The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Q(6809hit)

1301-1320hit(6809hit)

  • Improved Detection Scheme Based on Lattice-Reduction and Threshold Algorithm in MIMO-OFDM Systems

    Jae-Jeong KIM  Hyoung-Kyu SONG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E98-A No:6
      Page(s):
    1343-1345

    In this letter, an enhanced detection scheme using threshold and lattice-reduction algorithm is proposed. The first step of the proposed detection scheme finds another basis channel matrix H' which has good properties from the channel matrix H by using lattice-reduction algorithm. And QRD-M detection scheme using threshold algorithm is executed in the next step. Simulation results show that the proposed method has better performance than the conventional QRD-M detection scheme at high SNR. Also, it reduces candidate symbols because of the threshold algorithm.

  • Rain Sensing Using Dual-Frequency Measurements from Small-Scale Millimeter-Wave Network

    Hung V. LE  Capsoni CARLO  Nebuloni ROBERTO  Luini LORENZO  Takuichi HIRANO  Toru TANIGUCHI  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:6
      Page(s):
    1040-1049

    Dense millimeter-wave networks are a promising candidate for next-generation cellular systems enabling multiple gigabit-per-second data rates. A major disadvantage of millimeter-wave systems is signal disruption by rain, and here we propose a novel method for rain sensing using dual-frequency measurements at 25 and 38GHz from a small-scale Tokyo Institute of Technology (Tokyo Tech) millimeter-wave network. A real-time algorithm is developed for estimating the rain rate from attenuation using both ITU-R relationships and new coefficients that consider the effects of the rain Drop Size Distribution (DSD). The suggested procedure is tested on measured data, and its performance is evaluated. The results show that the proposed algorithm yields estimates that agree very well with rain gauge data.

  • Flying-Adder Frequency Synthesizer with a Novel Counter-Based Randomization Method

    Pao-Lung CHEN  Da-Chen LEE  Wei-Chia LI  

     
    PAPER

      Vol:
    E98-C No:6
      Page(s):
    480-488

    This work presents a novel counter-based randomization method for use in a flying-adder frequency synthesizer with a cost-effective structure that can replace the fractional accumulator. The proposed technique involves a counter, a comparator and a modified linear feedback shift register. The power consumption and speed bottleneck of the conventional flying-adder are significantly reduced. The modified linear shift feedback register is used as a pseudo random data generator, suppressing the spurious tones arise from the periodic carry sequences that is generated by the fractional accumulator. Furthermore, the proposed counter-based randomization method greatly reduces the large memory size that is required by the conventional approach to carry randomization. A test chip for the proposed counter-based randomization method is fabricated in the TSMC 0.18,$mu $m 1P6M CMOS process, with the core area of 0.093,mm$^{mathrm{2}}$. The output frequency had a range of 43.4,MHz, extasciitilde 225.8,MHz at 1.8,V with peak-to-peak jitter (Pk-Pk) jitter 139.2,ps at 225.8,MHz. Power consumption is 2.8,mW @ 225.8,MHz with 1.8 supply voltage.

  • Linear Complexity of Generalized Cyclotomic Binary Sequences with Period 2pm+1qn+1

    Dandan LI  Qiaoyan WEN  Jie ZHANG  Liying JIANG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:6
      Page(s):
    1244-1254

    The linear complexity of binary sequences plays a fundamental part in cryptography. In the paper, we construct more general forms of generalized cyclotomic binary sequences with period 2pm+1qn+1. Furthermore, we establish the formula of the linear complexity of proposed sequences. The results reveal that such sequences with period 2pm+1qn+1 have a good balance property and high linear complexity.

