The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ISM(359hit)

141-160hit(359hit)

  • Parallelism Analysis of H.264 Decoder and Realization on a Coarse-Grained Reconfigurable SoC

    Gugang GAO  Peng CAO  Jun YANG  Longxing SHI  

     
    PAPER-Application

      Vol:
    E96-D No:8
      Page(s):
    1654-1666

    One of the largest challenges for coarse-grained reconfigurable arrays (CGRAs) is how to efficiently map applications. The key issues for mapping are (1) how to reduce the memory bandwidth, (2) how to exploit parallelism in algorithms and (3) how to achieve load balancing and take full advantage of the hardware potential. In this paper, we propose a novel parallelism scheme, called ‘Hybrid partitioning’, for mapping a H.264 high definition (HD) decoder onto REMUS-II, a CGRA system-on-chip (SoC). Combining good features of data partitioning and task partitioning, our methodology mainly consists of three levels from top to bottom: (1) hybrid task pipeline based on slice and macroblock (MB) level; (2) MB row-level data parallelism; (3) sub-MB level parallelism method. Further, on the sub-MB level, we propose a few mapping strategies such as hybrid variable block size motion compensation (Hybrid VBSMC) for MC, 2D-wave for intra 44, parallel processing order for deblocking. With our mapping strategies, we improved the algorithm's performance on REMUS-II. For example, with a luma 1616 MB, the Hybrid VBSMC achieves 4 times greater performance than VBSMC and 2.2 times greater performance than fixed 44 partition approach. Finally, we achieve 1080p@33fps H.264 high-profile (HiP)@level 4.1 decoding when the working frequency of REMUS-II is 200 MHz. Compared with typical hardware platforms, we can achieve better performance, area, and flexibility. For example, our performance achieves approximately 175% improvement than that of a commercial CGRA processor XPP-III while only using 70% of its area.

  • Deterministic Message Passing for Distributed Parallel Computing

    Xu ZHOU  Kai LU  Xiaoping WANG  Wenzhe ZHANG  Kai ZHANG  Xu LI  Gen LI  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E96-D No:5
      Page(s):
    1068-1077

    The nondeterminism of message-passing communication brings challenges to program debugging, testing and fault-tolerance. This paper proposes a novel deterministic message-passing implementation (DMPI) for parallel programs in the distributed environment. DMPI is compatible with the standard MPI in user interface, and it guarantees the reproducibility of message with high performance. The basic idea of DMPI is to use logical time to solve message races and control asynchronous transmissions, and thus we could eliminate the nondeterministic behaviors of the existing message-passing mechanism. We apply a buffering strategy to alleviate the performance slowdown caused by mismatch of logical time and physical time. To avoid deadlocks introduced by deterministic mechanisms, we also integrate DMPI with a lightweight deadlock checker to dynamically detect and solve these deadlocks. We have implemented DMPI and evaluated it using NPB benchmarks. The results show that DMPI could guarantee determinism with incurring modest runtime overhead (14% on average).

  • Improving User's Privacy for Multi-Authority ABE Using Privacy Homomorphism

    Ang GAO  Zeng-Zhi LI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:3
      Page(s):
    724-727

    In order to improve user's privacy in multi-authority Attribute-Based Encryption (ABE), we propose a solution which hides user's attributes by privacy homomorphism, such that not only the “external” adversary fails to access the private attribute of one user by eavesdropping on communications, but also the “internal” Attribute Authorities (AA), who are responsible for issuing attribute keys, are unable to build a full profile with all of the user's attributes by pooling their information on the user's ID. Meanwhile, the use of ID is essential to defend against collusion attack on ABE. Benefiting from privacy homomorphism, by which we distribute the part of the interpolation for the shares abstracted by the hidden attributes into each AA, the performance of the proposed scheme is higher than those of existing ABE schemes.

