The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RP(993hit)

281-300hit(993hit)

  • A Partially-Corporate Feed Double-Layer Waveguide Slot Array with the Sub-Arrays also Fed in Alternating-Phases

    Miao ZHANG  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:2
      Page(s):
    469-475

    As a promising lamination-loss-free fabrication technique, diffusion bonding of etched thin metal plates is used to realize double-layer waveguide slot antennas. Alternating-phase feed is adopted in this paper to reduce the number of laminated plates to simplify fabrication as well as to reduce cost. A 20 × 20-element double-layer waveguide slot antenna with a bottom partially-corporate feed circuit is designed for 39GHz band operation as an example. The adjacent radiating waveguides as well as the 2 × 2 sub-arrays fed in an alternating-phase manner eliminate the need for complete electrical contact in the top layer. However, the feed circuit in the bottom layer has to be completely diffusion-bonded. These two layers are simply assembled by screws. An antenna laminated by only diffusion bonding is also fabricated and evaluated for comparison. The comparison proved that the simply fabricated antenna is comparable in performance to the fully diffusion-bonded one.

  • An Efficient Compression of Amplitude-Only Images for the Image Trading System

    Shenchuan LIU  Wannida SAE-TANG  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E97-D No:2
      Page(s):
    378-379

    This letter proposes an efficient compression scheme for the copyright- and privacy-protected image trading system. The proposed scheme multiplies pseudo random signs to amplitude components of discrete cosine transformed coefficients before the inverse transformation is applied. The proposed scheme efficiently compresses amplitude-only image which is the inversely transformed amplitude components, and the scheme simultaneously improves the compression efficiency of phase-only image which is the inversely transformed phase components, in comparison with the conventional systems.

  • CIP Basis Set Method for Electromagnetic Simulation

    Yoshiaki ANDO  Yusuke TAKAHASHI  

     
    PAPER-Numerical Techniques

      Vol:
    E97-C No:1
      Page(s):
    26-32

    This paper presents an application of the constained interpolation profile basis set (CIP-BS) method to electromagnetic fields analyses. Electromagnetic fields can be expanded in terms of multi-dimensional CIP basis functions, and the Galerkin method can then be applied to obtain a system of linear equations. In the present study, we focus on a two-dimensional problem with TMz polarization. In order to examine the precision of the CIP-BS method, TE202 resonant mode in a rectangular cavity is analyzed. The numerical results show that CIP-BS method has better performance than the finite-difference time-domain (FDTD) method when the time step is small. Then an absorbing boundary condition based on the perfectly matched layer (PML) is formulated, and the absorption performance is demonstrated. Finally, the propagation in an inhomogeneous medium is computed by using the proposed method, and it is observed that in the CIP-BS method, smooth variation of material constants is effectively formulated without additional computational costs, and that accurate results are obtained in comparison with the FDTD method even if the permittivity is high.

  • Double-Layer Plate-Laminated Waveguide Slot Array Antennas for a 39GHz Band Fixed Wireless Access System

    Miao ZHANG  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:1
      Page(s):
    122-128

    A point-to-point fixed wireless access (FWA) system with a maximum throughput of 1Gbps has been developed in the 39GHz band. A double-layer plate-laminated waveguide slot array antenna is successfully realized with specific considerations of practical application. The antenna is designed so as to hold the VSWR under 1.5. The antenna input as well as feeding network is configured to reduce the antenna profile as well as the antenna weight. In addition, integrating the antenna into a wireless terminal is taken into account. A shielding wall, whose effectiveness is experimentally demonstrated, is set in the middle of the wireless terminal to achieve the spatial isolation of more than 65dB between two antennas on the H-plane. 30 test antennas are fabricated by diffusion bonding of thin metal plates, to investigate the tolerance and mass-productivity of this process. An aluminum antenna, which has the advantages of light weight and anti-aging, is also fabricated and evaluated with an eye to the future.

  • Effect of Applied Magnetic Field Angle and Intensity on Magnetic Cluster State of Stacked Perpendicular Recording Media

    Shohei SATO  Yoshiaki YAMAGUCHI  Ryuji SUGITA  

     
    PAPER

      Vol:
    E96-C No:12
      Page(s):
    1479-1483

    The uniform magnetic field of various strength was applied to the perpendicularly and in-plane demagnetized media, and the change in each magnetic cluster state was investigated as the fundamental investigation of the influence of demagnetization method on noise during signal recording on the stacked perpendicular recording media. The results showed that the in-plane demagnetization can achieve lower noise level if the recording field is not very high. In other words, the in-plane demagnetization is an effective way to achieve lower noise in transition area, near track edge of recorded bit, and in high-density bit. In addition, the simulation clarified that this noise reduction can be explained using the idea of sub-domain structure in the in-plane demagnetized media.

