The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PAS(566hit)

221-240hit(566hit)

  • Noise-Coupled Image Rejection Architecture of Complex Bandpass ΔΣAD Modulator

    Hao SAN  Haruo KOBAYASHI  

     
    PAPER

      Vol:
    E93-A No:2
      Page(s):
    390-394

    This paper proposes a new realization technique of image rejection function by noise-coupling architecture, which is used for a complex bandpass ΔΣAD modulator. The complex bandpass ΔΣAD modulator processes just input I and Q signals, not image signals, and the AD conversion can be realized with low power dissipation. It realizes an asymmetric noise-shaped spectra, which is desirable for such low-IF receiver applications. However, the performance of the complex bandpass ΔΣAD modulator suffers from the mismatch between internal analog I and Q paths. I/Q path mismatch causes an image signal, and the quantization noise of the mirror image band aliases into the desired signal band, which degrades the SQNDR (Signal to Quantization Noise and Distortion Ratio) of the modulator. In our proposed modulator architecture, an extra notch for image rejection is realized by noise-coupled topology. We just add some passive capacitors and switches to the modulator; the additional integrator circuit composed of an operational amplifier in the conventional image rejection realization is not necessary. Therefore, the performance of the complex modulator can be effectively raised without additional power dissipation. We have performed simulation with MATLAB to confirm the validity of the proposed architecture. The simulation results show that the proposed architecture can achieve the realization of image-rejection effectively, and improve the SQNDR of the complex bandpass ΔΣAD modulator.

  • Internet Group Management Protocol for IPTV Services in Passive Optical Network

    Eunjo LEE  Sungkwon PARK  

     
    LETTER

      Vol:
    E93-B No:2
      Page(s):
    293-296

    We propose a new Internet group management protocol (IGMP) which can be used in passive optical network (PON) especially for IPTV services which dramatically reduces the channel change response time caused by traditional IGMP. In this paper, the newly proposed IGMP is introduced in detail and performance analysis is also included. Simulation results demonstrated the performance of the newly proposed IGMP, whereby, viewers can watch the shared IPTV channels without the channel change response time when channel request reaches a threshold.

  • Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols

    Yu SASAKI  Lei WANG  Kazuo OHTA  Kazumaro AOKI  Noboru KUNIHIRO  

     
    PAPER-Hash Function

      Vol:
    E93-A No:1
      Page(s):
    84-92

    In this paper, we present practical password recovery attacks against two challenge and response authentication protocols using MD4. For attacks on protocols, the number of queries is one of the most important factors because the opportunity where an attacker can ask queries is very limited in real protocols. When responses are computed as MD4(Password||Challenge), which is called prefix approach, previous work needs to ask 237 queries to recover a password. Asking 237 queries in real protocols is almost impossible. In our attack, to recover up to 8-octet passwords, we only need 1 time the amount of eavesdropping, 17 queries, and 234 MD4 off-line computations. To recover up to 12-octet passwords, we only need 210 times the amount of eavesdropping, 210 queries, and 241 off-line MD4 computations. When responses are computed as MD4(Password||Challenge||Password), which is called hybrid approach, previous work needs to ask 263 queries, while in our attack, up to 8-octet passwords are practically recovered by 28 times the amount of eavesdropping, 28 queries, and 239 off-line MD4 computations. Our idea is guessing a part of passwords so that we can simulate values of intermediate chaining variables from observed hash values. This enables us to use a short local collision that occurs with a very high probability, and thus the number of queries becomes practical.

  • Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection

    Katsunari YOSHIOKA  Tsutomu MATSUMOTO  

     
    PAPER-Application

      Vol:
    E93-A No:1
      Page(s):
    210-218

    Malware sandbox analysis, in which a malware sample is actually executed in a testing environment (i.e. sandbox) to observe its behavior, is one of the promising approaches to tackling the emerging threats of exploding malware. As a lot of recent malware actively communicates with remote hosts over the Internet, sandboxes should also support an Internet connection, otherwise important malware behavior may not be observed. In this paper, we propose a multi-pass sandbox analysis with a controlled Internet connection. In the proposed method, we start our analysis with an isolated sandbox and an emulated Internet that consists of a set of dummy servers and hosts that run vulnerable services, called Honeypots in the Sandbox (HitS). All outbound connections from the victim host are closely inspected to see if they could be connected to the real Internet. We iterate the above process until no new behaviors are observed. We implemented the proposed method in a completely automated fashion and evaluated it with malware samples recently captured in the wild. Using a simple containment policy that authorizes only certain application protocols, namely, HTTP, IRC, and DNS, we were able to observe a greater variety of behaviors compared with the completely isolated sandbox. Meanwhile, we confirmed that a noticeable number of IP scans, vulnerability exploitations, and DoS attacks are successfully contained in the sandbox. Additionally, a brief comparison with two existing sandbox analysis systems, Norman Sandbox and CWSandbox, are shown.

  • Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions

    SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  

     
    PAPER-Secure Protocol

      Vol:
    E93-A No:1
      Page(s):
    102-115

    An anonymous password-authenticated key exchange (anonymous PAKE) protocol is designed to provide both password-only authentication and user anonymity against a semi-honest server, who follows the protocol honestly. Very recently, Yang and Zhang have proposed a new anonymous PAKE (NAPAKE) protocol that is claimed efficient compared to the previous constructions. In this paper, we propose a very-efficient anonymous PAKE (called, VEAP) protocol that provides the most efficiency among their kinds in terms of computation and communication costs. The VEAP protocol guarantees semantic security of session keys in the random oracle model under the chosen target CDH problem, and unconditional user anonymity against a semi-honest server. If the pre-computation is allowed, both the user and the server are required to compute only one modular exponentiation, respectively. Surprisingly, this is the same computation cost of the well-known Diffie-Hellman protocol that does not provide authentication at all. In addition, we extend the VEAP protocol in two ways: the first is designed to reduce the communication costs of the VEAP protocol and the second shows that stripping off anonymity parts from the VEAP protocol results in a new PAKE protocol.

  • High-Speed Passphrase Search System for PGP

    Koichi SHIMIZU  Daisuke SUZUKI  Toyohiro TSURUMARU  

     
    PAPER-Application

      Vol:
    E93-A No:1
      Page(s):
    202-209

    We propose an FPGA-based high-speed search system for cryptosystems that employ a passphrase-based security scheme. We first choose PGP as an example of such cryptosystems, clear several hurdles for high throughputs and manage to develop a high-speed search system for it. As a result we achieve a throughput of 1.1 105 passphrases per second, which is 38 times the speed of the fastest software. Furthermore we can do many flexible passphrase generations in addition to a simple brute force one because we assign the passphrase generation operation to software. In fact we implement a brute force and a dictionary-based ones, and get the same maximum throughput as above in both cases. We next consider the speed of passphrase generation in order to apply our system to other cryptosystems than PGP, and implement a hardware passphrase generator to achieve higher throughputs. In the PGP case, the very heavy iteration of hashing, 1025 times in our case, lowers the total throughput linearly, and makes the figure 1.1 105 suffice. In other cases without any such iteration structure, we have to generate even more passphrases, for example 108 per second. That can easily exceed the generation speed that software can offer and thus we conclude that it is now necessary to place the passphrase generation in hardware instead of in software.

  • Raman-Based 10.66 Gb/s Bidirectional TDM over Long-Reach WDM Hybrid PON

    Hsin-Min WANG  Hidenori TAGA  

     
    LETTER-Fiber-Optic Transmission for Communications

      Vol:
    E92-B No:12
      Page(s):
    3911-3914

    In this paper, we demonstrate a 10.66 Gb/s bidirectional TDM over long-reach WDM hybrid PON supported by distributed Raman amplification, and the power budget margin is measured to be 15 dB for downstream transmission and 12 dB for upstream transmission, with dual Raman pump power of 300 mW.