  • Improved Identification Protocol Based on the MQ Problem

    Fábio S. MONTEIRO  Denise H. GOYA  Routo TERADA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:6
      Page(s):
    1255-1265

    The MQ problem, which consists of solving a system of multivariate quadratic polynomials over a finite field, has attracted the attention of researchers for the development of public-key cryptosystems because (1) it is NP-complete, (2) there is no known polynomial-time algorithm for its solution, even in the quantum computational model, and (3) it enables cryptographic primitives of practical interest. In 2011, Sakumoto, Shirai and Hiwatari presented two new zero-knowledge identification protocols based exclusively on the MQ problem. The 3-pass identification protocol of Sakumoto et al. has impersonation probability 2/3. In this paper, we propose an improvement that reduces the impersonation probability to 1/2. The result is a protocol that reduces the total computation time, the total communication needed and requires a smaller number of rounds for the same security level. We also present a new extension that achieves an additional communication reduction with the use of some smaller hash commitments, but maintaining the same security level.

  • New Construction of Optimal p2-Ary Low Correlation Zone Sequence Sets

    Yubo LI  Kai LIU  Chengqian XU  

     
    PAPER-Information Theory

      Vol:
    E98-A No:6
      Page(s):
    1288-1294

    In this correspondence, a generic method of constructing optimal p2-ary low correlation zone sequence sets is proposed. Firstly p2-ary column sequence sets are constructed, then p2-ary LCZ sequence sets with parameters (pn-1, pm-1, (pn-1)/(pm-1),1) are constructed by using column sequences and interleaving technique. The resultant p2-ary LCZ sequence sets are optimal with respect to the Tang-Fan-Matsufuji bound.

  • Energy Saving for Cognitive Multicast OFDM Systems: A Time-Frequency Two-Dimensional Method

    Wenjun XU  Shengyu LI  Zhihui LIU  Jiaru LIN  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E98-B No:6
      Page(s):
    974-983

    This paper studies the energy-saving problem in cognitive multicast orthogonal frequency-division multiplexing (OFDM) systems, for which a time-frequency two-dimensional model is established to enable the system energy conservation through joint temporal and spectral adaptations. The formulated two-dimensional problem, minimizing the total power consumption whilst guaranteeing the minimal-rate requirement for each multicast session and constraining the maximal perceived interference in each timeslot for the active primary user, is categorized as mixed integer non-convex programming, whose optimal solution is intractable in general. However, based on the time-sharing property, an asymptotically optimal algorithm is proposed by jointly iterating spectrum element (SE) assignment and power allocation. Moreover, a suboptimal algorithm, which carries out SE assignment and power allocation sequentially, is presented as well to reduce the computation complexity. Simulation results show the proposed joint algorithm can achieve the near-optimal solution, and the proposed sequential algorithm approximates to the joint one very well with a gap of less than 3%. Compared with the existing slot-by-slot energy-saving algorithms, the total power consumption is considerably decreased due to the combined exploitation of time and frequency dimensions.

  • Balance Differential Coherent Bit Synchronization Algorithm for GNSS Receiver

    Dengyun LEI  Weijun LU  Yanbin ZHANG  Dunshan YU  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E98-B No:6
      Page(s):
    1133-1140

    Due to low signal-to-carrier ratio and high dynamic, the frequency deviation affects the bit synchronization in GNSS receiver. This paper proposes a balance differential coherent bit synchronization algorithm, which uses the differential coherent method to eliminate the influence of the frequency deviation. By enlarging the differential distance, the proposed algorithm achieves higher bit synchronization rates. Combining two complementary differential coherent parts, the proposed algorithm avoids the unbalance problem and the attenuation of accumulation. Furthermore, a general architecture is presented to reduce the system complexity. Experimental results show that the proposed algorithm improves the sensitivity of bit synchronization by 3∼7dB compared with the previous method.

  • Inequality-Constrained RPCA for Shadow Removal and Foreground Detection

    Hang LI  Yafei ZHANG  Jiabao WANG  Yulong XU  Yang LI  Zhisong PAN  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2015/03/02
      Vol:
    E98-D No:6
      Page(s):
    1256-1259

    State-of-the-art background subtraction and foreground detection methods still face a variety of challenges, including illumination changes, camouflage, dynamic backgrounds, shadows, intermittent object motion. Detection of foreground elements via the robust principal component analysis (RPCA) method and its extensions based on low-rank and sparse structures have been conducted to achieve good performance in many scenes of the datasets, such as Changedetection.net (CDnet); however, the conventional RPCA method does not handle shadows well. To address this issue, we propose an approach that considers observed video data as the sum of three parts, namely a row-rank background, sparse moving objects and moving shadows. Next, we cast inequality constraints on the basic RPCA model and use an alternating direction method of multipliers framework combined with Rockafeller multipliers to derive a closed-form solution of the shadow matrix sub-problem. Our experiments have demonstrated that our method works effectively on challenging datasets that contain shadows.

