The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PAS(566hit)

21-40hit(566hit)

  • A Multi-Layer SIW Resonator Loaded with Asymmetric E-Shaped Slot-Lines for a Miniaturized Tri-Band BPF with Low Radiation Loss

    Weiyu ZHOU  Satoshi ONO  Koji WADA  

     
    PAPER-Microwaves, Millimeter-Waves

      Pubricized:
    2021/12/27
      Vol:
    E105-C No:7
      Page(s):
    349-357

    This paper proposes a novel multi-layer substrate integrated waveguide (SIW) resonator loaded with asymmetric E-shaped slot-lines and shows a tri-band band-pass filter (BPF) using the proposed structure. In the previous literature, various SIW resonators have been proposed to simultaneously solve the problems of large area and high insertion loss. Although these SIWs have a lower insertion loss than planar-type resonators using a printed circuit board, the size of these structures tends to be larger. A multi-layer SIW resonator loaded with asymmetric E-shaped slot-lines can solve the above problems and realize a tri-band BPF without increasing the size to realize further miniaturization. The theoretical design method and the structural design are shown. Moreover, the configured structure is fabricated and measured for showing the validity of the design method in this paper.

  • Efficient Multi-Scale Feature Fusion for Image Manipulation Detection

    Yuxue ZHANG  Guorui FENG  

     
    LETTER-Information Network

      Pubricized:
    2022/02/03
      Vol:
    E105-D No:5
      Page(s):
    1107-1111

    Convolutional Neural Network (CNN) has made extraordinary progress in image classification tasks. However, it is less effective to use CNN directly to detect image manipulation. To address this problem, we propose an image filtering layer and a multi-scale feature fusion module which can guide the model more accurately and effectively to perform image manipulation detection. Through a series of experiments, it is shown that our model achieves improvements on image manipulation detection compared with the previous researches.

  • Neuron-Network-Based Mixture Probability Model for Passenger Walking Time Distribution Estimation

    Hao FANG  Chi-Hua CHEN  Dewang CHEN  Feng-Jang HWANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/01/28
      Vol:
    E105-D No:5
      Page(s):
    1112-1115

    Aiming for accurate data-driven predictions for the passenger walking time, this study proposes a novel neuron-network-based mixture probability (NNBMP) model with repetition learning (RL) to estimate the probability density distribution of passenger walking time (PWT) in the metro station. Our conducted experiments for Fuzhou metro stations demonstrate that the proposed NNBMP-RL model achieved the mean absolute error, mean square error, and mean absolute percentage error of 0.0078, 1.33 × 10-4, and 19.41%, respectively, and it outperformed all the seven compared models. The developed NNBMP model fitting accurately the PWT distribution in the metro station is readily applicable to the microscopic analyses of passenger flow.

  • Design of Continuous Class-B/J Power Amplifier Based on Mirrored Lowpass Filter Matching Structure

    Guohua LIU  Huabang ZHONG  Cantianci GUO  Zhiqun CHENG  

     
    BRIEF PAPER-Electronic Circuits

      Pubricized:
    2021/10/21
      Vol:
    E105-C No:4
      Page(s):
    172-175

    This paper proposes a methodology for designing broadband class B/J power amplifier based on a mirrored lowpass filter matching structure. According to this filter theory, the impedance of this design method is mainly related to the cutoff frequency. Series inductors and shunt capacitors filter out high frequencies. The change of input impedance with frequency is small in the passband. Which can suppress higher harmonics and expand bandwidth. In order to confirm the validity of the design method, a broadband high-efficiency power amplifier in the 1.3 - 3.9GHz band is designed and fabricated. Measurement results show that the output power is greater than 40.5dBm, drain efficiency is 61.2% - 70.8% and the gain is greater than 10dB.

