The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] EE(4073hit)

2421-2440hit(4073hit)

  • A Test Structure to Analyze Highly-Doped-Drain and Lightly-Doped-Drain in CMOSFET

    Takashi OHZONE  Kazuhiko OKADA  Takayuki MORISHITA  Kiyotaka KOMOKU  Toshihiro MATSUDA  Hideyuki IWATA  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E89-C No:9
      Page(s):
    1351-1357

    A test structure to separately measure sheet resistances of highly-doped-drain (HDD) and lightly-doped-drain (LDD) in LDD-type CMOSFETs with various gate spaces S having sub-100 nm sidewalls was proposed. From the reciprocal of source/drain-resistance R-1 versus S characteristics, the sheet resistance ρH of the high-conductive-region (HCR) corresponding to HDD and the approximate width WLC of the low-conductive-region (LCR) corresponding to LDD could be estimated. Both of ρH and WLC for p- and n-MOS devices were scarcely dependent on the gate voltage. The sidewall-width difference of 40 nm could be sufficiently detected by using the test structure with the S pitch of about 60 nm. The R-1 versus S characteristics showed the unstable resistance variations in the narrow S region less than 0.3 µm, which corresponded to the minimum S for the process used for the test device fabrication and suggested that various micro-loading effects seriously affected on the characteristics.

  • Adaptive Beamforming with Robustness against Both Finite-Sample Effects and Steering Vector Mismatches

    Jing-Ran LIN  Qi-Cong PENG  Qi-Shan HUANG  

     
    PAPER-Digital Signal Processing

      Vol:
    E89-A No:9
      Page(s):
    2356-2362

    A novel approach of robust adaptive beamforming (RABF) is presented in this paper, aiming at robustness against both finite-sample effects and steering vector mismatches. It belongs to the class of diagonal loading approaches with the loading level determined based on worst-case performance optimization. The proposed approach, however, is distinguished by two points. (1) It takes finite-sample effects into account and applies worst-case performance optimization to not only the constraints, but also the objective of the constrained quadratic equation, for which it is referred to as joint worst-case RABF (JW-RABF). (2) It suggests a simple closed-form solution to the optimal loading after some approximations, revealing how different factors affect the loading. Compared with many existing methods in this field, the proposed one achieves better robustness in the case of small sample data size as well as steering vector mismatches. Moreover, it is less computationally demanding for presenting a simple closed-form solution to the optimal loading. Numerical examples confirm the effectiveness of the proposed approach.

  • Design and Evaluation of a Cooperative Mechanism for Pure P2P File-Sharing Networks

    Junjiro KONISHI  Naoki WAKAMIYA  Masayuki MURATA  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2319-2326

    To provide application-oriented network services, a variety of overlay networks are deployed over physical IP networks. Since they share and compete for the same physical network resources, their selfish behaviors affect each other and, as a result, their performance deteriorates. Our research group considers a model of overlay network symbiosis, where overlay networks coexist and cooperate to improve their application-level quality of service (QoS) while sustaining influences from the physical network and other overlay networks. In this paper, we especially focus on Peer-to-Peer (P2P) networks among various overlay networks. We propose a mechanism for pure P2P networks of file-sharing applications to cooperate with each other. In our proposal, cooperative peers establish logical links among two or more P2P networks, and messages and files are exchanged among cooperative P2P networks through these logical links. For efficient and effective cooperation, we also propose an algorithm for selection of cooperative peers and a caching mechanism to avoid putting too much load on cooperative peers and cooperating networks. Simulation results show that our proposed mechanism improves the search efficiency of P2P file-sharing applications and reduces the load in P2P networks.

