The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PU(3318hit)

601-620hit(3318hit)

  • A New Nonisolated ZVS Bidirectional Converter with Minimum Auxiliary Elements

    Majid DELSHAD  Mahmood VESALI  

     
    PAPER-Electronic Circuits

      Vol:
    E100-C No:3
      Page(s):
    313-320

    In this paper, a non-isolated bidirectional DC-DC converter with zero voltage switching and constant switching frequency is proposed. Unlike the active clamp bidirectional converters, to create soft switching condition in both direction, only one auxiliary switch is used, which reduces conduction losses and the complexity of the circuit. The proposed converter is controlled by pulse width modulation and the switches are gated complementary, thus the implementation of the control circuit is simple. Low switching losses, high efficiency, high power density, are the advantages of this converter. The simulation and experimental results of the converter verify theoretical analysis. Based on an implemented prototype of the proposed converter at 80 watts, the measured efficiency is 96.5%.

  • A Hybrid Push/Pull Streaming Scheme Using Interval Caching in P2P VOD Systems

    Eunsam KIM  Boa KANG  Choonhwa LEE  

     
    LETTER-Information Network

      Pubricized:
    2016/12/06
      Vol:
    E100-D No:3
      Page(s):
    582-586

    This paper presents a hybrid push/pull streaming scheme to take advantage of both the interval caching-based push method and the mesh-based pull method. When a new peer joins, a mesh-based pull method is adopted to avoid the overhead to reorganize the structure only if all of its potential preceding peers are likely to leave before the end of its playback. Otherwise, an interval caching-based push method is adopted so that the better performance of the push method can be maintained until it completes the playback. We demonstrate that our proposed scheme outperforms compared with when either the interval caching-based push method or mesh-based pull method is employed alone.

  • Cache-Aware, In-Place Rotation Method for Texture-Based Volume Rendering

    Yuji MISAKI  Fumihiko INO  Kenichi HAGIHARA  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2016/12/12
      Vol:
    E100-D No:3
      Page(s):
    452-461

    We propose a cache-aware method to accelerate texture-based volume rendering on a graphics processing unit (GPU) that is compatible with the compute unified device architecture. The proposed method extends a previous method such that it can maximize the average rendering performance while rotating the viewing direction around a volume. To realize this, the proposed method performs in-place rotation of volume data, which rearranges the order of voxels to allow consecutive threads (warps) to refer to voxels with the minimum access strides. Experiments indicate that the proposed method replaces the worst texture cache (TC) hit rate of 42% with the best TC hit rate of 93% for a 10243-voxel volume. Thus, the average frame rate increases by a factor of 1.6 in the proposed method compared with that in the previous method. Although the overhead of in-place rotation slightly decreases the frame rate from 2.0 frames per second (fps) to 1.9 fps, this slowdown occurs only with a few viewing directions.

  • Decision Feedback Equalizer with Frequency Domain Bidirectional Noise Prediction for MIMO-SCFDE System

    Zedong XIE  Xihong CHEN  Xiaopeng LIU  Lunsheng XUE  Yu ZHAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/09/12
      Vol:
    E100-B No:3
      Page(s):
    433-439

    The impact of intersymbol interference (ISI) on single carrier frequency domain equalization with multiple input multiple output (MIMO-SCFDE) systems is severe. Most existing channel equalization methods fail to solve it completely. In this paper, given the disadvantages of the error propagation and the gap from matched filter bound (MFB), we creatively introduce a decision feedback equalizer with frequency-domain bidirectional noise prediction (DFE-FDBiNP) to tackle intersymbol interference (ISI) in MIMO-SCFDE systems. The equalizer has two-part equalizer, that is the normal mode and the time-reversal mode decision feedback equalization with noise prediction (DFE-NP). Equal-gain combining is used to realize a greatly simplified and low complexity diversity combining. Analysis and simulation results validate the improved performance of the proposed method in quasi-static frequency-selective fading MIMO channel for a typical urban environment.