  • Comparative Study of Open-Loop Transmit Diversity Schemes with Four Antennas in DFT-Precoded OFDMA Using Turbo FDE and Iterative Channel Estimation

    Lianjun DENG  Teruo KAWAMURA  Hidekazu TAOKA  Mamoru SAWAHASHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:6
      Page(s):
    1065-1077

    This paper presents comprehensive comparisons on the block error rate (BLER) performance of rate-one open-loop (OL) transmit diversity schemes with four antennas for discrete Fourier transform (DFT)-precoded Orthogonal Frequency Division Multiple Access (OFDMA). One candidate scheme employs a quasi-orthogonal (QO) - space-time block code (STBC) in which four-branch minimum mean-square error (MMSE) combining is achieved at the cost of residual inter-code interference (ICI). Another candidate employs a combination of the STBC and selection transmit diversity called time switched transmit diversity (TSTD) (or frequency switched transmit diversity (FSTD)). We apply a turbo frequency domain equalizer (FDE) associated with iterative decision-feedback channel estimation (DFCE) using soft-symbol estimation to reduce channel estimation (CE) error. The turbo FDE includes an ICI canceller to reduce the influence of the residual ICI for the QO-STBC. Based on link-level simulation results, we show that a combination of the STBC and TSTD (or FSTD) is suitable as a four-antenna OL transmit diversity scheme for DFT-precoded OFDMA using the turbo FDE and iterative DFCE.

  • Performance Analysis and Optimum Resource Allocation in Mobile Multihop Relay System

    Taejoon KIM  Seong Gon CHOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:6
      Page(s):
    1078-1085

    This paper analyzes the performance of a mobile multihop relay (MMR) system which uses intermediate mobile relay stations (RSs) to increase service coverage area and capacity of a communication system. An analytical framework for an MMR system is introduced, and a scheme for allocating the optimum radio resources to an MMR system is presented. It is very challenging to develop an analytical framework for an MMR system because more than two wireless links should be considered in analyzing the performance of such a system. Here, the joint effect of a finite queue length and an adaptive modulation and coding (AMC) scheme in both a base station (BS) and an RS are considered. The traffic characteristics from BS to RS are analyzed, and a three-dimensional finite-state Markov chain (FSMC) is built for the RS which considers incoming traffic from the BS as well. The RS packet loss rate and the RS average throughput are also derived. Moreover, maximum throughput is achieved by optimizing the amount of radio resources to be allocated to the wireless link between a BS and an RS.

  • Multipath Time Delay Estimation Based on Gibbs Sampling under Incoherent Reception Environment

    Sen ZHONG  Wei XIA  Zishu HE  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:6
      Page(s):
    1300-1304

    In the traditional time delay estimation methods, it is usually implicitly assumed that the observed signals are either only direct path propagate or coherently received. In practice, the multipath propagation and incoherent reception always exist simultaneously. In response to this situation, the joint maximum likelihood (ML) estimation of multipath delays and system error is proposed, and the estimation of the number of multipath is considered as well for the specific incoherent signal model. Furthermore, an algorithm based Gibbs sampling is developed to solve the multi-dimensional nonlinear ML estimation. The efficiency of the proposed estimator is demonstrated by simulation results.