  • Authenticated Dynamic Group Key Agreement for Autoconfigurable Mobile Ad Hoc Networks

    Joseph Chee Ming TEO  Chik How TAN  

     
    PAPER-Network

      Vol:
    E89-B No:9
      Page(s):
    2480-2492

    Secure communication in Mobile Ad Hoc Networks (MANETs) is important as nodes communicate over the wireless medium, which can be easily eavesdropped. Currently, the literature of secure IP address autoconfiguration in MANETs is extremely rare. In this paper, we propose five protocols that provide both secure IP address autoconfiguration and authenticated group key agreement (GKA) to give a more efficient and secure solution for MANET communications. Whenever a dynamic group membership event such as node join, node leave, network merge and network partition occurs, our protocols ensure that the IP address allocation table and group key are updated so that there are no address conflicts and leaving and joining users cannot decrypt future and previous communications respectively. A complexity analysis shows that despite having additional capabilities such as IP address autoconfiguration and key authentication, our protocols are still efficient when compared to other GKA protocols.

  • Robust Recognition of Fast Speech

    Ki-Seung LEE  

     
    LETTER-Speech and Hearing

      Vol:
    E89-D No:8
      Page(s):
    2456-2459

    This letter describes a robust speech recognition system for recognizing fast speech by stretching the length of the utterance in the cepstrum domain. The degree of stretching for an utterance is determined by its rate of speech (ROS), which is based on a maximum likelihood (ML) criterion. The proposed method was evaluated on 10-digits mobile phone numbers. The results of the simulation show that the overall error rate was reduced by 17.8% when the proposed method was employed.

  • A Polynomial Time Algorithm for Obtaining a Minimum Vertex Ranking Spanning Tree in Outerplanar Graphs

    Shin-ichi NAKAYAMA  Shigeru MASUYAMA  

     
    INVITED PAPER

      Vol:
    E89-D No:8
      Page(s):
    2357-2363

    The minimum vertex ranking spanning tree problem is to find a spanning tree of G whose vertex ranking is minimum. This problem is NP-hard and no polynomial time algorithm for solving it is known for non-trivial classes of graphs other than the class of interval graphs. This paper proposes a polynomial time algorithm for solving the minimum vertex ranking spanning tree problem on outerplanar graphs.

  • Key-Dependent Weak IVs and Weak Keys in WEP--How to Trace Conditions Back to Their Patterns--

    Kazukuni KOBARA  Hideki IMAI  

     
    PAPER-Information Security

      Vol:
    E89-A No:8
      Page(s):
    2198-2206

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over the air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The attack was then extended and implemented as WEP cracking tools. The key recovery attacks can basically be prevented by skipping certain IVs (Initial Values) called weak IVs, but the problem is that there exist huge amount of key-dependent weak IVs and the patterns of them have not been fully identified yet. The difficult part is that a naive approach to identify the key-dependent weak IVs requires the exhaustive search of IVs and WEP keys, and hence is infeasible. On the other hand, it might be feasible to skip the key-dependent weak IVs for the currently set WEP key but this reveals information on the WEP key from the skipped patterns. To skip them safely, the patterns of the key-dependent weak IVs must be identified in the first place. In this paper, we analyze the famous condition for IVs and WEP keys to be weak in the FMS attack, i.e. 0≤S[1]≤t'

  • The Even Outdegree Conjecture for Acyclic PLCP-Cubes in Dimension Five

    Sonoko MORIYAMA  Yoshio OKAMOTO  

     
    INVITED PAPER

      Vol:
    E89-D No:8
      Page(s):
    2402-2404

    The behavior of Bard-type pivoting algorithms for the linear complementarity problem with a P-matrix is represented by an orientation of a hypercube. We call it a PLCP-cube. In 1978, Stickney and Watson conjectured that such an orientation has no facet on which all even outdegree vertices appear. We prove that this conjecture is true for acyclic PLCP-cubes in dimension five.

  • Equivalent Circuit Analysis for Time-Coordinated Non-arcing Operation of Reed Switches

    Noboru WAKATSUKI  Yu YONEZAWA  Atsushi YAMAMOTO  

     
    PAPER-Relays & Switches

      Vol:
    E89-C No:8
      Page(s):
    1182-1186

    We proposed a method for suppressing arc ignition in mechanical contact devices using a transient current switch and a capacitor. We applied the method to conventional reed switches. For the electric circuit analysis, we clarified the momentary voltage-current characteristics at breaking operation of reed switches by FEM analysis. We could also estimate the capacitance of the contact electrodes at the metal bridge rupture by FEM analysis, and would derive the non-arcing condition using SPICE simulation. The suitable capacitor value in the transient current circuit for arc ignition suppression would be depend on the load impedance, the power supply, the time depending contact resistance R(t)s, the contact capacitance, and the minimum arc voltage and current.