  • Power-Rail ESD Clamp Circuit with Parasitic-BJT and Channel Parallel Shunt Paths to Achieve Enhanced Robustness

    Yuan WANG  Guangyi LU  Yize WANG  Xing ZHANG  

     
    BRIEF PAPER-Semiconductor Materials and Devices

      Vol:
    E100-C No:3
      Page(s):
    344-347

    This work reports a novel power-rail electrostatic discharge (ESD) clamp circuit with parasitic bipolar-junction-transistor (BJT) and channel parallel shunt paths. The parallel shunt paths are formed by delivering a tiny ratio of drain voltage to the gate terminal of the clamp device in ESD events. Under such a mechanism, the proposed circuit achieves enhanced robustness over those of both gate-grounded NMOS (ggNMOS) and the referenced gate-coupled NMOS (gcNMOS). Besides, the proposed circuit also achieves improved fast power-up immunity over that of the referenced gcNMOS. All investigated designs are fabricated in a 65-nm CMOS process. Transmission-line-pulsing (TLP) and human-body-model (HBM) test results have both confirmed the performance enhancements of the proposed circuit. Finally, the validity of the achieved performance enhancements on other trigger circuits is essentially revealed in this work.

  • Polynomial Time Inductive Inference of Languages of Ordered Term Tree Patterns with Height-Constrained Variables from Positive Data

    Takayoshi SHOUDAI  Kazuhide AIKOH  Yusuke SUZUKI  Satoshi MATSUMOTO  Tetsuhiro MIYAHARA  Tomoyuki UCHIDA  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E100-A No:3
      Page(s):
    785-802

    An efficient means of learning tree-structural features from tree-structured data would enable us to construct effective mining methods for tree-structured data. Here, a pattern representing rich tree-structural features common to tree-structured data and a polynomial time algorithm for learning important tree patterns are necessary for mining knowledge from tree-structured data. As such a tree pattern, we introduce a term tree pattern t such that any edge label of t belongs to a finite alphabet Λ, any internal vertex of t has ordered children and t has a new kind of structured variable, called a height-constrained variable. A height-constrained variable has a pair of integers (i, j) as constraints, and it can be replaced with a tree whose trunk length is at least i and whose height is at most j. This replacement is called height-constrained replacement. A sequence of consecutive height-constrained variables is called a variable-chain. In this paper, we present polynomial time algorithms for solving the membership problem and the minimal language (MINL) problem for term tree patternshaving no variable-chain. The membership problem for term tree patternsis to decide whether or not a given tree can be obtained from a given term tree pattern by applying height-constrained replacements to all height-constrained variables in the term tree pattern. The MINL problem for term tree patternsis to find a term tree pattern t such that the language generated by t is minimal among languages, generated by term tree patterns, which contain all given tree-structured data. Finally, we show that the class, i.e., the set of all term tree patternshaving no variable-chain, is polynomial time inductively inferable from positive data if |Λ| ≥ 2.

  • Automatically Extracting Parallel Sentences from Wikipedia Using Sequential Matching of Language Resources

    Juryong CHEON  Youngjoong KO  

     
    LETTER-Natural Language Processing

      Pubricized:
    2016/11/11
      Vol:
    E100-D No:2
      Page(s):
    405-408

    In this paper, we propose a method to find similar sentences based on language resources for building a parallel corpus between English and Korean from Wikipedia. We use a Wiki-dictionary consisted of document titles from the Wikipedia and bilingual example sentence pairs from Web dictionary instead of traditional machine readable dictionary. In this way, we perform similarity calculation between sentences using sequential matching of the language resources, and evaluate the extracted parallel sentences. In the experiments, the proposed parallel sentences extraction method finally shows 65.4% of F1-score.

