The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PA(8249hit)

1301-1320hit(8249hit)

  • VANET-Assisted Cooperative Vehicle Mutual Positioning: Feasibility Study

    Ali Ufuk PEKER  Tankut ACARMAN  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    448-456

    This paper presents the set of procedures to blend GNSS and V2V communication to improve the performance of the stand-alone on-board GNSS receiver and to assure mutual positioning with a bounded error. Particle filter algorithm is applied to enhance mutual positioning of vehicles, and it fuses the information provided by the GNSS receiver, wireless measurements in vehicular environments, odometer, and digital road map data including reachability and zone probabilities. Measurement-based statistical model of relative distance as a function of Time-of-Arrival is experimentally obtained. The number of collaborative vehicles to the mutual positioning procedure is investigated in terms of positioning accuracy and network performance through realistic simulation studies, and the proposed mutual positioning procedure is experimentally evaluated by a fleet of five IEEE 802.11p radio modem equipped vehicles. Collaboration in a VANET improves availability of position measurement and its accuracy up to 40% in comparison with respect to the stand-alone GNSS receiver.

  • H-Infinity Control Design Considering Packet Loss as a Disturbance for Networked Control Systems

    Takashi OGURA  Kentaro KOBAYASHI  Hiraku OKADA  Masaaki KATAYAMA  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    353-360

    This paper studies H∞ control for networked control systems with packet loss. In networked control systems, packet loss is one of major weakness because the control performance deteriorates due to packet loss. H∞ control, which is one of robust control, can design a controller to reduce the influence of disturbances acting on the controlled object. This paper proposes an H∞ control design that considers packet loss as a disturbance. Numerical examples show that the proposed H∞ control design can more effectively reduce control performance deterioration due to packet loss than the conventional H∞ control design. In addition, this paper provides control performance comparisons of H∞ control and Linear Quadratic (LQ) control. Numerical examples show that the control performance of the proposed H∞ control design is better than that of the LQ control design.

  • Power Line Noise Reduction for Bio-Sensing Applications Using N-Path Notch Filter

    Nicodimus RETDIAN  Takeshi SHIMA  

     
    LETTER

      Vol:
    E100-A No:2
      Page(s):
    541-544

    Power line noise is one of critical problems in bio-sensing. Various approaches utilizing both analog and digital techniques has been proposed. However, these approaches need active circuits with a wide dynamic range. N-path notch filters which implementable using passive components can be a promising solution to this problem. However, the notch depth of a conventional N-path notch filter is limited by the number of path. A new N-path notch filter with additional S/H circuit is proposed. Simulation results show that the proposed topology improves the notch depth by 43dB.

  • Path Loss Model for Outdoor-to-Indoor Corridor Up to 40GHz Band in Microcell Environments

    Minoru INOMATA  Motoharu SASAKI  Wataru YAMADA  Takeshi ONIZAWA  Masashi NAKATSUGAWA  Nobutaka OMAKI  Koshiro KITAO  Tetsuro IMAI  Yukihiko OKUMURA  

     
    PAPER

      Vol:
    E100-B No:2
      Page(s):
    242-251

    This paper proposed that a path loss model for outdoor-to-indoor corridor is presented to construct next generation mobile communication systems. The proposed model covers the frequency range of millimeter wave bands up to 40GHz and provides three dimensional incident angle characteristics. Analysis of path loss characteristics is conducted by ray tracing. We clarify that the paths reflected multiple times between the external walls of buildings and then diffracted into one of the buildings are dominant. Moreover, we also clarify how the paths affect the path loss dependence on frequency and three dimensional incident angle. Therefore, by taking these dependencies into consideration, the proposed model decreases the root mean square errors of prediction results to within about 2 to 6dB in bands up to 40GHz.

