The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] POS(1110hit)

521-540hit(1110hit)

  • Demultiplexing Property Owing to a Composite Right/Left-Handed Transmission Line with Leaky Wave Radiation toward Functional Wireless Interconnects

    Sadaharu ITO  Michihiko SUHARA  

     
    PAPER-Analog/RF Devices

      Vol:
    E93-C No:5
      Page(s):
    619-624

    A composite right/left-handed (CRLH) transmission line with demultiplexing property is proposed towards short-range functional wireless interconnects. The CRLH line is designed by analyzing dispersion relation of the microstrip line having a split-ring and a double-stub structure to realize frequency selective properties for leaky wave radiation. A prototype device is fabricated and estimated to study feasibility of the demultiplexing operation around ten GHz.

  • Uniform Superposition for Wireless Multimedia Multicast with No Channel Side Information

    Wonjong NOH  

     
    LETTER-Broadcast Systems

      Vol:
    E93-B No:5
      Page(s):
    1342-1345

    In this paper, we study multi-layer transmission for wireless multimedia multicast in a cell. Under the assumptions that the users in a cell are uniformly well distributed and that the BS has no channel side information, we find the optimal number of transmission layers and power allocation. This result can be used in highly dynamic dense networks and jamming networks where channel side information at the transmitter is somewhat useless.

  • A Novel Turbo Coded Modulation Scheme for Deep Space Optical Communications

    Sangmok OH  Inho HWANG  Adrish BANERJEE  Jeong Woo LEE  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E93-B No:5
      Page(s):
    1260-1263

    A novel turbo coded modulation scheme, called the turbo-APPM, for deep space optical communications is proposed. The proposed turbo-APPM is a serial concatenation of turbo codes, an accumulator and a pulse position modulation (PPM), where turbo codes act as an outer code while the accumulator and the PPM act together as an inner code. The generator polynomial and the puncturing rule for generating turbo codes are chosen to lower the bit error rate. At the receiver, the joint iterative decoding is performed between the inner decoder and the outer turbo decoder. In the outer decoder, local iterative decoding for turbo codes is conducted. Simulation results are presented showing that the proposed turbo-APPM outperforms all previously proposed schemes such as LDPC-APPM, RS-PPM and SCPPM reported in the literature.

  • Online HOG Method in Pedestrian Tracking

    Chang LIU  Guijin WANG  Fan JIANG  Xinggang LIN  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E93-D No:5
      Page(s):
    1321-1324

    Object detection and tracking is one of the most important research topics in pattern recognition and the basis of many computer vision systems. Many accomplishments in this field have been achieved recently. Some specific objects, such as human face and vehicles, can already be detected in various applications. However, tracking objects with large variances in color, texture and local shape (such as pedestrians) is still a challenging topic in this field. To solve this problem, a pedestrian tracking scheme is proposed in this paper, including online training for pedestrian-detector. Simulation and analysis of the results shows that, the proposal method could deal with illumination change, pose change and occlusion problem and any combination thereof.

  • AdaFF: Adaptive Failure-Handling Framework for Composite Web Services

    Yuna KIM  Wan Yeon LEE  Kyong Hoon KIM  Jong KIM  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E93-D No:4
      Page(s):
    834-842

    In this paper, we propose a novel Web service composition framework which dynamically accommodates various failure recovery requirements. In the proposed framework called Adaptive Failure-handling Framework (AdaFF), failure-handling submodules are prepared during the design of a composite service, and some of them are systematically selected and automatically combined with the composite Web service at service instantiation in accordance with the requirement of individual users. In contrast, existing frameworks cannot adapt the failure-handling behaviors to user's requirements. AdaFF rapidly delivers a composite service supporting the requirement-matched failure handling without manual development, and contributes to a flexible composite Web service design in that service architects never care about failure handling or variable requirements of users. For proof of concept, we implement a prototype system of the AdaFF, which automatically generates a composite service instance with Web Services Business Process Execution Language (WS-BPEL) according to the users' requirement specified in XML format and executes the generated instance on the ActiveBPEL engine.

