The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RP(993hit)

461-480hit(993hit)

  • Generalized Scalar Multiplication Secure against SPA, DPA, and RPA

    Atsuko MIYAJI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    2833-2842

    In the execution on a smart card, elliptic curve cryptosystems have to be secure against side channel attacks such as the simple power analysis (SPA), the differential power analysis (DPA), and the refined power analysis (RPA), and so on. MMM-algorithm proposed by Mamiya, Miyaji, and Morimoto is a scalar multiplication algorithm secure against SPA, DPA, and RPA, which can decrease the computational complexity by increasing the size of a pre-computed table. However, it provides only 4 different cases of pre-computed tables. From the practical point of view, a wider range of time-memory tradeoffs is usually desired. This paper generalizes MMM-algorithm to improve the flexibility of tables as well as the computational complexity. Our improved algorithm is secure, efficient and flexible for the storage size.

  • Dynamic Bandwidth Allocation Performance for Dual QoS Classes in Resilient Packet Ring

    Yasuyuki OKUMURA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3226-3231

    This paper proposes an improved dynamic bandwidth allocation algorithm for dual Quality of Service (QoS) classes to maximize the utilization rate of the Resilient Packet Ring (RPR). To achieve dynamic bandwidth allocation for the two QoS classes in the RPR, each node measures the high priority traffic flow and assigns the appropriate bandwidth; the remaining bandwidth is used for low priority traffic. It passes a control frame containing the measured bandwidth of the high priority traffic to the other nodes. Based on the advertised high priority traffic bandwidth, any node that is congested transmits, to the other nodes, a fairness message to fairly allocate the remaining low priority bandwidth. Simulations demonstrate that the proposed algorithm enhances the utilization rate and reduces the delay of high priority frames.

  • A Nearly Perfect Total-Field/Scattered-Field Boundary for the One-Dimensional CIP Method

    Yoshiaki ANDO  Hiroyuki SAITO  Masashi HAYAKAWA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E91-C No:10
      Page(s):
    1677-1683

    A total-field/scattered-field (TF/SF) boundary which is commonly used in the finite-difference time-domain (FDTD) method to illuminate scatterers by plane waves, is developed for use in the constrained interpolation profile (CIP) method. By taking the numerical dispersion into account, the nearly perfect TF/SF boundary can be achieved, which allows us to calculate incident fields containing high frequency components without fictitious scattered fields. First of all, we formulate the TF/SF boundary in the CIP scheme. The numerical dispersion relation is then reviewed. Finally the numerical dispersion is implemented in the TF/SF boundary to estimate deformed incident fields. The performance of the nearly perfect TF/SF boundary is examined by measuring leaked fields in the SF region, and the proposed method drastically diminish the leakage compared with the simple TF/SF boundary.

  • Space-Efficient Algorithm for Image Rotation

    Tetsuo ASANO  Shinnya BITOU  Mitsuo MOTOKI  Nobuaki USUI  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2341-2348

    This paper presents an algorithm for rotating a subimage in place without using any extra working array. Due to this constraint, we have to overwrite pixel values by interpolated values. Key ideas are local reliability test which determines whether interpolation at a pixel is carried out correctly without using interpolated values, and lazy interpolation which stores interpolated values in a region which is never used for output images and then fills in interpolated values after safety is guaranteed. It is shown that linear interpolation is always safely implemented. An extension to cubic interpolation is also discussed.

  • Performance of Superposition Coded Broadcast/Unicast Service Overlay System

    Seokhyun YOON  Donghee KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:9
      Page(s):
    2933-2939

    The system level performance of a superposition coded broadcast/unicast service overlay system is considered. Cellular network for unicast service only is considered as interference limited system, where increasing the transmission power does not help improve the network throughput especially when the frequency reuse factor is close to 1. In such cases, the amount of power that does not contribute to improving the throughput can be considered as "unused." This situation motivates us to use the unused power for broadcast services, which can be efficiently provided in OFDM based single frequency networks as in digital multimedia broadcast systems. In this paper, we investigate the performance of such a broadcast/unicast overlay system in which a single frequency broadcast service is superimposed over a unicast cellular service. Alternative service multiplexing using FDM/TDM is also considered for comparison.

