The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Q(6809hit)

1281-1300hit(6809hit)

  • TherWare: Thermal-Aware Placement and Routing Framework for 3D FPGAs with Location-Based Heat Balance

    Ya-Shih HUANG  Han-Yuan CHANG  Juinn-Dar HUANG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E98-A No:8
      Page(s):
    1796-1805

    The emerging three-dimensional (3D) technology is considered as a promising solution for achieving better performance and easier heterogeneous integration. However, the thermal issue becomes exacerbated primarily due to larger power density and longer heat dissipation paths. The thermal issue would also be critical once FPGAs step into the 3D arena. In this article, we first construct a fine-grained thermal resistive model for 3D FPGAs. We show that merely reducing the total power consumption and/or minimizing the power density in vertical direction is not enough for a thermal-aware 3D FPGA backend (placement and routing) flow. Then, we propose our thermal-aware backend flow named TherWare considering location-based heat balance. In the placement stage, TherWare not only considers power distribution of logic tiles in both lateral and vertical directions but also minimizes the interconnect power. In the routing stage, TherWare concentrates on overall power minimization and evenness of power distribution at the same time. Experimental results show that TherWare can significantly reduce the maximum temperature, the maximum temperature gradient, and the temperature deviation only at the cost of a minor increase in delay and runtime as compared with present arts.

  • Inter-Cell Interference Coordination Method Based on Coordinated Inter-Cell Interference Power Control in Uplink

    Kenichi HIGUCHI  Yoshiko SAITO  Seigo NAKAO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E98-B No:7
      Page(s):
    1357-1362

    We propose an inter-cell interference coordination (ICIC) method that employs inter-cell coordinated transmission power control (TPC) based on inter-cell interference power in addition to conventional received signal power-based TPC in the cellular uplink. We assume orthogonal multiple-access as is used in 3GPP LTE. In the proposed method, an ICIC effect similar to that for conventional fractional frequency reuse (FFR) is obtained. This is achieved by coordinating the allowable inter-cell interference power level at the appropriate frequency blocks within the system bandwidth among neighboring cells in a semi-static manner. Different from conventional FFR, since all users within a cell can access all the frequency blocks, the reduction in multiuser diversity gain is abated. Computer simulation results show that the proposed method enhances both the cell-edge and average user throughput simultaneously compared to conventional universal frequency reuse (UFR) and FFR.

  • Method of Spread Spectrum Watermarking Using Quantization Index Modulation for Cropped Images

    Takahiro YAMAMOTO  Masaki KAWAMURA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2015/04/16
      Vol:
    E98-D No:7
      Page(s):
    1306-1315

    We propose a method of spread spectrum digital watermarking with quantization index modulation (QIM) and evaluate the method on the basis of IHC evaluation criteria. The spread spectrum technique can make watermarks robust by using spread codes. Since watermarks can have redundancy, messages can be decoded from a degraded stego-image. Under IHC evaluation criteria, it is necessary to decode the messages without the original image. To do so, we propose a method in which watermarks are generated by using the spread spectrum technique and are embedded by QIM. QIM is an embedding method that can decode without an original image. The IHC evaluation criteria include JPEG compression and cropping as attacks. JPEG compression is lossy compression. Therefore, errors occur in watermarks. Since watermarks in stego-images are out of synchronization due to cropping, the position of embedded watermarks may be unclear. Detecting this position is needed while decoding. Therefore, both error correction and synchronization are required for digital watermarking methods. As countermeasures against cropping, the original image is divided into segments to embed watermarks. Moreover, each segment is divided into 8×8 pixel blocks. A watermark is embedded into a DCT coefficient in a block by QIM. To synchronize in decoding, the proposed method uses the correlation between watermarks and spread codes. After synchronization, watermarks are extracted by QIM, and then, messages are estimated from the watermarks. The proposed method was evaluated on the basis of the IHC evaluation criteria. The PSNR had to be higher than 30 dB. Ten 1920×1080 rectangular regions were cropped from each stego-image, and 200-bit messages were decoded from these regions. Their BERs were calculated to assess the tolerance. As a result, the BERs were less than 1.0%, and the average PSNR was 46.70 dB. Therefore, our method achieved a high image quality when using the IHC evaluation criteria. In addition, the proposed method was also evaluated by using StirMark 4.0. As a result, we found that our method has robustness for not only JPEG compression and cropping but also additional noise and Gaussian filtering. Moreover, the method has an advantage in that detection time is small since the synchronization is processed in 8×8 pixel blocks.