  • On the Convergence of Convolutional Approximate Message-Passing for Gaussian Signaling Open Access

    Keigo TAKEUCHI  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2021/08/11
      Vol:
    E105-A No:2
      Page(s):
    100-108

    Convolutional approximate message-passing (CAMP) is an efficient algorithm to solve linear inverse problems. CAMP aims to realize advantages of both approximate message-passing (AMP) and orthogonal/vector AMP. CAMP uses the same low-complexity matched-filter as AMP. To realize the asymptotic Gaussianity of estimation errors for all right-orthogonally invariant matrices, as guaranteed in orthogonal/vector AMP, the Onsager correction in AMP is replaced with a convolution of all preceding messages. CAMP was proved to be asymptotically Bayes-optimal if a state-evolution (SE) recursion converges to a fixed-point (FP) and if the FP is unique. However, no proofs for the convergence were provided. This paper presents a theoretical analysis for the convergence of the SE recursion. Gaussian signaling is assumed to linearize the SE recursion. A condition for the convergence is derived via a necessary and sufficient condition for which the linearized SE recursion has a unique stationary solution. The SE recursion is numerically verified to converge toward the Bayes-optimal solution if and only if the condition is satisfied. CAMP is compared to conjugate gradient (CG) for Gaussian signaling in terms of the convergence properties. CAMP is inferior to CG for matrices with a large condition number while they are comparable to each other for a small condition number. These results imply that CAMP has room for improvement in terms of the convergence properties.

  • Leakage-Resilient and Proactive Authenticated Key Exchange (LRP-AKE), Reconsidered

    SeongHan SHIN  

     
    PAPER

      Pubricized:
    2021/08/05
      Vol:
    E104-D No:11
      Page(s):
    1880-1893

    In [31], Shin et al. proposed a Leakage-Resilient and Proactive Authenticated Key Exchange (LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. In this paper, we discuss a problem in the security proof of the LRP-AKE protocol, and then propose a modified LRP-AKE protocol that has a simple and effective measure to the problem. Also, we formally prove its AKE security and mutual authentication for the entire modified LRP-AKE protocol. In addition, we describe several extensions of the (modified) LRP-AKE protocol including 1) synchronization issue between the client and server's stored secrets; 2) randomized ID for the provision of client's privacy; and 3) a solution to preventing server compromise-impersonation attacks. Finally, we evaluate the performance overhead of the LRP-AKE protocol and show its test vectors. From the performance evaluation, we can confirm that the LRP-AKE protocol has almost the same efficiency as the (plain) Diffie-Hellman protocol that does not provide authentication at all.

  • S-to-X Band 360-Degree RF Phase Detector IC Consisting of Symmetrical Mixers and Tunable Low-Pass Filters

    Akihito HIRAI  Kazutomi MORI  Masaomi TSURU  Mitsuhiro SHIMOZAWA  

     
    PAPER

      Pubricized:
    2021/05/13
      Vol:
    E104-C No:10
      Page(s):
    559-567

    This paper demonstrates that a 360° radio-frequency phase detector consisting of a combination of symmetrical mixers and 45° phase shifters with tunable devices can achieve a low phase-detection error over a wide frequency range. It is shown that the phase detection error does not depend on the voltage gain of the 45° phase shifter. This allows the usage of tunable devices as 45° phase shifters for a wide frequency range with low phase-detection errors. The fabricated phase detector having tunable low-pass filters as the tunable device demonstrates phase detection errors lower than 2.0° rms in the frequency range from 3.0 GHz to 10.5 GHz.

  • Realization of Rectangular Frequency Characteristics by the Effects of a Low-Noise Amplifier and Flat Passband Bandpass Filter

    Tomohiro TSUKUSHI  Satoshi ONO  Koji WADA  

     
    PAPER

      Pubricized:
    2021/04/09
      Vol:
    E104-C No:10
      Page(s):
    568-575

    Realizing frequency rectangular characteristics using a planar circuit made of a normal conductor material such as a printed circuit board (PCB) is difficult. The reason is that the corners of the frequency response are rounded by the effect of the low unloaded quality factors of the resonators. Rectangular frequency characteristics are generally realized by a low-noise amplifier (LNA) with flat gain characteristics and a high-order bandpass filter (BPF) with resonators having high unloaded quality factors. Here, we use an LNA and a fourth-order flat passband BPF made of a PCB to realize the desired characteristics. We first calculate the signal and noise powers to confirm any effects from insertion loss caused by the BPF. Next, we explain the design and fabrication of an LNA, since no proper LNAs have been developed for this research. Finally, the rectangular frequency characteristics are shown by a circuit combining the fabricated LNA and the fabricated flat passband BPF. We show that rectangular frequency characteristics can be realized using a flat passband BPF technique.