  • Detection of Leak Location in a Pipeline by Acoustic Signal

    Umut YUNUS  Masaru TSUNASAKI  Yiwei HE  Masanobu Kominami   Katsumi YAMASHITA  

     
    PAPER-Engineering Acoustics

      Vol:
    E91-A No:8
      Page(s):
    2053-2061

    Gas or water leaks in pipes that are buried under ground or that are situated in the walls of buildings may occur due to aging or unpredictable accidents, such as earthquakes. Therefore, the detection of leaks in pipes is an important task and has been investigated extensively. In the present paper, we propose a novel leak detection method by means of acoustic wave. We inject an acoustic chirp signal into a target pipeline and then estimate the leak location from the delay time of the compressed pulse by passing the reflected signal through a correlator. In order to distinguish a leak reflection in a complicated pipeline arrangement, the reflection characteristics of leaks are carefully discussed by numerical simulations and experiments. There is a remarkable difference in the reflection characteristics between the leak and other types of discontinuity, and the property can be utilized to distinguish the leak reflection. The experimental results show that, even in a complicated pipe arrangement including bends and branches, the proposed approach can successfully implement the leak detection. Furthermore, the proposed approach has low cost and is easy to implement because only a personal computer and some commonly equipment are required.

  • Tracing Stored Program Counter to Detect Polymorphic Shellcode

    Daewon KIM  Ikkyun KIM  Jintae OH  Jongsoo JANG  

     
    LETTER-Application Information Security

      Vol:
    E91-D No:8
      Page(s):
    2192-2195

    The shellcode use of the polymorphic form has become active as the de facto method for avoiding signature based network security system. We present a new static analysis method for detecting the decryption routine of the polymorphic shellcode. This method traces the processes by which the decryption routine stores the current program counter in a stack, moves the value between registers and uses the value in order to make the address of the encrypted code accessible. Most of decryption routines have the feature which they use the program counter stored on a stack as the address for accessing the memory that the encrypted code is positioned.

  • Adaptive Chirp Beamforming for Direction-of-Arrival Estimation of Wideband Chirp Signals in Sensor Arrays

    Jeong-Soo KIM  Byung-Woong CHOI  Eun-Hyon BAE  Kyun-Kyung LEE  

     
    LETTER-Antennas and Propagation

      Vol:
    E91-B No:8
      Page(s):
    2757-2760

    An adaptive chirp beamforming method is proposed to solve the bias problem in the direction-of-arrival (DOA) estimation of wideband chirp signals that have identical time-frequency parameters yet emanate from different directions. The proposed method, based on the steered minimum variance (STMV) method, exploits the time-frequency structure of a chirp signal to improve the DOA estimation performance by effectively suppressing the wideband chirp interferences causing the bias. Simulations are performed to demonstrate the effectiveness of the proposed method.

  • Design of a High-Precision DDS-Based Configurable Clock Generator

    Hsin-Chuan CHEN  

     
    PAPER-Integrated Electronics

      Vol:
    E91-C No:7
      Page(s):
    1151-1157

    Configurable clock is necessary for many applications such as digital communication systems, however, using the conventional direct digital frequency synthesizer (DDS) as a pulse or clock generator may cause jitter problems. People usually employ phase-interpolation approaches to generate a pulse or clock with correct time intervals. This work proposes a new phase-interpolation DDS scheme, which uses the output of the phase accumulator to provide an initial voltage on an integration capacitor by pre-charging in the first phase, and then performs integration operation on the same integration capacitor in the second phase. By using single capacitor integration, the instability of the delay generator existed in the phase-interpolation DDS can be avoided, and the impact caused by capacitance error in the circuit implementation also can be reduced. Furthermore, without ROM tables, the proposed DDS using pre-charging integration not only reduces the spurious level of the clock output, but also has a low hardware complexity.

