The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] LD(1872hit)

881-900hit(1872hit)

  • Autonomous Community Construction Technology to Achieve Service Assurance in ADCS

    Khalid MAHMOOD  Xiaodong LU  Kinji MORI  

     
    PAPER

      Vol:
    E91-D No:9
      Page(s):
    2259-2266

    Autonomous Decentralized Community System (ADCS) makes its basis on offering customized and dynamic services to group of end-users having common preferences at specified time and location. Owing to extreme dynamism in the system caused by rapidly varying user's demands, and severe mobility of users, it is quite difficult to assure timely service provision to all community members. This paper presents autonomous decentralized community system construction by autonomous division and integration technologies to procure service assurance under dynamic situations, without involving significant communication overhead. By adopting the concept of size threshold, the proposed technique continuously maintains the appropriate size of community in constantly and rapidly changing operating environment, to deliver optimal quality of service in terms of response time. The effectiveness of proposed technology has been shown through simulation, which reveals remarkable improvement (up to 29%) in response time.

  • Autonomous Preference-Aware Information Services Integration for High Response in Integrated Faded Information Field Systems

    Xiaodong LU  Kinji MORI  

     
    PAPER

      Vol:
    E91-D No:9
      Page(s):
    2243-2250

    The market and users' requirements have been rapidly changing and diversified. Under these heterogeneous and dynamic situations, not only the system structure itself, but also the accessible information services would be changed constantly. To cope with the continuously changing conditions of service provision and utilization, Faded Information Field (FIF) has been proposed, which is a agent-based distributed information service system architecture. In the case of a mono-service request, the system is designed to improve users' access time and preserve load balancing through the information structure. However, with interdependent requests of multi-service increasing, adaptability and timeliness have to be assured by the system. In this paper, the relationship that exists among the correlated services and the users' preferences for separate and integrated services is clarified. Based on these factors, the autonomous preference-aware information services integration technology to provide one-stop service for users multi-service requests is proposed. As compared to the conventional system, we show that proposed technology is able to reduce the total access time.

  • On a Fast (k,n)-Threshold Secret Sharing Scheme

    Jun KURIHARA  Shinsaku KIYOMOTO  Kazuhide FUKUSHIMA  Toshiaki TANAKA  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2365-2378

    In Shamir's (k,n)-threshold secret sharing scheme (threshold scheme)[1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. However, there is no fast ideal (k,n)-threshold scheme, where k and n are arbitrary. This paper proposes a new fast (k,n)-threshold scheme which uses just EXCLUSIVE-OR(XOR) operations to make n shares and recover the secret from k shares. We prove that every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret in the proposed scheme. Moreover, the proposed scheme is an ideal secret sharing scheme similar to Shamir's scheme, in which every bit-size of shares equals that of the secret. We also evaluate the efficiency of the scheme, and show that our scheme realizes operations that are much faster than Shamir's.

  • A 0.8-V 250-MSample/s Double-Sampled Inverse-Flip-Around Sample-and-Hold Circuit Based on Switched-Opamp Architecture

    Hsin-Hung OU  Bin-Da LIU  Soon-Jyh CHANG  

     
    PAPER-Electronic Circuits

      Vol:
    E91-C No:9
      Page(s):
    1480-1487

    This paper proposes a low-voltage high-speed sample-and-hold (S/H) structure with excellent power efficiency. Based on the switched-opamp technique, an inverse-flip-around architecture which maximizes the feedback factor is employed in the proposed S/H. A skew-insensitive double-sampling mechanism is presented to increase the throughput by a factor of two while eliminating the timing mismatch associated with double-sampling circuits. Furthermore, a dual-input dual-output opamp is proposed to incorporate double-sampling into the switched-opamp based S/H. This opamp also removes the memory effect in double-sampling circuitry and features fast turn-on time to improve the speed performance in switched-opamp circuits. Simulation results using a 0.13-µm CMOS process model demonstrates the proposed S/H circuit has a total-harmonic-distortion of -67.3 dB up to 250 MSample/s and a 0.8 VPP input range at 0.8 V supply. The power consumption is 3.5 mW and the figure-of-merit is only 7.4 fJ/step.

  • Iterative Decoding of SPC Outer Coded Concatenation Codes with Maximal Ratio Combining

    Xiaogang CHEN  Hongwen YANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E91-B No:9
      Page(s):
    2983-2986

    This letter proposes a simple iterative decoding algorithm for the concatenation codes where the outer code is single-parity-check (SPC) code. The erroneous inner codewords are iteratively combined with maximum ratio combining (MRC) and then re-decoded. Compared with the conventional scheme where the RS outer code concatenation is algebraically decoded to recover the erasures, the proposed scheme has better performance due to MRC processing. On the other hand, the proposed scheme is less complex because the linear combination is simpler than algebraical decoding and the MRC gain can loose the requirement for inner decoder.