  • Novel UWB Bandpass Filter Using CPW-to-Microstrip Transition Structure

    Tae-Hak LEE  Jung-Woo BAIK  Seongmin PYO  Young-Sik KIM  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E92-C No:12
      Page(s):
    1545-1547

    A novel bandpass filter (BPF) for an ultra-wideband (UWB) system is proposed in this letter. The BPF consists of four coplanar stripline (CPS)-to-microstrip transitions. Each transition is employed for broad electromagnetic (EM) coupling between a short-circuited CPS and an open-circuited microstrip line. The equivalent circuit model of the proposed geometry is derived and utilized in the impedance and mode matching analysis. Measured results show good agreement with the analysis and simulated ones.

  • Design of Complex BPF with Automatic Digital Tuning Circuit for Low-IF Receivers

    Hideaki KONDO  Masaru SAWADA  Norio MURAKAMI  Shoichi MASUI  

     
    PAPER-Integrated Electronics

      Vol:
    E92-C No:10
      Page(s):
    1304-1310

    This paper describes the architecture and implementations of an automatic digital tuning circuit for a complex bandpass filter (BPF) in a low-power and low-cost transceiver for applications such as personal authentication and wireless sensor network systems. The architectural design analysis demonstrates that an active RC filter in a low-IF architecture can be at least 47.7% smaller in area than a conventional gm-C filter; in addition, it features a simple implementation of an associated tuning circuit. The principle of simultaneous tuning of both the center frequency and bandwidth through calibration of a capacitor array is illustrated as based on an analysis of filter characteristics, and a scalable automatic digital tuning circuit with simple analog blocks and control logic having only 835 gates is introduced. The developed capacitor tuning technique can achieve a tuning error of less than 3.5% and lower a peaking in the passband filter characteristics. An experimental complex BPF using 0.18 µm CMOS technology can successfully reduce the tuning error from an initial value of -20% to less than 2.5% after tuning. The filter block dimensions are 1.22 mm1.01 mm; and in measurement results of the developed complex BPF with the automatic digital tuning circuit, current consumption is 705 µA and the image rejection ratio is 40.3 dB. Complete evaluation of the BPF indicates that this technique can be applied to low-power, low-cost transceivers.

  • Static Dependency Pair Method Based on Strong Computability for Higher-Order Rewrite Systems

    Keiichirou KUSAKARI  Yasuo ISOGAI  Masahiko SAKAI  Frederic BLANQUI  

     
    PAPER-Computation and Computational Models

      Vol:
    E92-D No:10
      Page(s):
    2007-2015

    Higher-order rewrite systems (HRSs) and simply-typed term rewriting systems (STRSs) are computational models of functional programs. We recently proposed an extremely powerful method, the static dependency pair method, which is based on the notion of strong computability, in order to prove termination in STRSs. In this paper, we extend the method to HRSs. Since HRSs include λ-abstraction but STRSs do not, we restructure the static dependency pair method to allow λ-abstraction, and show that the static dependency pair method also works well on HRSs without new restrictions.

  • A Multi-Sensing-Range Method for Efficient Position Estimation by Passive RFID Technology

    Toshihiro HORI  Tomotaka WADA  Norie UCHITOMI  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E92-A No:10
      Page(s):
    2609-2617

    The RFID tag system has received attention as an identification source. Each RFID tag is attached to some object. With the unique ID of the RFID tag, a user identifies the object provided with the RFID tag, and derives appropriate information about the object. One of important applications of the RFID technology is the position estimation of RFID tags. It can be very useful to acquire the location information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for robots etc. In this paper, we propose a new position estimation method of RFID tags by using a probabilistic approach. In this method, mobile objects (person and robot, etc.) with RFID readers estimate the positions of RFID tags with multiple communication ranges. We show the effectiveness of the proposed method by computer simulations.

