficient means of learning tree-structural features from tree-structured data would enable us to construct effective mining methods for tree-structured data. Here, a pattern representing rich tree-structural features common to tree-structured data and a polynomial time algorithm for learning important tree patterns are necessary for mining knowledge from tree-structured data. As such a tree pattern, we introduce a term tree pattern t such that any edge label of t belongs to a finite alphabet Λ, any internal vertex of t has ordered children and t has a new kind of structured variable, called a height-constrained variable. A height-constrained variable has a pair of integers (i, j) as constraints, and it can be replaced with a tree whose trunk length is at least i and whose height is at most j. This replacement is called height-constrained replacement. A sequence of consecutive height-constrained variables is called a variable-chain. In this paper, we present polynomial time algorithms for solving the membership problem and the minimal language (MINL) problem for term tree patternshaving no variable-chain. The membership problem for term tree patternsis to decide whether or not a given tree can be obtained from a given term tree pattern by applying height-constrained replacements to all height-constrained variables in the term tree pattern. The MINL problem for term tree patternsis to find a term tree pattern t such that the language generated by t is minimal among languages, generated by term tree patterns, which contain all given tree-structured data. Finally, we show that the class, i.e., the set of all term tree patternshaving no variable-chain, is polynomial time inductively inferable from positive data if |Λ| ≥ 2.

  • A Comprehensive Model for Write Disturbance in Resistive Memory Composed of Cross-Point Array

    Yoshiaki ASAO  Fumio HORIGUCHI  

     
    PAPER-Integrated Electronics

      Vol:
    E100-C No:3
      Page(s):
    329-339

    A comprehensive model is presented for estimating the bit error rate (BER) of write disturbance in a resistive memory composed of a cross-point array. While writing a datum into the selected address, the non-selected addresses are biased by word-line (WL) and bit-line (BL). The stored datum in the non-selected addresses will be disturbed if the bias is large enough. It is necessary for the current flowing through the non-selected address to be calculated in order to estimate the BER of the write disturbance. Since it takes a long time to calculate the current flowing in a large-scale cross-point array, several simplified circuits have been utilized to decrease the calculating time. However, these simplified circuits are available to the selected address, not to the non-selected one. In this paper, new simplified circuits are proposed for calculating the current flowing through the non-selected address. The proposed and the conventional simplified circuits are used, and on that basis the trade-off between the write disturbance and the write error is discussed. Furthermore, the error correcting code (ECC) is introduced to improve the trade-off and to provide the low-cost memory chip matching current production lines.

  • A Fully-Synthesizable 10.06Gbps 16.1mW Injection-Locked CDR in 28nm FDSOI

    Aravind THARAYIL NARAYANAN  Wei DENG  Dongsheng YANG  Rui WU  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER

      Vol:
    E100-C No:3
      Page(s):
    259-267

    An all-digital fully-synthesizable PVT-tolerant clock data recovery (CDR) architecture for wireline chip-to-chip interconnects is presented. The proposed architecture enables the co-synthesis of the CDR with the digital core. By eliminating the resource hungry manual layout and interfacing steps, which are necessary for conventional CDR topologies, the design process and the time-to-market can be drastically improved. Besides, the proposed CDR architecture enables the re-usability of majority of the sub-systems which enables easy migration to different process nodes. The proposed CDR is also equipped with a self-calibration scheme for ensuring tolerence over PVT. The proposed fully-syntehsizable CDR was implemented in 28nm FDSOI. The system achieves a maximum data rate of 10.06Gbps while consuming a power of 16.1mW from a 1V power supply.