  • Efficient ID-Based Threshold Random Key Pre-Distribution Scheme for Wireless Sensor Networks

    Tran Thanh DAI  Choong Seon HONG  

     
    PAPER-Network

      Vol:
    E91-B No:8
      Page(s):
    2602-2609

    Security for wireless sensor networks (WSNs) has become an increasingly serious concern due to the requirement level of applications and hostile deployment areas. To enable secure services, cryptographic keys must be agreed upon by communicating nodes. Unfortunately, due to resource constraints, the key agreement problem in wireless sensor networks has become quite complicated. To tackle this problem, many public-key unrelated proposals which are considered more reasonable in cost than public key based approaches have been proposed so far including random based key pre-distribution schemes. One prominent branch of these proposals is threshold random key pre-distribution schemes. However these schemes still introduce either communication overhead or both communication and computational overheads to resource constrained sensor nodes. Considering this issue, we propose an efficient ID-based threshold random key pre-distribution scheme that not only retains all the highly desirable properties of the schemes including high probability of establishing pairwise keys, tolerance of node compromise but also significantly reduces communication and computational costs of each node. The proposed scheme is validated by a thorough analysis in terms of network resiliency and related overheads. In addition, we also propose a supplementary method to significantly improve the security of pairwise keys established indirectly.

  • On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes

    Todorka ALEXANDROVA  Hiroyoshi MORITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2138-2150

    Constructing ideal (t,n) threshold secret sharing schemes leads to some limitations on the maximum number of users, that are able to join the secret sharing scheme. We aim to remove these limitations by reducing the information rate of the constructed threshold secret sharing schemes. In this paper we propose recursive construction algorithms of (t,n) threshold secret sharing schemes, based on the generalized vector space construction. Using these algorithms we are able to construct a (t,n) threshold secret sharing scheme for any arbitrary n.

  • Effect of Back-Volume of Arc-Quenching Chamber on Arc Behavior

    Ruicheng DAI  Degui CHEN  Xingwen LI  Chunping NIU  Weixiong TONG  Honggang XIANG  

     
    PAPER-Arc Discharge & Related Phenomena

      Vol:
    E91-C No:8
      Page(s):
    1261-1267

    The gas-puffer effect has important effects on the interruption capability of a molded case circuit breaker (MCCB). In this paper, on the basis of a simplified model of an arc chamber with a single break, the effect of back-volume of an arc-quenching chamber on arc behavior in an MCCB is investigated. Firstly, using a 2-D optical-fiber arc-motion measurement system, experiments are performed to study the effect of back-volume on the arc-motion and gas pressure in an arc-quenching chamber. We demonstrate that the lower back-volume of the arc-quenching chamber is, the higher the pressure and the better the arc motion will be. Then, corresponding to the above experiments, the gas pressure inside the arc-quenching chamber is calculated using the integral conservation equation. The simulation results are consistent with the experimental results.

  • Threshold Equalization for On-Line Signature Verification

    Isao NAKANISHI  Hiroyuki SAKAMOTO  Yoshio ITOH  Yutaka FUKUI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2244-2247

    In on-line signature verification, complexity of signature shape can influence the value of the optimal threshold for individual signatures. Writer-dependent threshold selection has been proposed but it requires forgery data. It is not easy to collect such forgery data in practical applications. Therefore, some threshold equalization method using only genuine data is needed. In this letter, we propose three different threshold equalization methods based on the complexity of signature. Their effectiveness is confirmed in experiments using a multi-matcher DWT on-line signature verification system.

  • Shielding Effectiveness of a Collinear Unequal Paired-Narrow-Slot Array in Conducting Screens

    Ki-Chai KIM  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E91-B No:8
      Page(s):
    2768-2771

    This letter presents a method that offers the simple calculation of the electric shielding effectiveness of a collinear unequal narrow slot array in a planar conducting screen. An integral equation for an aperture electric field on the unequal narrow slot array is used instead of coupled integral equations for a multiple slot and solved by applying Galerkin's method of moments. Numerical results illustrate the shielding effectiveness and aperture electric field distributions of the collinear unequal two-narrow slot array by using single integral equation.

  • 3-D Finite Element Analysis of Dynamic Characteristics of Twin-Type Relay Interfered by Uniform Constant Magnetic Field

    Guofu ZHAI  Wenying YANG  Xue ZHOU  

     
    PAPER-Contact Phenomena

      Vol:
    E91-C No:8
      Page(s):
    1215-1221

    Research on the electromagnetic compatibility of functional module composed of two independent electromagnetic relays in a hermetically sealed shell is the technical foundation for integration and miniaturization of electronic equipment in the future. In this paper, 3D finite element method (FEM) was used to analyze the dynamic characteristics of twin-type relay interfered by uniform constant magnetic field and identify the sensitive direction in which the relay was easily interfered. The models of twin-type relay in three working states were founded. Through simulation and analysis, it was found out how the operation time and electromagnetic torque of twin-type relay changed with the outer interfered magnetic field. When the relay was on the point of operation failure, the critical value of magnetic field was calculated through simulation. The simulation results of the dynamic characteristics of twin-type relay agree well with the experimental data. The conclusion in this paper is of great value for research on the electromagnetic compatibility of relay functional module.

