Eiji HIGURASHI Renshi SAWADA Tadatomo SUGA
This paper focuses on optical integration technology and its application in optical microsensors used in biomedical fields. The integration is based on the hybrid integration approach, achieving high performance, small size and weight, and lower cost. First, we describe the key technologies used in hybrid integration, namely passive alignment technology, low temperature bonding technology, and packaging technology for realizing advanced microsensors. Then, we describe an integrated laser Doppler flowmeter that can monitor blood flow in human skin.
Chen CHI Yu ZHANG Zhixing YANG
Software defined radio (SDR) technology has been widely applied for its powerful universality and flexibility in the past decade. To address the issue of bandpass sampling of multiband signals, a novel and efficient method of finding the minimum valid sampling frequency is proposed. Since there are frequency deviations due to the channel effect and hardware instability in actual systems, we also consider the guard-bands between downconverted signal spectra in determining the minimum sampling frequency. In addition, the case that the spectra within the sampled bandwidth are located in inverse placement can be avoided by our proposed method, which will reduce the complexity of the succeeding digital signal process significantly. Simulation results illustrate that the proper minimum sampling frequency can be determined rapidly and accurately.
In this paper, we raise a question about existence of secure password-based authenticated key exchange against leakage of internal states (i.e., the passwords and session-specific private information). Toward this question, first, we classify six models of adversary's capabilities about leakage. Next, as a result of considerations for 2-party PAKE, we find two negative answers, but also find a positive answer. More specifically, we show that there exists no scheme which is secure in strong leakage models, but we also show that there exists a scheme which is secure in weak leakage models. Also, we consider the case of 3-party setting which is a special setting of password-based authenticated key exchange, and we find similar impossibilities as 2-party setting.
Mitsuyoshi KISHIHARA Isao OHTA Kensuke OKUBO Jiro YAMAKITA
In this paper, we suggest a method of analyzing the post-wall waveguide (PWW) or the substrate integrated waveguide (SIW) by applying the analytical technique of the H-plane waveguide discontinuities based on the planar circuit approach. The analytical procedure consists of the derivation of the mode impedance matrices for regular-shaped circuits and the short-circuiting operation on fictitious ports arranged at the peripheries of the metallic posts. First, a straight section of the PWW is treated as an example and the analytical method for the calculation of the S-parameters is described in detail. Then the attenuation and phase constants of the PWW are computed with the aid of the Thru-Reflect Line (TRL) calibration technique. Next, the analytical method is applied to the design of two types of right-angled corners. The analysis and the design results are verified using an em-simulator (HFSS).
Lei WANG Kazuo OHTA Noboru KUNIHIRO
The most widely used hash functions from MD4 family have been broken, which lead to a public competition on designing new hash functions held by NIST. This paper focuses on one concept called near-collision resistance: computationally difficult to find a pair of messages with hash values differing in only few bits, which new hash functions should satisfy. In this paper, we will give a model of near-collisions on MD4, and apply it to attack protocols including HMAC/NMAC-MD4 and MD4(Password||Challenge). Our new outer-key recovery attacks on HMAC/NMAC-MD4 has a complexity of 272 online queries and 277 MD4 computations, while previous result was 288 online queries and 295 MD4 computations. Our attack on MD4(Password||Challenge) can recover 16 password characters with a complexity of 237 online queries and 221 MD4 computations, which is the first approach to attack such protocols.
This paper introduces a methodology for engineering best-effort P2P algorithms into dependable P2P-based network control mechanism. The proposed method is built upon an iterative approach consisting of improving the original P2P algorithm by appropriate mechanisms and of thorough performance assessment with respect to dependability measures. The potential of the methodology is outlined by the example of timely routing control for vertical handover in B3G wireless networks. In detail, the well-known Pastry and CAN algorithms are enhanced to include locality. By showing how to combine algorithmic enhancements with performance indicators, this case study paves the way for future engineering of dependable network control mechanisms through P2P algorithms.
Abdalla et al. proposed a gateway-oriented password-based authenticated key exchange (GPAKE) protocol among a client, a gateway, and an authentication server, where a password is only shared between the client and the authentication server. The goal of their scheme is to securely establish a session key between the client and the gateway by the help of the authentication server without revealing any information on the password to the gateway. Recently, Byun et al. showed that Abdalla et al.'s GPAKE is insecure against undetectable on-line password guessing attacks. They also proposed a modified version to overcome the attacks. In this letter, we point out that Byun et al.'s modified GPAKE protocol is still insecure against the same attacks. We then make a suggestion for improvement.
Wen JI Yuta ABE Takeshi IKENAGA Satoshi GOTO
In this paper, we propose a partially-parallel irregular LDPC decoder based on IEEE 802.11n standard targeting high throughput and small area applications. The design is based on a novel sum-delta message passing algorithm characterized as follows: (i) Decoding throughput is greatly improved by utilizing the difference value between the updated and the original value to remove redundant computations. (ii) Registers and memory are optimized to store only the frequently used messages to decrease the hardware cost. (iii) Techniques such as binary sorting, parallel column operation, high performance pipelining are used to further speed up the message passing procedure. The synthesis result in TSMC 0.18 CMOS technology demonstrates that for (648,324) irregular LDPC code, our decoder achieves 7.5X improvement in throughput, which reaches 402 Mbps at the frequency of 200 MHz, with 11% area reduction. The synthesis result also demonstrates the competitiveness to the fully-parallel regular LDPC decoders in terms of the tradeoff between throughput, area and power.