  • Interconnect-Driven Floorplanning with Noise-Aware Buffer Planning

    Katherine Shu-Min LI  Yingchieh HO  Liang-Bi CHEN  

     
    PAPER-Physical Level Design

      Vol:
    E96-A No:12
      Page(s):
    2467-2474

    Crosstalk-induced noise has become a key problem in interconnect optimization when technology improves, spacing diminishes, and coupling capacitance/inductance increases. Buffer insertion/sizing is one of the most effective and popular techniques to reduce interconnect delay and decouple coupling effects. It is traditionally applied to post-layout optimization. However, it is obviously infeasible to insert/size hundreds of thousands buffers during the post-layout stage when most routing regions are occupied. Therefore, it is desirable to incorporate buffer planning into floorplanning to ensure timing closure and design convergence. In this paper, we first derive formulae of buffer insertion for timing and noise optimization, and then apply the formulae to compute the feasible regions for inserting buffers to meet both timing and noise constraints. Experimental results show that our approach achieves an average success rate of 80.9% (78.2%) of nets meeting timing constraints alone (both timing and noise constraints) and consumes an average extra area of only 0.49% (0.66%) over the given floorplan, compared with the average success rate of 75.6% of nets meeting timing constraints alone and an extra area of 1.33% by the BBP method proposed previously.

  • A 12-bit Interpolated Pipeline ADC Using Body Voltage Controlled Amplifier

    Hyunui LEE  Masaya MIYAHARA  Akira MATSUZAWA  

     
    PAPER-Circuit Design

      Vol:
    E96-A No:12
      Page(s):
    2508-2515

    This paper presents a 12-bit interpolated pipeline analog to digital converter (ADC) using body voltage controlled amplifier for current biasing and common mode feedback (CMFB). The proposed body voltage control method allows the amplifier to achieve small power consumption and large output swing. The proposed amplifier has a power consumption lower than 15.6mW, almost half of the folded cascode amplifier satisfying 12-bit, 400MS/s ADC operation. Moreover, the proposed amplifier secures 600mV output swing, which is one drain source voltage (VDS) wider compared with the telescopic amplifier. The 12-bit interpolated pipeline ADC using the proposed amplifier is fabricated in a 1P9M 90nm CMOS technology with a 1.2V supply voltage. The ADC achieves an effective number of bit (ENOB) of about 10-bit at 300MS/s and an figure of merit (FoM) of 0.2pJ/conv. when the frequency of the input signal is sufficiently low.

  • Structure and Magnetic Properties of Co/Pd Multilayer Films Epitaxially Grown on Single-Crystal Substrates

    Mitsuru OHTAKE  Kousuke TOBARI  Masaaki FUTAMOTO  

     
    REVIEW PAPER

      Vol:
    E96-C No:12
      Page(s):
    1452-1459

    Co/Pd multilayer films are prepared on fcc-Pd underlayers of (001), (011), and (111) orientations hetero-epitaxially grown on MgO single-crystal substrates at room temperature. The effects of underlayer orientation, Co and Pd layer thicknesses, and repetition number of Co/Pd bi-layer on the structure and the magnetic properties are investigated. fcc-Co/fcc-Pd multilayer films of (001), (011), and (111) orientations epitaxially grow on the Pd underlayers of (001), (011), and (111) orientations, respectively. Flatter and sharper Co/Pd interface is formed in the order of (011) < (111) < (001) orientation. Atomic mixing around the Co/Pd interface is enhanced by deposition of thinner Co and Pd layers, and Co-Pd alloy phase is formed. With increasing the repetition number (decreasing the thicknesses of Co and Pd layers), perpendicular magnetic anisotropy is promoted. Stronger perpendicular anisotropy is observed in the order of film orientation of (001) < (011) < (111). Perpendicular anisotropy of Co/Pd multilayer film is considered to be originated from the two sources; the interface anisotropy and the magnetocrystalline anisotropy associated with Co-Pd lattice shrinkage along the perpendicular direction. In order to enhance the perpendicular anisotropy of Co/Pd multilayer film, it is important to align the film orientation to be (111) and to enhance the lattice distortion along the perpendicular direction.