  • Magnetospinography: Instruments and Application to Functional Imaging of Spinal Cords

    Yoshiaki ADACHI  Daisuke OYAMA  Shigenori KAWABATA  Kensuke SEKIHARA  Yasuhiro HARUTA  Gen UEHARA  

     
    PAPER

      Vol:
    E96-C No:3
      Page(s):
    326-333

    Magnetospinography (MSG) is one of the most promising techniques to detect the nerve activity of spinal cords thanks to its noninvasiveness and high spatial/temporal resolutions. Multichannel superconducting quantum interference device (SQUID) MSG measurement systems optimized for supine subjects have been developed previously and employed in clinical applications in hospitals. Magnetic source analyses of MSG data based on spatial filter techniques reveal the transition of reconstructed current distributions adjacent to the spinal cord. The propagation of the neural signals was noninvasively visualized. The MSG measurements provide significant diagnostic information such as irregularities in the transitions of the reconstructed current distribution and/or considerable decreases in the current intensity at the lesion. Such functional imaging of the spinal cord in addition to conventional neurologic examinations and morphological imaging will be fairly effective in presurgical lesion localizations of the spinal cord.

  • Tensor Rank and Strong Quantum Nondeterminism in Multiparty Communication

    Marcos VILLAGRA  Masaki NAKANISHI  Shigeru YAMASHITA  Yasuhiko NAKASHIMA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E96-D No:1
      Page(s):
    1-8

    In this paper we study quantum nondeterminism in multiparty communication. There are three (possibly) different types of nondeterminism in quantum computation: i) strong, ii) weak with classical proofs, and iii) weak with quantum proofs. Here we focus on the first one. A strong quantum nondeterministic protocol accepts a correct input with positive probability and rejects an incorrect input with probability 1. In this work we relate strong quantum nondeterministic multiparty communication complexity to the rank of the communication tensor in the Number-On-Forehead and Number-In-Hand models. In particular, by extending the definition proposed by de Wolf to nondeterministic tensor-rank (nrank), we show that for any boolean function f when there is no prior shared entanglement between the players, 1) in the Number-On-Forehead model the cost is upper-bounded by the logarithm of nrank(f); 2) in the Number-In-Hand model the cost is lower-bounded by the logarithm of nrank(f). Furthermore, we show that when the number of players is o(log log n), we have NQP BQP for Number-On-Forehead communication.

  • An Approach for Utilizing User Resources in Information-Centric Network

    HyunYong LEE  Akihiro NAKAO  

     
    PAPER

      Vol:
    E96-B No:1
      Page(s):
    48-55

    As one innovative research that heavily depends on the network virtualization for its realization and deployment on an Internet-scale, we propose an approach to utilize user resources in information-centric network (ICN). We try to fully benefit from the in-network cache that is one attractive feature of ICN by expanding the in-network cache indirectly based on the user resources. To achieve this, in this paper, we focus on how to encourage users to contribute their resources in ICN. Through simulations, we examine a feasibility of our approach and an effect of user participation on the content distribution performance in ICN. We also briefly discuss how the network virtualization technique can be utilized for our research in terms of its evaluation and deployment.

  • An Online Bandwidth Allocation Scheme Based on Mechanism Design Model

    Sungwook KIM  

     
    LETTER-Network

      Vol:
    E96-B No:1
      Page(s):
    321-324

    In this paper, a new bandwidth allocation scheme is proposed based on the Mechanism Design (MD); MD is a branch of game theory that stimulates rational users to behave cooperatively for a global goal. The proposed scheme consists of bandwidth adaptation, call admission control and pricing computation algorithms to improve network performance. These algorithms are designed based on the adaptive online approach and work together to maximize bandwidth efficiency economically. A simulation shows that the proposed scheme can satisfy contradictory requirements and so provide well-balanced network performance.

  • User-Assisted Content Distribution in Information-Centric Network

    HyunYong LEE  Akihiro NAKAO  

     
    LETTER-Network

      Vol:
    E95-B No:12
      Page(s):
    3873-3874

    In this letter, we argue that user resources will be still useful in the information-centric network (ICN). From this point of view, we first examine how P2P utilizing user resources looks like in ICN. Then, we identify challenging research issues to utilize user resources in ICN.