  • A Large-Scale, Flip-Flop RAM Imitating a Logic LSI for Fast Development of Process Technology

    Masako FUJII  Koji NII  Hiroshi MAKINO  Shigeki OHBAYASHI  Motoshige IGARASHI  Takeshi KAWAMURA  Miho YOKOTA  Nobuhiro TSUDA  Tomoaki YOSHIZAWA  Toshikazu TSUTSUI  Naohiko TAKESHITA  Naofumi MURATA  Tomohiro TANAKA  Takanari FUJIWARA  Kyoko ASAHINA  Masakazu OKADA  Kazuo TOMITA  Masahiko TAKEUCHI  Shigehisa YAMAMOTO  Hiromitsu SUGIMOTO  Hirofumi SHINOHARA  

     
    PAPER

      Vol:
    E91-C No:8
      Page(s):
    1338-1347

    We propose a new large-scale logic test element group (TEG), called a flip-flop RAM (FF-RAM), to improve the total process quality before and during initial mass production. It is designed to be as convenient as an SRAM for measurement and to imitate a logic LSI. We implemented a 10 Mgates FF-RAM using our 65-nm CMOS process. The FF-RAM enables us to make fail-bit maps (FBM) of logic cells because of its cell array structure as an SRAM. An FF-RAM has an additional structure to detect the open and short failure of upper metal layers. The test results show that it can detect failure locations and layers effortlessly using FBMs. We measured and analyzed it for both the cell arrays and the upper metal layers. Their results provided many important clues to improve our processes. We also measured the neutron-induced soft error rate (SER) of FF-RAM, which is becoming a serious problem as transistors become smaller. We compared the results of the neutron-induced soft error rate to those of previous generations: 180 nm, 130 nm, and 90 nm. Because of this TEG, we can considerably shorten the development period for advanced CMOS technology.

  • Cooperative Control Technology with ITP Method for SCADA Systems

    Juichi KOSAKAYA  Hideyuki TADOKORO  Yasuhiro INAZUMI  

     
    PAPER-Distributed Cooperation and Agents

      Vol:
    E91-D No:8
      Page(s):
    2141-2152

    Introducing multi-agent (MA) technology into a SCADA (Supervisory Control and Data Acquisition) system can improve the serviceability and enhance maintenance-free operation with the inter-terminal parameter (ITP) method. In addition, the system's distributed intelligent field terminals (IFTs) use a common algorithm that is unaffected by any changes to the system specifications. As a result of these innovations, the proposed system has much better serviceability because it is much easier to make modifications compared to that of conventional systems. This system has been implemented for practical purposes at over 60 sites.

  • Locally Adaptive Perceptual Compression for Color Images

    Kuo-Cheng LIU  Chun-Hsien CHOU  

     
    PAPER-Image

      Vol:
    E91-A No:8
      Page(s):
    2213-2222

    The main idea in perceptual image compression is to remove the perceptual redundancy for representing images at the lowest possible bit rate without introducing perceivable distortion. A certain amount of perceptual redundancy is inherent in the color image since human eyes are not perfect sensors for discriminating small differences in color signals. Effectively exploiting the perceptual redundancy will help to improve the coding efficiency of compressing color images. In this paper, a locally adaptive perceptual compression scheme for color images is proposed. The scheme is based on the design of an adaptive quantizer for compressing color images with the nearly lossless visual quality at a low bit rate. An effective way to achieve the nearly lossless visual quality is to shape the quantization error as a part of perceptual redundancy while compressing color images. This method is to control the adaptive quantization stage by the perceptual redundancy of the color image. In this paper, the perceptual redundancy in the form of the noise detection threshold associated with each coefficient in each subband of three color components of the color image is derived based on the finding of perceptually indistinguishable regions of color stimuli in the uniform color space and various masking effects of human visual perception. The quantizer step size for the target coefficient in each color component is adaptively adjusted by the associated noise detection threshold to make sure that the resulting quantization error is not perceivable. Simulation results show that the compression performance of the proposed scheme using the adaptively coefficient-wise quantization is better than that using the band-wise quantization. The nearly lossless visual quality of the reconstructed image can be achieved by the proposed scheme at lower entropy.