  • Metastable Ordered Phase Formation in CoPt and Co3Pt Alloy Thin Films Epitaxially Grown on Single-Crystal Substrates

    Mitsuru OHTAKE  Daisuke SUZUKI  Fumiyoshi KIRINO  Masaaki FUTAMOTO  

     
    REVIEW PAPER

      Vol:
    E96-C No:12
      Page(s):
    1460-1468

    CoPt and Co3Pt alloy thin films are prepared on MgO(111), SrTiO3(111), and Al2O3(0001) single-crystal substrates by varying the substrate temperature in a range from room temperature to 600°C by using an ultra-high vacuum radio-frequency magnetron sputtering system. The formation of metastable ordered phase and the structural thermal stability are briefly investigated. CoPt and Co3Pt films with the close-packed plane parallel to the substrate surface grow epitaxially on these oxide single-crystal substrates. CoPt epitaxial films are also formed by employing Pt, Pd, Cu, Cr, Ti, and Ru underlayers hetero-epitaxially grown on MgO(111) substrates. The crystal structure is evaluated by considering the order degree and the atomic stacking sequence of close-packed plane. Metastable ordered phases of L11, Bh, and D019 are preferentially formed in the CoPt and the Co3Pt films deposited around 300°C. Metastable ordered phase formation is influenced by the substrate temperature, the film composition, and the underlayer material. With increasing the substrate temperature up to around 300°C, the order degree increases. As the substrate temperature further increases, the order degree decreases. Annealing a disordered film at 300°C does not effectively enhance ordering. The CoPt and the Co3Pt films which include metastable ordered phases have flat surfaces and show strong perpendicular magnetic anisotropies reflecting the magnetocrystalline anisotropies of ordered crystals.

  • On Discrete Logarithm Based Additively Homomorphic Encryption

    Jae Hong SEO  Keita EMURA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:11
      Page(s):
    2286-2289

    In this paper, we examine additive homomorphic encryptions in the discrete logarithm setting. Recently, Wang et al. proposed an additive homomorphic encryption scheme by modifying the ElGamal encryption scheme [Information Sciences 181(2011) 3308-3322]. We show that their scheme allows only limited number of additions among encrypted messages, which is different from what they claimed.

  • Out-of-Sequence Traffic Classification Based on Improved Dynamic Time Warping

    Jinghua YAN  Xiaochun YUN  Hao LUO  Zhigang WU  Shuzhuang ZHANG  

     
    PAPER-Information Network

      Vol:
    E96-D No:11
      Page(s):
    2354-2364

    Traffic classification has recently gained much attention in both academic and industrial research communities. Many machine learning methods have been proposed to tackle this problem and have shown good results. However, when applied to traffic with out-of-sequence packets, the accuracy of existing machine learning approaches decreases dramatically. We observe the main reason is that the out-of-sequence packets change the spatial representation of feature vectors, which means the property of linear mapping relation among features used in machine learning approaches cannot hold any more. To address this problem, this paper proposes an Improved Dynamic Time Warping (IDTW) method, which can align two feature vectors using non-linear alignment. Experimental results on two real traces show that IDTW achieves better classification accuracy in out-of-sequence traffic classification, in comparison to existing machine learning approaches.

  • Content Aware Image Resizing with Constraint of Object Aspect Ratio Preservation

    Kazu MISHIBA  Masaaki IKEHARA  Takeshi YOSHITOME  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E96-D No:11
      Page(s):
    2427-2436

    In this paper, we propose a novel content-aware image resizing method based on grid transformation. Our method focuses on not only keeping important regions unchanged but also keeping the aspect ratio of the main object in an image unchanged. The dual conditions can avoid distortion which often occurs when only using the former condition. Our method first calculates image importance. Next, we extract the main objects on an image by using image importance. Finally, we calculate the optimal grid transformation which suppresses changes in size of important regions and in the aspect ratios of the main objects. Our method uses lower and upper thresholds for transformation to suppress distortion due to extreme shrinking and enlargement. To achieve better resizing results, we introduce a boundary discarding process. This process can assign wider regions to important regions, reducing distortions on important regions. Experimental results demonstrate that our proposed method resizes images with less distortion than other resizing methods.