  • Linear Complexity over Fq of Generalized Cyclotomic Quaternary Sequences with Period 2p

    Minglong QI  Shengwu XIONG  Jingling YUAN  Wenbi RAO  Luo ZHONG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:7
      Page(s):
    1569-1575

    Let r be an odd prime, such that r≥5 and r≠p, m be the order of r modulo p. Then, there exists a 2pth root of unity in the extension field Frm. Let G(x) be the generating polynomial of the considered quaternary sequences over Fq[x] with q=rm. By explicitly computing the number of zeros of the generating polynomial G(x) over Frm, we can determine the degree of the minimal polynomial, of the quaternary sequences which in turn represents the linear complexity. In this paper, we show that the minimal value of the linear complexity is equal to $ rac{1}{2}(3p-1) $ which is more than p, the half of the period 2p. According to Berlekamp-Massey algorithm, these sequences viewed as enough good for the use in cryptography.

  • Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function

    Nam-Su JHO  Ku-Young CHANG  Do-Won HONG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:7
      Page(s):
    1276-1283

    Order-Preserving Encryption (OPE) is an encryption system that preserves the numerical (or alphabetical) order of plaintexts. Since many operations of communications and databases are based on order relations of data (plaintexts), OPE is regarded as a core technique for various applications. However, the intrinsic property of OPE makes constructing an efficient and secure OPE system hard to achieve. In particular, OPE can guarantee only limited security compared to general encryption systems. Only a few results on OPE systems were presented, and no theoretical research based on provable security has been presented until recently. Lately, some approaches have been suggested. However, every known result is unsatisfactory for formalizing the provable security of OPE systems. In this paper, we propose a new OPE system that employs only a simple pseudorandom number function, and therefore has an advantage for practical usage.

  • Objective No-Reference Video Quality Assessment Method Based on Spatio-Temporal Pixel Analysis

    Wyllian B. da SILVA  Keiko V. O. FONSECA  Alexandre de A. P. POHL  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2015/04/03
      Vol:
    E98-D No:7
      Page(s):
    1325-1332

    Digital video signals are subject to several distortions due to compression processes, transmission over noisy channels or video processing. Therefore, the video quality evaluation has become a necessity for broadcasters and content providers interested in offering a high video quality to the customers. Thus, an objective no-reference video quality assessment metric is proposed based on the sigmoid model using spatial-temporal features weighted by parameters obtained through the solution of a nonlinear least squares problem using the Levenberg-Marquardt algorithm. Experimental results show that when it is applied to MPEG-2 streams our method presents better linearity than full-reference metrics, and its performance is close to that achieved with full-reference metrics for H.264 streams.

  • Design and Fabrication of Three-Bit Reconfigurable Bandpass Filter Using Branch-Line Type Variable Resonator

    Ryosuke KOBAYASHI  Takumi KATO  Kazuhiro AZUMA  Yasushi YAMAO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E98-C No:7
      Page(s):
    636-643

    Current mobile communication terminals are equipped with multiple RF circuits that cover all frequency bands assigned for the communication. In order to make efficient use of frequency spectrum and to reduce circuits in a terminal, a low-loss reconfigurable RF filter is necessary to flexibly change RF frequencies. In this paper, a new reconfigurable bandpass filter (BPF) having eight-frequency (three-bit) selection capability is proposed. It employs branch-line switched type variable resonators that provide low insertion loss. One of the design issues is how to control pass bandwidths among selectable frequencies. In order to analyze the bandwidth variation of the reconfigurable BPF, we calculate the changes of external Q and coupling coefficients. It is shown that the inductive coupling design can achieve less variation of bandwidth for the reconfigurable BPF, compared with commonly used capacitive coupling design. A prototype BPF on a printed circuit board with high dielectric constant substrate has been fabricated and evaluated in 2 GHz bands. It presents performance very close to the design results with respect to insertion loss, center frequency and passband bandwidth. Low insertion loss of less than 1 dB is achieved among the eight frequencies.