  • Jigsaw-Puzzle-Like 3D Glyphs for Visualization of Grammatical Constraints

    Noritaka OSAWA  

     
    PAPER-Computer Graphics

      Vol:
    E91-D No:6
      Page(s):
    1804-1812

    Three-dimensional visualization using jigsaw-puzzle-like glyphs, or shapes, is proposed as a means of representing grammatical constraints in programming. The proposed visualization uses 3D glyphs such as convex, concave, and wireframe shapes. A semantic constraint, such as a type constraint in an assignment, is represented by an inclusive match between 3D glyphs. An application of the proposed visualization method to a subset of the Java programming language is demonstrated. An experimental evaluation showed that the 3D glyphs are easier to learn and enable users to more quickly understand their relationships than 2D glyphs and 1D symbol sequences.

  • Selective Adsorption of an Antibody onto a Plasma-Polymerized Film for Protein Patterning

    Atsunori HIRATSUKA  Naoya MURATA  Hitoshi MUGURUMA  Kazunari MATSUMURA  

     
    LETTER-Organic Molecular Electronics

      Vol:
    E91-C No:6
      Page(s):
    978-980

    Techniques for patterned modification of substrate surfaces are important for forming microarrays on protein chips. A hexamethyldisiloxane plasma-polymerized film (HMDS PPF) was deposited on a glass substrate and the resulting surface was partially modified by subsequent nitrogen plasma treatment with a patterned shadow mask. When surface adsorption of an antibody protein (F(ab')2 fragment of anti-human immunoglobulin G) was visualized by fluorescence microscopy, distinct 8080 µm2 square spots were observed, surrounded by a non-fluorescent 80 µm-wide grid. This pattern could be attributed to proteins selectively adsorbed onto the nitrogen plasma-treated regions but not onto the surface of pristine HMDS PPF. This provided a simple fabrication method of protein patterning.

  • A Masking Model for Motion Sharpening Phenomenon in Video Sequences

    Akira FUJIBAYASHI  Choong Seng BOON  

     
    PAPER

      Vol:
    E91-A No:6
      Page(s):
    1408-1415

    In this paper, we show that motion sharpening phenomenon can be explained as a form of visual masking for a special case where a video sequence is composed of alternate frames with different level of sharpness. A frame of higher sharpness behaves to mask the ambiguity of a subsequent frame of lower sharpness and hence preserves the perceptive quality of the whole sequence. Borrowing the mechanism for visual masking, we formulated a quantitative model for deriving the minimum spatial frequency conditions which preserves the subjective quality of the frames being masked. The quantitative model takes into account three fundamental properties of the video signals, namely the size of motion, average luminance and the power of each frequency components. The psychophysical responses towards the changes of these properties are obtained through subjective assessment tests using video sequences of simple geometrical patterns. Subjective experiments on natural video sequences show that more than 75% of viewers could make no distinction between the original sequence and the one processed using the quantitative model.

  • Study of Spatial Configurations of Equipment for Online Sign Interpretation Service

    Kaoru NAKAZONO  Saori TANAKA  

     
    PAPER-Media Communication

      Vol:
    E91-D No:6
      Page(s):
    1613-1621

    This paper discusses the design of configurations of videophone equipment aimed at online sign interpretation. We classified interpretation services into three types of situations: on-site interpretation, partial online interpretation, and full online interpretation. For each situation, the spatial configurations of the equipment are considered keeping the issue of nonverbal signals in mind. Simulation experiments of sign interpretation were performed using these spatial configurations and the qualities of the configurations were assessed. The preferred configurations had the common characteristics that the hearing subject could see the face of his/her principal conversation partner, that is, the deaf subject. The results imply that hearing people who do not understand sign language utilize nonverbal signals for facilitating interpreter-mediated conversation.

  • Prototyping Tool for Web-Based Multiuser Online Role-Playing Game

    Shusuke OKAMOTO  Masaru KAMADA  Tatsuhiro YONEKURA  

     
    LETTER-Interface Design

      Vol:
    E91-D No:6
      Page(s):
    1700-1703

    This letter proposes a prototyping tool for Web-based Multiuser Online Role-Playing Game (MORPG). The design goal is to make this tool simple and powerful. The tool is comprised of a GUI editor, a translator and a runtime environment. The GUI editor is used to edit state-transition diagrams, each of which defines the behavior of the fictional characters. The state-transition diagrams are translated into C program codes, which plays the role of a game engine in RPG system. The runtime environment includes PHP, JavaScript with Ajax and HTML. So the prototype system can be played on the usual Web browser, such as Firefox, Safari and IE. On a click or key press by a player, the Web browser sends it to the Web server to reflect its consequence on the screens which other players are looking at. Prospected users of this tool include programming novices and schoolchildren. The knowledge or skill of any specific programming languages is not required to create state-transition diagrams. Its structure is not only suitable for the definition of a character behavior but also intuitive to help novices understand. Therefore, the users can easily create Web-based MORPG system with the tool.