  • Fiber Access Networks: Reliability Analysis and Swedish Broadband Market Open Access

    Lena WOSINSKA  Jiajia CHEN  Claus Popp LARSEN  

     
    INVITED PAPER

      Vol:
    E92-B No:10
      Page(s):
    3006-3014

    Fiber access network architectures such as active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand. Whereas particularly Swedish operators prefer AON, this may not be the case for operators in other countries. The choice depends on a combination of technical requirements, practical constraints, business models, and cost. Due to the increasing importance of reliable access to the network services, connection availability is becoming one of the most crucial issues for access networks, which should be reflected in the network owner's architecture decision. In many cases protection against failures is realized by adding backup resources. However, there is a trade off between the cost of protection and the level of service reliability since improving reliability performance by duplication of network resources (and capital expenditures CAPEX) may be too expensive. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparsely and densely populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort should be put on minimizing the operational expenditures (OPEX) during the access network lifetime.

  • Two-Phase Cycle DBA (TCDBA) for Differentiated Services on EPON

    Hye Kyung LEE  Won-Jin YOON  Tae-Jin LEE  Hyunseung CHOO  Min Young CHUNG  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E92-B No:9
      Page(s):
    2823-2837

    The Ethernet passive optical network (EPON), which is one of the PON technologies for realizing FTTx (Fiber-To-The-Curb/Home/Office), is a low-cost and high-speed solution to the bottleneck problem that occurs between a backbone network and end users. The EPON is compatible with existing customer devices that are equipped with an Ethernet card. To effectively control frame transmission from optical network units (ONUs) to an optical line termination (OLT), the EPON can use a multi-point control protocol (MPCP) with control functions in addition to the media access control (MAC) protocol function. In this paper, we propose a two-phase cycle dynamic bandwidth allocation (TCDBA) algorithm to increase the channel utilization on the uplink by allowing frame transmissions during computation periods, and combine the TCDBA algorithm with the queue management schemes performed within each ONU, in order to effectively support differentiated services. Additionally, we perform simulations to validate the effectiveness of the proposed algorithm. The results show that the proposed TCDBA algorithm improves the maximum throughput, average transmission delay, and average volume of frames discarded, compared with the existing algorithms. Furthermore, the proposed TCDBA algorithm is able to support differentiated quality of services (QoS).

  • Advanced MMIC Receiver for 94-GHz Band Passive Millimeter-Wave Imager Open Access

    Masaru SATO  Tatsuya HIROSE  Koji MIZUNO  

     
    INVITED PAPER

      Vol:
    E92-C No:9
      Page(s):
    1124-1129

    In this paper, we present the development of an advanced MMIC receiver for a 94-GHz band passive millimeter-wave (PMMW) imager. Our configuration is based on a Dicke receiver in order to reduce fluctuations in the detected voltage. By introducing an electronic switch in the MMIC, we achieved a high resolution millimeter-wave image in a shorter image collection time compared to that with a conventional mechanical chopper. We also developed an imaging array using MMIC receivers.

  • Low-Pass Filter Property of an Input-Dimensional Output Feedback Passification Controller for Rotary Inverted Pendulum

    Young Ik SON  Nam Hoon JO  Hyungbo SHIM  Goo-Jong JEONG  

     
    LETTER-Systems and Control

      Vol:
    E92-A No:8
      Page(s):
    2133-2136

    A rotary inverted pendulum is stabilized by a single first order dynamic output feedback system. Numerical simulations and experimental results show that the proposed control law has low-pass filter property as well as it can successfully replace the velocity measurements for LQR control law.

  • Dynamic Splitting: An Enhanced Query Tree Protocol for RFID Tag Collision Arbitration

    Jihoon CHOI  Wonjun LEE  

     
    LETTER-Network

      Vol:
    E92-B No:6
      Page(s):
    2283-2286

    To reduce RFID tag identification delay, we propose a novel Dynamic Splitting protocol (DS) which is an improvement of the Query tree protocol (QT). DS controls the number of branches of a tree dynamically. An improved performance of DS relative to QT is verified by analytical results and simulation studies.