  • Applying Razor Flip-Flops to SRAM Read Circuits

    Ushio JIMBO  Junji YAMADA  Ryota SHIOYA  Masahiro GOSHIMA  

     
    PAPER

      Vol:
    E100-C No:3
      Page(s):
    245-258

    Timing fault detection techniques address the problems caused by increased variations on a chip, especially with dynamic voltage and frequency scaling (DVFS). The Razor flip-flop (FF) is a timing fault detection technique that employs double sampling by the main and shadow FFs. In order for the Razor FF to correctly detect a timing fault, not the main FF but the shadow FF must sample the correct value. The application of Razor FFs to static logic relaxes the timing constraints; however, the naive application of Razor FFs to dynamic precharged logic such as SRAM read circuits is not effective. This is because the SRAM precharge cannot start before the shadow FF samples the value; otherwise, the transition of the bitline of the SRAM stops and the value sampled by the shadow FF will be incorrect. Therefore, the detect period cannot overlap the precharge period. This paper proposes a novel application of Razor FFs to SRAM read circuits. Our proposal employs a conditional precharge according to the value of a bitline sampled by the main FF. This enables the detect period to overlap the precharge period, thereby relaxing the timing constraints. The additional circuit required by this method is simple and only needed around the sense amplifier, and there is no need for a clock delayed from the system clock. Consequently, the area overhead of the proposed circuit is negligible. This paper presents SPICE simulations of the proposed circuit. Our proposal reduces the minimum cycle time by 51.5% at a supply voltage of 1.1 V and the minimum voltage by 31.8% at cycle time of 412.5 ps.

  • Recent Progress and Application of Superconducting Nanowire Single-Photon Detectors Open Access

    Taro YAMASHITA  Shigehito MIKI  Hirotaka TERAI  

     
    INVITED PAPER

      Vol:
    E100-C No:3
      Page(s):
    274-282

    In this review, we present recent advances relating to superconducting nanowire single-photon detectors (SSPDs or SNSPDs) and their broad range of applications. During a period exceeding ten years, the system performance of SSPDs has been drastically improved, and lately excellent detection efficiencies have been realized in practical systems for a wide range of target photon wavelengths. Owing to their advantages such as high system detection efficiency, low dark count rate, and excellent timing jitter, SSPDs have found application in various research fields such as quantum information, quantum optics, optical communication, and also in the life sciences. We summarize the photon detection principle and the current performance status of practical SSPD systems. In addition, we introduce application examples in which SSPDs have been applied.

  • Low Leakage Current Nb-Based Tunnel Junctions with an Extra Top Al Layer

    Mizuki IKEYA  Takashi NOGUCHI  Takafumi KOJIMA  Takeshi SAKAI  

     
    PAPER

      Vol:
    E100-C No:3
      Page(s):
    291-297

    In this paper, we describe the fabrication of low leakage Superconductor/Insulator/Superconductor (SIS) junctions with a Nb/Al/AlOx/Al/Nb structure. In other words, an extra Al layer was added onto the top of the insulator in a conventional Nb/Al/AlOx/Nb junction. We measured the current and voltage (IV) characteristics of both the Nb/Al/AlOx/Al/Nb and Nb/Al/AlOx/Nb junctions at the temperature of liquid helium, and found that the sub-gap leakage current in the Nb/Al/AlOx/Al/Nb junctions was much lower than that of the Nb/Al/AlOx/Nb junctions. Our analysis of the IV characteristics indicates that the quality of the AlOx insulator used in the Nb/Al/AlOx/Al/Nb junction was close to ideal, while the insulator used in the Nb/Al/AlOx/Nb junction had possible defects. According to the scanning transmission electron microscope (STEM) images and energy-dispersive X-ray spectroscopy (EDX) analyses, it was evident that the Nb atoms diffused into the bottom electrode of the Nb/Al/AlOx/Nb junction, while a smaller number diffused into the bottom electrode of the Nb/Al/AlOx/Al/Nb junction. Therefore, we conclude that the extra Al layer effectively acted as a buffer layer that prevented the Nb atoms from diffusing into the insulator and bottom electrode. The presence of the top Al layer is expected to favorably improve the quality of junctions with a very high current density, and support the extension of the RF and IF bandwidths of SIS mixers.

  • Decision Feedback Equalizer with Frequency Domain Bidirectional Noise Prediction for MIMO-SCFDE System

    Zedong XIE  Xihong CHEN  Xiaopeng LIU  Lunsheng XUE  Yu ZHAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/09/12
      Vol:
    E100-B No:3
      Page(s):
    433-439

    The impact of intersymbol interference (ISI) on single carrier frequency domain equalization with multiple input multiple output (MIMO-SCFDE) systems is severe. Most existing channel equalization methods fail to solve it completely. In this paper, given the disadvantages of the error propagation and the gap from matched filter bound (MFB), we creatively introduce a decision feedback equalizer with frequency-domain bidirectional noise prediction (DFE-FDBiNP) to tackle intersymbol interference (ISI) in MIMO-SCFDE systems. The equalizer has two-part equalizer, that is the normal mode and the time-reversal mode decision feedback equalization with noise prediction (DFE-NP). Equal-gain combining is used to realize a greatly simplified and low complexity diversity combining. Analysis and simulation results validate the improved performance of the proposed method in quasi-static frequency-selective fading MIMO channel for a typical urban environment.

