The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PAS(566hit)

241-260hit(566hit)

  • Optical Microsensors Integration Technologies for Biomedical Applications Open Access

    Eiji HIGURASHI  Renshi SAWADA  Tadatomo SUGA  

     
    INVITED PAPER

      Vol:
    E92-C No:2
      Page(s):
    231-238

    This paper focuses on optical integration technology and its application in optical microsensors used in biomedical fields. The integration is based on the hybrid integration approach, achieving high performance, small size and weight, and lower cost. First, we describe the key technologies used in hybrid integration, namely passive alignment technology, low temperature bonding technology, and packaging technology for realizing advanced microsensors. Then, we describe an integrated laser Doppler flowmeter that can monitor blood flow in human skin.

  • A New Robust Bandpass Sampling Scheme for Multiple RF Signals in SDR System

    Chen CHI  Yu ZHANG  Zhixing YANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    326-329

    Software defined radio (SDR) technology has been widely applied for its powerful universality and flexibility in the past decade. To address the issue of bandpass sampling of multiband signals, a novel and efficient method of finding the minimum valid sampling frequency is proposed. Since there are frequency deviations due to the channel effect and hardware instability in actual systems, we also consider the guard-bands between downconverted signal spectra in determining the minimum sampling frequency. In addition, the case that the spectra within the sampled bandwidth are located in inverse placement can be avoided by our proposed method, which will reduce the complexity of the succeeding digital signal process significantly. Simulation results illustrate that the proper minimum sampling frequency can be determined rapidly and accurately.

  • Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?

    Kazuki YONEYAMA  

     
    PAPER-Secure Protocol

      Vol:
    E92-A No:1
      Page(s):
    113-121

    In this paper, we raise a question about existence of secure password-based authenticated key exchange against leakage of internal states (i.e., the passwords and session-specific private information). Toward this question, first, we classify six models of adversary's capabilities about leakage. Next, as a result of considerations for 2-party PAKE, we find two negative answers, but also find a positive answer. More specifically, we show that there exists no scheme which is secure in strong leakage models, but we also show that there exists a scheme which is secure in weak leakage models. Also, we consider the case of 3-party setting which is a special setting of password-based authenticated key exchange, and we find similar impossibilities as 2-party setting.

  • Analysis of Post-Wall Waveguide Based on H-Plane Planar Circuit Approach

    Mitsuyoshi KISHIHARA  Isao OHTA  Kensuke OKUBO  Jiro YAMAKITA  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    63-71

    In this paper, we suggest a method of analyzing the post-wall waveguide (PWW) or the substrate integrated waveguide (SIW) by applying the analytical technique of the H-plane waveguide discontinuities based on the planar circuit approach. The analytical procedure consists of the derivation of the mode impedance matrices for regular-shaped circuits and the short-circuiting operation on fictitious ports arranged at the peripheries of the metallic posts. First, a straight section of the PWW is treated as an example and the analytical method for the calculation of the S-parameters is described in detail. Then the attenuation and phase constants of the PWW are computed with the aid of the Thru-Reflect Line (TRL) calibration technique. Next, the analytical method is applied to the design of two types of right-angled corners. The analysis and the design results are verified using an em-simulator (HFSS).

  • Near-Collision Attacks on MD4: Applied to MD4-Based Protocols

    Lei WANG  Kazuo OHTA  Noboru KUNIHIRO  

     
    PAPER-Hash Function

      Vol:
    E92-A No:1
      Page(s):
    76-86

    The most widely used hash functions from MD4 family have been broken, which lead to a public competition on designing new hash functions held by NIST. This paper focuses on one concept called near-collision resistance: computationally difficult to find a pair of messages with hash values differing in only few bits, which new hash functions should satisfy. In this paper, we will give a model of near-collisions on MD4, and apply it to attack protocols including HMAC/NMAC-MD4 and MD4(Password||Challenge). Our new outer-key recovery attacks on HMAC/NMAC-MD4 has a complexity of 272 online queries and 277 MD4 computations, while previous result was 288 online queries and 295 MD4 computations. Our attack on MD4(Password||Challenge) can recover 16 password characters with a complexity of 237 online queries and 221 MD4 computations, which is the first approach to attack such protocols.

  • Towards the Engineering of Dependable P2P-Based Network Control -- The Case of Timely Routing Control Messages

    Kurt TUTSCHKU  Akihiro NAKAO  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    17-25

    This paper introduces a methodology for engineering best-effort P2P algorithms into dependable P2P-based network control mechanism. The proposed method is built upon an iterative approach consisting of improving the original P2P algorithm by appropriate mechanisms and of thorough performance assessment with respect to dependability measures. The potential of the methodology is outlined by the example of timely routing control for vertical handover in B3G wireless networks. In detail, the well-known Pastry and CAN algorithms are enhanced to include locality. By showing how to combine algorithmic enhancements with performance indicators, this case study paves the way for future engineering of dependable network control mechanisms through P2P algorithms.