  • Comparisons of SiN Passivation Film Deposited by PE-CVD and T-CVD Method for AlGaN/GaN HEMTs on SiC Substrate

    Hideyuki OKITA  Toshiharu MARUI  Shinichi HOSHI  Masanori ITOH  Fumihiko TODA  Yoshiaki MORINO  Isao TAMAI  Yoshiaki SANO  Shohei SEKI  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    686-690

    Current collapse phenomenon is a well known obstacle in the AlGaN/GaN HEMTs. In order to improve the surface stability of HEMTs, we have investigated the SiN passivation film deposited by T-CVD, and we found that it improves both gate leakage current and current collapse phenomenon [1]. Moreover, we compared the T-CVD and PE-CVD passivation films, on high electric field DC and RF characteristics. We found that T-CVD SiN passivation film improves BVds-off by 30% because of the reduction of gate leakage current. It also improved ηd in the output power characteristics by load-pull measurement, which indicates the decrease of the current collapse phenomenon. Also we fabricated a multi-fingered 50 W-class AlGaN/GaN HEMT with T-CVD SiN passivation film and achieved 61.2% of high drain efficiency at frequency of 2.14 GHz, which was 3.6 points higher than that with PE-CVD SiN passivation film.

  • Low-Leakage and Low-Power Implementation of High-Speed Logic Gates

    Tsung-Yi WU  Liang-Ying LU  

     
    PAPER

      Vol:
    E92-C No:4
      Page(s):
    401-408

    In this paper, we propose novel transmission-gate-based (TG-based) AND gates, TG-based OR gates, and pass-transistor logic gates that have new structures and have lower transistor counts than those proposed by other authors. All our proposed gates operate in full swing and have less leakage currents and shorter delays than conventional CMOS gates. Compared with the conventional 65 nm CMOS gates, our proposed 65 nm gates in this paper can improve leakage currents, dynamic power consumption, and propagation delays by averages of 42.4%, 8.1%, and 13.5%, respectively. Logic synthesizers can use them to facilitate power reduction. The experimental results show that a commercial power optimization tool can further reduce the leakage current and dynamic power up to 39.85% and 18.69%, respectively, when the standard cell library used by the tool contains our proposed gates.

  • Cross-Noise-Coupled Architecture of Complex Bandpass ΔΣAD Modulator

    Hao SAN  Haruo KOBAYASHI  

     
    PAPER

      Vol:
    E92-A No:4
      Page(s):
    998-1003

    Complex bandpass ΔΣAD modulators can provide superior performance to a pair of real bandpass ΔΣAD modulators of the same order. They process just input I and Q signals, not image signals, and AD conversion can be realized with low power dissipation, so that they are desirable for such low-IF receiver applications. This paper proposes a new architecture for complex bandpass Δ ΣAD modulators with cross-noise-coupled topology, which effectively raises the order of the complex modulator and achieves higher SQNDR (Signal to Quantization Noise and Distortion Ratio) with low power dissipation. By providing the cross-coupled quantization noise injection to internal I and Q paths, noise coupling between two quantizers can be realized in complex form, which enhances the order of noise shaping in complex domain, and provides a higher-order NTF using a lower-order loop filter in the complex ΔΣAD modulator. Proposed higher-order modulator can be realized just by adding some passive capacitors and switches, the additional integrator circuit composed of an operational amplifier is not necessary, and the performance of the complex modulator can be effectively raised without more power dissipation. We have performed simulation with MATLAB to verify the effectiveness of the proposed architecture. The simulation results show that the proposed architecture can achieve the realization of higher-order enhancement, and improve SQNDR of the complex bandpass ΔΣAD modulator.

  • Automatic Trimming Technique for Superconducting Band-Pass Filters Using a Trimming Library Open Access

    Shigetoshi OHSHIMA  Takuro KANEKO  Jae-Hun LEE  Maya OSAKA  Satoshi ONO  Atsushi SAITO  

     
    INVITED PAPER

      Vol:
    E92-C No:3
      Page(s):
    302-306

    The superconducting band-pass filter has small insertion loss and excellent out-of-band rejection properties. It has been put to practical use in a number of applications. However, in order to expand its range of application, a tuning technique that can restore the filter characteristics is needed. We propose an automatic tuning system using a trimming library and checked the feasibility of the system by tuning a forward-coupled filter with three resonators. The results show that the trimming library method is an effective way of automatically improving the filter characteristics.

221-240hit(566hit)