Hiromitsu UCHIDA Naofumi YONEDA Yoshihiko KONISHI
A new elliptic-function bandpass filter (BPF) is proposed, which utilizes an inter-digital coupled line (IDCPL) as a left-handed transmission line. The IDCPL is employed in order to realize a negative coupling between non-adjacent resonators in a wideband BPF. As the authors' knowledge, the left-handed operations of the IDCPL has rarely utilized before, although the IDCPL itself has been widely used in many microwave circuits without being paid attention to the left-handed operations. Measured characteristics of two BPFs are presented in this paper, one is targeted for 3-4 GHz WiMAX systems, and the other is for 3-5 GHz ultra wideband communication systems (UWB).
Yi WAN Takuya ASAKA Tatsuro TAKAHASHI
In P2P content distribution systems, there are many cases in which the content can be classified into hierarchically organized categories. In this paper, we propose a hybrid overlay network design suitable for such content called Pastry/NSHCC (Pastry for Non-Strictly Hierarchically Categorized Content). The semantic information of classification hierarchies of the content can be utilized regardless of whether they are in a strict tree structure or not. By doing so, the search scope can be restrained to any granularity, and the number of query messages also decreases while maintaining keyword searching availability. Through simulation, we showed that the proposed method provides better performance and lower overhead than unstructured overlays exploiting the same semantic information.
Tadashi KAWAI Yasuaki NAKASHIMA Yoshihiro KOKUBO Isao OHTA
This paper describes a novel Wilkinson power divider operating at two arbitrary different frequencies. The proposed divider consists of two-section transmission lines and a series RLC circuit connected between two output ports. The circuit parameters for a dual-band operation are derived by the even/odd mode analysis. Equal power split, complete matching, and good isolation between two output ports are numerically demonstrated. Dual-band and broadband Wilkinson power dividers can be successfully designed. Finally, verification of this design method is also shown by electromagnetic simulations and experiments.
Chun-Ping CHEN Zhewang MA Tetsuo ANADA
To realize the compact ultra-wideband (UWB) bandpass filters, a novel filter prototype with two short-circuited stubs loaded at both sides of a stepped-impedance resonator (SIR) via the parallel coupled lines is proposed based on a distributed filter synthesis theory. The equivalent circuit of this filter is established, while the corresponding 7-pole Chebyshev-type transfer function is derived for filter synthesis. Then, a distributed-circuit-based technique was presented to synthesize the elements' values of this filter. As an example, a FCC UWB filter with the fractional bandwidth (FWB) @ -10 dB up to 110% was designed using the proposed prototype and then re-modeled by commercial microwave circuit simulator to verify the correctness and accuracy of the synthesis theory. Furthermore, in terms of EM simulator, the filter was further-optimized and experimentally-realized by using microstrip line. Good agreements between the measurement results and theoretical ones validate the effectiveness of our technique. In addition, compared with the conventional SIR-type UWB filter without short-circuited stubs, the new one significantly improves the selectivity and out-of-band characteristics (especially in lower one -45 dB@1-2 GHz) to satisfy the FCC's spectrum mask. The designed filter also exhibits very compact size, quite low insertion loss, steep skirts, flat group delay and the easily-fabricatable structure (the coupling gap dimension in this filter is 0.15 mm) as well. Moreover, it should be noted that, in terms of the presented design technique, the proposed filter prototype can be also used to easily realize the UWB filters with other FBW even greater than 110%.
SeongHan SHIN Kazukuni KOBARA Hideki IMAI
At Indocrypt 2005, Viet et al.[21], have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for client's password-based authentication and anonymity against a passive server, who does not deviate the protocol. In this paper, we first point out that their threshold construction is completely insecure against off-line dictionary attacks. For the threshold t > 1, we propose a secure threshold anonymous PAKE (for short, TAP) protocol with the number of clients n upper-bounded, such that n 2 -1, where N is a dictionary size of passwords. We rigorously prove that the TAP protocol has semantic security of session keys in the random oracle model by showing the reduction to the computational Diffie-Hellman problem. In addition, the TAP protocol provides unconditional anonymity against a passive server. For the threshold t=1, we propose an efficient anonymous PAKE protocol that significantly improves efficiency in terms of computation costs and communication bandwidth compared to the original (not threshold) anonymous PAKE protocol [21].
Shunsuke KOSHITA Satoru TANAKA Masahide ABE Masayuki KAWAMATA
This paper proposes the Gramian-preserving frequency transformation for linear discrete-time state-space systems. In this frequency transformation, we replace each delay element of a discrete-time system with an allpass system that has a balanced realization. This approach can generate transformed systems that have the same controllability/observability Gramians as those of the original system. From this result, we show that the Gramian-preserving frequency transformation gives us transformed systems with different magnitude characteristics, but with the same structural property with respect to the Gramians as that of the original system. This paper also presents a simple method for realization of the Gramian-preserving frequency transformation. This method makes use of the cascaded normalized lattice structure of allpass systems.