  • Efficient Fingercode Classification

    Hong-Wei SUN  Kwok-Yan LAM  Dieter GOLLMANN  Siu-Leung CHUNG  Jian-Bin LI  Jia-Guang SUN  

     
    INVITED PAPER

      Vol:
    E91-D No:5
      Page(s):
    1252-1260

    In this paper, we present an efficient fingerprint classification algorithm which is an essential component in many critical security application systems e.g. systems in the e-government and e-finance domains. Fingerprint identification is one of the most important security requirements in homeland security systems such as personnel screening and anti-money laundering. The problem of fingerprint identification involves searching (matching) the fingerprint of a person against each of the fingerprints of all registered persons. To enhance performance and reliability, a common approach is to reduce the search space by firstly classifying the fingerprints and then performing the search in the respective class. Jain et al. proposed a fingerprint classification algorithm based on a two-stage classifier, which uses a K-nearest neighbor classifier in its first stage. The fingerprint classification algorithm is based on the fingercode representation which is an encoding of fingerprints that has been demonstrated to be an effective fingerprint biometric scheme because of its ability to capture both local and global details in a fingerprint image. We enhance this approach by improving the efficiency of the K-nearest neighbor classifier for fingercode-based fingerprint classification. Our research firstly investigates the various fast search algorithms in vector quantization (VQ) and the potential application in fingerprint classification, and then proposes two efficient algorithms based on the pyramid-based search algorithms in VQ. Experimental results on DB1 of FVC 2004 demonstrate that our algorithms can outperform the full search algorithm and the original pyramid-based search algorithms in terms of computational efficiency without sacrificing accuracy.

  • Variable Cutoff Frequency Pre-Modulation Filter for PCM/FM Transmission System

    Sang-Rae LEE  Sung-Woong RA  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E91-B No:5
      Page(s):
    1387-1396

    The purpose of this study is to design, analyze and calibrate a pre-modulation filter with a variable cutoff frequency property for the PCM/FM transmission system. The effect of the pre-modulation filter reduces the energy contained in the sidebands of the modulated carrier. Most existing filters are based on a constant cutoff frequency specification. The onboard units of the launch vehicle which have been performed by the functional and environmental tests should not be revised by any hardware modifications from a reliability point of view. In case of the VCU in this paper, it is necessary to change the PCM bit rate and the cutoff frequency of the pre-modulation filter with software programming in order to improve the picture quality in the allowable bandwidth even if the unit has already been manufactured. In addition, the link margin around the satellite separation event is very low because the flight range is more than 2000 km. Under the same RF power condition, the reduction of the transmitting data rate will result in an increase of link margin. For this, the pre-modulation filter should have the variable cutoff frequency property with software programmable function according to 0.7 times the data rate. The variable cutoff frequency pre-modulation filter consists of a digital FIR filter, a DAC system and a tunable 2nd order LPF to meet the magnitude frequency response of an analog 7th order Bessel LPF. The attenuation requirements of three sub-blocks are generated by the frequency response analysis and the linear phase features are also taken into account for each stage. And the analog conversion part including a DAC system and a tunable 2nd order LPF is verified and calibrated using a tone generator.

  • A New 1.25-Gb/s Burst Mode Clock and Data Recovery Circuit Using Two Digital Phase Aligners and a Phase Interpolator

    Chang-Kyung SEONG  Seung-Woo LEE  Woo-Young CHOI  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E91-B No:5
      Page(s):
    1397-1402

    We propose a new Clock and Data Recovery (CDR) circuit for burst-mode applications. It can recover clock signals after two data transitions and endure long sequence of consecutive identical digits. Two Digital Phase Aligners (DPAs), triggered by rising or falling edges of input data, recover clock signals, which are then combined by a phase interpolator. This configuration reduces the RMS jitters of the recovered clock by 30% and doubles the maximum run length compared to a previously reported DPA CDR. A prototype chip is demonstrated with 0.18-µm CMOS technology. Measurement results show that the chip operates without any bit error for 1.25-Gb/s 231-1 PRBS with 200-ppm frequency offset and recovers clock and data after two clock cycles.

