The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Q(6809hit)

2121-2140hit(6809hit)

  • Temperature-Independent Hole Mobility in Field-Effect Transistors Based on Liquid-Crystalline Semiconductors Open Access

    Masahiro FUNAHASHI  Fapei ZHANG  Nobuyuki TAMAOKI  

     
    INVITED PAPER

      Vol:
    E94-C No:11
      Page(s):
    1720-1726

    Thin-film transistors based on Liquid-crystalline phenylterthiophenes, 3-TTPPh-5 and 3-TTPPhF4-6 are fabricated with a spin-coating method. The devices exhibit p-type operation with the mobility on the order of 10-2 cm2V-1s-1. The field-effect mobilities of the transistors using 3-TTPPh-5 and 3-TTPPhF4-6 are almost independent of the temperature above room temperature. In particular, the temperature range in which the mobility is constant is between 230 and 350 K for 3-TTPPh-5.

  • Rethinking Business Model in Cloud Computing: Concept and Example

    Ping DU  Akihiro NAKAO  

     
    PAPER

      Vol:
    E94-D No:11
      Page(s):
    2119-2128

    In cloud computing, a cloud user pays proportionally to the amount of the consumed resources (bandwidth, memory, and CPU cycles etc.). We posit that such a cloud computing system is vulnerable to DDoS (Distributed Denial-of-Service) attacks against quota. Attackers can force a cloud user to pay more and more money by exhausting its quota without crippling its execution system or congesting links. In this paper, we address this issue and claim that cloud should enable users to pay only for their admitted traffic. We design and prototype such a charging model in a CoreLab testbed infrastructure and show an example application.

  • 2-Adic Complexity of Self-Shrinking Sequence

    Huijuan WANG  Qiaoyan WEN  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:11
      Page(s):
    2462-2465

    This paper studies the 2-adic complexity of the self-shrinking sequence under the relationship between 2-adic integers and binary sequences. Based on the linear complexity and the number of the sequences which have the same connection integer, we conclude that the 2-adic complexity of the self-shrinking sequence constructed by a binary m-sequence of order n has a lower bound 2n-2-1. Furthermore, it is shown that its 2-adic complexity has a bigger lower bound under some circumstances.

  • Optical Wireless N-CSK with Modified Pseudo Orthogonal M-Sequence Sets

    Yusuke KOZAWA  Hiromasa HABUCHI  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E94-A No:11
      Page(s):
    2188-2193

    In this paper, N-CSK (N parallel Codes Shift Keying) using modified pseudo orthogonal M-sequence sets (MPOMSs) to realize the parallel combinatory spread spectrum (PC/SS) communication system for the optical communications is proposed. Moreover, the upper bound of data transmission rate and the bit error rate (BER) performance of this N-CSK system using the chip-level detection are evaluated through theoretical analysis by taking into account the scintillation, background-noise, avalanche photo-diode (APD) noise, thermal noise, and signal dependence noise. It is shown that the upper bound of data transmission rate of the proposed system is better than those of OOK/CDM and SIK/CDM. Moreover, the upper bound of data transmission rate of the proposed system can achieve about 1.5 [bit/chip] when the code length of MPOMS is 64 [chip].

  • A Simple Model for Nonsaturated Opportunistic Spectrum Access Networks

    Yutae LEE  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:11
      Page(s):
    3125-3127

    We propose a simple approximate model for unslotted opportunistic spectrum access networks under nonsaturation conditions. The main simplification we introduce is that all secondary users, except a tagged one, in nonsaturated setting can be approximated by saturated ones with a scaled version of backoff interval. We analyze the approximate model and verify the model using simulations.

  • A Ternary Zero-Correlation Zone Sequence Set Having Wide Inter-Subset Zero-Correlation Zone

    Takafumi HAYASHI  Takao MAEDA  Shinya MATSUFUJI  Satoshi OKAWA  

     
    LETTER-Sequence

      Vol:
    E94-A No:11
      Page(s):
    2230-2235

    The present paper introduces a novel construction of ternary sequences having a zero-correlation zone. The cross-correlation function and the side-lobe of the auto-correlation function of the proposed sequence set is zero for the phase shifts within the zero-correlation zone. The proposed sequence set consists of more than one subset having the same member size. The correlation function of the sequences of a pair of different subsets, referred to as the inter-subset correlation function, has a wider zero-correlation zone than that of the correlation function of sequences of the same subset (intra-subset correlation function). The wide inter-subset zero-correlation enables performance improvement during application of the proposed sequence set. The proposed sequence set has a zero-correlation zone for periodic, aperiodic, and odd correlation functions.