  • Hybrid Quaternionic Hopfield Neural Network

    Masaki KOBAYASHI  

     
    PAPER-Nonlinear Problems

      Vol:
    E98-A No:7
      Page(s):
    1512-1518

    In recent years, applications of complex-valued neural networks have become wide spread. Quaternions are an extension of complex numbers, and neural networks with quaternions have been proposed. Because quaternion algebra is non-commutative algebra, we can consider two orders of multiplication to calculate weighted input. However, both orders provide almost the same performance. We propose hybrid quaternionic Hopfield neural networks, which have both orders of multiplication. Using computer simulations, we show that these networks outperformed conventional quaternionic Hopfield neural networks in noise tolerance. We discuss why hybrid quaternionic Hopfield neural networks improve noise tolerance from the standpoint of rotational invariance.

  • Address Order Violation Detection with Parallel Counting Bloom Filters

    Naruki KURATA  Ryota SHIOYA  Masahiro GOSHIMA  Shuichi SAKAI  

     
    PAPER

      Vol:
    E98-C No:7
      Page(s):
    580-593

    To eliminate CAMs from the load/store queues, several techniques to detect memory access order violation with hash filters composed of RAMs have been proposed. This paper proposes a technique with parallel counting Bloom filters (PCBF). A Bloom filter has extremely low false positive rates owing to multiple hash functions. Although some existing researches claim the use of Bloom filters, none of them make mention to multiple hash functions. This paper also addresses the problem relevant to the variety of access sizes of load/store instructions. The evaluation results show that our technique, with only 2720-bit Bloom filters, achieves a relative IPC of 99.0% while the area and power consumption are greatly reduced to 14.3% and 22.0% compared to a conventional model with CAMs. The filter is much smaller than usual branch predictors.

  • Investigation of Electromagnetic Noise Coupling in a Board with a Digital-RF Mixed IC by Measurement and Analysis

    Kenta TSUKAMOTO  Mizuki IWANAMI  Eiji HANKUI  

     
    PAPER

      Vol:
    E98-B No:7
      Page(s):
    1182-1187

    In this paper the amplitude probability distribution (APD) measurement method is applied to evaluate noise coupling to an antenna on an evaluation board that uses mixed RF and digital signals of an IC. We analytically investigate noise coupling path to the antenna where the correlation coefficient matches the APD curve of the evaluation board. Moreover, in order to verify the analysis results, the noise coupling path in the board is evaluated by measurements involving In-phase/Quadrature (I/Q) signals as well as electromagnetic simulations. As a result, we demonstrate that APD method is effective in evaluating a degree of noise coupling from an IC to multiple antennas on the board, and confirm that the intensity of noise coupling to each antenna is affected greatly by the board layout patterns.

  • Throughput Maximization for Wireless Relay Systems with AMC and HARQ

    Wei-Shun LIAO  Po-Hung LIU  Hsuan-Jung SU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:7
      Page(s):
    1345-1356

    With the development of wireless technologies, wireless relay systems have become a popular topic. To design practical wireless relay systems, link adaptation is an important technique. Because there are both broadcast and multiple access channels in wireless relay systems, link adaptation is difficult to design and hence the optimal throughput is hard to achieve. In this study, a novel method is proposed to maximize the system throughput of wireless relay systems by utilizing the most popular link adaptation methods, adaptive modulation and coding (AMC) and hybrid automatic repeat request (HARQ). The proposed method utilizes the characteristics and operations of AMC and HARQ to adaptively adjust the thresholds for selecting modulation and coding scheme (MCS) to be used. Thus the system can keep tracking the optimal values of the thresholds. Therefore, the system throughput can be maximized. We set up simulations for different relay environment settings, such as different relay HARQ protocols, placements, and multiplexing schemes, to verify the capability of the proposed method. The simulation results show that, compared to the existing method, the proposed method indeed improves system throughput under a variety of relay settings and can be easily applied to different system platforms.