  • Non-Invasive Monitoring of Respiratory Rate and Respiratory Status during Sleep Using a Passive Radio-Frequency Identification System

    Kagome NAYA  Toshiaki MIYAZAKI  Peng LI  

     
    PAPER-Biological Engineering

      Pubricized:
    2021/02/22
      Vol:
    E104-D No:5
      Page(s):
    762-771

    In recent years, checking sleep quality has become essential from a healthcare perspective. In this paper, we propose a respiratory rate (RR) monitoring system that can be used in the bedroom without wearing any sensor devices directly. To develop the system, passive radio-frequency identification (RFID) tags are introduced and attached to a blanket, instead of attaching them to the human body. The received signal strength indicator (RSSI) and phase values of the passive RFID tags are continuously obtained using an RFID reader through antennas located at the bedside. The RSSI and phase values change depending on the respiration of the person wearing the blanket. Thus, we can estimate the RR using these values. After providing an overview of the proposed system, the RR estimation flow is explained in detail. The processing flow includes noise elimination and irregular breathing period estimation methods. The evaluation demonstrates that the proposed system can estimate the RR and respiratory status without considering the user's body posture, body type, gender, or change in the RR.

  • Deep Network for Parametric Bilinear Generalized Approximate Message Passing and Its Application in Compressive Sensing under Matrix Uncertainty

    Jingjing SI  Wenwen SUN  Chuang LI  Yinbo CHENG  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2020/09/29
      Vol:
    E104-A No:4
      Page(s):
    751-756

    Deep learning is playing an increasingly important role in signal processing field due to its excellent performance on many inference problems. Parametric bilinear generalized approximate message passing (P-BiG-AMP) is a new approximate message passing based approach to a general class of structure-matrix bilinear estimation problems. In this letter, we propose a novel feed-forward neural network architecture to realize P-BiG-AMP methodology with deep learning for the inference problem of compressive sensing under matrix uncertainty. Linear transforms utilized in the recovery process and parameters involved in the input and output channels of measurement are jointly learned from training data. Simulation results show that the trained P-BiG-AMP network can achieve higher reconstruction performance than the P-BiG-AMP algorithm with parameters tuned via the expectation-maximization method.

  • Programmable Hardware Accelerator for Finite-State-Machine Processing in Flexible Access Network Systems

    Saki HATTA  Nobuyuki TANAKA  Hiroyuki UZAWA  Koyo NITTA  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2020/09/09
      Vol:
    E104-B No:3
      Page(s):
    277-285

    The application of network function virtualization (NFV) and software-defined networking (SDN) to passive optical networks (PONs) is attracting attention for the deployment of cost-effective access network systems. This paper presents a novel architecture of a programmable finite state machine (P-FSM) as a hardware accelerator for protocol processing in an optical line terminal (OLT). The P-FSM is programmable hardware that manages various types of FSMs to enhance flexibility in OLTs and achieve wired-rate performance with a negligible increase in total chip area. The P-FSM is implemented using three key technologies: a specific architecture for state management of communications protocols to minimize the logic area, a memory distributed implementation to minimize the program memory, and a new branch operation to minimize the memory area and reduce processing time. Evaluation results show that the P-FSM can handle 10G-EPON/NG-PON2 communications protocols in the same architecture while achieving wired-rate performance. The increase in the total designed area is only 1.5% to 4.9% depending on the number of protocols supported compared to the area of a conventional communications SoC without flexibility. We also clarify that our architecture has the scalability needed to modify the number of FSMs and the maximum number of ONU connections according to the system scale.