  • Model for Estimating Effects of Human Body Shadowing in High Frequency Bands

    Ngochao TRAN  Tetsuro IMAI  Yukihiko OKUMURA  

     
    PAPER

      Vol:
    E98-B No:5
      Page(s):
    773-782

    In this paper, we propose a simple model for estimating the effects of human body shadowing (HBS) in high frequency bands. The model includes two factors: the shadowing width (SW), which is the width of the area with shadowing loss values greater than 0dB, and the median shadowing loss value (MSLV), which is obtained by taking the median of the shadowing loss values within the SW. These factors are determined by formulas using parameters, i.e. frequency, distance between the base station (BS) and human body, distance between the terminal and human body, BS antenna height, and direction of the human body. To obtain the formulas, a method for calculating the effects of HBS based on the uniform theory of diffraction (UTD) and a human body model comprising lossy dielectric flat plates is proposed and verified. Then, the general forms of the formulas are predicted using the theory of knife-edge diffraction (KE). A series of computer simulations using the proposed calculation method with random changes in parameters is conducted to verify the general formulas and derive coefficients for these formulas through regression formulas.

  • Evaluating Cooperative ARQ Protocols from the Perspective of Physical Layer Security

    Lei WANG  Xinrong GUAN  Yueming CAI  Weiwei YANG  Wendong YANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:5
      Page(s):
    927-939

    This work investigates the physical layer security for three cooperative automatic-repeat-request (CARQ) protocols, including the decode-and-forward (DF) CARQ, opportunistic DF (ODF) CARQ, and the distributed space-time code (DSTC) CARQ. Assuming that there is no instantaneous channel state information (CSI) of legitimate users' channel and eavesdropper's channel at the transmitter, the connection outage performance and secrecy outage performance are derived to evaluate the reliability and security of each CARQ protocol. Then, we redefine the concept of the secrecy throughput to evaluate the overall efficiency of the system in terms of maintaining both reliable and secure transmission. Furthermore, through an asymptotic analysis in the high signal-to-noise ratio (SNR) regime, the direct relationship between reliability and security is established via the reliability-security tradeoff (RST). Numerical results verify the analysis and show the efficiency of the CARQ protocols in terms of the improvement on the secrecy throughput. More interestingly, increasing the transmit SNR and the maximum number of transmissions of the ARQ protocols may not achieve a security performance gain. In addition, the RST results underline the importance of determining how to balance the reliability vs. security, and show the superiority of ODF CARQ in terms of RST.

  • Asymmetric Quantum Codes and Quantum Convolutional Codes Derived from Nonprimitive Non-Narrow-Sense BCH Codes

    Jianzhang CHEN  Jianping LI  Yuanyuan HUANG  

     
    LETTER-Coding Theory

      Vol:
    E98-A No:5
      Page(s):
    1130-1135

    Nonprimitive non-narrow-sense BCH codes have been studied by many scholars. In this paper, we utilize nonprimitive non-narrow-sense BCH codes to construct a family of asymmetric quantum codes and two families of quantum convolutional codes. Most quantum codes constructed in this paper are different from the ones in the literature. Moreover, some quantum codes constructed in this paper have good parameters compared with the ones in the literature.

  • Estimation of a Received Signal at an Arbitrary Remote Location Using MUSIC Method

    Makoto TANAKA  Hisato IWAI  Hideichi SASAOKA  

     
    PAPER

      Vol:
    E98-B No:5
      Page(s):
    806-813

    In recent years, various applications based on propagation characteristics have been developed. They generally utilize the locality of the fading characteristics of multipath environments. On the other hand, if a received signal at a remote location can be estimated beyond the correlation distance of the multipath fading environment, a wide variety of new applications can be possible. In this paper, we attempt to estimate a received signal at a remote location using the MUSIC method and the least squares method. Based on the plane wave assumption for each arriving wave, multipath environment is analyzed through estimation of the directions of arrival by the MUISC method and the complex amplitudes of the received signals by the least squares method, respectively. We present evaluation results on the estimation performance of the method by computer simulations.