  • Trusted Inter-Domain Fast Authentication Protocol in Split Mechanism Network

    Lijuan ZHENG  Yingxin HU  Zhen HAN  Fei MA  

     
    LETTER-Information Network

      Vol:
    E95-D No:11
      Page(s):
    2728-2731

    Previous inter-domain fast authentication schemes only realize the authentication of user identity. We propose a trusted inter-domain fast authentication scheme based on the split mechanism network. The proposed scheme can realize proof of identity and integrity verification of the platform as well as proof of the user identity. In our scheme, when the mobile terminal moves to a new domain, the visited domain directly authenticates the mobile terminal using the ticket issued by the home domain rather than authenticating it through its home domain. We demonstrate that the proposed scheme is highly effective and more secure than contemporary inter-domain fast authentication schemes.

  • A Dynamic Sleep Interval Decision Scheme for Power-Saving with Minimum Delay in IEEE 802.16e Mobile WiMAX

    Bong Keol SHIN  Ju Wook JANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:11
      Page(s):
    3609-3612

    We observe that the state-of-the-art power-saving mechanisms (PSM) for IEEE 802.16e is neither optimal in terms of delay nor in terms of energy consumption. We propose a new PSM which achieves the optimality in terms of the average buffering delay without increasing energy consumption. In order to do so, we derive a formula which relates the average buffering delay to sleep intervals. Simulation results show that our scheme surpasses the BTE algorithm (used by the current IEEE 802.16e Mobile Stations) by 56.75–76% and the PSID algorithm by 8.52–24.39% in terms of the delay-energy consumption product.

  • Small Multi-Band Antenna with Tuning Function for Body-Centric Wireless Communications

    Chia-Hsien LIN  Zhengyi LI  Kazuyuki SAITO  Masaharu TAKAHASHI  Koichi ITO  

     
    PAPER

      Vol:
    E95-B No:10
      Page(s):
    3074-3080

    The research on body-centric wireless communications (BCWCs) is becoming very hot because of numerous applications, especially the application of E-health systems. Therefore, a small multi-band and low-profile planar inverted-F antenna (PIFA) with tuning function is presented for BCWCs in this paper. In order to achieve multi-band operation, there are two branches in the antenna: the longer branch low frequency band (950–956 MHz), and the shorter branch with a varactor diode embedded for high frequency bands. By supplying different DC voltages, the capacitance of the varactor diode varies, so the resonant frequency can be tuned without changing the dimension of the antenna. While the bias is set at 6 V and 14 V, WiMAX and ISM bands can be covered, respectively. From the radiation patterns, at 950 MHz, the proposed antenna is suitable for on-body communications, and in WiMAX and ISM bands, they are suitable for both on-body and off-body communications.

  • Miniaturized Antenna with High Radiation Efficiency Using Ground and Chip Capacitors

    Hyengcheul CHOI  Kyung-Young JUNG  Hyeongdong KIM  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:10
      Page(s):
    3328-3331

    Ground antennas are suitable for use in mobile electronic devices due to their compactness. These ground antennas incorporate two capacitors for controlling the resonance frequency and a shorting loop for impedance matching. In this work, we compare the performance of a ground antenna with that of a meandered inverted-F antenna (IFA). It is numerically and experimentally shown that a ground antenna can yield simultaneous improvements in both the antenna size and radiation efficiency when compared to the meandered IFA. The bandwidth of the ground antenna for a voltage standing wave ratio (VSWR) of 3:1 is 240 MHz from 2350 MHz to 2590 MHz, while the minimum total antenna efficiency is 62% within the 2.4 GHz ISM band.