  • Expectation Propagation Decoding for Sparse Superposition Codes Open Access

    Hiroki MAYUMI  Keigo TAKEUCHI  

     
    LETTER-Coding Theory

      Pubricized:
    2020/07/06
      Vol:
    E103-A No:12
      Page(s):
    1666-1669

    Expectation propagation (EP) decoding is proposed for sparse superposition coding in orthogonal frequency division multiplexing (OFDM) systems. When a randomized discrete Fourier transform (DFT) dictionary matrix is used, the EP decoding has the same complexity as approximate message-passing (AMP) decoding, which is a low-complexity and powerful decoding algorithm for the additive white Gaussian noise (AWGN) channel. Numerical simulations show that the EP decoding achieves comparable performance to AMP decoding for the AWGN channel. For OFDM systems, on the other hand, the EP decoding is much superior to the AMP decoding while the AMP decoding has an error-floor in high signal-to-noise ratio regime.

  • Pilot Decontamination in Massive MIMO Uplink via Approximate Message-Passing

    Takumi FUJITSUKA  Keigo TAKEUCHI  

     
    PAPER-Communication Theory

      Pubricized:
    2020/07/01
      Vol:
    E103-A No:12
      Page(s):
    1356-1366

    Pilot contamination is addressed in massive multiple-input multiple-output (MIMO) uplink. The main ideas of pilot decontamination are twofold: One is to design transmission timing of pilot sequences such that the pilot transmission periods in different cells do not fully overlap with each other, as considered in previous works. The other is joint channel and data estimation via approximate message-passing (AMP) for bilinear inference. The convergence property of conventional AMP is bad in bilinear inference problems, so that adaptive damping was required to help conventional AMP converge. The main contribution of this paper is a modification of the update rules in conventional AMP to improve the convergence property of AMP. Numerical simulations show that the proposed AMP outperforms conventional AMP in terms of estimation performance when adaptive damping is not used. Furthermore, it achieves better performance than state-of-the-art methods based on subspace estimation when the power difference between cells is small.

  • Design for Long-Reach Coexisting PON Considering Subscriber Distribution with Wavelength Selective Asymmetrical Splitters

    Kazutaka HARA  Atsuko KAWAKITA  Yasutaka KIMURA  Yasuhiro SUZUKI  Satoshi IKEDA  Kohji TSUJI  

     
    PAPER

      Pubricized:
    2020/06/08
      Vol:
    E103-B No:11
      Page(s):
    1249-1256

    A long-reach coexisting PON system (1G/10G-EPON, video, and TWDM-PON) that uses the Wavelength Selective-Asymmetrical optical SPlitter (WS-ASP) without any active devices like optical amplifiers is proposed. The proposal can take into account the subscriber distribution in an access network and provide specific services in specific areas by varying the splitting ratios and the branch structure in the optical splitter. Simulations confirm the key features of WS-ASP, its novel process for deriving the splitting-ratios and greater transmission distance than possible with symmetrical splitters. Experiments on a prototype system demonstrate how wavelengths can be assigned to specific areas and optical link budget enhancement. For 1G-EPON systems, the prototype system with splitting-ratio of 60% attains the optical link budget enhancement of 4.2dB compared with conventional symmetrical optical splitters. The same prototype offers the optical link budget enhancement of 4.0dB at the bit rate of 10G-EPON systems. The values measured in the experiment agree well with the simulation results with respect to the transmission distance.

  • High-Speed-Operation of All-Silicon Lumped-Electrode Modulator Integrated with Passive Equalizer Open Access

    Yohei SOBU  Shinsuke TANAKA  Yu TANAKA  

     
    INVITED PAPER

      Pubricized:
    2020/05/15
      Vol:
    E103-C No:11
      Page(s):
    619-626