  • Design and Implementation of 10-Gb/s Optical Receiver Analog Front-End in 0.13-µm CMOS Technology

    Won-Seok OH  Kang-Yeob PARK  Kyu-Ho PARK  Chang-Joon KIM  Jong-Kook MOON  

     
    PAPER-Optoelectronics

      Vol:
    E93-C No:3
      Page(s):
    393-398

    In this paper, a 10-Gb/s CMOS optical receiver analog front-end is designed and implemented in 0.13-µm CMOS technology. An optical receiver analog front-end includes a pre-amplifier and a post amplifier. To ensure 10-Gb/s operation, the effect of inherent photodiode parasitic capacitance should be suppressed. Thus, an advanced common-gate stage is exploited as the input stage of pre amplifier. To enhance the bandwidth without a passive inductor, a new post amplifier with active feedback and negative capacitance compensation techniques is proposed. A prototype chip has 98-dBΩ of trans-impedance gain (ZT), corresponding 40-dB input dynamic range (5-µA to 500-µA) and minimum allowable input current (5-µA). Also, the receiver achieves the bandwidth of 7.5-GHz for 0.25-pF photodiode parasitic capacitance, and the measured optical sensitivity equals -18-dBm for 10-12 bit error rate (BER).

  • A Weighted Combining Wireless Location Algorithm for Mobile-WiMAX Femto-Cell Environments

    Sanhae KIM  Myungsik YOO  Yoan SHIN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:3
      Page(s):
    749-752

    The conventional TDoA (Time Difference of Arrival)-based and RSS (Received Signal Strength)-based location schemes create large positioning errors because of the various wireless channel effects such as path loss, shadowing, and NLoS (Non-Line-of-Sight) components of the multipath channels. In this paper, we propose an improved wireless location scheme which performs a weighted combination of the TDoA and RSS location schemes to improve a detection probability in the mobile-WiMAX femto-cell environments.

  • An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment

    Zhuo MA  Jianfeng MA  SangJae MOON  Xinghua LI  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    430-437

    Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.

  • General Impossible Differential Attack on 7-Round AES

    Meiling ZHANG  Weiguo ZHANG  Jingmei LIU  Xinmei WANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:1
      Page(s):
    327-330

    Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α,β). And a trade-off relation between the number of plaintexts and times of encryptions in the process of the attack is derived, which makes only some values of (α,β) allowed in the attack for different key length.

  • Topology Design and Performance Evaluation of Wireless Sensor Network Based on MIMO Channel Capacity

    Ky LENG  Kei SAKAGUCHI  Kiyomichi ARAKI  

     
    PAPER-Network

      Vol:
    E93-B No:1
      Page(s):
    22-28

    The Wireless Sensor Network (WSN) uses autonomous sensor nodes to monitor a field. These sensor nodes sometimes act as relay nodes for each other. In this paper, the performance of the WSN using fixed relay nodes and Multiple-Input Multiple-Output (MIMO) technology necessary for future wireless communication is evaluated in terms of the channel capacity of the MIMO system and the number of sensor nodes served by the system. Accordingly, we propose an optimum topology for the WSN backbone named Connected Relay Node Double Cover (CRNDC), which can recover from a single fault, the algorithms (exhaustive search and other two approximation methods) to find the optimum distance to place the relay nodes from sink node, and the height of the sink and relay nodes to be placed by using the pathloss model. The performances of different MIMO-WSN configurations over conventional WSN are evaluated, and the direct relationship between relay position and minimum required channel capacity are discovered.

  • The Vector Decomposition Problem

    Maki YOSHIDA  Shigeo MITSUNARI  Toru FUJIWARA  

     
    PAPER-Mathematics

      Vol:
    E93-A No:1
      Page(s):
    188-193

    This paper introduces a new computational problem on a two-dimensional vector space, called the vector decomposition problem (VDP), which is mainly defined for designing cryptosystems using pairings on elliptic curves. We first show a relation between the VDP and the computational Diffie-Hellman problem (CDH). Specifically, we present a sufficient condition for the VDP on a two-dimensional vector space to be at least as hard as the CDH on a one-dimensional subspace. We also present a sufficient condition for the VDP with a fixed basis to have a trapdoor. We then give an example of vector spaces which satisfy both sufficient conditions and on which the CDH is assumed to be hard in previous work. In this sense, the intractability of the VDP is a reasonable assumption as that of the CDH.