  • LAPS: Layout-Aware Path Selection for Post-Silicon Timing Characterization

    Yu HU  Jing YE  Zhiping SHI  Xiaowei LI  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/10/25
      Vol:
    E100-D No:2
      Page(s):
    323-331

    Process variation has become prominent in the advanced CMOS technology, making the timing of fabricated circuits more uncertain. In this paper, we propose a Layout-Aware Path Selection (LAPS) technique to accurately estimate the circuit timing variation from a small set of paths. Three features of paths are considered during the path selection. Experiments conducted on benchmark circuits with process variation simulated with VARIUS show that, by selecting only hundreds of paths, the fitting errors of timing distribution are kept below 5.3% when both spatial correlated and spatial uncorrelated process variations exist.

  • A Spectrum-Based Saliency Detection Algorithm for Millimeter-Wave InSAR Imaging with Sparse Sensing

    Yilong ZHANG  Yuehua LI  Safieddin SAFAVI-NAEINI  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2016/10/25
      Vol:
    E100-D No:2
      Page(s):
    388-391

    Object detection in millimeter-wave Interferometric Synthetic Aperture Radiometer (InSAR) imaging is always a crucial task. Facing unpredictable and numerous objects, traditional object detection models running after the InSAR system accomplishing imaging suffer from disadvantages such as complex clutter backgrounds, weak intensity of objects, Gibbs ringing, which makes a general purpose saliency detection system for InSAR necessary. This letter proposes a spectrum-based saliency detection algorithm to extract the salient regions from unknown backgrounds cooperating with sparse sensing InSAR imaging procedure. Directly using the interferometric value and sparse information of scenes in the basis of the Discrete Cosine Transform (DCT) domain adopted by InSAR imaging procedure, the proposed algorithm isolates the support of saliency region and then inversely transforms it back to calculate the saliency map. Comparing with other detecting algorithms which run after accomplishing imaging, the proposed algorithm will not be affected by information-loss accused by imaging procedure. Experimental results prove that it is effective and adaptable for millimeter-wave InSAR imaging.

  • Alumina Passivation Films Prepared by Wet Process for Silicon Solar Cells Using Aluminum Isopropoxide as a Sol-Gel Precursor

    Ryosuke WATANABE  Mizuho KAWASHIMA  Yoji SAITO  

     
    BRIEF PAPER-Semiconductor Materials and Devices

      Vol:
    E100-C No:1
      Page(s):
    108-111

    We prepared alumina passivation films for p-type silicon substrates by sol-gel wet process mainly using aluminum isopropoxide (Al(O-i-Pr)3) as a precursor material. The precursor solution was spin-coated onto p-type silicon substrates and then calcined for 1 hour in air. Minority carrier lifetime of the passivated wafers was evaluated for different calcination temperature conditions. We also compared the passivation quality of the alumina passivation films using different alumina precursor, aluminum acetylacetonate (Al(acac)3). Obtained effective minority carrier lifetime indicated that the lifetime is strongly depends on the calcination temperature. The substrate calcined below 400°C shows relatively short lifetime below 100 µsec. On the other hand, the substrate calcined around 500°C to 600°C indicates lifetime from 250 to 300 µsec. Calcination temperature dependence of the lifetime for the samples using Al(O-i-Pr)3 precursors shows almost the same as that using Al(acac)3.

  • Iterative Constructions of Orthogonal Arrays of Strength t and Orthogonal Partitions

    Shanqi PANG  Ying WANG  Jiao DU  Wenju XU  

     
    LETTER-Coding Theory

      Vol:
    E100-A No:1
      Page(s):
    308-311

    Orthogonal arrays and orthogonal partitions have great significance in communications and coding theory. In this letter, by using a generalized orthogonal partition, Latin squares and orthogonal Latin squares, we present an iterative construction method of orthogonal arrays of strength t and orthogonal partitions. As an application of the method, more orthogonal arrays of strength t and orthogonal partitions than the existing methods can be constructed.