  • Parameterization of Perfect Arrays of Real Numbers

    Takao MAEDA  Takafumi HAYASHI  

     
    PAPER-Digital Signal Processing

      Vol:
    E94-A No:11
      Page(s):
    2178-2187

    A perfect array is an array for which the autocorrelation function is impulsive. A parameterization of perfect arrays of real numbers is presented. Perfect arrays are represented by trigonometric functions. Three formulae are obtained according to the parities of the size of the array. Examples corresponding to each formula are shown. In the case of 66 arrays, the existence of a set of perfect arrays having integer components is shown.

  • A 4 Gb/s Adaptive FFE/DFE Receiver with a Data-Dependent Jitter Measurement

    Tae-Ho KIM  Yong-Hwan MOON  Jin-Ku KANG  

     
    PAPER-Electronic Circuits

      Vol:
    E94-C No:11
      Page(s):
    1779-1786

    This paper presents an adaptive FFE/DFE receiver with an algorithm that measures the data-dependent jitter. The proposed adaptive algorithm determines the compensation level by measuring the input data-dependent jitter. The adaptive algorithm is combined with a clock and data recovery phase detector. The receiver is fabricated in with 0.13 µm CMOS technology, and the compensation range of equalization is up to 26 dB at 2 GHz. The test chip is verified for a 40 inch FR4 trace and a 53 cm flexible printed circuit channel. The receiver occupies an area of 440 µm 520 µm and has a power dissipation of 49 mW (excluding the I/O buffers) from a 1.2 V supply.

  • Analysis of m:n Lockings from Pulse-Coupled Asynchronous Sequential Logic Spiking Neurons

    Hirofumi IJICHI  Hiroyuki TORIKAI  

     
    PAPER-Nonlinear Problems

      Vol:
    E94-A No:11
      Page(s):
    2384-2393

    An asynchronous sequential logic spiking neuron is an artificial neuron model that can exhibit various bifurcations and nonlinear responses to stimulation inputs. In this paper, a pulse-coupled system of the asynchronous sequential logic spiking neurons is presented. Numerical simulations show that the coupled system can exhibit various lockings and related nonlinear responses. Then, theoretical sufficient parameter conditions for existence of typical lockings are provided. Usefulness of the parameter conditions is validated by comparing with the numerical simulation results as well as field programmable gate array experiment results.

  • Analysis on the Sequential Behavior of Malware Attacks

    Nur Rohman ROSYID  Masayuki OHRUI  Hiroaki KIKUCHI  Pitikhate SOORAKSA  Masato TERADA  

     
    PAPER

      Vol:
    E94-D No:11
      Page(s):
    2139-2149

    Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the bots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.

  • On the Autocorrelation and Linear Complexity of Some 2p Periodic Quaternary Cyclotomic Sequences over F4

    Pinhui KE  Zheng YANG  Jie ZHANG  

     
    LETTER-Information Theory

      Vol:
    E94-A No:11
      Page(s):
    2472-2477

    We determine the autocorrelations of the quaternary sequence over F4 and its modified version introduced by Du et al. [X.N. Du et al., Linear complexity of quaternary sequences generated using generalized cyclotomic classes modulo 2p, IEICE Trans. Fundamentals, vol.E94-A, no.5, pp.1214–1217, 2011]. Furthermore, we reveal a drawback in the paper aforementioned and remark that the proof in the paper by Kim et al. can be simplified.