  • Cryptanalysis and Enhancement of Modified Gateway-Oriented Password-Based Authenticated Key Exchange Protocol

    Kyung-Ah SHIM  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:12
      Page(s):
    3837-3839

    Abdalla et al. proposed a gateway-oriented password-based authenticated key exchange (GPAKE) protocol among a client, a gateway, and an authentication server, where a password is only shared between the client and the authentication server. The goal of their scheme is to securely establish a session key between the client and the gateway by the help of the authentication server without revealing any information on the password to the gateway. Recently, Byun et al. showed that Abdalla et al.'s GPAKE is insecure against undetectable on-line password guessing attacks. They also proposed a modified version to overcome the attacks. In this letter, we point out that Byun et al.'s modified GPAKE protocol is still insecure against the same attacks. We then make a suggestion for improvement.

  • A High Performance Partially-Parallel Irregular LDPC Decoder Based on Sum-Delta Message Passing Schedule

    Wen JI  Yuta ABE  Takeshi IKENAGA  Satoshi GOTO  

     
    PAPER-Embedded, Real-Time and Reconfigurable Systems

      Vol:
    E91-A No:12
      Page(s):
    3622-3629

    In this paper, we propose a partially-parallel irregular LDPC decoder based on IEEE 802.11n standard targeting high throughput and small area applications. The design is based on a novel sum-delta message passing algorithm characterized as follows: (i) Decoding throughput is greatly improved by utilizing the difference value between the updated and the original value to remove redundant computations. (ii) Registers and memory are optimized to store only the frequently used messages to decrease the hardware cost. (iii) Techniques such as binary sorting, parallel column operation, high performance pipelining are used to further speed up the message passing procedure. The synthesis result in TSMC 0.18 CMOS technology demonstrates that for (648,324) irregular LDPC code, our decoder achieves 7.5X improvement in throughput, which reaches 402 Mbps at the frequency of 200 MHz, with 11% area reduction. The synthesis result also demonstrates the competitiveness to the fully-parallel regular LDPC decoders in terms of the tradeoff between throughput, area and power.

  • An Elliptic-Function Bandpass Filter Utilizing Left-Handed Operations of an Inter-Digital Coupled Line

    Hiromitsu UCHIDA  Naofumi YONEDA  Yoshihiko KONISHI  

     
    PAPER

      Vol:
    E91-C No:11
      Page(s):
    1772-1777

    A new elliptic-function bandpass filter (BPF) is proposed, which utilizes an inter-digital coupled line (IDCPL) as a left-handed transmission line. The IDCPL is employed in order to realize a negative coupling between non-adjacent resonators in a wideband BPF. As the authors' knowledge, the left-handed operations of the IDCPL has rarely utilized before, although the IDCPL itself has been widely used in many microwave circuits without being paid attention to the left-handed operations. Measured characteristics of two BPFs are presented in this paper, one is targeted for 3-4 GHz WiMAX systems, and the other is for 3-5 GHz ultra wideband communication systems (UWB).

  • A Hybrid P2P Overlay Network for Non-strictly Hierarchically Categorized Content

    Yi WAN  Takuya ASAKA  Tatsuro TAKAHASHI  

     
    PAPER-Network

      Vol:
    E91-B No:11
      Page(s):
    3608-3616

    In P2P content distribution systems, there are many cases in which the content can be classified into hierarchically organized categories. In this paper, we propose a hybrid overlay network design suitable for such content called Pastry/NSHCC (Pastry for Non-Strictly Hierarchically Categorized Content). The semantic information of classification hierarchies of the content can be utilized regardless of whether they are in a strict tree structure or not. By doing so, the search scope can be restrained to any granularity, and the number of query messages also decreases while maintaining keyword searching availability. Through simulation, we showed that the proposed method provides better performance and lower overhead than unstructured overlays exploiting the same semantic information.

  • Dual-Band Wilkinson Power Dividers Using a Series RLC Circuit

    Tadashi KAWAI  Yasuaki NAKASHIMA  Yoshihiro KOKUBO  Isao OHTA  

     
    PAPER

      Vol:
    E91-C No:11
      Page(s):
    1793-1797

    This paper describes a novel Wilkinson power divider operating at two arbitrary different frequencies. The proposed divider consists of two-section transmission lines and a series RLC circuit connected between two output ports. The circuit parameters for a dual-band operation are derived by the even/odd mode analysis. Equal power split, complete matching, and good isolation between two output ports are numerically demonstrated. Dual-band and broadband Wilkinson power dividers can be successfully designed. Finally, verification of this design method is also shown by electromagnetic simulations and experiments.