  • Two-Switch Voltage Equalizer Using a Series-Resonant Voltage Multiplier Operating in Frequency-Multiplied Discontinuous Conduction Mode for Series-Connected Supercapacitors

    Masatoshi UNO  Akio KUKITA  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E98-B No:5
      Page(s):
    842-853

    Cell voltage equalizers are necessary to ensure years of operation and maximize the chargeable/dischargeable energy of series-connected supercapacitors (SCs). A two-switch voltage equalizer using a series-resonant voltage multiplier operating in frequency-multiplied discontinuous conduction mode (DCM) is proposed for series-connected SCs in this paper. The frequency-multiplied mode virtually increases the operation frequency and hence mitigates the negative impact of the impedance mismatch of capacitors on equalization performance, allowing multi-layer ceramic capacitors (MLCCs) to be used instead of bulky and costly tantalum capacitors, the conventional approach when using voltage multipliers in equalizers. Furthermore, the DCM operation inherently provides the constant current characteristic, realizing the excessive current protection that is desirable for SCs, which experience 0V and equivalently become an equivalent short-circuit load. Experimental equalization tests were performed for eight SCs connected in series under two frequency conditions to verify the improved equalization performance at the increased virtual operation frequencies. The standard deviation of cell voltages under the higher-frequency condition was lower than that under the lower-frequency condition, demonstrating superior equalization performance at higher frequencies.

  • A Low Power and Hardware Efficient Syndrome Key Equation Solver Architecture and Its Folding with Pipelining

    Kazuhito ITO  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E98-A No:5
      Page(s):
    1058-1066

    Syndrome key equation solution is one of the important processes in the decoding of Reed-Solomon codes. This paper proposes a low power key equation solver (KES) architecture where the power consumption is reduced by decreasing the required number of multiplications without degrading the decoding throughput and latency. The proposed method employs smaller number of multipliers than a conventional low power KES architecture. The critical path in the proposed KES circuit is minimized so that the operation at a high clock frequency is possible. A low power folded KES architecture is also proposed to further reduce the hardware complexity by executing folded operations in a pipelined manner with a slight increase in decoding latency.

  • Interference Suppression Method between Primary Broadcasting and Secondary Systems Using Load Modulation

    Takuma ITO  Naoki HONMA  Keisuke TERASAKI  Kentaro NISHIMORI  Yoshitaka TSUNEKAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:5
      Page(s):
    861-869

    Controlling interference from the secondary system (SS) to the receiver of the primary system (PS) is an important issue when the SS uses the same frequency band as the television broadcast system. The reason includes that the SS is unaware of the interference imposed on the primary receiver (PS-Rx), which does not have a transmitter. In this paper, we propose an interference control method between PS-Rx and SS, where a load modulation scheme is introduced to the PS-Rx. In this method, the signal from the PS transmitting station is scattered by switching its load impedance. The SS observes the scattered channel and calculates the interference suppression weights for transmitting, and controls interference by transmit beamforming. A simulation shows that the Signal-to-Interference Ratio (SIR) with interference control is improved by up to 41.5dB compared to that without interference control at short distances; the results confirm that the proposed method is effective in controlling interference between PS-Rx and SS. Furthermore, we evaluate the Signal-to-Noise Ratio (SNR) and channel capacity at SS.

  • Tunable Threshold Voltage of Organic CMOS Inverter Circuits by Electron Trapping in Bilayer Gate Dielectrics

    Toan Thanh DAO  Hideyuki MURATA  

     
    PAPER

      Vol:
    E98-C No:5
      Page(s):
    422-428

    We have demonstrated tunable extit{n}-channel fullerene and extit{p}-channel pentacene OFETs and CMOS inverter circuit based on a bilayer-dielectric structure of CYTOP (poly(perfluoroalkenyl vinyl ether)) electret and SiO$_{2}$. For both OFET types, the $V_{mathrm{th}}$ can be electrically tuned thanks to the charge-trapping at the interface of CYTOP and SiO$_{2}$. The stability of the shifted $V_{mathrm{th}}$ was investigated through monitoring a change in transistor current. The measured transistor current versus time after programming fitted very well with a stretched-exponential distribution with a long time constant up to 10$^{6}$ s. For organic CMOS inverter, after applying the program gate voltages for extit{n}-channel fullerene or extit{p}-channel pentacene elements, the voltage transfer characteristics were shifted toward more positive values, resulting in a modulation of the noise margin. We realized that at a program gate voltage of 60,V for extit{p}-channel OFET, the circuit switched at 4, 8,V, that is close to half supply voltage $V_{mathrm{DD}}$, leading to the maximum electrical noise immunity of the inverter circuit.

1301-1320hit(6809hit)