In this paper, a new formulation of equal-length three-section open stubs having two zeros located on the unit circle and one zero at z=-1 (θ=π) in the Z-plane is presented. In particular, new filter configurations consisting of equal-length two-section open stubs, cascade lines, open stubs, and three-section open stubs are employed to emulate the discrete-time filters. To examine the validity of our formulation, we realized two discrete-time Chebyshev type II low-pass filters in the form of microstrip lines. The frequency responses of these two filters are measured to validate this new formulation.
Intark HAN Hong-Shik PARK Man-Soo HAN
A fast class-of-service oriented packet scheduling (FCOPS) has a service fairness problem since a credit pool for a service class is initialized at the beginning of a transmission cycle whose starting moment is fixed at a specific ONU. To remedy the service unfairness of FCOPS, we suggest an enhanced class-of-service oriented packet scheduling (ECOPS) that uses a new initialization cycle whose starting moment is fairly distributed to each ONU. Also, ECOPS generates a colorless grant to utilize the resource wastage, when traffic is light and the total sum of grants of an ONU is less than a minimum size. Using simulation, we validate ECOPS as superior to FCOPS in the mean delay and the service fairness.
The passive and sparse reduced-order modeling of a RLC network is presented, where eigenvalues and eigenvectors of the original network are used, and thus the obtained macromodel is more accurate than that provided by the Krylov subspace methods or TBR procedures for a class of circuits. Furthermore, the proposed method is applied to low pass filtering of a reduced-order model produced by these methods without breaking the passivity condition. Therefore, the proposed eigenspace method is not only a reduced-order macromodeling method, but also is embedded in other methods enhancing their performances.
In this paper we compare various parallel preconditioners such as Point-SSOR (Symmetric Successive OverRelaxation), ILU(0) (Incomplete LU) in the Wavefront ordering, ILU(0) in the Multi-color ordering, Multi-Color Block SOR (Successive OverRelaxation), SPAI (SParse Approximate Inverse) and pARMS (Parallel Algebraic Recursive Multilevel Solver) for solving large sparse linear systems arising from two-dimensional PDE (Partial Differential Equation)s on structured grids. Point-SSOR is well-known, and ILU(0) is one of the most popular preconditioner, but it is inherently serial. ILU(0) in the Wavefront ordering maximizes the parallelism in the natural order, but the lengths of the wavefronts are often nonuniform. ILU(0) in the Multi-color ordering is a simple way of achieving a parallelism of the order N, where N is the order of the matrix, but its convergence rate often deteriorates as compared to that of natural ordering. We have chosen the Multi-Color Block SOR preconditioner combined with direct sparse matrix solver, since for the Laplacian matrix the SOR method is known to have a nondeteriorating rate of convergence when used with the Multi-Color ordering. By using block version we expect to minimize the interprocessor communications. SPAI computes the sparse approximate inverse directly by least squares method. Finally, ARMS is a preconditioner recursively exploiting the concept of independent sets and pARMS is the parallel version of ARMS. Experiments were conducted for the Finite Difference and Finite Element discretizations of five two-dimensional PDEs with large meshsizes up to a million on an IBM p595 machine with distributed memory. Our matrices are real positive, i.e., their real parts of the eigenvalues are positive. We have used GMRES(m) as our outer iterative method, so that the convergence of GMRES(m) for our test matrices are mathematically guaranteed. Interprocessor communications were done using MPI (Message Passing Interface) primitives. The results show that in general ILU(0) in the Multi-Color ordering and ILU(0) in the Wavefront ordering outperform the other methods but for symmetric and nearly symmetric 5-point matrices Multi-Color Block SOR gives the best performance, except for a few cases with a small number of processors.
Bong Kyu KIM Hwan Seok CHUNG Sun Hyok CHANG Sangjo PARK
We propose and demonstrate a scheme enhancing the performance of optical access networks with Manchester coded downstream and re-modulated NRZ coded upstream. It is achieved by threshold level control of a limiting amplifier at a receiver, and the minimum sensitivity of upstream is significantly improved for the re-modulation scheme with 5 Gb/s Manchester coded downstream and 2.488 Gb/s NRZ upstream data rates.
Rawid BANCHUIN Boonruk CHIPIPOP Boonchareon SIRINAOVAKUL
In this research, the practical OTA-based inductors of all structures have been studied and their complete passive equivalent circuit models, where the effects of both parasitic elements and finite opened-loop bandwidth have been taken into account, also contain only the conventional standard linear elements i.e. the ordinary resistor, inductor and capacitor, without any infeasible high order element e.g. super inductor etc., have been proposed. The resulting models have been found to be excellently accurate, excellently straight forward, far superior to the previously proposed ones and completely realizable by the passive elements. Hence, the proposed passive equivalent circuit models have been found to be the convenience and versatile tools for the implementation of any analog and mixed signal processing circuits and systems.