  • Concurrent Algorithm and Hardware Implementation for Low-Latency Turbo Decoder Using a Single MAP Decoder

    Ya-Cheng LU  Erl-Huei LU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E93-B No:1
      Page(s):
    1-8

    In order to reduce the iterative decoding delay of convolutional turbo codes, this paper presents a concurrent decoding algorithm for the hardware implementation of turbo convolutional decoders. Different than a general turbo code, the hardware turbo decoder based on the proposed algorithm can update the priori information of message for each component code in a bit-by-bit manner as soon as it is generated by the other component code. The two component codes in a turbo code can thus be decoded concurrently, by using a single MAP decoder, subsequently reducing the decoding latency by approximately half while maintaining the bit error rate performance and a comparable hardware complexity, as a general turbo decoder.

  • A Novel Composite Right/Left-Handed Rectangular Waveguide with Tilted Corrugations and Its Application to Millimeter-Wave Frequency-Scanning Antenna

    Toru IWASAKI  Hirokazu KAMODA  Takao KUKI  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:12
      Page(s):
    3843-3849

    A novel structure for a composite right/left-handed (CRLH) corrugated waveguide in the millimeter-wave band is proposed. The CRLH waveguide is composed of a rectangular waveguide with tilted corrugations on its bottom broad wall. By operating above and below the cutoff frequency of the dominant mode of the rectangular waveguide, the CRLH waveguide provides, respectively, an inherent series inductance and shunt capacitance, and an inherent shunt inductance. Moreover, the tilted corrugations provide a series inductance and a series capacitance, which can support CRLH propagation. A frequency-scanning antenna using this CRLH waveguide is also studied numerically and experimentally. The results demonstrate that the antenna can provide backward-to-forward beam scanning, including the broadside direction. A scanning angle from -9.9 to +2.2 is achieved within a 1.8-GHz frequency range in the 60-GHz band.

  • Synthesis of Single- and Double-Wall Carbon Nanotubes by Gas Flow-Modified Catalyst-Supported Chemical Vapor Deposition

    Naoki KISHI  Toshiki SUGAI  Hisanori SHINOHARA  

     
    BRIEF PAPER-Nanomaterials and Nanostructures

      Vol:
    E92-C No:12
      Page(s):
    1483-1486

    The synthesis of single- and double-wall carbon nanotubes by gas flow-modified, catalyst-supported chemical vapor deposition (CCVD) is reported. We have investigated the gas flow condition dependence on the synthesis of carbon nanotubes (CNTs) by placing blocks in the CCVD reactor. Carbon nanotubes having large diameters are preferentially grown under turbulent flow conditions. This indicates that the diameter distribution of CNTs can be controlled by modification of the gas flow condition in the CCVD.

  • Joint Chinese Word Segmentation and POS Tagging Using an Error-Driven Word-Character Hybrid Model

    Canasai KRUENGKRAI  Kiyotaka UCHIMOTO  Jun'ichi KAZAMA  Yiou WANG  Kentaro TORISAWA  Hitoshi ISAHARA  

     
    PAPER-Morphological/Syntactic Analysis

      Vol:
    E92-D No:12
      Page(s):
    2298-2305

    In this paper, we present a discriminative word-character hybrid model for joint Chinese word segmentation and POS tagging. Our word-character hybrid model offers high performance since it can handle both known and unknown words. We describe our strategies that yield good balance for learning the characteristics of known and unknown words and propose an error-driven policy that delivers such balance by acquiring examples of unknown words from particular errors in a training corpus. We describe an efficient framework for training our model based on the Margin Infused Relaxed Algorithm (MIRA), evaluate our approach on the Penn Chinese Treebank, and show that it achieves superior performance compared to the state-of-the-art approaches reported in the literature.

  • Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties

    Taek-Young YOUN  Young-Ho PARK  Jongin LIM  

     
    LETTER-Application Information Security

      Vol:
    E92-D No:12
      Page(s):
    2520-2523

    Trapdoor commitment schemes are widely used for adding valuable properties to ordinary signatures or enhancing the security of weakly secure signatures. In this letter, we propose a trapdoor commitment scheme based on RSA function, and prove its security under the hardness of the integer factoring. Our scheme is very efficient in computing a commitment. Especially, it requires only three multiplications for evaluating a commitment when e=3 is used as a public exponent of RSA function. Moreover, our scheme has two useful properties, key exposure freeness and strong trapdoor opening, which are useful for designing secure chameleon signature schemes and converting a weakly secure signature to a strongly secure signature, respectively.