  • 16-QAM Sequences with Zero Correlation Zone from the Known Binary ZCZ Sequences and Gray Mapping

    Fanxin ZENG  Xiaoping ZENG  Zhenyu ZHANG  Guixin XUAN  

     
    LETTER-Information Theory

      Vol:
    E94-A No:11
      Page(s):
    2466-2471

    The approximately synchronized code-division multiple-access (CDMA) communication system, using the QAM sequences with zero correlation zone (ZCZ) as its spreading sequences, not only can remove the multiple access interference (MAI) and multi-path interference (MPI) synchronously, but also has a higher transmission data rate than the one using traditional ZCZ sequences with the same sequence length. Based on Gray mapping and the known binary ZCZ sequences, in this letter, six families of 16-QAM sequences with ZCZ are presented. When the binary ZCZ sequences employed by this letter arrive at the theoretical bound on the binary ZCZ sequences, and their family size is a multiple of 4 or 2, two of the resultant six 16-QAM sequence sets satisfy the bound referred to above as well.

  • Frequency Characteristics of Polymer Field-Effect Transistors with Self-Aligned Electrodes Investigated by Impedance Spectroscopy Open Access

    Hideyuki HATTA  Takashi NAGASE  Takashi KOBAYASHI  Mitsuru WATANABE  Kimihiro MATSUKAWA  Shuichi MURAKAMI  Hiroyoshi NAITO  

     
    INVITED PAPER

      Vol:
    E94-C No:11
      Page(s):
    1727-1732

    Solution-based organic field-effect transistors (OFETs) with low parasitic capacitance have been fabricated using a self-aligned method. The self-aligned processes using a cross-linking polymer gate insulator allow fabricating electrically stable polymer OFETs with small overlap area between the source-drain electrodes and the gate electrode, whose frequency characteristics have been investigated by impedance spectroscopy (IS). The IS of polymer OFETs with self-aligned electrodes reveals frequency-dependent channel formation process and the frequency response in FET structure.

  • A Semidefinite Relaxation Approach to Spreading Sequence Estimation for DS-SS Signals

    Hua Guo ZHANG  Qing MOU  Hong Shu LIAO  Ping WEI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:11
      Page(s):
    3163-3167

    In non-cooperative scenarios, the estimation of direct sequence spread spectrum (DS-SS) signals has to be done in a blind manner. In this letter, we consider the spreading sequence estimation problem for DS-SS signals. First, the maximum likelihood estimate (MLE) of spreading sequence is derived, then a semidefinite relaxation (SDR) approach is proposed to cope with the exponential complexity of performing MLE. Simulation results demonstrate that the proposed approach provides significant performance improvements compared to existing methods, especially in the case of low numbers of data samples and low signal-to-noise ratio (SNR) situations.

  • Data Transmission Using Original Coils in Resonant Wireless Power Transmission

    Takashi MARUYAMA  Tatsuya SHIMIZU  Mamoru AKIMOTO  Kazuki MARUTA  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:11
      Page(s):
    3172-3174

    We propose a data transmission method for resonant wireless power transmission systems. In order to transmit data, we use the coils originally designed for power transmission, no additional antennas are required. We focus on uplink data transmission and adopt the load modulation technique. This configuration yields mid-range data transmission without transmitting power. In addition, the proposal enables simultaneous power feeding and uplink data transmission. We make a prototype demonstrating resonant wireless power transmission and measure its S-parameter under some load conditions. The results confirm the potential of load modulation in supporting uplink data transmission. Additionally, the results are elucidated by analyzing an equivalent circuit. Measured S-parameter and equivalent circuit response are found to be similar.

  • A User Scheduling with Minimum-Rate Requirement for Maximum Sum-Rate in MIMO-BC

    Seungkyu CHOI  Chungyong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:11
      Page(s):
    3179-3182

    This letter considers a sum-rate maximization problem with user scheduling wherein each user has a minimum-rate requirement in multiple-input-multiple-output broadcast channel. The multiuser strategy used in the user scheduling is a joint transceiver scheme with block diagonal geometric mean decomposition. Since optimum solution to the user scheduling problem generally requires exhaustive search, we propose a suboptimum user scheduling algorithm with each user's minimum-rate requirement as the main constraint. In order to satisfy maximum sum-rate and minimum-rate constraints simultaneously, we additionally consider power allocation for scheduled users. Simulation results show that the proposed user scheduling algorithm, together with the user power allocation, achieves sum-rate close to the exhaustive search, while also guarantees minimum-rate requirement of each user.