  • Computational Model of Card-Based Cryptographic Protocols and Its Applications

    Takaaki MIZUKI  Hiroki SHIZUYA  

     
    INVITED PAPER

      Vol:
    E100-A No:1
      Page(s):
    3-11

    Card-based protocols enable us to easily perform cryptographic tasks such as secure multiparty computation using a deck of physical cards. Since the first card-based protocol appeared in 1989, many protocols have been designed. A protocol is usually described with a series of somewhat intuitive and verbal descriptions, such as “turn over this card,” “shuffle these two cards,” “apply a random cut to these five cards,” and so on. On the other hand, a formal computational model of card-based protocols via abstract machine was constructed in 2014. By virtue of the formalization, card-based protocols can be treated more rigorously; for example, it enables one to discuss the lower bounds on the number of cards required for secure computations. In this paper, an overview of the computational model with its applications to designing protocols and a survey of the recent progress in card-based protocols are presented.

  • How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services

    Kazuto OGAWA  Goichiro HANAOKA  Hideki IMAI  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    34-49

    A lot of encryption and watermarking schemes have been developed as countermeasures to protect copyrights of broadcast or multicast content from malicious subscribers (traitors) that make pirate receivers (PRs) to use the content illegally. However, solo use of these schemes does not necessarily work well. Traitor tracing encryption schemes are a type of broadcasting encryption and have been developed for broadcasting and multicast services. There are multiple distinct decryption keys for each encryption key, and each service subscriber is given a unique decryption key. Any subscriber that redistributes his or her decryption key to a third party or who uses it and maybe other keys to make a PR can be identified with using the tracing algorithm of the scheme that is used by the services. However, almost all previous schemes have the same weakness; that is, they are vulnerable to an attack (content comparison attack). This is a concrete example such that solo use of the scheme does not work well. The attack involves multiple distinct decryption keys and a content-data comparison mechanism. We have developed a method, called complementary traitor tracing method (CTT), that makes traitor tracing schemes secure against content comparison attacks. It makes it impossible for PRs to distinguish ordinary content data from test data and makes traitor tracing schemes effective against all PRs, even those with multiple distinct decryption keys. CTT is made with a simple combination of schemes that are absolutely necessary. It makes broadcasting or multicast services secure.

  • A Weil Pairing on a Family of Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms

    Masahiro ISHII  Atsuo INOMATA  Kazutoshi FUJIKAWA  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    62-72

    In this paper, we provided a new variant of Weil pairing on a family of genus 2 curves with the efficiently computable automorphism. Our pairing can be considered as a generalization of the omega pairing given by Zhao et al. We also report the algebraic cost estimation of our pairing. We then show that our pairing is more efficient than the variant of Tate pairing with the automorphism given by Fan et al. Furthermore, we show that our pairing is slightly better than the twisted Ate pairing on Kawazoe-Takahashi curve at the 192-bit security level.

  • Aesthetic QR Code Based on Modified Systematic Encoding Function

    Minoru KURIBAYASHI  Masakatu MORII  

     
    PAPER

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    42-51

    Quick Response (QR) code is a two dimensional barcode widely used in many applications. A standard QR code consists of black and white square modules, and it appears randomized patterns. By modifying the modules using certain rule, it is possible to display a logo image on the QR code. Such a QR code is called an aesthetic QR code. In this paper, we change the encoding method of the Reed-Solomon (RS) code to produce an aesthetic QR code without sacrificing its error correcting capability. The proposed method randomly produces candidates of RS blocks and finds the best one during encoding. Considering an image to be displayed, we also introduce a weighting function during random selection that classifies the visually important regions in the image. We further investigate the shape of modules which represents the image and consider the trade-off between the visual quality and its readability. As a result, we can produce a beautiful aesthetic QR code, which still can be decoded by standard QR code reader.

