The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SC(4570hit)

661-680hit(4570hit)

  • Applying Razor Flip-Flops to SRAM Read Circuits

    Ushio JIMBO  Junji YAMADA  Ryota SHIOYA  Masahiro GOSHIMA  

     
    PAPER

      Vol:
    E100-C No:3
      Page(s):
    245-258

    Timing fault detection techniques address the problems caused by increased variations on a chip, especially with dynamic voltage and frequency scaling (DVFS). The Razor flip-flop (FF) is a timing fault detection technique that employs double sampling by the main and shadow FFs. In order for the Razor FF to correctly detect a timing fault, not the main FF but the shadow FF must sample the correct value. The application of Razor FFs to static logic relaxes the timing constraints; however, the naive application of Razor FFs to dynamic precharged logic such as SRAM read circuits is not effective. This is because the SRAM precharge cannot start before the shadow FF samples the value; otherwise, the transition of the bitline of the SRAM stops and the value sampled by the shadow FF will be incorrect. Therefore, the detect period cannot overlap the precharge period. This paper proposes a novel application of Razor FFs to SRAM read circuits. Our proposal employs a conditional precharge according to the value of a bitline sampled by the main FF. This enables the detect period to overlap the precharge period, thereby relaxing the timing constraints. The additional circuit required by this method is simple and only needed around the sense amplifier, and there is no need for a clock delayed from the system clock. Consequently, the area overhead of the proposed circuit is negligible. This paper presents SPICE simulations of the proposed circuit. Our proposal reduces the minimum cycle time by 51.5% at a supply voltage of 1.1 V and the minimum voltage by 31.8% at cycle time of 412.5 ps.

  • Hybrid Minutiae Descriptor for Narrow Fingerprint Verification

    Zhiqiang HU  Dongju LI  Tsuyoshi ISSHIKI  Hiroaki KUNIEDA  

     
    PAPER-Pattern Recognition

      Pubricized:
    2016/12/12
      Vol:
    E100-D No:3
      Page(s):
    546-555

    Narrow swipe sensor based systems have drawn more and more attention in recent years. However, the size of captured image is significantly smaller than that obtained from the traditional area fingerprint sensor. Under this condition the available minutiae number is also limited. Therefore, only employing minutiae with the standard associated feature can hardly achieve high verification accuracy. To solve this problem, we present a novel Hybrid Minutiae Descriptor (HMD) which consists of two modules. The first one: Minutiae Ridge-Valley Orientation Descriptor captures the orientation information around minutia and also the trace points located at associated ridge and valley. The second one: Gabor Binary Code extracts and codes the image patch around minutiae. The proposed HMD enhances the representation capability of minutiae feature, and can be matched very efficiently. Experiments conducted over public databases and the database captured by the narrow swipe sensor show that this innovative method gives rise to significant improvements in reducing FRR (False Reject Rate) and EER (Equal Error Rate).

  • Power-Rail ESD Clamp Circuit with Parasitic-BJT and Channel Parallel Shunt Paths to Achieve Enhanced Robustness

    Yuan WANG  Guangyi LU  Yize WANG  Xing ZHANG  

     
    BRIEF PAPER-Semiconductor Materials and Devices

      Vol:
    E100-C No:3
      Page(s):
    344-347

    This work reports a novel power-rail electrostatic discharge (ESD) clamp circuit with parasitic bipolar-junction-transistor (BJT) and channel parallel shunt paths. The parallel shunt paths are formed by delivering a tiny ratio of drain voltage to the gate terminal of the clamp device in ESD events. Under such a mechanism, the proposed circuit achieves enhanced robustness over those of both gate-grounded NMOS (ggNMOS) and the referenced gate-coupled NMOS (gcNMOS). Besides, the proposed circuit also achieves improved fast power-up immunity over that of the referenced gcNMOS. All investigated designs are fabricated in a 65-nm CMOS process. Transmission-line-pulsing (TLP) and human-body-model (HBM) test results have both confirmed the performance enhancements of the proposed circuit. Finally, the validity of the achieved performance enhancements on other trigger circuits is essentially revealed in this work.

  • Thermal Treatment Effect on Morphology and Photo-Physical Properties of Bis-Styrylbenzene Derivatives

    Hiroyuki MOCHIZUKI  

     
    BRIEF PAPER

      Vol:
    E100-C No:2
      Page(s):
    145-148

    Characteristics of the bis-styrylbenzene derivatives with trifluoromethyl or methyl moieties were evaluated in each as-vapor-deposited film, thermally-treated film, and the crystal from the solution. Thermal treatment dramatically changed morphologies and photo-physical properties of the vapor-deposited film.