  • Novel Compact Ultra-Wideband Bandpass Filter by Application of Short-Circuited Stubs and Stepped-Impedance-Resonator

    Chun-Ping CHEN  Zhewang MA  Tetsuo ANADA  

     
    PAPER

      Vol:
    E91-C No:11
      Page(s):
    1786-1792

    To realize the compact ultra-wideband (UWB) bandpass filters, a novel filter prototype with two short-circuited stubs loaded at both sides of a stepped-impedance resonator (SIR) via the parallel coupled lines is proposed based on a distributed filter synthesis theory. The equivalent circuit of this filter is established, while the corresponding 7-pole Chebyshev-type transfer function is derived for filter synthesis. Then, a distributed-circuit-based technique was presented to synthesize the elements' values of this filter. As an example, a FCC UWB filter with the fractional bandwidth (FWB) @ -10 dB up to 110% was designed using the proposed prototype and then re-modeled by commercial microwave circuit simulator to verify the correctness and accuracy of the synthesis theory. Furthermore, in terms of EM simulator, the filter was further-optimized and experimentally-realized by using microstrip line. Good agreements between the measurement results and theoretical ones validate the effectiveness of our technique. In addition, compared with the conventional SIR-type UWB filter without short-circuited stubs, the new one significantly improves the selectivity and out-of-band characteristics (especially in lower one -45 dB@1-2 GHz) to satisfy the FCC's spectrum mask. The designed filter also exhibits very compact size, quite low insertion loss, steep skirts, flat group delay and the easily-fabricatable structure (the coupling gap dimension in this filter is 0.15 mm) as well. Moreover, it should be noted that, in terms of the presented design technique, the proposed filter prototype can be also used to easily realize the UWB filters with other FBW even greater than 110%.

  • A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange

    SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:11
      Page(s):
    3312-3324

    At Indocrypt 2005, Viet et al.[21], have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for client's password-based authentication and anonymity against a passive server, who does not deviate the protocol. In this paper, we first point out that their threshold construction is completely insecure against off-line dictionary attacks. For the threshold t > 1, we propose a secure threshold anonymous PAKE (for short, TAP) protocol with the number of clients n upper-bounded, such that n 2 -1, where N is a dictionary size of passwords. We rigorously prove that the TAP protocol has semantic security of session keys in the random oracle model by showing the reduction to the computational Diffie-Hellman problem. In addition, the TAP protocol provides unconditional anonymity against a passive server. For the threshold t=1, we propose an efficient anonymous PAKE protocol that significantly improves efficiency in terms of computation costs and communication bandwidth compared to the original (not threshold) anonymous PAKE protocol [21].

  • Gramian-Preserving Frequency Transformation for Linear Discrete-Time State-Space Systems

    Shunsuke KOSHITA  Satoru TANAKA  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Systems and Control

      Vol:
    E91-A No:10
      Page(s):
    3014-3021

    This paper proposes the Gramian-preserving frequency transformation for linear discrete-time state-space systems. In this frequency transformation, we replace each delay element of a discrete-time system with an allpass system that has a balanced realization. This approach can generate transformed systems that have the same controllability/observability Gramians as those of the original system. From this result, we show that the Gramian-preserving frequency transformation gives us transformed systems with different magnitude characteristics, but with the same structural property with respect to the Gramians as that of the original system. This paper also presents a simple method for realization of the Gramian-preserving frequency transformation. This method makes use of the cascaded normalized lattice structure of allpass systems.

  • Design of Low-Pass Filters Using Discrete-Time Domain Techniques

    Lin-Chuan TSAI  Kuo-Chih CHU  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E91-B No:10
      Page(s):
    3162-3165

    In this paper, a new formulation of equal-length three-section open stubs having two zeros located on the unit circle and one zero at z=-1 (θ=π) in the Z-plane is presented. In particular, new filter configurations consisting of equal-length two-section open stubs, cascade lines, open stubs, and three-section open stubs are employed to emulate the discrete-time filters. To examine the validity of our formulation, we realized two discrete-time Chebyshev type II low-pass filters in the form of microstrip lines. The frequency responses of these two filters are measured to validate this new formulation.

  • Enhanced Class-of-Service Oriented Packet Scheduling Scheme for EPON Access Networks

    Intark HAN  Hong-Shik PARK  Man-Soo HAN  

     
    LETTER-Fiber-Optic Transmission for Communications

      Vol:
    E91-B No:10
      Page(s):
    3334-3337

    A fast class-of-service oriented packet scheduling (FCOPS) has a service fairness problem since a credit pool for a service class is initialized at the beginning of a transmission cycle whose starting moment is fixed at a specific ONU. To remedy the service unfairness of FCOPS, we suggest an enhanced class-of-service oriented packet scheduling (ECOPS) that uses a new initialization cycle whose starting moment is fairly distributed to each ONU. Also, ECOPS generates a colorless grant to utilize the resource wastage, when traffic is light and the total sum of grants of an ONU is less than a minimum size. Using simulation, we validate ECOPS as superior to FCOPS in the mean delay and the service fairness.