  • Parametric Wind Velocity Vector Estimation Method for Single Doppler LIDAR Model

    Takayuki MASUO  Fang SHANG  Shouhei KIDERA  Tetsuo KIRIMOTO  Hiroshi SAKAMAKI  Nobuhiro SUZUKI  

     
    PAPER-Sensing

      Pubricized:
    2016/10/12
      Vol:
    E100-B No:3
      Page(s):
    465-472

    Doppler lidar (LIght Detection And Ranging) can provide accurate wind velocity vector estimates by processing the time delay and Doppler spectrum of received signals. This system is essential for real-time wind monitoring to assist aircraft taking off and landing. Considering the difficulty of calibration and cost, a single Doppler lidar model is more attractive and practical than a multiple lidar model. In general, it is impossible to estimate two or three dimensional wind vectors from a single lidar model without any prior information, because lidar directly observes only a 1-dimensional (radial direction) velocity component of wind. Although the conventional VAD (Velocity Azimuth Display) and VVP (Velocity Volume Processing) methods have been developed for single lidar model, both of them are inaccurate in the presence of local air turbulence. This paper proposes an accurate wind velocity estimation method based on a parametric approach using typical turbulence models such as tornado, micro-burst and gust front. The results from numerical simulation demonstrate that the proposed method remarkably enhances the accuracy for wind velocity estimation in the assumed modeled turbulence cases, compared with that obtained by the VAD or other conventional method.

  • SPDebugger: A Fine-Grained Deterministic Debugger for Concurrency Code

    Ziyi LIN  Yilei ZHOU  Hao ZHONG  Yuting CHEN  Haibo YU  Jianjun ZHAO  

     
    PAPER-Software Engineering

      Pubricized:
    2016/12/20
      Vol:
    E100-D No:3
      Page(s):
    473-482

    When debugging bugs, programmers often prepare test cases to reproduce buggy behaviours. However, for concurrent programs, test cases alone are typically insufficient to reproduce buggy behaviours, due to the nondeterminism of multi-threaded executions. In literature, various approaches have been proposed to reproduce buggy behaviours for concurrency bugs deterministically, but to the best of our knowledge, they are still limited. In particular, we have recognized three debugging scenarios from programming practice, but existing approaches can handle only one of the scenarios. In this paper, we propose a novel approach, called SPDebugger, that provides finer-grained thread controlling over test cases, programs under test, and even third party library code, to reproduce the predesigned thread execution schedule. The evaluation shows that SPDebugger handles more debugging scenarios than the state-of-the-art tool, called IMUnit, with similar human effort.

  • On Scheduling Delay-Sensitive SVC Multicast over Wireless Networks with Network Coding

    Shujuan WANG  Chunting YAN  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2016/09/12
      Vol:
    E100-B No:3
      Page(s):
    407-416

    In this work, we study efficient scheduling with network coding in a scalable video coding (SVC) multicast system. Transmission consists of two stages. The original SVC packets are multicasted by the server in the first stage and the lost packets are retransmitted in the second stage. With deadline constraint, the consumer can be only satisfied when the requested packets are received before expiration. Further, the hierarchical encoding architecture of SVC introduces extra decoding delay which poses a challenge for providing acceptable reconstructed video quality. To solve these problems, instantly decodable network coding is applied for reducing the decoding delay, and a novel packet weighted policy is designed to better describe the contribution a packet can make in upgrading the recovered video quality. Finally, an online packet scheduling algorithm based on the maximal weighted clique is proposed to improve the delay, deadline miss ratio and users' experience. Multiple characteristics of SVC packets, such as the packet utility, the slack time and the number of undelivered/wanted packets, are jointly considered. Simulation results prove that the proposed algorithm requires fewer retransmissions and achieves lower deadline miss ratio. Moreover, the algorithm enjoys fine recovery video quality and provides high user satisfaction.

  • Autoreducibility and Completeness for Partial Multivalued Functions

    Shuji ISOBE  Eisuke KOIZUMI  

     
    PAPER

      Pubricized:
    2016/12/21
      Vol:
    E100-D No:3
      Page(s):
    422-427

    In this paper, we investigate a relationship between many-one-like autoreducibility and completeness for classes of functions computed by polynomial-time nondeterministic Turing transducers. We prove two results. One is that any many-one complete function for these classes is metric many-one autoreducible. The other is that any strict metric many-one complete function for these classes is strict metric many-one autoreducible.

