The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IR(5768hit)

921-940hit(5768hit)

  • A Free Space Permittivity Measurement at Microwave Frequencies for Solid Materials

    An Ngoc NGUYEN  Hiroshi SHIRAI  

     
    PAPER

      Vol:
    E100-C No:1
      Page(s):
    52-59

    A broadband approach to estimate the relative permittivity of dielectric cuboids has been proposed for materials of weak frequency dispersive characteristic. Our method involves a numerical iterative scheme with appropriate initial values carefully selected to solve for the relative permittivity in a wide range of frequencies. Good agreements between our method and references have been observed for nylon and acrylic samples. An applicable range relation between the minimal thickness, the frequency range and the dielectric property of the material has also been discussed.

  • Towards Practical Store-Carry-Forward Networking: Examples and Issues Open Access

    Masato TSURU  Mineo TAKAI  Shigeru KANEDA   Agussalim  Rabenirina AINA TSIORY  

     
    INVITED PAPER-Network

      Vol:
    E100-B No:1
      Page(s):
    2-10

    In the evolution of wireless networks such as wireless sensor networks, mobile ad-hoc networks, and delay/disruption tolerant networks, the Store-Carry-Forward (SCF) message relaying paradigm has been commonly featured and studied with much attention. SCF networking is essential for offsetting the deficiencies of intermittent and range limited communication environments because it allows moving wireless communication nodes to act as “mobile relay nodes”. Such relay nodes can store/carry/process messages, wait for a better opportunity for transmission, and finally forward the messages to other nodes. This paper starts with a short overview of SCF routing and then examines two SCF networking scenarios. The first one deals with large content delivery across multiple islands using existing infrastructural transportation networks (e.g., cars and ferries) in which mobility is uncontrollable from an SCF viewpoint. Simulations show how a simple coding technique can improve flooding-based SCF. The other scenario looks at a prototype system of unmanned aerial vehicle (UAV) for high-quality video surveillance from the sky in which mobility is partially controllable from an SCF viewpoint. Three requisite techniques in this scenario are highlighted - fast link setup, millimeter wave communications, and use of multiple links. Through these examples, we discuss the benefits and issues of the practical use of SCF networking-based systems.

  • Design, Fabrication, and Measurement of Constant Gain UWB Planar Antenna Using FSS-Based Reflectors

    Rabia YAHYA  Akira NAKAMURA  Makoto ITAMI  Tayeb A. DENIDNI  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    194-199

    In this paper, we propose a technique to improve the gain of ultra wide-band (UWB) planar antennas by using low profile reflectors based on frequency selective surfaces (FSS). This technique not only enhances the gain of the planar UWB antennas but also guarantees a constant gain with weak variation across the entire UWB while keeping their attractive merits such as planar structure and easy fabrication. An UWB coplanar waveguide (CPW) fed antenna is installed above the proposed reflectors, to prove the effectiveness of the proposed technique. As a result, a constant gain is achieved across a very large bandwidth.

  • Increase of Recognizable Label Number with Optical Passive Waveguide Circuits for Recognition of Encoded 4- and 8-Bit BPSK Labels

    Hiroki KISHIKAWA  Akito IHARA  Nobuo GOTO  Shin-ichiro YANAGIYA  

     
    PAPER-Optoelectronics

      Vol:
    E100-C No:1
      Page(s):
    84-93

    Optical label processing is expected to reduce power consumption in label switching network nodes. Previously, we proposed passive waveguide circuits for the recognition of BPSK labels with a theoretically infinite contrast ratio. The recognizable label number was limited to four and eight for 4-bit and 8-bit BPSK labels, respectively. In this paper, we propose methods to increase the recognizable label number. The proposed circuits can recognize eight and sixteen labels of 4-bit BPSK codes with a contrast ratio of 4.00 and 2.78, respectively. As 8-bit BSPK codes, 64, 128, and 256 labels can be recognized with a contrast ratio of 4.00, 2.78, and 1.65, respectively. In recognition of all encoded labels, that is, 16 and 256 labels for 4-bit and 8-bit BPSK labels, a reference signal is employed to identify the sign of the optical output signals. The effect of phase deviation and loss along the optical waveguides of the devices is also discussed.

  • Design, Analysis and Implementation of Pulse Generator by CMOS Flipped on Glass for Low Power UWB-IR

    Parit KANJANAVIROJKUL  Nguyen NGOC MAI-KHANH  Tetsuya IIZUKA  Toru NAKURA  Kunihiro ASADA  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    200-209

    This paper discusses a pulse generator implemented by CMOS flipped on a glass substrate aiming at low power applications with low duty cycle. The pulse generator is theoretically possible to generate a pulse at a frequency near and beyond Fmax. It also features a quick starting time and zero stand-by power. By using a simplified circuit model, analytical expressions for Q factor, energy conversion efficiency, output energy, and oscillation frequency of the pulse generator are derived. Pulse generator prototypes are designed on a 0.18 μm CMOS chip flipped over a transmission line resonator on a glass substrate. Measurement results of two different prototypes confirm the feasibility of the proposed circuit and the analytical model.