  • The Bump Hunting Method Using the Genetic Algorithm with the Extreme-Value Statistics

    Takahiro YUKIZANE  Shin-ya OHI  Eiji MIYANO  Hideo HIROSE  

     
    INVITED PAPER

      Vol:
    E89-D No:8
      Page(s):
    2332-2339

    In difficult classification problems of the z-dimensional points into two groups giving 0-1 responses due to the messy data structure, we try to find the denser regions for the favorable customers of response 1, instead of finding the boundaries to separate the two groups. Such regions are called the bumps, and finding the boundaries of the bumps is called the bump hunting. The main objective of this paper is to find the largest region of the bumps under a specified ratio of the number of the points of response 1 to the total. Then, we may obtain a trade-off curve between the number of points of response 1 and the specified ratio. The decision tree method with the Gini's index will provide the simple-shaped boundaries for the bumps if the marginal density for response 1 shows a rather simple or monotonic shape. Since the computing time searching for the optimal trees will cost much because of the NP-hardness of the problem, some random search methods, e.g., the genetic algorithm adapted to the tree, are useful. Due to the existence of many local maxima unlike the ordinary genetic algorithm search results, the extreme-value statistics will be useful to estimate the global optimum number of captured points; this also guarantees the accuracy of the semi-optimal solution with the simple descriptive rules. This combined method of genetic algorithm search and extreme-value statistics use is new. We apply this method to some artificial messy data case which mimics the real customer database, showing a successful result. The reliability of the solution is discussed.

  • A Hybrid FEC Method Using Packet-Level Convolution and Reed-Solomon Codes

    Jun TAKAHASHI  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Network

      Vol:
    E89-B No:8
      Page(s):
    2143-2151

    Efficient real-time contents distribution services on the Internet are only possible by suppressing the influence of packet losses. One solution for UDP transmission is the use of Forward Error Correction (FEC) based on Reed-Solomon codes. However, a more efficient method is required since this causes the increase of network traffic and includes the weakness to burst packet losses. In this paper, we propose a data recovery method that generates redundant data with the combination of Reed-Solomon codes and convolution of neighboring blocks. We realize the small amount of redundancy and the high reliability in data transmission compared with using only Reed-Solomon codes in the environment that burst packet losses are occurred frequently. We implement proposal method into the network bridge and confirm its efficiency from the viewpoint of data reconstruction from burst packet losses.

  • Novel Downlink Beamforming Method Using Selective STBC with Common Eigenvectors for MIMO-OFDM Systems

    Riichi KUDO  Yasushi TAKATORI  Kentaro NISHIMORI  Koichi TSUNEKAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:8
      Page(s):
    2170-2179

    To achieve a very high data rate within a limited frequency band in orthogonal frequency division multiplexing (OFDM) systems, multi-input multi-output (MIMO) techniques are very promising. Moreover, if a transmitter has the channel state information (CSI), the achievable spectrum efficiency can be maximized using the eigenbeam-space division multiplexing (E-SDM). However, this scheme demands accurate channel estimation. Therefore, in a closed-loop transmission scheme, an increase in the amount of feedback is absolutely necessary for the E-SDM. This paper describes a downlink beamforming method that significantly reduces the amount of feedback needed by using the common transmission weight vectors in all sub-carriers, compared to the amount required for E-SDM. The proposed method also applies transmission diversity to compensate for the quality. The effectiveness of the proposed method was confirmed using computer simulations in both Ricean and Rayleigh fading environments.