  • Studies on Modification of Channel Material and Gate Recess Structures in Metamorphic HEMT for Improvement of Breakdown and RF Characteristics

    Seok Gyu CHOI  Young Hyun BAEK  Jung Hun OH  Min HAN  Seok Ho BANG  Jin-Koo RHEE  

     
    PAPER

      Vol:
    E91-C No:5
      Page(s):
    683-687

    In this study, we have performed both the channel modification of the conventional MHEMT (Metamorphic High Electron Mobility Transistor) and the variation of gate recess width to improve the breakdown and RF characteristics. The modified channel consists of the InxGa1-xAs and the InP layers. Since InP has lower impact ionization coefficient than In0.53Ga0.47As, we have adopted the InP-composite channel in the modified MHEMT. Also, the gate recess width is both functions of breakdown and RF characteristic of a HEMT structure. Therefore, we have studied the breakdown and RF characteristic for various gate recess widths in MHEMT. We have compared breakdown characteristic of the InP-composite channel with that of conventional MHEMT. It is shown that on and off state breakdown voltages of the InP-composite channel MHEMT were increased by about 20 and 27%, respectively, compared with the conventional structure. Also, breakdown voltage of the InP-composite channel MHEMT was increased with increasing gate recess width. The fT was increased with decreasing the gate recess width, whereas fmax was increased with increasing the gate recess width. Also, we extracted small-signal parameters. It was shown that Gd of the InP-composite channel MHEMT is decreased about by 30% compared with the conventional MHEMT. Therefore, the suppression of the impact ionization in the InP-composite channel increases the breakdown voltage and decreases the output conductance.

  • Selective Epitaxial Growth of SiGe Layers with High Aspect Ratio Mask of Dielectric Films

    A-Ram CHOI  Sang-Sik CHOI  Byung-Guan PARK  Dongwoo SUH  Gyungock KIM  Jin-Tae KIM  Jin-Soo CHOI  Deok-Ho CHO  Tae-Hyun HAN  Kyu-Hwan SHIM  

     
    PAPER

      Vol:
    E91-C No:5
      Page(s):
    767-771

    This paper presents the selective epitaxial growth (SEG) properties of reduced pressure chemical vapor deposition (RPCVD) at low temperatures (LT) of 675-725 with high aspect ratio mask of dielectric films. The SEG process could be explained in conjunction with the loading effect, the mask pattern shape/size, and the process parameters of RPCVD. The growth rates showed a large non-uniformity up to 40% depending upon the pattern size of the dielectric mask films, but as the SEG film becomes thicker, the growth rate difference converged on 15% between the narrow 2-µm and the wide 100-µm patterns. The evolution of SEG was controlled dominantly by the surface migration control at the initial stage, and converted to the surface topology control. The design of pattern size and distribution with dummy patterns must be useful to accomplish the reliable and uniform LT-SEG.

  • Dirty Paper Coded Cooperation Utilizing Superposition Modulation

    Koji ISHII  Koji ISHIBASHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1540-1547

    In this paper, we design a new coded cooperation protocol utilizing superposition modulation together with iterative decoding/detection algorithms. The aim of the proposed system is to apply "dirty paper coding" theory in the context of half-duplex relay systems. In the proposed system, the node transmits a superposed signal which consists of its own coded information and other node's re-coded information. The destination node detects and decodes the signal using the received signals at two continuous time-slots with iterative decoding algorithm. Moreover, the destination node detects the received signal using the results of decoding, iteratively. This paper provides the outage probability of the proposed system under the assumption that the proposed system can ideally perform dirty paper coding, and it is shown from the comparison between outage probabilities and simulated results that the proposed system can get close to the dirty paper coding theory.

461-480hit(993hit)