  • Reconstructing Sequential Patterns without Knowing Image Correspondences

    Saba Batool MIYAN  Jun SATO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2015/04/13
      Vol:
    E98-D No:7
      Page(s):
    1343-1352

    In this paper, we propose a method for reconstructing 3D sequential patterns from multiple images without knowing exact image correspondences and without calibrating linear camera sensitivity parameters on intensity. The sequential pattern is defined as a series of colored 3D points. We assume that the series of the points are obtained in multiple images, but the correspondence of individual points is not known among multiple images. For reconstructing sequential patterns, we consider a camera projection model which combines geometric and photometric information of objects. Furthermore, we consider camera projections in the frequency space. By considering the multi-view relationship on the new projection model, we show that the 3D sequential patterns can be reconstructed without knowing exact correspondence of individual image points in the sequential patterns; moreover, the recovered 3D patterns do not suffer from changes in linear camera sensitivity parameters. The efficiency of the proposed method is tested using real images.

  • Model-Based Contract Testing of Graphical User Interfaces

    Tugkan TUGLULAR  Arda MUFTUOGLU  Fevzi BELLI  Michael LINSCHULTE  

     
    PAPER-Software Engineering

      Pubricized:
    2015/03/19
      Vol:
    E98-D No:7
      Page(s):
    1297-1305

    Graphical User Interfaces (GUIs) are critical for the security, safety and reliability of software systems. Injection attacks, for instance via SQL, succeed due to insufficient input validation and can be avoided if contract-based approaches, such as Design by Contract, are followed in the software development lifecycle of GUIs. This paper proposes a model-based testing approach for detecting GUI data contract violations, which may result in serious failures such as system crash. A contract-based model of GUI data specifications is used to develop test scenarios and to serve as test oracle. The technique introduced uses multi terminal binary decision diagrams, which are designed as an integral part of decision table-augmented event sequence graphs, to implement a GUI testing process. A case study, which validates the presented approach on a port scanner written in Java programming language, is presented.

  • Development of Wireless Systems for Disaster Recovery Operations Open Access

    Takashi HIROSE  Fusao NUNO  Masashi NAKATSUGAWA  

     
    INVITED PAPER

      Vol:
    E98-C No:7
      Page(s):
    630-635

    This paper presents wireless systems for use in disaster recovery operations. The Great East Japan Earthquake of March 11, 2011 reinforced the importance of communications in, to, and between disaster areas as lifelines. It also revealed that conventional wireless systems used for disaster recovery need to be renovated to cope with technological changes and to provide their services with easier operations. To address this need we have developed new systems, which include a relay wireless system, subscriber wireless systems, business radio systems, and satellite communication systems. They will be chosen and used depending on the situations in disaster areas as well as on the required services.

  • Effect Analysis of Coding Convention Violations on Readability of Post-Delivered Code

    Taek LEE  Jung-Been LEE  Hoh Peter IN  

     
    PAPER-Software Engineering

      Pubricized:
    2015/04/10
      Vol:
    E98-D No:7
      Page(s):
    1286-1296

    Adherence to coding conventions during the code production stage of software development is essential. Benefits include enabling programmers to quickly understand the context of shared code, communicate with one another in a consistent manner, and easily maintain the source code at low costs. In reality, however, programmers tend to doubt or ignore the degree to which the quality of their code is affected by adherence to these guidelines. This paper addresses research questions such as “Do violations of coding conventions affect the readability of the produced code?”, “What kinds of coding violations reduce code readability?”, and “How much do variable factors such as developer experience, project size, team size, and project maturity influence coding violations?” To respond to these research questions, we explored 210 open-source Java projects with 117 coding conventions from the Sun standard checklist. We believe our findings and the analysis approach used in the paper will encourage programmers and QA managers to develop their own customized and effective coding style guidelines.