  • Assessment of Building Damage in 2008 Wenchuan Earthquake from Multi-Temporal SAR Images Using Getis Statistic

    Haipeng WANG  Tianlin WANG  Feng XU  Kazuo OUCHI  

     
    LETTER

      Vol:
    E94-B No:11
      Page(s):
    2983-2986

    In this paper, the Getis statistic is applied to ALOS- PALSAR (Advanced Land Ovserving Satellite-Phased Array L-band Synthetic Aperture Radar) images for assessing the building damage caused by the Wenchuan earthquake in 2008. As a proposed image analysis, a simulated building image using mapping and projection algorithm is first presented for analysis of the Getis statistic. The results show the high accuracy of the assessment of the proposed approach. The Getis statistic is then applied to two ALOS-PALSAR images acquired before and after the Wenchuan earthquake to assess the level of building damage. Results of the Getis statistic show that the damage level is approximately 81%.

  • Signal Activity Detection of Offset-QPSK in Colored Gaussian Noise

    Sayed Jalal ZAHABI  Mohammadali KHOSRAVIFARD  Ali A. TADAION  T. Aaron GULLIVER  

     
    LETTER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2226-2229

    This letter considers the problem of detecting an offset quadrature phase shift keying (O-QPSK) modulated signal in colored Gaussian noise. The generalized likelihood ratio test (GLRT) is employed for detection. By deriving the GLRT, it is shown that the assumption of colored Gaussian noise results in a more complicated problem than with the white noise assumption that was previously examined in the literature. An efficient solution for the detection maximization problem is proposed, based on which the GLRT is implemented. Performance results are presented to illustrate the detector performance.

  • Impulsive Noise Suppression for ISDB-T Receivers Based on Adaptive Window Function

    Ziji MA  Minoru OKADA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2237-2245

    Impulsive noise interference is a significant problem for the Integrated Services Digital Broadcasting for Terrestrial (ISDB-T) receivers due to its effect on the orthogonal frequency division multiplexing (OFDM) signal. In this paper, an adaptive scheme to suppress the effect of impulsive noise is proposed. The impact of impulsive noise can be detected by using the guard band in the frequency domain; furthermore the position information of the impulsive noise, including burst duration, instantaneous power and arrived time, can be estimated as well. Then a time-domain window function with adaptive parameters, which are decided in terms of the estimated information of the impulsive noise and the carrier-to-noise ratio (CNR), is employed to suppress the impulsive interference. Simulation results confirm the validity of the proposed scheme, which improved the bit error rate (BER) performance for the ISDB-T receivers in both AWGN channel and Rayleigh fading channel.

  • Packet Scheduling and Traffic Differentiation in Femtocell Environment

    Volkan SEVINDIK  Oguz BAYAT  

     
    PAPER-Network

      Vol:
    E94-B No:11
      Page(s):
    3018-3025

    This paper proposes new scheduling algorithms for best effort (BE) traffic classification in business femtocell networks. The purpose of traffic classification is to provide differentiated services to BE users depending on their traffic classes, and the concept of traffic classification is called Inter User Best Effort (IUBE) in CDMA2000 1x Evolution Data Optimized (EVDO) standard. Traffic differentiation is achieved by introducing Grade of Service (GoS) as a quality of service (QoS) parameter into the scheduler's decision metric (DM). New scheduling algorithms are called QoS Round Robin (QoS-RR), QoS Proportionally Fair (QoS-PF), QoS maximum data rate control (DRC) (QoS-maxDRC), QoS average DRC (QoS-aveDRC), QoS exponent DRC (QoS-expDRC), QoS maxDRC-PF (QoS-maxDRC-PF). Two different femtocell throughput experiments are performed using real femtocell devices in order to collect real DRC values. The first experiment examines 4, 8, 12 and 16 IUBE users, while second experiment examines 4 IUBE + 2 Voice over IP (VoIP), 8 IUBE + 2 VoIP, 12 IUBE + 2 VoIP, 16 IUBE + 2 (VoIP) users. Average sector throughput, IUBE traffic differentiation, VoIP delay bound error values are investigated to compare the performance of the proposed scheduling algorithms. In conclusion, QoS-maxDRC-PF scheduler is proposed for business femtocell environment.

2121-2140hit(6809hit)