  • A Jointly Optimized Predictive-Adaptive Partitioned Block Transform for Video Coding

    Di WU  Xiaohai HE  

     
    PAPER-Image Processing

      Vol:
    E96-A No:11
      Page(s):
    2161-2168

    In this paper, we propose a jointly optimized predictive-adaptive partitioned block transform to exploit the spatial characteristics of intra residuals and improve video coding performance. Under the assumptions of traditional Markov representations, the asymmetric discrete sine transform (ADST) can be combined with a discrete cosine transform (DCT) for video coding. In comparison, the interpolative Markov representation has a lower mean-square error for images or regions that have relatively high contrast, and is insensitive to changes in image statistics. Hence, we derive an even discrete sine transform (EDST) from the interpolative Markov model, and use a coding scheme to switch between EDST and DCT, depending on the prediction direction and boundary information. To obtain an implementation independent of multipliers, we also propose an orthogonal 4-point integer EDST, which consists solely of adds and bit-shifts. We implement our hybrid transform coding scheme within the H.264/AVC intra-mode framework. Experimental results show that the proposed scheme significantly outperforms standard DCT and ADST. It also greatly reduces the blocking artifacts typically observed around block edges, because the new transform is more adaptable to the characteristics of intra-prediction residuals.

  • Electromagnetic Power Transmission through Two Circular Apertures in Parallel Conducting Planes Penetrated by a Long Cylinder

    Young Seung LEE  Seung Keun PARK  

     
    PAPER-Electromagnetic Analysis

      Vol:
    E96-B No:10
      Page(s):
    2455-2461

    Electromagnetic power transmission through two cyl-inder-penetrated circular apertures in parallel conducting planes is studied. The Weber transform and superposition principle are used to represent the scattered field. A set of simultaneous equations for the modal coefficients are constituted based on the mode-matching and boundary conditions. The whole integration path is slightly deformed into a new one below the positive real axis not to pass through the pole singularities encountered on the original path so that it is easily calculated by direct numerical quadrature. Computation shows the behaviors of power transmission in terms of aperture geometry and wavelength. The presented scheme is very amenable to numerical evaluations and useful for various electromagnetic scattering and antenna radiation analysis involved with singularity problems.

  • Multi-Stage Automatic NE and PoS Annotation Using Pattern-Based and Statistical-Based Techniques for Thai Corpus Construction

    Nattapong TONGTEP  Thanaruk THEERAMUNKONG  

     
    PAPER-Natural Language Processing

      Vol:
    E96-D No:10
      Page(s):
    2245-2256

    Automated or semi-automated annotation is a practical solution for large-scale corpus construction. However, the special characteristics of Thai language, such as lack of word-boundary and sentence-boundary markers, trigger several issues in automatic corpus annotation. This paper presents a multi-stage annotation framework, containing two stages of chunking and three stages of tagging. The two chunking stages are pattern matching-based named entity (NE) extraction and dictionary-based word segmentation while the three succeeding tagging stages are dictionary-, pattern- and statist09812490981249ical-based tagging. Applying heuristics of ambiguity priority, NE extraction is performed first on an original text using a set of patterns, in the order of pattern ambiguity. Next, the remaining text is segmented into words with a dictionary. The obtained chunks are then tagged with types of named entities or parts-of-speech (PoS) using dictionaries, patterns and statistics. Focusing on the reduction of human intervention in corpus construction, our experimental results show that the dictionary-based tagging process can assign unique tags to 64.92% of the words, with the remaining of 24.14% unknown words and 10.94% ambiguously tagged words. Later, the pattern-based tagging can reduce unknown words to only 13.34% while the statistical-based tagging can solve the ambiguously tagged words to only 3.01%.

  • Unsupervised Fingerprint Recognition

    Wei-Ho TSAI  Jun-Wei LIN  Der-Chang TSENG  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E96-D No:9
      Page(s):
    2115-2125

    This study extends conventional fingerprint recognition from a supervised to an unsupervised framework. Instead of enrolling fingerprints from known persons to identify unknown fingerprints, our aim is to partition a collection of unknown fingerprints into clusters, so that each cluster consists of fingerprints from the same finger and the number of generated clusters equals the number of distinct fingers involved in the collection. Such an unsupervised framework is helpful to handle the situation where a collection of captured fingerprints are not from the enrolled people. The task of fingerprint clustering is formulated as a problem of minimizing the clustering errors characterized by the Rand index. We estimate the Rand index by computing the similarities between fingerprints and then apply a genetic algorithm to minimize the Rand index. Experiments conducted using the FVC2002 database show that the proposed fingerprint clustering method outperforms an intuitive method based on hierarchical agglomerative clustering. The experiments also show that the number of clusters determined by our system is close to the true number of distinct fingers involved in the collection.