  • New p-ary Sequence Families of Period ${ rac{p^n -1}{2}}$ with Good Correlation Property Using Two Decimated m-Sequences

    Chang-Min CHO  Ji-Youp KIM  Jong-Seon NO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:7
      Page(s):
    1268-1275

    In this paper, for an odd prime p and i=0,1, we investigate the cross-correlation between two decimated sequences, s(2t+i) and s(dt), where s(t) is a p-ary m-sequence of period pn-1. Here we consider two cases of ${d}$, ${d= rac{(p^m +1)^2}{2} }$ with ${n=2m}$, ${p^m equiv 1 pmod{4}}$ and ${d= rac{(p^m +1)^2}{p^e + 1}}$ with n=2m and odd m/e. The value distribution of the cross-correlation function for each case is completely determined. Also, by using these decimated sequences, two new p-ary sequence families of period ${ rac{p^n -1}{2}}$ with good correlation property are constructed.

  • Active and Reactive Power in Stochastic Resonance for Energy Harvesting

    Madoka KUBOTA  Ryo TAKAHASHI  Takashi HIKIHARA  

     
    LETTER-Noise and Vibration

      Vol:
    E98-A No:7
      Page(s):
    1537-1539

    A power allocation to active and reactive power in stochastic resonance is discussed for energy harvesting from noise. It is confirmed that active power can be increased at stochastic resonance, in the same way of the relationship between energy and phase at an appropriate setting in resonance.

  • Comments on “New Constructions of Perfect 8-QAM+/8-QAM Sequences”

    Fanxin ZENG  

     
    LETTER-Information Theory

      Vol:
    E98-A No:6
      Page(s):
    1334-1338

    In Xu, Chen, and Liu's letter, two constructions producing perfect 8-QAM+/8-QAM sequences were given. We show that their constructions are equivalent to Zeng, et al.'s constructions under unit constant transform. Since the autocorrelation of a perfect sequence under unit constant transform is invariable, Xu, et al.'s constructions are the special case of Zeng, et al.'s constructions.

  • A Forward/Reverse Body Bias Generator with Wide Supply-Range down to Threshold Voltage

    Norihiro KAMAE  Akira TSUCHIYA  Hidetoshi ONODERA  

     
    PAPER

      Vol:
    E98-C No:6
      Page(s):
    504-511

    A forward/reverse body bias generator (BBG) which operates under wide supply-range is proposed. Fine-grained body biasing (FGBB) is effective to reduce variability and increase energy efficiency on digital LSIs. Since FGBB requires a number of BBGs to be implemented, simple design is preferred. We propose a BBG with charge pumps for reverse body bias and the BBG operates under wide supply-range from 0.5,V to 1.2,V. Layout of the BBG was designed in a cell-based flow with an AES core and fabricated in a 65~nm CMOS process. Area of the AES core is 0.22 mm$^2$ and area overhead of the BBG is 2.3%. Demonstration of the AES core shows a successful operation with the supply voltage from 0.5,V to 1.2,V which enables the reduction of power dissipation, for example, of 17% at 400,MHz operation.

  • QAM Periodic Complementary Sequence Sets

    Fanxin ZENG  Zhenyu ZHANG  

     
    LETTER-Information Theory

      Vol:
    E98-A No:6
      Page(s):
    1329-1333

    The mappings from independent binary variables to quadrature amplitude modulation (QAM) symbols are developed. Based the proposed mappings and the existing binary mutually uncorrelated complementary sequence sets (MUCSSs), a construction producing QAM periodic complementary sequence sets (PCSSs) is presented. The resultant QAM PCSSs have the same numbers and periods of sub-sequences as the binary MUCSSs employed, and the family size of new sequence sets is increased with exponent of periods of sub-sequences. The proposed QAM PCSSs can be applied to CDMA or OFDM communication systems so as to suppress multiple access interference (MAI) or to reduce peak-to-mean envelope power ratio (PMEPR), respectively.

1281-1300hit(6809hit)