  • Optical Observation of Arc Discharges between Electrical Contacts Breaking at Low Speed in DC42 V Resistive Circuit

    Junya SEKIKAWA  Takayoshi KUBONO  

     
    PAPER-Arc Discharge & Related Phenomena

      Vol:
    E89-C No:8
      Page(s):
    1147-1152

    Breaking arcs occurring between silver electrical contacts are observed in DC42 V resistive circuit using a high-speed camera. The motion and current densities of the cathode and anode spot regions are investigated for different interrupt currents (I=7 A, 10 A and 14 A). Results indicate that the arc length at which the motion of arc spots becomes stable depends on the interrupt current, and the current densities of the cathode spot region are almost constant immediately before arc extinction for each interrupt current.

  • Analysis and Synthesis of Emotional Voice Based on Time-Frequency Pitch Distributions

    Mamoru KOBAYASHI  Shigeo WADA  

     
    PAPER

      Vol:
    E89-A No:8
      Page(s):
    2100-2106

    In this paper, analysis and synthesis methods of emotional voice for man-machine natural interface is developed. First, the emotional voice (neutral, anger, sadness, joy, dislike) is analyzed using time-frequency representation of speech and similarity analysis. Then, based on the result of emotional analysis, a voice with neutral emotion is transformed to synthesize the particular emotional voice using time-frequency modifications. In the simulations, five types of emotion are analyzed using 50 samples of speech signals. The high average discrimination rate is achieved in the similarity analysis. Further, the synthesized emotional voice is subjectively evaluated. It is confirmed that the emotional voice is naturally generated by the proposed time-frequency based approach.

  • Detection of Overlapping Speech in Meetings Using Support Vector Machines and Support Vector Regression

    Kiyoshi YAMAMOTO  Futoshi ASANO  Takeshi YAMADA  Nobuhiko KITAWAKI  

     
    PAPER-Engineering Acoustics

      Vol:
    E89-A No:8
      Page(s):
    2158-2165

    In this paper, a method of detecting overlapping speech segments in meetings is proposed. It is known that the eigenvalue distribution of the spatial correlation matrix calculated from a multiple microphone input reflects information on the number and relative power of sound sources. However, in a reverberant sound field, the feature of the number of sources in the eigenvalue distribution is degraded by the room reverberation. In the Support Vector Machines approach, the eigenvalue distribution is classified into two classes (overlapping speech segments and single speech segments). In the Support Vector Regression approach, the relative power of sound sources is estimated by using the eigenvalue distribution, and overlapping speech segments are detected based on the estimated relative power. The salient feature of this approach is that the sensitivity of detecting overlapping speech segments can be controlled simply by changing the threshold value of the relative power. The proposed method was evaluated using recorded data of an actual meeting.

  • Construction of Thai Lexicon from Existing Dictionaries and Texts on the Web

    Thatsanee CHAROENPORN  Canasai KRUENGKRAI  Thanaruk THEERAMUNKONG  Virach SORNLERTLAMVANICH  

     
    PAPER-Natural Language Processing

      Vol:
    E89-D No:7
      Page(s):
    2286-2293

    A lexicon is an important linguistic resource needed for both shallow and deep language processing. Currently, there are few machine-readable Thai dictionaries available, and most of them do not satisfy the computational requirements. This paper presents the design of a Thai lexicon named the TCL's Computational Lexicon (TCLLEX) and proposes a method to construct a large-scale Thai lexicon by re-using two existing dictionaries and a large number of texts on the Internet. In addition to morphological, syntactic, semantic case role and logical information in the existing dictionaries, a sort of semantic constraint called selectional preference is automatically acquired by analyzing Thai texts on the web and then added into the lexicon. In the acquisition process of the selectional preferences, the so-called Bayesian Information Criterion (BIC) is applied as the measure in a tree cut model. The experiments are done to verify the feasibility and effectiveness of obtained selection preferences.