  • Identification Schemes from Key Encapsulation Mechanisms

    Hiroaki ANADA  Seiko ARITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:7
      Page(s):
    1136-1155

    We propose a generic conversion from a key encapsulation mechanism (KEM) to an identification (ID) scheme. The conversion derives the security for ID schemes against concurrent man-in-the-middle (cMiM) attacks from the security for KEMs against adaptive chosen ciphertext attacks on one-wayness (one-way-CCA2). Then, regarding the derivation as a design principle of ID schemes, we develop a series of concrete one-way-CCA2 secure KEMs. We start with El Gamal KEM and prove it secure against non-adaptive chosen ciphertext attacks on one-wayness (one-way-CCA1) in the standard model. Then, we apply a tag framework with the algebraic trick of Boneh and Boyen to make it one-way-CCA2 secure based on the Gap-CDH assumption. Next, we apply the CHK transformation or a target collision resistant hash function to exit the tag framework. And finally, as it is better to rely on the CDH assumption rather than the Gap-CDH assumption, we apply the Twin DH technique of Cash, Kiltz and Shoup. The application is not “black box” and we do it by making the Twin DH technique compatible with the algebraic trick. The ID schemes obtained from our KEMs show the highest performance in both computational amount and message length compared with previously known ID schemes secure against concurrent man-in-the-middle attacks.

  • Automated Adaptor Generation for Behavioral Mismatching Services Based on Pushdown Model Checking

    Hsin-Hung LIN  Toshiaki AOKI  Takuya KATAYAMA  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E95-D No:7
      Page(s):
    1882-1893

    In this paper, we introduce an approach of service adaptation for behavior mismatching services using pushdown model checking. This approach uses pushdown systems as model of adaptors so that capturing non-regular behavior in service interactions is possible. Also, the use of pushdown model checking integrates adaptation and verification. This guarantees that an adaptor generated by our approach not only solves behavior mismatches but also satisfies usual verification properties if specified. Unlike conventional approaches, we do not count on specifications of adaptor contracts but take only information from behavior interfaces of services and perform fully automated adaptor generation. Three requirements relating to behavior mismatches, unbounded messages, and branchings are retrieved from behavior interfaces and used to build LTL properties for pushdown model checking. Properties for unbounded messages, i.e., messages sent and received arbitrary multiple times, are especially addressed since it characterizes non-regular behavior in service composition. This paper also shows some experimental results from a prototype tool and provides directions for building BPEL adaptors from behavior interface of generated adaptor. The results show that our approach does solve behavior mismatches and successfully capture non-regular behavior in service composition under the scale of real service applications.

  • A 83-dB SFDR 10-MHz Bandwidth Continuous-Time Delta-Sigma Modulator Employing a One-Element-Shifting Dynamic Element Matching

    Hong Phuc NINH  Masaya MIYAHARA  Akira MATSUZAWA  

     
    PAPER

      Vol:
    E95-C No:6
      Page(s):
    1017-1025

    This paper considers a simple type of Dynamic Element Matching (DEM), Clocked Averaging (CLA) method referred to as one-element-shifting (OES) and its effectiveness for the implementation of high spurious-free dynamic range (SFDR) multi-bit Delta-Sigma modulators (DSMs). Generic DEM techniques are successful at suppressing the mismatch error and increasing the SFDR of data converters. However, they will induce additional glitch energy in most cases. Some recent DEM methods achieve improvements in minimizing glitch energy but sacrificing their effects in harmonic suppression due to mismatches. OES technique discussed in this paper can suppress the effect of glitch while preserving the reduction of element mismatch effects. Hence, this approach achieves better SFDR performance over the other published DEM methods. With this OES, a 3rd order, 10 MHz bandwidth continuous-time DSM is implemented in 90 nm CMOS process. The measured SFDR attains 83 dB for a 10 MHz bandwidth. The measurement result also shows that OES improves the SFDR by higher than 10 dB.

  • TXOP Exchange: A Mechanism for Cooperation in CSMA Networks

    Takayuki NISHIO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  Narayan B. MANDAYAM  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1944-1952

    Conventional mechanisms proposed for enhancing quality of service (QoS) in 802.11 networks suffer from a lack of backward compatibility and fairness with and to legacy devices. In this paper, we present a cooperative mechanism, called TXOP (transmission opportunity) Exchange, that provides a legacy-neutral solution in which only stations (STAs) participating in TXOP Exchange cooperatively use their available bandwidth to satisfy their required throughputs, while other legacy devices continue to get the same throughput performance as before. Specifically, we discuss the implementation of TXOP Exchange in legacy 802.11 networks. We show that this mechanism can be realized with minor modifications to the RTS (request-to-send) frames of only the STAs participating in TXOP Exchange and without any replacement of legacy access points or STAs. We show an example of a proportional fair algorithm for fair and efficient MAC cooperation using a Nash bargaining solution (NBS). A simulation study using a realistic simulator verifies that the TXOP Exchange mechanism ensures legacy neutrality and fair and efficient cooperation even when a large number of legacy STAs coexist.