  • Light Space Partitioned Shadow Maps

    Bin TANG  Jianxin LUO  Guiqiang NI  Weiwei DUAN  Yi GAO  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    234-237

    This letter proposes a Light Space Partitioned Shadow Maps (LSPSMs) algorithm which implements shadow rendering based on a novel partitioning scheme in light space. In stead of splitting the view frustum like traditional Z-partitioning methods, we split partitions from the projection of refined view frustum in light space. The partitioning scheme is performed dual-directionally while limiting the wasted space. Partitions are created in dynamic number corresponding to the light and view directions. Experiments demonstrate that high quality shadows can be rendered in high efficiency with our algorithm.

  • The Computation Reduction in Object Detection via Composite Structure of Modified Integral Images

    Daeha LEE  Jaehong KIM  Ho-Hee KIM  Soon-Ja KIM  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    229-233

    Object detection is the first step in the object recognition. According to the detection results, its following works are affected. However, object detection has a heavy resource requirement in terms of, computing power and memory. If an image is enlarged, the computational load required for object detection is also increased. An-integral-image-based method guarantees fast object detection. Once an integral image is generated, the speed of the object detection procedure remains fixed, regardless of the pattern region size. However, this becomes an even greater issue if the image is enlarged. In this paper, we propose the use of directional integral image based object detection. A directional integral image gives direction to an integral image, which can then be calculated from various directions. Furthermore, many unnecessary calculations, which typically occur when a partial integral image is used for object detection, can be avoided. Therefore, the amount of computation is reduced, compared with methods using integral images. In experiments comparing methods, the proposed method required 40% fewer computations.

  • Direct- or Fast-Access Decoding Schemes for VF Codes

    Hirosuke YAMAMOTO  Yuka KUWAORI  

     
    LETTER-Source Coding and Data Compression

      Vol:
    E99-A No:12
      Page(s):
    2291-2295

    In this paper, we propose two schemes, which enable any VF code to realize direct- or fast-access decoding for any long source sequence. Direct-access decoding means that any source symbol of any position can be directly decoded within constant time, not depending on the length of source sequence N, without decoding the whole codeword sequence. We also evaluate the memory size necessary to realize direct-access decoding or fast-access decoding with decoding delay O(log log N), O(log N), and so on, in the proposed schemes.

  • Power-Supply-Noise-Aware Timing Analysis and Test Pattern Regeneration

    Cheng-Yu HAN  Yu-Ching LI  Hao-Tien KAN  James Chien-Mo LI  

     
    PAPER

      Vol:
    E99-A No:12
      Page(s):
    2320-2327

    SUMMARY This paper proposes a power-supply-noise-aware timing analysis and test pattern regeneration framework suitable for testing 3D IC. The proposed framework analyzes timing with reasonable accuracy at much faster speed than existing tools. This technique is very scalable because it is based on analytical functions, instead of solving nonlinear equations. The experimental results show, for small circuits, the error is less than 2% compared with SPICE. For large circuits, we achieved 272 times speed up compared with a commercial tool. For a large benchmark circuit (638K gates), we identified 88 risky patterns out of 31K test patterns. We propose a test pattern regeneration flow to replace those risky patterns with very little (or even no) penalty in fault coverage. Our test sets are shorter than commercial power-aware ATPG while the fault coverage is almost the same as power-unaware ATPG.

  • Fast Live Migration for IO-Intensive VMs with Parallel and Adaptive Transfer of Page Cache via SAN

    Soramichi AKIYAMA  Takahiro HIROFUCHI  Ryousei TAKANO  Shinichi HONIDEN  

     
    PAPER-Operating system

      Pubricized:
    2016/08/24
      Vol:
    E99-D No:12
      Page(s):
    3024-3034

    Live migration plays an important role on improving efficiency of cloud data centers by enabling dynamically replacing virtual machines (VMs) without disrupting services running on them. Although many studies have proposed acceleration mechanisms of live migration, IO-intensive VMs still suffer from long total migration time due to a large amount of page cache. Existing studies for this problem either force the guest OS to delete the page cache before a migration, or they do not consider dynamic characteristics of cloud data centers. We propose a parallel and adaptive transfer of page cache for migrating IO-intensive VMs which (1) does not delete the page cache and is still fast by utilizing the storage area network of a data center, and (2) achieves the shortest total migration time without tuning hand-crafted parameters. Experiments showed that our method reduces total migration time of IO-intensive VMs up to 33.9%.