  • An Efficient Soft Shadow Mapping for Area Lights in Various Shapes and Colors

    Youngjae CHUN  Kyoungsu OH  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/11/11
      Vol:
    E100-D No:2
      Page(s):
    396-400

    Shadow is an important effect that makes virtual 3D scenes more realistic. In this paper, we propose a fast and correct soft shadow generation method for area lights of various shapes and colors. To conduct efficient as well as accurate visibility tests, we exploit the complexity of shadow and area light color.

  • Achievable Degrees of Freedom of MIMO Multi-Way Relay Channel with Asymmetric Message Set and Delayed CSIT

    Chiachi HUANG  Yuan OUYANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/09/05
      Vol:
    E100-B No:2
      Page(s):
    364-371

    In this paper, we study the achievable degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) multi-way relay channel with asymmetric message set that models the scenario of the two-way communication between a base station and multiple users through a relay. Under the assumption of delayed channel state information at transmitters (CSIT), we propose an amplify-and-forward relaying scheme based on the scheme proposed by Maddah-Ali and Tse to support signal space alignment, so that the available dimensions of the signal spaces at the relay and the users can be efficiently utilized. The proposed scheme outperforms the traditional one-way scheme from the perspective of DoF, and is useful to relieve the communication bottleneck caused by the asymmetric traffic load inherent in cellular networks.

  • GaN-Based Light-Emitting Diodes with Graphene Buffers for Their Application to Large-Area Flexible Devices Open Access

    Jitsuo OHTA  Jeong Woo SHON  Kohei UENO  Atsushi KOBAYASHI  Hiroshi FUJIOKA  

     
    INVITED PAPER

      Vol:
    E100-C No:2
      Page(s):
    161-165

    Crystalline GaN films can be grown even on amorphous substrates with the use of graphene buffer layers by pulsed sputtering deposition (PSD). The graphene buffer layers allowed us to grow highly c-axis-oriented GaN films at low substrate temperatures. Full-color GaN-based LEDs can be fabricated on the GaN/graphene structures and they are operated successfully. This indicates that the present technique is promising for future large-area light-emitting displays on amorphous substrates.

  • A Study of the Sense of Security Needed for the Input Devices of the Vehicle in the Vicinity of the Time to Collision

    Hiroaki TANAKA  Ayako KOTANI  Katsuyoshi NISHI  Yurie IRIBE  Koji OGURI  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    473-481

    Driving safety related innovations received increasing interest from automotive industry. We performed an experiment to observe what situations are related to the secured feelings drivers feel when they drive, and found out that drivers need to have four to seven seconds to react possible collision when they operate onboard Human Machine Interface (HMI) devices and check display devices. We explored the distance of semantic space to see what factors of HMI interaction lead to the secured feeling in that time period, and extracted 32 types of factors that lead to the secured feelings. Furthermore, in the process of investigating the semantic space distance, the indicators relating to the secured feelings obtained in the prior studies were further determined to be ‘The layout of the operation device is the same as the driver's image' and ‘The driver can use the word he uses every day to give instructions’ in this time period.’, which were more concrete factors of the secured feelings.

  • Personalized Movie Recommendation System Based on Support Vector Machine and Improved Particle Swarm Optimization

    Xibin WANG  Fengji LUO  Chunyan SANG  Jun ZENG  Sachio HIROKAWA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/11/21
      Vol:
    E100-D No:2
      Page(s):
    285-293

    With the rapid development of information and Web technologies, people are facing ‘information overload’ in their daily lives. The personalized recommendation system (PRS) is an effective tool to assist users extract meaningful information from the big data. Collaborative filtering (CF) is one of the most widely used personalized recommendation techniques to recommend the personalized products for users. However, the conventional CF technique has some limitations, such as the low accuracy of of similarity calculation, cold start problem, etc. In this paper, a PRS model based on the Support Vector Machine (SVM) is proposed. The proposed model not only considers the items' content information, but also the users' demographic and behavior information to fully capture the users' interests and preferences. An improved Particle Swarm Optimization (PSO) algorithm is also proposed to improve the performance of the model. The efficiency of the proposed method is verified by multiple benchmark datasets.