  • On the Stopping Distance and Stopping Redundancy of Finite Geometry LDPC Codes

    Hai-yang LIU  Xiao-yan LIN  Lian-rong MA  Jie CHEN  

     
    PAPER-Coding Theory

      Vol:
    E91-A No:8
      Page(s):
    2159-2166

    The stopping distance and stopping redundancy of a linear code are important concepts in the analysis of the performance and complexity of the code under iterative decoding on a binary erasure channel. In this paper, we studied the stopping distance and stopping redundancy of Finite Geometry LDPC (FG-LDPC) codes, and derived an upper bound of the stopping redundancy of FG-LDPC codes. It is shown from the bound that the stopping redundancy of the codes is less than the code length. Therefore, FG-LDPC codes give a good trade-off between the performance and complexity and hence are a very good choice for practical applications.

  • An Application of Linear Codes to the Problem of Source Coding with Partial Side Information

    Shigeaki KUZUOKA  

     
    PAPER-Information Theory

      Vol:
    E91-A No:8
      Page(s):
    2151-2158

    This paper clarifies the adequacy of the linear channel coding approach for the source coding with partial side information at the decoder. A sufficient condition for an ensemble of linear codes which achieves the Wyner's bound is given. Our result reveals that, by combining a good lossy code, an LDPC code ensemble gives a good code for source coding with partial side information at the decoder.

  • Combining Attention Model with Hierarchical Graph Representation for Region-Based Image Retrieval

    Song-He FENG  De XU  Bing LI  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E91-D No:8
      Page(s):
    2203-2206

    The manifold-ranking algorithm has been successfully adopted in content-based image retrieval (CBIR) in recent years. However, while the global low-level features are widely utilized in current systems, region-based features have received little attention. In this paper, a novel attention-driven transductive framework based on a hierarchical graph representation is proposed for region-based image retrieval (RBIR). This approach can be characterized by two key properties: (1) Since the issue about region significance is the key problem in region-based retrieval, a visual attention model is chosen here to measure the regions' significance. (2) A hierarchical graph representation which combines region-level with image-level similarities is utilized for the manifold-ranking method. A novel propagation energy function is defined which takes both low-level visual features and regional significance into consideration. Experimental results demonstrate that the proposed approach shows the satisfactory retrieval performance compared to the global-based and the block-based manifold-ranking methods.

  • An Integrated Calculation Method to Predict Arc Behavior

    Xingwen LI  Degui CHEN  

     
    LETTER-Arc Discharge & Related Phenomena

      Vol:
    E91-C No:8
      Page(s):
    1228-1229

    The precision of magnetic field calculation is crucial to predict the arc behavior using magnetohydrodynamic (MHD) model. A integrated calculation method is proposed to couple the calculation of magnetic field and fluid dynamics based on the commercial software ANSYS and FLUENT, which especially benefits to take into account the existence of the ferromagnetic parts. An example concerning air arc is presented using the method.

  • 3D Precise Inspection of Terminal Lead for Electronic Devices by Single Camera Stereo Vision

    Takashi WATANABE  Akira KUSANO  Takayuki FUJIWARA  Hiroyasu KOSHIMIZU  

     
    PAPER

      Vol:
    E91-D No:7
      Page(s):
    1885-1892

    It is very important to guarantee the quality of the industrial products by means of visual inspection. In order to reduce the soldering defect with terminal deformation and terminal burr in the manufacturing process, this paper proposes a 3D visual inspection system based on a stereo vision with single camera. It is technically noted that the base line of this single camera stereo was precisely calibrated by the image processing procedure. Also to extract the measuring point coordinates for computing disparity; the error is reduced with original algorithm. Comparing its performance with that of human inspection using industrial microscope, the proposed 3D inspection could be an alternative in precision and in processing cost. Since the practical specification in 3D precision is less than 1 pixel and the experimental performance was around the same, it was demonstrated by the proposed system that the soldering defect with terminal deformation and terminal burr in inspection, especially in 3D inspection, was decreased. In order to realize the inline inspection, this paper will suggest how the human inspection of the products could be modeled and be implemented by the computer system especially in manufacturing process.

  • Current Status and Future Prospects of SiC Power JFETs and ICs

    Jian H. ZHAO  Kuang SHENG  Yongxi ZHANG  Ming SU  

     
    INVITED PAPER

      Vol:
    E91-C No:7
      Page(s):
    1031-1041

    This paper will review the development of SiC power devices especially SiC power junction field-effect transistors (JFETs). Rationale and different approaches to the development of SiC power JFETs will be presented, focusing on normally-OFF power JFETs that can provide the highly desired fail-save feature for reliable power switching applications. New results for the first demonstration of SiC Power ICs will be presented and the potential for distributed DC-DC power converters at frequencies higher than 35 MHz will be discussed.

881-900hit(1872hit)