  • LigeroAV: A Light-Weight, Signature-Based Antivirus for Mobile Environment

    Jaehwan LEE  Min Jae JO  Ji Sun SHIN  

     
    LETTER-Information Network

      Pubricized:
    2016/09/12
      Vol:
    E99-D No:12
      Page(s):
    3185-3187

    Current signature-based antivirus solutions have three limitations such as the large volume of signature database, privacy preservation, and computation overheads of signature matching. In this paper, we propose LigeroAV, a light-weight, performance-enhanced antivirus, suitable for pervasive environments such as mobile phones. LigeroAV focuses on detecting MD5 signatures which are more than 90% of signatures. LigeroAV offloads matching computation in the cloud server with up-to-dated signature database while preserving privacy level using the Bloom filter.

  • Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channel

    Shunsuke HORII  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Coding Theory and Techniques

      Vol:
    E99-A No:12
      Page(s):
    2170-2178

    In this study, we develop a new algorithm for decoding binary linear codes for symbol-pair read channels. The symbol-pair read channel was recently introduced by Cassuto and Blaum to model channels with higher write resolutions than read resolutions. The proposed decoding algorithm is based on linear programming (LP). For LDPC codes, the proposed algorithm runs in time polynomial in the codeword length. It is proved that the proposed LP decoder has the maximum-likelihood (ML) certificate property, i.e., the output of the decoder is guaranteed to be the ML codeword when it is integral. We also introduce the fractional pair distance dfp of the code, which is a lower bound on the minimum pair distance. It is proved that the proposed LP decoder corrects up to ⌈dfp/2⌉-1 errors.

  • Equivalent Circuit Modeling of a Semiconductor-Integrated Bow-Tie Antenna for the Physical Interpretation of the Radiation Characteristics in the Terahertz Region

    Hirokazu YAMAKURA  Michihiko SUHARA  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E99-C No:12
      Page(s):
    1312-1322

    We have derived the physics-based equivalent circuit model of a semiconductor-integrated bow-tie antenna (BTA) for expressing its impedance and radiation characteristics as a terahertz transmitter. The equivalent circuit branches and components, consisting of 16 RLC parameters are determined based on electromagnetic simulations. All the values of the circuit elements are identified using the particle swarm optimization (PSO) that is one of the modern multi-purpose optimization methods. Moreover, each element value can also be explained by the structure of the semiconductor-integrated BTA, the device size, and the material parameters.

  • General, Practical and Accurate Models for the Performance Analysis of Multi-Cache Systems

    Haoqiu HUANG  Lanlan RUI  Weiwei ZHENG  Danmei NIU  Xuesong QIU  Sujie SHAO  

     
    PAPER

      Vol:
    E99-B No:12
      Page(s):
    2559-2573

    In this work, we propose general, practical and accurate models to analyze the performance of multi-cache systems, in which a cache forwards its miss stream (i.e., requests which have not found the target item) to other caches. We extend a miss stream modeling technique originally known as Melazzi's approximation, which provides a simple but accurate approximate analysis for caches with cascade configurations. We consider several practical replication strategies, which have been commonly adopted in the context of ICN, taking into account the effects of temporal locality. Also, we capture the existing state correlations between neighboring caches by exploiting the cache eviction time. Our proposed models to handle traffic patterns allow us to go beyond the standard Poisson approximation under Independent Reference Model. Our results, validated against simulations, provide interesting insights into the performance of multi-cache systems with different replication strategies.

  • Algebraic Decoding of BCH Codes over Symbol-Pair Read Channels: Cases of Two-Pair and Three-Pair Error Correction

    Makoto TAKITA  Masanori HIROTOMO  Masakatu MORII  

     
    PAPER-Coding Theory and Techniques

      Vol:
    E99-A No:12
      Page(s):
    2179-2191

    In this paper, we discuss an algebraic decoding of BCH codes over symbol-pair read channels. The channels output overlapping pairs of symbols in storage applications. The pair distance and pair error are used in the channels. We define a polynomial that represents the positions of the pair errors as the error-locator polynomials and a polynomial that represents the positions of the pairs of a received pair vector in conflict as conflict-locator polynomial. In this paper, we propose algebraic methods for correcting two-pair and three-pair errors for BCH codes. First, we show the relation between the error-locator polynomials and the conflict-locator polynomial. Second, we show the relation among these polynomials and the syndromes. Finally, we provide how to correct the pair errors by solving equations including the relational expression by algebraic methods.