  • Floating-Point Multiplier with Concurrent Error Detection Capability by Partial Duplication

    Nobutaka KITO  Kazushi AKIMOTO  Naofumi TAKAGI  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/12/19
      Vol:
    E100-D No:3
      Page(s):
    531-536

    A floating-point multiplier with concurrent error detection capability by partial duplication is proposed. It uses a truncated multiplier for checking of the significand (mantissa) multiplication instead of full duplication. The proposed multiplier can detect any erroneous output with error larger than one unit in the last place (1 ulp) of the significand, which may be overlooked by residue checking. Its circuit area is smaller than that of a fully duplicated one. Area overhead of a single-precision multiplier is about 78% and that of a double-precision one is about 65%.

  • Two Classes of 1-Resilient Prime-Variable Rotation Symmetric Boolean Functions

    Lei SUN  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E100-A No:3
      Page(s):
    902-907

    Recent research has shown that the class of rotation symmetric Boolean functions is beneficial to cryptographics. In this paper, for an odd prime p, two sufficient conditions for p-variable rotation symmetric Boolean functions to be 1-resilient are obtained, and then several concrete constructions satisfying the conditions are presented. This is the first time that resilient rotation symmetric Boolean functions have been systematically constructed. In particular, we construct a class of 2-resilient rotation symmetric Boolean functions when p=2m+1 for m ≥ 4. Moreover, several classes of 1-order correlation immune rotation symmetric Boolean functions are also got.

  • Blind Image Deconvolution Using Specified 2-D HPF for Feature Extraction and Conjugate Gradient Method in Frequency Domain

    Takanori FUJISAWA  Masaaki IKEHARA  

     
    PAPER-Image

      Vol:
    E100-A No:3
      Page(s):
    846-853

    Image deconvolution is the task to recover the image information that was lost by taking photos with blur. Especially, to perform image deconvolution without prior information about blur kernel, is called blind image deconvolution. This framework is seriously ill-posed and an additional operation is required such as extracting image features. Many blind deconvolution frameworks separate the problem into kernel estimation problem and deconvolution problem. In order to solve the kernel estimation problem, previous frameworks extract the image's salient features by preprocessing, such as edge extraction. The disadvantage of these frameworks is that the quality of the estimated kernel is influenced by the region with no salient edges. Moreover, the optimization in the previous frameworks requires iterative calculation of convolution, which takes a heavy computational cost. In this paper, we present a blind image deconvolution framework using a specified high-pass filter (HPF) for feature extraction to estimate a blur kernel. The HPF-based feature extraction properly weights the image's regions for the optimization problem. Therefore, our kernel estimation problem can estimate the kernel in the region with no salient edges. In addition, our approach accelerates both kernel estimation and deconvolution processes by utilizing a conjugate gradient method in a frequency domain. This method eliminates costly convolution operations from these processes and reduces the execution time. Evaluation for 20 test images shows our framework not only improves the quality of recovered images but also performs faster than conventional frameworks.

  • The Performance Stability of Defect Prediction Models with Class Imbalance: An Empirical Study

    Qiao YU  Shujuan JIANG  Yanmei ZHANG  

     
    PAPER-Software Engineering

      Pubricized:
    2016/11/04
      Vol:
    E100-D No:2
      Page(s):
    265-272

    Class imbalance has drawn much attention of researchers in software defect prediction. In practice, the performance of defect prediction models may be affected by the class imbalance problem. In this paper, we present an approach to evaluating the performance stability of defect prediction models on imbalanced datasets. First, random sampling is applied to convert the original imbalanced dataset into a set of new datasets with different levels of imbalance ratio. Second, typical prediction models are selected to make predictions on these new constructed datasets, and Coefficient of Variation (C·V) is used to evaluate the performance stability of different models. Finally, an empirical study is designed to evaluate the performance stability of six prediction models, which are widely used in software defect prediction. The results show that the performance of C4.5 is unstable on imbalanced datasets, and the performance of Naive Bayes and Random Forest are more stable than other models.