  • Sparse and Passive Reduced-Order Interconnect Modeling by Eigenspace Method

    Yuichi TANJI  

     
    PAPER-Analysis, Modelng and Simulation

      Vol:
    E91-A No:9
      Page(s):
    2419-2425

    The passive and sparse reduced-order modeling of a RLC network is presented, where eigenvalues and eigenvectors of the original network are used, and thus the obtained macromodel is more accurate than that provided by the Krylov subspace methods or TBR procedures for a class of circuits. Furthermore, the proposed method is applied to low pass filtering of a reduced-order model produced by these methods without breaking the passivity condition. Therefore, the proposed eigenspace method is not only a reduced-order macromodeling method, but also is embedded in other methods enhancing their performances.

  • A Performance Comparison of the Parallel Preconditioners for Iterative Methods for Large Sparse Linear Systems Arising from Partial Differential Equations on Structured Grids

    Sangback MA  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E91-A No:9
      Page(s):
    2578-2587

    In this paper we compare various parallel preconditioners such as Point-SSOR (Symmetric Successive OverRelaxation), ILU(0) (Incomplete LU) in the Wavefront ordering, ILU(0) in the Multi-color ordering, Multi-Color Block SOR (Successive OverRelaxation), SPAI (SParse Approximate Inverse) and pARMS (Parallel Algebraic Recursive Multilevel Solver) for solving large sparse linear systems arising from two-dimensional PDE (Partial Differential Equation)s on structured grids. Point-SSOR is well-known, and ILU(0) is one of the most popular preconditioner, but it is inherently serial. ILU(0) in the Wavefront ordering maximizes the parallelism in the natural order, but the lengths of the wavefronts are often nonuniform. ILU(0) in the Multi-color ordering is a simple way of achieving a parallelism of the order N, where N is the order of the matrix, but its convergence rate often deteriorates as compared to that of natural ordering. We have chosen the Multi-Color Block SOR preconditioner combined with direct sparse matrix solver, since for the Laplacian matrix the SOR method is known to have a nondeteriorating rate of convergence when used with the Multi-Color ordering. By using block version we expect to minimize the interprocessor communications. SPAI computes the sparse approximate inverse directly by least squares method. Finally, ARMS is a preconditioner recursively exploiting the concept of independent sets and pARMS is the parallel version of ARMS. Experiments were conducted for the Finite Difference and Finite Element discretizations of five two-dimensional PDEs with large meshsizes up to a million on an IBM p595 machine with distributed memory. Our matrices are real positive, i.e., their real parts of the eigenvalues are positive. We have used GMRES(m) as our outer iterative method, so that the convergence of GMRES(m) for our test matrices are mathematically guaranteed. Interprocessor communications were done using MPI (Message Passing Interface) primitives. The results show that in general ILU(0) in the Multi-Color ordering and ILU(0) in the Wavefront ordering outperform the other methods but for symmetric and nearly symmetric 5-point matrices Multi-Color Block SOR gives the best performance, except for a few cases with a small number of processors.

  • Performance Enhancement by Threshold Level Control of a Receiver in WDM-PON System with Manchester Coded Downstream and NRZ Upstream Re-Modulation

    Bong Kyu KIM  Hwan Seok CHUNG  Sun Hyok CHANG  Sangjo PARK  

     
    LETTER-Fiber-Optic Transmission for Communications

      Vol:
    E91-B No:9
      Page(s):
    2994-2997

    We propose and demonstrate a scheme enhancing the performance of optical access networks with Manchester coded downstream and re-modulated NRZ coded upstream. It is achieved by threshold level control of a limiting amplifier at a receiver, and the minimum sensitivity of upstream is significantly improved for the re-modulation scheme with 5 Gb/s Manchester coded downstream and 2.488 Gb/s NRZ upstream data rates.

  • Novel Conventional Standard Linear Element Based Complete Passive Equivalent Circuit Models of the Practical OTA-Based Inductors

    Rawid BANCHUIN  Boonruk CHIPIPOP  Boonchareon SIRINAOVAKUL  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1883-1889

    In this research, the practical OTA-based inductors of all structures have been studied and their complete passive equivalent circuit models, where the effects of both parasitic elements and finite opened-loop bandwidth have been taken into account, also contain only the conventional standard linear elements i.e. the ordinary resistor, inductor and capacitor, without any infeasible high order element e.g. super inductor etc., have been proposed. The resulting models have been found to be excellently accurate, excellently straight forward, far superior to the previously proposed ones and completely realizable by the passive elements. Hence, the proposed passive equivalent circuit models have been found to be the convenience and versatile tools for the implementation of any analog and mixed signal processing circuits and systems.

241-260hit(566hit)