  • Geometry Clipmaps Terrain Rendering Using Hardware Tessellation

    Ge SONG  Hongyu YANG  Yulong JI  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/11/09
      Vol:
    E100-D No:2
      Page(s):
    401-404

    Due to heavy rendering load and unstable frame rate when rendering large terrain, this paper proposes a geometry clipmaps based algorithm. Triangle meshes are generated by few tessellation control points in GPU tessellation shader. ‘Cracks’ caused by different resolution between adjacent levels are eliminated by modifying outer tessellation level factor of shared edges between levels. Experimental results show the algorithm is able to improve rendering efficiency and frame rate stability in terrain navigation.

  • A Hardware Efficient Multiple-Stream Pipeline FFT Processor for MIMO-OFDM Systems

    Kai-Feng XIA  Bin WU  Tao XIONG  Tian-Chun YE  Cheng-Ying CHEN  

     
    PAPER-Digital Signal Processing

      Vol:
    E100-A No:2
      Page(s):
    592-601

    In this paper, a hardware efficient design methodology for a configurable-point multiple-stream pipeline FFT processor is presented. We first compared the memory and arithmetic components of different pipeline FFT architectures, and obtained the conclusion that MDF architecture is more hardware efficient than MDC for the overall processor. Then, in order to reduce the computational complexity, a binary-tree representation was adopted to analyze the decomposition algorithm. Consequently, the coefficient multiplications are minimized among all the decomposition probabilities. In addition, an efficient output reorder circuit was designed for the multiple-stream architecture. An 128∼2048 point 4-stream FFT processor in LTE system was designed in SMIC 55nm technology for evaluation. It owns 1.09mm2 core area with 82.6mW power consumption at 122.88MHz clock frequency.

  • Efficient Selection of Users' Pair in Cognitive Radio Network to Maximize Throughput Using Simultaneous Transmit-Sense Approach

    Muhammad Sajjad KHAN  Muhammad USMAN  Vu-Van HIEP  Insoo KOO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/09/01
      Vol:
    E100-B No:2
      Page(s):
    380-389

    Protection of the licensed user (LU) and utilization of the spectrum are the most important goals in cognitive radio networks. To achieve the first goal, a cognitive user (CU) is required to sense for a longer time period, but this adversely affects the second goal, i.e., throughput or utilization of the network, because of the reduced time left for transmission in a time slot. This tradeoff can be controlled by simultaneous sensing and data transmission for the whole frame duration. However, increasing the sensing time to the frame duration consumes more energy. We propose a new frame structure in this paper, in which transmission is done for the whole frame duration whereas sensing is performed only until the required detection probability is satisfied. This means the CU is not required to perform sensing for the whole frame duration, and thus, conserves some energy by sensing for a smaller duration. With the proposed frame structure, throughput of all the CUs is estimated for the frame and, based on the estimated throughput and consumed energy in sensing and transmission, the energy efficient pair of CUs (transmitter and receiver) that maximizes system throughput by consuming less energy, is selected for a time slot. The selected CUs transmits data for the whole time slot, whereas sensing is performed only for certain duration. The performance improvement of the proposed scheme is demonstrated through simulations by comparing it with existing schemes.

  • Computational Model of Card-Based Cryptographic Protocols and Its Applications

    Takaaki MIZUKI  Hiroki SHIZUYA  

     
    INVITED PAPER

      Vol:
    E100-A No:1
      Page(s):
    3-11

    Card-based protocols enable us to easily perform cryptographic tasks such as secure multiparty computation using a deck of physical cards. Since the first card-based protocol appeared in 1989, many protocols have been designed. A protocol is usually described with a series of somewhat intuitive and verbal descriptions, such as “turn over this card,” “shuffle these two cards,” “apply a random cut to these five cards,” and so on. On the other hand, a formal computational model of card-based protocols via abstract machine was constructed in 2014. By virtue of the formalization, card-based protocols can be treated more rigorously; for example, it enables one to discuss the lower bounds on the number of cards required for secure computations. In this paper, an overview of the computational model with its applications to designing protocols and a survey of the recent progress in card-based protocols are presented.

  • Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field

    Yasufumi HASHIMOTO  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    18-25

    One of major ideas to design a multivariate public key cryptosystem (MPKC) is to generate its quadratic forms by a polynomial map over an extension field. In fact, Matsumoto-Imai's scheme (1988), HFE (Patarin, 1996), MFE (Wang et al., 2006) and multi-HFE (Chen et al., 2008) are constructed in this way and Sflash (Akkar et al., 2003), Quartz (Patarin et al., 2001), Gui (Petzoldt et al, 2015) are variants of these schemes. An advantage of such extension field type MPKCs is to reduce the numbers of variables and equations to be solved in the decryption process. In the present paper, we study the security of MPKCs whose quadratic forms are derived from a “quadratic” map over an extension field and propose a new attack on such MPKCs. Our attack recovers partial information of the secret affine maps in polynomial time when the field is of odd characteristic. Once such partial information is recovered, the attacker can find the plain-text for a given cipher-text by solving a system of quadratic equations over the extension field whose numbers of variables and equations are same to those of the system of quadratic equations used in the decryption process.

  • Efficient Balanced Truncation for RC and RLC Networks

    Yuichi TANJI  

     
    PAPER-Circuit Theory

      Vol:
    E100-A No:1
      Page(s):
    266-274

    An efficient balanced truncation for RC and RLC networks is presented in this paper. To accelerate the balanced truncation, sparse structures of original networks are considered. As a result, Lyapunov equations, the solutions of which are necessary for making the transformation matrices, are efficiently solved, and the reduced order models are efficiently obtained. It is proven that reciprocity of original networks is preserved while applying the proposed method. Passivity of the reduced RC networks is also guaranteed. In the illustrative examples, we will show that the proposed method is compatible with PRIMA in efficiency and is more accurate than PRIMA.

  • A Low Computational Complexity Algorithm for Compressive Wideband Spectrum Sensing

    Shiyu REN  Zhimin ZENG  Caili GUO  Xuekang SUN  Kun SU  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:1
      Page(s):
    294-300

    Compressed sensing (CS)-based wideband spectrum sensing approaches have attracted much attention because they release the burden of high signal acquisition costs. However, in CS-based sensing approaches, highly non-linear reconstruction methods are used for spectrum recovery, which require high computational complexity. This letter proposes a two-step compressive wideband sensing algorithm. This algorithm introduces a coarse sensing step to further compress the sub-Nyquist measurements before spectrum recovery in the following compressive fine sensing step, as a result of the significant reduction in computational complexity. Its enabled sufficient condition and computational complexity are analyzed. Even when the sufficient condition is just satisfied, the average reduced ratio of computational complexity can reach 50% compared with directly performing compressive sensing with the excellent algorithm that is used in our fine sensing step.

  • Analysis of Pulse Reflection Responses from Periodic Perfect Conductor in Two Dispersion Media

    Ryosuke OZAKI  Tsuneki YAMASAKI  

     
    BRIEF PAPER

      Vol:
    E100-C No:1
      Page(s):
    80-83

    In this paper, a periodic perfect conductor is used to investigate the solution for the metallic scatterer problem in soil. We analyzed the pulse reflection responses from the periodic perfect conductor in two dispersion media by varying the parameters for the permittivity properties of the complex dielectric constants, and also investigated the influence of both the dielectric and conductor using a combination of the fast inversion Laplace transform (FILT) method and the point matching method (PMM). In addition, we verified the accuracy of the present method with exact solutions for the transient scattering problem for a perfect conductor plate in the dispersion media.

601-620hit(3318hit)