  • Analysis of Vehicle Information Sharing Performance of an Intersection Collision Warning System

    Yusuke TAKATORI  Hideya TAKEO  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    457-465

    In this paper, the performance of a vehicle information sharing (VIS) system for an intersection collision warning system (ICWS) is analyzed. The on-board unit (OBU) of the ICWS sharing obstacle detection sensor information (ICWS-ODSI) is mounted on a vehicle, and it obtains information about the surrounding vehicles, such as their position and velocity, by its in-vehicle obstacle detection sensors. These information are shared with other vehicles via an intervehicle communication network. In this analysis, a T-junction is assumed as the road environment for the theoretical analysis of the VIS performance in terms of the mean of entire vehicle information acquiring probability (MEVIAP). The MEVIAP on OBU penetration rate indicated that the ICWS-ODSI is superior to the conventional VIS system that only shares its own individual driving information via an intervehicle communication network. Furthermore, the MEVIAP on the sensing range of the ICWS-ODSI is analyzed, and it was found that the ISO15623 sensor used for the forward vehicle collision warning system becomes a candidate for the in-vehicle detection sensor of ICWS-ODSI.

  • Dynamic Heterogeneous Particle Swarm Optimization

    Shiqin YANG  Yuji SATO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2016/11/02
      Vol:
    E100-D No:2
      Page(s):
    247-255

    Recently, the Static Heterogeneous Particle Swarm Optimization (SHPSO) has been studied by more and more researchers. In SHPSO, the different search behaviours assigned to particles during initialization do not change during the search process. As a consequence of this, the inappropriate population size of exploratory particles could leave the SHPSO with great difficulties of escaping local optima. This motivated our attempt to improve the performance of SHPSO by introducing the dynamic heterogeneity. The self-adaptive heterogeneity is able to alter its heterogeneous structure according to some events caused by the behaviour of the swarm. The proposed triggering events are confirmed by keeping track of the frequency of the unchanged global best position (pg) for a number of iterations. This information is then used to select a new heterogeneous structure when pg is considered stagnant. According to the different types of heterogeneity, DHPSO-d and DHPSO-p are proposed in this paper. In, particles dynamically use different rules for updating their position when the triggering events are confirmed. In DHPSO-p, a global gbest model and a pairwise connection model are automatically selected by the triggering configuration. In order to investigate the scalability of and DHPSO-p, a series of experiments with four state-of-the-art algorithms are performed on ten well-known optimization problems. The scalability analysis of and DHPSO-p reveals that the dynamic self-adaptive heterogeneous structure is able to address the exploration-exploitation trade-off problem in PSO, and provide the excellent optimal solution of a problem simultaneously.

  • New Estimation Method of Pedestrian's Running Out into Road by Using Pressure Sensor and Moving Record for Traffic Safety

    Tomotaka WADA  Go NAKAGAMI  Susumu KAWAI  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    482-490

    We have developed Pedestrian-Vehicular Collision Avoidance Support System (P-VCASS) in order to protect pedestrians from traffic accidents and its effectiveness has been verified. P-VCASS is a system that takes into account pedestrian's moving situations. It gives warning to drivers of neighboring vehicles in advance if there is a possibility of collision between vehicles and pedestrians. There are pedestrians to move around. They are dangerous for vehicle drivers because they have high probability of running out into the road suddenly. Hence, we need to take into account the presence of them. In this paper, we propose a new estimation method of pedestrian's running out into road by using pressure sensor and moving record. We show the validity of the proposed system by experiments using a vehicle and a pedestrian terminal in the intersection. As a result, we show that a driver of vehicle is able to detect dangerous pedestrians quickly and accurately.

  • A Novel Receiver for Reliable IoT Communications Based on ZigBee under Frequency-Selective Indoor Environments

    Minhyuk KIM  Sekchin CHANG  

     
    LETTER

      Vol:
    E100-A No:2
      Page(s):
    361-365

    We present a novel receiver for reliable IoT communications. In this letter, it is assumed that IoT communications are based on ZigBee under frequency-selective indoor environments. The ZigBee includes IEEE 802.15.4 specification for low-power and low-cost communications. The presented receiver fully follows the specification. However, the specification exhibits extremely low performance under frequency-selective environments. Therefore, a channel estimation approach is proposed for reliable communications under frequency-selective fading indoor environments. The estimation method relies on FFT operations, which are usually embedded in cellular phones. We also suggest a correlation method for accurate recovery of original information. The simulation results show that the proposed receiver is very suitable for IoT communications under frequency-selective indoor environments.

1561-1580hit(8214hit)