    Silicon photonics technology is a promising candidate for small form factor transceivers that can be used in data-center applications. This technology has a small footprint, a low fabrication cost, and good temperature immunity. However, its main challenge is due to the high baud rate operation for optical modulators with a low power consumption. This paper investigates an all-Silicon Mach-Zehnder modulator based on the lumped-electrode optical phase shifters. These phase shifters are driven by a complementary metal oxide semiconductor (CMOS) inverter driver to achieve a low power optical transmitter. This architecture improves the power efficiency because an electrical digital-to-analog converter (DAC) and a linear driver are not required. In addition, the current only flows at the time of data transition. For this purpose, we use a PIN-diode phase shifter. These phase shifters have a large capacitance so the driving voltage can be reduced while maintaining an optical phase shift. On the other hand, this study integrates a passive resistance-capacitance (RC) equalizer with a PIN-phase shifter to expand the electro-optic (EO) bandwidth of a modulator. Therefore, the modulation efficiency and the EO bandwidth can be optimized by designing the capacitor of the RC equalizer. This paper reviews the recent progress for the high-speed operation of an all-Si PIN-RC modulator. This study introduces a metal-insulator-metal (MIM) structure for a capacitor with a passive RC equalizer to obtain a wider EO bandwidth. As a result, this investigation achieves an EO bandwidth of 35.7-37 GHz and a 70 Gbaud NRZ operation is confirmed.

  • Reach Extension of 10G-EPON Upstream Transmission Using Distributed Raman Amplification and SOA

    Ryo IGARASHI  Masamichi FUJIWARA  Takuya KANAI  Hiro SUZUKI  Jun-ichi KANI  Jun TERADA  

     
    PAPER

      Pubricized:
    2020/06/08
      Vol:
    E103-B No:11
      Page(s):
    1257-1264

    Effective user accommodation will be more and more important in passive optical networks (PONs) in the next decade since the number of subscribers has been leveling off as well and it is becoming more difficult for network operators to keep sufficient numbers of maintenance workers. Drastically reducing the number of small-scale communication buildings while keeping the number of accommodated users is one of the most attractive solutions to meet this situation. To achieve this, we propose two types of long-reach repeater-free upstream transmission configurations for PON systems; (i) one utilizes a semiconductor optical amplifier (SOA) as a pre-amplifier and (ii) the other utilizes distributed Raman amplification (DRA) in addition to the SOA. Our simulations assuming 10G-EPON specifications and transmission experiments on a 10G-EPON prototype confirm that configuration (i) can add a 17km trunk fiber to a normal PON system with 10km access reach and 1 : 64 split (total 27km reach), while configuration (ii) can further expand the trunk fiber distance to 37km (total 47km reach). Network operators can select these configurations depending on their service areas.

  • Password-Based Authenticated Key Exchange without Centralized Trusted Setup

    Kazuki YONEYAMA  

     
    PAPER-cryptography

      Vol:
    E103-A No:10
      Page(s):
    1142-1156

    Almost all existing password-based authenticated key exchange (PAKE) schemes achieve concurrent security in the standard model by relying on the common reference string (CRS) model. A drawback of the CRS model is to require a centralized trusted authority in the setup phase; thus, passwords of parties may be revealed if the authority ill-uses trapdoor information of the CRS. There are a few secure PAKE schemes in the plain model, but, these are not achievable in a constant round (i.e., containing a linear number of rounds). In this paper, we discuss how to relax the setup assumption for (constant round) PAKE schemes. We focus on the multi-string (MS) model that allows a number of authorities (including malicious one) to provide some reference strings independently. The MS model is a more relaxed setup assumption than the CRS model because we do not trust any single authority (i.e., just assuming that a majority of authorities honestly generate their reference strings). Though the MS model is slightly restrictive than the plain model, it is very reasonable assumption because it is very easy to implement. We construct a (concurrently secure) three-move PAKE scheme in the MS model (justly without random oracles) based on the Groce-Katz PAKE scheme. The main ingredient of our scheme is the multi-string simulation-extractable non-interactive zero-knowledge proof that provides both the simulation-extractability and the extraction zero-knowledge property even if minority authorities are malicious. This work can be seen as a milestone toward constant round PAKE schemes in the plain model.