  • Impersonation Attacks on Key Agreement Protocols Resistant to Denial of Service Attacks

    Kyung-Ah SHIM  

     
    LETTER-Application Information Security

      Vol:
    E89-D No:7
      Page(s):
    2306-2309

    Hirose and Yoshida proposed an authenticated key agreement protocol based on the intractability of the Computational Diffie-Hellman problem. Recently, Hirose and Matsuura pointed out that Hirose and Yoshida's protocol is vulnerable to Denial-of-Service (DoS) attacks. And they proposed two key agreement protocols which are resistant to the DoS attacks. Their protocols are the first authenticated key agreement protocols resistant to both the storage exhaustion attack and the CPU exhaustion attack. In this paper we show that Hirose and Matsuura's DoS-resistant key agreement protocols and Hirose and Yoshida's key agreement protocol are vulnerable to impersonation attacks. We make suggestions for improvements.

  • Quick Data-Retrieving for U-APSD in IEEE802.11e WLAN Networks

    Shojiro TAKEUCHI  Kaoru SEZAKI  Yasuhiko YASUDA  

     
    PAPER

      Vol:
    E89-A No:7
      Page(s):
    1919-1929

    The IEEE802.11e is a standard developed by a Task Group E of the IEEE802.11 working group and defines a MAC protocol, which provides EDCA (enhanced distributed channel access) and HCCA (HCF controlled channel access) to support differentiation service over WLAN (wireless LAN). In IEEE802.11e WLAN, real-time application such as VoIP (Voice over IP) can have more chances to access the WM (wireless medium) than non real-time application. In addition to QoS support in WLAN, power consumption is a critical issue when WLAN is used in handheld devices. For power saving in the use of real-time applications like VoIP under EDCA, U-APSD (Unscheduled Automatic Power Save Delivery) was proposed in [2] and [4]. In fact, it can save power consumption and works well when it is used for bi-directional voice connections generated at constant bit rate. However, when it is used for real-time applications like ON-OFF traffic, buffering delay at AP (access point) increases. To reduce the buffering delay, this paper proposes two mechanisms. Simulation results show that they can alleviate buffering delay generated at AP.

  • Fast Rebuilding B+-Trees for Index Recovery

    Ig-hoon LEE  Junho SHIM  Sang-goo LEE  

     
    PAPER-Database

      Vol:
    E89-D No:7
      Page(s):
    2223-2233

    Rebuilding an index is an essential step for database recovery. Fast recovery of the index is a necessary condition for fast database recovery. The B+-Tree is the most popular index structure in database systems. In this paper, we present a fast B+-Tree rebuilding algorithm called Max-PL. The main idea of Max-PL is that at first it constructs a B+-Tree index structure using the pre-stored max keys of the leaf nodes, and then inserts the keys and data pointers into the index. The algorithm employs a pipelining mechanism for reading the data records and inserting the keys into the index. It also exploits parallelisms in several phases to boost the overall performance. We analyze the time complexity and space requirement of the algorithm, and perform the experimental study to compare its performance to other B+-Trees rebuilding algorithms; Sequential Insertion and Batch-Construction. The results show that our algorithm runs on average at least 670% faster than Sequential Insertion and 200% faster than Batch-Construction.

  • Future of Heterostructure Microelectronics and Roles of Materials Research for Its Progress

    Hideki HASEGAWA  Seiya KASAI  Taketomo SATO  Tamotsu HASHIZUME  

     
    INVITED PAPER

      Vol:
    E89-C No:7
      Page(s):
    874-882

    With advent of the ubiquitous network era and due to recent progress of III-V nanotechnology, the present III-V heterostructure microelectronics will turn into what one might call III-V heterostructure nanoelectronics, and may open up a new future in much wider application areas than today, combining information technology, nanotechnology and biotechnology. Instead of the traditional top-down approach, new III-V heterostructure nanoelectronics will be formed on nanostructure networks formed by combination of top-down and bottom-up approaches. In addition to communication devices, emerging devices include high speed digital LSIs, various sensors, various smart-chips, quantum LSIs and quantum computation devices covering varieties of application areas. Ultra-low power quantum LSIs may become brains of smart chips and other nano-space systems. Achievements of new functions and higher performances and their on chip integration are key issues. Key processing issue remains to be understanding and control of nanostructure surfaces and interfaces in atomic scale.

2421-2440hit(4073hit)