  • An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan

    Fakir Sharif HOSSAIN  Tomokazu YONEDA  Michiko INOUE  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/10/20
      Vol:
    E100-D No:1
      Page(s):
    130-139

    Due to outsourcing of numerous stages of the IC manufacturing process to different foundries, the security risk, such as hardware Trojan becomes a potential threat. In this paper, we present a layout aware localized hardware Trojan detection method that magnifies the detection sensitivity for small Trojan in power-based side-channel analysis. A scan segmentation approach with a modified launch-on-capture (LoC) transition delay fault test pattern application technique is proposed so as to maximize the dynamic power consumption of any target region. The new architecture allows activating any target region and keeping others quiet, which reduces total circuit toggling activity. We evaluate our approach on ISCAS89 benchmark and two practical circuits to demonstrate its effectiveness in side-channel analysis.

  • Video Data Modeling Using Sequential Correspondence Hierarchical Dirichlet Processes

    Jianfei XUE  Koji EGUCHI  

     
    PAPER

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    33-41

    Video data mining based on topic models as an emerging technique recently has become a very popular research topic. In this paper, we present a novel topic model named sequential correspondence hierarchical Dirichlet processes (Seq-cHDP) to learn the hidden structure within video data. The Seq-cHDP model can be deemed as an extended hierarchical Dirichlet processes (HDP) model containing two important features: one is the time-dependency mechanism that connects neighboring video frames on the basis of a time dependent Markovian assumption, and the other is the correspondence mechanism that provides a solution for dealing with the multimodal data such as the mixture of visual words and speech words extracted from video files. A cascaded Gibbs sampling method is applied for implementing the inference task of Seq-cHDP. We present a comprehensive evaluation for Seq-cHDP through experimentation and finally demonstrate that Seq-cHDP outperforms other baseline models.

  • Sparse Representation for Color Image Super-Resolution with Image Quality Difference Evaluation

    Zi-wen WANG  Guo-rui FENG  Ling-yan FAN  Jin-wei WANG  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2016/10/19
      Vol:
    E100-D No:1
      Page(s):
    150-159

    The sparse representation models have been widely applied in image super-resolution. The certain optimization problem is supposed and can be solved by the iterative shrinkage algorithm. During iteration, the update of dictionaries and similar patches is necessary to obtain prior knowledge to better solve such ill-conditioned problem as image super-resolution. However, both the processes of iteration and update often spend a lot of time, which will be a bottleneck in practice. To solve it, in this paper, we present the concept of image quality difference based on generalized Gaussian distribution feature which has the same trend with the variation of Peak Signal to Noise Ratio (PSNR), and we update dictionaries or similar patches from the termination strategy according to the adaptive threshold of the image quality difference. Based on this point, we present two sparse representation algorithms for image super-resolution, one achieves the further improvement in image quality and the other decreases running time on the basis of image quality assurance. Experimental results also show that our quantitative results on several test datasets are in line with exceptions.

  • Element Gain Improvement for Phased Array Antenna Based on Radiation Pattern Reconfigurable Antenna

    Takashi MARUYAMA  Takashi UESAKA  Satoshi YAMAGUCHI  Masataka OTSUKA  Hiroaki MIYASHITA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/07/12
      Vol:
    E100-B No:1
      Page(s):
    148-157

    We propose a new configuration for phased array antennas. The proposal uses radiation pattern reconfigurable antennas as the antenna element to improve the gain on the scanning angle and to suppress the grating lobes of sparse phased array antennas. This configuration can reduce the element number because the desired gain of the total array can be achieved by using fewer elements. We demonstrate the concept by designing a radiation pattern reconfigurable Yagi-Uda antenna. PIN diode switches are added to the parasitic elements to change director and reflector. The switches of multiple array elements are concurrently controlled by just a single one-pair line. This control structure is simple and can be applied to large-scale arrays. The proposed antenna yields an element gain that almost matches the theoretical limit across about half the coverage, even if the element spacing is enlarged to 1λ. If the switch states are interchanged, the gain in the mirror direction can be increased. We design a 48-element array and compare its gain against those of normal dipole antennas. We also fabricate the proposed antenna and demonstrate radiation pattern switching.