  • Design and Measurement of the Plate Laminated Waveguide Slot Array Antenna and Its Feasibility for Wireless Link System in the 120 GHz Band

    Dongjin KIM  Jiro HIROKAWA  Kimio SAKURAI  Makoto ANDO  Takuma TAKADA  Tadao NAGATSUMA  Jun TAKEUCHI  Akihiko HIRATA  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:8
      Page(s):
    2102-2111

    We design and fabricate a double-layer hollow-waveguide slot array antenna with wide bandwidth and high antenna efficiency for the 120 GHz band. The antenna is fabricated by diffusion bonding of laminated thin metal plates for high precision and perfect electrical contact. The 1616-element antenna shows more than 70% antenna efficiency over a 13 GHz bandwidth. Furthermore, it realizes error-free data transmission in 2.5 m distance at up to 10 Gbit/s. To our knowledge, this is the first report of the design and fabrication of a high-efficiency wideband planar antenna for the 120 GHz band.

  • Quality Evaluation of Decimated Images Using Visual Difference Predictor

    Ryo MATSUOKA  Takao JINNO  Masahiro OKUDA  

     
    LETTER-Image

      Vol:
    E96-A No:8
      Page(s):
    1824-1827

    This paper proposes a method for evaluating visual differences caused by decimation. In many applications it is important to evaluate visual differences of two different images. There exist many image assessment methods that utilize the model of the human visual system (HVS), such as the visual difference predictor (VDP) and the Sarnoff visual discrimination model. In this paper, we extend and elaborate on the conventional image assessment method for the purpose of evaluating the visual difference caused by the image decimation. Our method matches actual human evaluation more and requires less computational complexity than the conventional method.

  • Creating Chinese-English Comparable Corpora

    Degen HUANG  Shanshan WANG  Fuji REN  

     
    PAPER-Natural Language Processing

      Vol:
    E96-D No:8
      Page(s):
    1853-1861

    Comparable Corpora are valuable resources for many NLP applications, and extensive research has been done on information mining based on comparable corpora in recent years. While there are not enough large-scale available public comparable corpora at present, this paper presents a bi-directional CLIR-based method for creating comparable corpora from two independent news collections in different languages. The original Chinese document collections and English documents collections are crawled from XinHuaNet respectively and formatted in a consistent manner. For each document from the two collections, the best query keywords are extracted to represent the essential content of the document, and then the keywords are translated into the language of the other collection. The translated queries are run against the collection in the same language to pick up the candidate documents in the other language and candidates are aligned based on their publication dates and the similarity scores. Results show that our approach significantly outperforms previous approaches to the construction of Chinese-English comparable corpora.

  • An Advanced Incident Response Methodology Based on Correlation Analysis of Polymorphic Security Events

    Haeng-Gon LEE  Jungsuk SONG  Sang-Soo CHOI  Gi-Hwan CHO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E96-B No:7
      Page(s):
    1803-1813

    In order to cope with the continuous evolution in cyber threats, many security products (e.g., IDS/IPS, TMS, Firewalls) are being deployed in the network of organizations, but it is not so easy to monitor and analyze the security events triggered by the security products constantly and effectively. Thus, in many cases, real-time incident analysis and response activities for each organization are assigned to an external dedicated security center. However, since the external security center deploys its security appliances to only the boundary or the single point of the network, it is very difficult to understand the entire network situation and respond to security incidents rapidly and accurately if they depend on only a single type of security information. In addition, security appliances trigger an unmanageable amount of alerts (in fact, by some estimates, several thousands of alerts are raised everyday, and about 99% of them are false positives), this situation makes it difficult for the analyst to investigate all of them and to identify which alerts are more serious and which are not. In this paper, therefore, we propose an advanced incident response methodology to overcome the limitations of the existing incident response scheme. The main idea of our methodology is to utilize polymorphic security events which can be easily obtained from the security appliances deployed in each organization, and to subject them to correlation analysis. We evaluate the proposed methodology using diverse types of real security information and the results show the effectiveness and superiority of the proposed incident response methodology.

281-300hit(993hit)