  • Layout-Aware Variability Characterization of CMOS Current Sources

    Bo LIU  Bo YANG  Shigetoshi NAKATAKE  

     
    PAPER

      Vol:
    E95-C No:4
      Page(s):
    696-705

    Current sources are essential components for analog circuit designs, the mismatch of which causes the significant degradation of the circuit performance. This paper addresses the mismatch model of CMOS current sources, unlike the conventional modeling, focusing on the layout- and λ-dependency of the process variation, where λ is the output conductance parameter. To make it clear what variation parameter influences the mismatch, we implemented a test chip on 90 nm process technology, where we can collect the characteristics variation data for MOSFETs of various layouts. The test chip also includes D/A converters to check the differential non-linearity (DNL) caused by the mismatch of current sources when behaving as a DAC. Identifying the variation and the circuit-level errors in the measured DNLs, we reveal that our model can more accurately account for the current variation compared to the conventional mismatch model.

  • A 64 Cycles/MB, Luma-Chroma Parallelized H.264/AVC Deblocking Filter for 4 K2 K Applications

    Weiwei SHEN  Yibo FAN  Xiaoyang ZENG  

     
    PAPER

      Vol:
    E95-C No:4
      Page(s):
    441-446

    In this paper, a high-throughput debloking filter is presented for H.264/AVC standard, catering video applications with 4 K2 K (40962304) ultra-definition resolution. In order to strengthen the parallelism without simply increasing the area, we propose a luma-chroma parallel method. Meanwhile, this work reduces the number of processing cycles, the amount of external memory traffic and the working frequency, by using triple four-stage pipeline filters and a luma-chroma interlaced sequence. Furthermore, it eliminates most unnecessary off-chip memory bandwidth with a highly reusable memory scheme, and adopts a “slide window” buffer scheme. As a result, our design can support 4 K2 K at 30 fps applications at the working frequency of only 70.8 MHz.

  • Solving SAT and Hamiltonian Cycle Problem Using Asynchronous P Systems

    Hirofumi TAGAWA  Akihiro FUJIWARA  

     
    PAPER

      Vol:
    E95-D No:3
      Page(s):
    746-754

    In the present paper, we consider fully asynchronous parallelism in membrane computing, and propose two asynchronous P systems for the satisfiability (SAT) and Hamiltonian cycle problem. We first propose an asynchronous P system that solves SAT with n variables and m clauses, and show that the proposed P system computes SAT in O(mn2n) sequential steps or O(mn) parallel steps using O(mn) kinds of objects. We next propose an asynchronous P system that solves the Hamiltonian cycle problem with n nodes, and show that the proposed P system computes the problem in O(n!) sequential steps or O(n2) parallel steps using O(n2) kinds of objects.

  • Indexing All Rooted Subgraphs of a Rooted Graph

    Tomoki IMADA  Hiroshi NAGAMOCHI  

     
    PAPER

      Vol:
    E95-D No:3
      Page(s):
    712-721

    Let G be a connected graph in which we designate a vertex or a block (a biconnected component) as the center of G. For each cut-vertex v, let Gv be the connected subgraph induced from G by v and the vertices that will be separated from the center by removal of v, where v is designated as the root of Gv. We consider the set R of all such rooted subgraphs in G, and assign an integer, called an index, to each of the subgraphs so that two rooted subgraphs in R receive the same indices if and only if they are isomorphic under the constraint that their roots correspond each other. In this paper, assuming a procedure for computing a signature of each graph in a class of biconnected graphs, we present a framework for computing indices to all rooted subgraphs of a graph G with a center which is composed of biconnected components from . With this framework, we can find indices to all rooted subgraphs of a outerplanar graph with a center in linear time and space.

141-160hit(359hit)