  • Logic-Path-and-Clock-Path-Aware At-Speed Scan Test Generation

    Fuqiang LI  Xiaoqing WEN  Kohei MIYASE  Stefan HOLST  Seiji KAJIHARA  

     
    PAPER

      Vol:
    E99-A No:12
      Page(s):
    2310-2319

    Excessive IR-drop in capture mode during at-speed scan testing may cause timing errors for defect-free circuits, resulting in undue test yield loss. Previous solutions for achieving capture-power-safety adjust the switching activity around logic paths, especially long sensitized paths, in order to reduce the impact of IR-drop. However, those solutions ignore the impact of IR-drop on clock paths, namely test clock stretch; as a result, they cannot accurately achieve capture-power-safety. This paper proposes a novel scheme, called LP-CP-aware ATPG, for generating high-quality capture-power-safe at-speed scan test vectors by taking into consideration the switching activity around both logic and clock paths. This scheme features (1) LP-CP-aware path classification for characterizing long sensitized paths by considering the IR-drop impact on both logic and clock paths; (2) LP-CP-aware X-restoration for obtaining more effective X-bits by backtracing from both logic and clock paths; (3) LP-CP-aware X-filling for using different strategies according to the positions of X-bits in test cubes. Experimental results on large benchmark circuits demonstrate the advantages of LP-CP-aware ATPG, which can more accurately achieve capture-power-safety without significant test vector count inflation and test quality loss.

  • Privacy-Enhanced Similarity Search Scheme for Cloud Image Databases

    Hao LIU  Hideaki GOTO  

     
    LETTER-Information Network

      Pubricized:
    2016/09/12
      Vol:
    E99-D No:12
      Page(s):
    3188-3191

    The privacy of users' data has become a big issue for cloud service. This research focuses on image cloud database and the function of similarity search. To enhance security for such database, we propose a framework of privacy-enhanced search scheme, while all the images in the database are encrypted, and similarity image search is still supported.

  • Improvement of Throughput Prediction Scheme Considering Terminal Distribution in Multi-Rate WLAN Considering Both CSMA/CA and Frame Collision

    Ryo HAMAMOTO  Chisa TAKANO  Hiroyasu OBATA  Kenji ISHIDA  

     
    PAPER-Wireless system

      Pubricized:
    2016/08/24
      Vol:
    E99-D No:12
      Page(s):
    2923-2933

    Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standard have been increasingly used. Access Points (APs) are being established in various public places, such as railway stations and airports, as well as private residences. Moreover, the rate of public WLAN services continues to increase. Throughput prediction of an AP in a multi-rate environment, i.e., predicting the amount of receipt data (including retransmission packets at an AP), is an important issue for wireless network design. Moreover, it is important to solve AP placement and selection problems. To realize the throughput prediction, we have proposed an AP throughput prediction method that considers terminal distribution. We compared the predicted throughput of the proposed method with a method that uses linear order computation and confirmed the performance of the proposed method, not by a network simulator but by the numerical computation. However, it is necessary to consider the impact of CSMA/CA in the MAC layer, because throughput is greatly influenced by frame collision. In this paper, we derive an effective transmission rate considering CSMA/CA and frame collision. We then compare the throughput obtained using the network simulator NS2 with a prediction value calculated by the proposed method. Simulation results show that the maximum relative error of the proposed method is approximately 6% and 15% for UDP and TCP, respectively, while that is approximately 17% and 21% in existing method.

  • Error and Secrecy Exponents for Wiretap Channels under Two-Fold Cost Constraints

    Hiroyuki ENDO  Te Sun HAN  Masahide SASAKI  

     
    PAPER-Information Theoretic Security

      Vol:
    E99-A No:12
      Page(s):
    2136-2146

    The wiretap channel is now a fundamental model for information-theoretic security. After introduced by Wyner, Csiszár and Körner have generalized this model by adding an auxiliary random variable. Recently, Han, Endo and Sasaki have derived the exponents to evaluate the performance of wiretap channels with cost constraints on input variable plus such an auxiliary random variable. Although the constraints on two variables were expected to provide larger-valued (or tighter) exponents, some non-trivial theoretical problems had been left open. In this paper, we investigate these open problems, especially concerning the concavity property of the exponents. Furthermore, we compare the exponents derived by Han et al. with the counterparts derived by Gallager to reveal that the former approach has a significantly wider applicability in contrast with the latter one.

  • Computing K-Terminal Reliability of Circular-Arc Graphs

    Chien-Min CHEN  Min-Sheng LIN  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2016/09/06
      Vol:
    E99-D No:12
      Page(s):
    3047-3052

    Let G be a graph and K be a set of target vertices of G. Assume that all vertices of G, except the vertices in K, may fail with given probabilities. The K-terminal reliability of G is the probability that all vertices in K are mutually connected. This reliability problem is known to be #P-complete for general graphs. This work develops the first polynomial-time algorithm for computing the K-terminal reliability of circular-arc graphs.

921-940hit(5768hit)