  • Using the Rotation Matrix to Eliminate the Unitary Ambiguity in the Blind Estimation of Short-Code DSSS Signal Pseudo-Code

    Kejun LI  Yong GAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/03
      Vol:
    E103-B No:9
      Page(s):
    979-988

    For the blind estimation of short-code direct sequence spread spectrum (DSSS) signal pseudo-noise (PN) sequences, the eigenvalue decomposition (EVD) algorithm, the singular value decomposition (SVD) algorithm and the double-periodic projection approximation subspace tracking with deflation (DPASTd) algorithm are often used to estimate the PN sequence. However, when the asynchronous time delay is unknown, the largest eigenvalue and the second largest eigenvalue may be very close, resulting in the estimated largest eigenvector being any non-zero linear combination of the really required largest eigenvector and the really required second largest eigenvector. In other words, the estimated largest eigenvector exhibits unitary ambiguity. This degrades the performance of any algorithm estimating the PN sequence from the estimated largest eigenvector. To tackle this problem, this paper proposes a spreading sequence blind estimation algorithm based on the rotation matrix. First of all, the received signal is divided into two-information-period-length temporal vectors overlapped by one-information-period. The SVD or DPASTd algorithm can then be applied to obtain the largest eigenvector and the second largest eigenvector. The matrix composed of the largest eigenvector and the second largest eigenvector can be rotated by the rotation matrix to eliminate any unitary ambiguity. In this way, the best estimation of the PN sequence can be obtained. Simulation results show that the proposed algorithm not only solves the problem of estimating the PN sequence when the largest eigenvalue and the second largest eigenvalue are close, but also performs well at low signal-to-noise ratio (SNR) values.

  • A Series of PIN/Password Input Methods Resilient to Shoulder Hacking Based on Cognitive Difficulty of Tracing Multiple Key Movements

    Kokoro KOBAYASHI  Tsuyoshi OGUNI  Masaki NAKAGAWA  

     
    PAPER-Computer System

      Pubricized:
    2020/04/06
      Vol:
    E103-D No:7
      Page(s):
    1623-1632

    This paper presents a series of secure PIN/password input methods resilient to shoulder hacking. When a person inputs a PIN or password to a smartphone, tablet, banking terminal, etc., there is a risk of shoulder hacking of the PIN or the password being stolen. To decrease the risk, we propose a method that erases key-top labels, moves them smoothly and simultaneously, and lets the user touch the target key after they stopped. The user only needs to trace a single key, but peepers have to trace the movements of all the keys at the same time. We extend the method by assigning different colors, shapes, and/or sizes to keys for enhancing distinguishability, which allows all the keys to be moved instantaneously after key-top labels are erased and the user to touch the target key. We also introduce a “move backward/forward” function that allows the user to play back the movements. This series of methods does not have the highest security, but it is easy to use and does not require any changes to the server side. Results of a performance evaluation demonstrate that this method has high resistance to shoulder hacking while providing satisfactory usability without large input errors.

  • Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?

    Keika MORI  Takuya WATANABE  Yunao ZHOU  Ayako AKIYAMA HASEGAWA  Mitsuaki AKIYAMA  Tatsuya MORI  

     
    PAPER-Network and System Security

      Pubricized:
    2020/04/10
      Vol:
    E103-D No:7
      Page(s):
    1541-1555

    This work aims to determine the propensity of password creation through the lens of language spheres. To this end, we consider four different countries, each with a different culture/language: China/Chinese, United Kingdom (UK) and India/English, and Japan/Japanese. We first employ a user study to verify whether language and culture are reflected in password creation. We found that users in India, Japan, and the UK prefer to create their passwords from base words, and the kinds of words they are incorporated into passwords vary between countries. We then test whether the findings obtained through the user study are reflected in a corpus of leaked passwords. We found that users in China and Japan prefer dates, while users in India, Japan, and the UK prefer names. We also found that cultural words (e.g., “sakura” in Japan and “football” in the UK) are frequently used to create passwords. Finally, we demonstrate that the knowledge on the linguistic background of targeted users can be exploited to increase the speed of the password guessing process.

21-40hit(566hit)