  • Recommendation-Based Bandwidth Calendaring for Packet Transport Network

    Shohei KAMAMURA  Rie HAYASHI  Hiroki DATE  Hiroshi YAMAMOTO  Takashi MIYAMURA  Yoshihiko UEMATSU  Kouichi GENDA  

     
    PAPER-Network

      Pubricized:
    2016/08/04
      Vol:
    E100-B No:1
      Page(s):
    122-130

    This paper proposes a recommendation-based bandwidth calendaring system for packet transport networks. The system provides a user-portal interface with which users can directly reserve packet transport resources. In this regard, the system recommends multi-grade (e.g., multi-price) reservation plans. By adjusting grades of plans in accordance with network resource utilization, this system provides not only reservation flexibility for users but also efficient utilization of network resources. For recommending multi-grade plans, pre-computation of resource allocation is required for every time slot. Because the number of time slots is huge, we also propose an algorithm for fast computation of resource allocation based on time-slot aggregation. Our evaluation suggests that our algorithm can produce a sub-optimal solution within quasi-real time for a large-scale network. We also show that our recommendation-based system can increase the service-provider-revenue in peaky traffic demand environments.

  • Optimal Construction of Frequency-Hopping Sequence Sets with Low-Hit-Zone under Periodic Partial Hamming Correlation

    Changyuan WANG  Daiyuan PENG  Xianhua NIU  Hongyu HAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E100-A No:1
      Page(s):
    304-307

    In this paper, a new class of low-hit-zone (LHZ) frequency-hopping sequence sets (LHZ FHS sets) is constructed based upon the Cartesian product, and the periodic partial Hamming correlation within its LHZ are studied. Studies have shown that the new LHZ FHS sets are optimal according to the periodic partial Hamming correlation bounds of FHS set, and some known FHS sets are the special cases of this new construction.

  • A Free Space Permittivity Measurement at Microwave Frequencies for Solid Materials

    An Ngoc NGUYEN  Hiroshi SHIRAI  

     
    PAPER

      Vol:
    E100-C No:1
      Page(s):
    52-59

    A broadband approach to estimate the relative permittivity of dielectric cuboids has been proposed for materials of weak frequency dispersive characteristic. Our method involves a numerical iterative scheme with appropriate initial values carefully selected to solve for the relative permittivity in a wide range of frequencies. Good agreements between our method and references have been observed for nylon and acrylic samples. An applicable range relation between the minimal thickness, the frequency range and the dielectric property of the material has also been discussed.

  • Using a Single Dendritic Neuron to Forecast Tourist Arrivals to Japan

    Wei CHEN  Jian SUN  Shangce GAO  Jiu-Jun CHENG  Jiahai WANG  Yuki TODO  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2016/10/18
      Vol:
    E100-D No:1
      Page(s):
    190-202

    With the fast growth of the international tourism industry, it has been a challenge to forecast the tourism demand in the international tourism market. Traditional forecasting methods usually suffer from the prediction accuracy problem due to the high volatility, irregular movements and non-stationarity of the tourist time series. In this study, a novel single dendritic neuron model (SDNM) is proposed to perform the tourism demand forecasting. First, we use a phase space reconstruction to analyze the characteristics of the tourism and reconstruct the time series into proper phase space points. Then, the maximum Lyapunov exponent is employed to identify the chaotic properties of time series which is used to determine the limit of prediction. Finally, we use SDNM to make a short-term prediction. Experimental results of the forecasting of the monthly foreign tourist arrivals to Japan indicate that the proposed SDNM is more efficient and accurate than other neural networks including the multi-layered perceptron, the neuro-fuzzy inference system, the Elman network, and the single multiplicative neuron model.

1301-1320hit(8249hit)