  • A 3-D Packaging Technology with Highly-Parallel Memory/Logic Interconnect

    Yoichiro KURITA  Koji SOEJIMA  Katsumi KIKUCHI  Masatake TAKAHASHI  Masamoto TAGO  Masahiro KOIKE  Koujirou SHIBUYA  Shintaro YAMAMICHI  Masaya KAWANO  

     
    PAPER-Electronic Components

      Vol:
    E92-C No:12
      Page(s):
    1512-1522

    A three-dimensional semiconductor package structure with inter-chip connections was developed for broadband data transfer and low latency electrical communication between a high-capacity memory and a logic device interconnected by a feedthrough interposer (FTI) featuring a 10 µm scale fine-wiring pattern and ultra-fine-pitch through vias. This technology features co-existence of the wide-band memory accessibility of a system-on-chip (SoC) and the capability of memory capacity increasing of a system-in-package (SiP) that is made possible by the individual fabrication of memory and logic on independent chips. This technology can improve performance due to memory band widening and a reduction in the power consumed in inter-chip communications. This paper describes the concept, structure, process, and experimental results of prototypes of this package, called SMAFTI (SMAart chip connection with FeedThrough Interposer). This paper also reports the results of the fundamental reliability test of this novel inter-chip connection structure and board-level interconnectivity tests.

  • OTHR Impulsive Interference Suppression in Strong Clutter Background

    Tao LIU  Yu GONG  Yaohuan GONG  

     
    PAPER-Digital Signal Processing

      Vol:
    E92-A No:11
      Page(s):
    2866-2873

    External interferences can severely degrade the performance of an Over-the-horizon radar (OTHR), so suppression of external interferences in strong clutter environment is the prerequisite for the target detection. The traditional suppression solutions usually began with clutter suppression in either time or frequency domain, followed by the interference detection and suppression. Based on this traditional solution, this paper proposes a method characterized by joint clutter suppression and interference detection: by analyzing eigenvalues in a short-time moving window centered at different time position, clutter is suppressed by discarding the maximum three eigenvalues at every time position and meanwhile detection is achieved by analyzing the remained eigenvalues at different position. Then, restoration is achieved by forward-backward linear prediction using interference-free data surrounding the interference position. In the numeric computation, the eigenvalue decomposition (EVD) is replaced by singular values decomposition (SVD) based on the equivalence of these two processing. Data processing and experimental results show its efficiency of noise floor falling down about 10-20 dB.

  • Shift-Invariant Sparse Image Representations Using Tree-Structured Dictionaries

    Makoto NAKASHIZUKA  Hidenari NISHIURA  Youji IIGUNI  

     
    PAPER-Image Processing

      Vol:
    E92-A No:11
      Page(s):
    2809-2818

    In this study, we introduce shift-invariant sparse image representations using tree-structured dictionaries. Sparse coding is a generative signal model that approximates signals by the linear combinations of atoms in a dictionary. Since a sparsity penalty is introduced during signal approximation and dictionary learning, the dictionary represents the primal structures of the signals. Under the shift-invariance constraint, the dictionary comprises translated structuring elements (SEs). The computational cost and number of atoms in the dictionary increase along with the increasing number of SEs. In this paper, we propose an algorithm for shift-invariant sparse image representation, in which SEs are learnt with a tree-structured approach. By using a tree-structured dictionary, we can reduce the computational cost of the image decomposition to the logarithmic order of the number of SEs. We also present the results of our experiments on the SE learning and the use of our algorithm in image recovery applications.

  • Development of an Interference Canceller in Satellite Communications Using a Multi-Level Modulation with Superposed Transmission

    Shoko KURODA  Sho TANAKA  Shigeo NAOI  Yozo TAKEDA  Ryusuke MIYAMOTO  Takao HARA  Minoru OKADA  

     
    PAPER

      Vol:
    E92-B No:11
      Page(s):
    3354-3364

    This paper proposes an architecture of an interference canceller for satellite communications with super-posed transmission, which is applicable not only to QPSK but also to 16QAM transmission to get higher satellite capacity. We implement it as an FPGA-based prototype and verify its performance. We propose here to use a new method to measure the satellite round-trip delay using an extended matched filter (EMF), which can work in low C/N conditions such as 0 dB and under. Given this performance, our canceller can work in a network in which forward and reverse links have the same power level. The results of the laboratory tests for QPSK show that interference can be suppressed by about 30 dB and that the BER degradation due to the canceller was small enough for operation.

521-540hit(1110hit)