  • lq Sparsity Penalized STAP Algorithm with Sidelobe Canceler Architecture for Airborne Radar

    Xiaoxia DAI  Wei XIA  Wenlong HE  

     
    LETTER-Information Theory

      Vol:
    E100-A No:2
      Page(s):
    729-732

    Much attention has recently been paid to sparsity-aware space-time adaptive processing (STAP) algorithms. The idea of sparsity-aware technology is commonly based on the convex l1-norm penalty. However, some works investigate the lq (0 < q < 1) penalty which induces more sparsity owing to its lack of convexity. We herein consider the design of an lq penalized STAP processor with a generalized sidelobe canceler (GSC) architecture. The lq cyclic descent (CD) algorithm is utilized with the least squares (LS) design criterion. It is validated through simulations that the lq penalized STAP processor outperforms the existing l1-based counterparts in both convergence speed and steady-state performance.

  • Reduction of Max-Plus Algebraic Equations to Constraint Satisfaction Problems for Mixed Integer Programming

    Hiroyuki GOTO  

     
    LETTER

      Vol:
    E100-A No:2
      Page(s):
    427-430

    This letter presents a method for solving several linear equations in max-plus algebra. The essential part of these equations is reduced to constraint satisfaction problems compatible with mixed integer programming. This method is flexible, compared with optimization methods, and suitable for scheduling of certain discrete event systems.

  • Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing

    Ryutaroh MATSUMOTO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E100-A No:2
      Page(s):
    726-728

    The multiple assignment scheme is to assign one or more shares to single participant so that any kind of access structure can be realized by classical secret sharing schemes. We propose its quantum version including ramp secret sharing schemes. Then we propose an integer optimization approach to minimize the average share size.

  • Single Camera Vehicle Localization Using Feature Scale Tracklets

    David WONG  Daisuke DEGUCHI  Ichiro IDE  Hiroshi MURASE  

     
    PAPER-Vision

      Vol:
    E100-A No:2
      Page(s):
    702-713

    Advances in intelligent vehicle systems have led to modern automobiles being able to aid drivers with tasks such as lane following and automatic braking. Such automated driving tasks increasingly require reliable ego-localization. Although there is a large number of sensors that can be employed for this purpose, the use of a single camera still remains one of the most appealing, but also one of the most challenging. GPS localization in urban environments may not be reliable enough for automated driving systems, and various combinations of range sensors and inertial navigation systems are often too complex and expensive for a consumer setup. Therefore accurate localization with a single camera is a desirable goal. In this paper we propose a method for vehicle localization using images captured from a single vehicle-mounted camera and a pre-constructed database. Image feature points are extracted, but the calculation of camera poses is not required — instead we make use of the feature points' scale. For image feature-based localization methods, matching of many features against candidate database images is time consuming, and database sizes can become large. Therefore, here we propose a method that constructs a database with pre-matched features of known good scale stability. This limits the number of unused and incorrectly matched features, and allows recording of the database scales into “tracklets”. These “Feature scale tracklets” are used for fast image match voting based on scale comparison with corresponding query image features. This process reduces the number of image-to-image matching iterations that need to be performed while improving the localization stability. We also present an analysis of the system performance using a dataset with high accuracy ground truth. We demonstrate robust vehicle positioning even in challenging lane change and real traffic situations.

  • A Study on Adaptive Scheduling Priority Control for Layered Cell Configuration

    Atsushi NAGATE  Teruya FUJII  Masayuki MURATA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/09/15
      Vol:
    E100-B No:2
      Page(s):
    372-379

    The layered cell configuration, in which a large number of small cells are set in a macro-cell coverage area, is attracting much attention recently as a promising approach to handle the rapidly increasing mobile data traffic. In this configuration, cells of various sizes, from macro to small, are placed in various locations, so that the variation in the number and the distribution of the users among cells becomes much wider than in conventional macro-cell homogeneous networks. Therefore, even in the layered cell configuration, the users in the cell with many users and low received signal quality may experience low throughput especially at cell edge. This is because such users experience both low spectral efficiency and few radio resources. In order to resolve this issue, a lot of techniques have been proposed such as load balancing and cooperative multi-point transmission. In this paper, we focus on scheduling priority control as a simple solution that can also be used in combination with load balancing and coordinated multi-point transmission. We propose an adaptive scheduling priority control scheme based on the congestion and user distribution of each cell and clarify the effect of the proposed method by computer simulations.

  • A Loitering Discovery System Using Efficient Similarity Search Based on Similarity Hierarchy

    Jianquan LIU  Shoji NISHIMURA  Takuya ARAKI  Yuichi NAKAMURA  

     
    INVITED PAPER

      Vol:
    E100-A No:2
      Page(s):
    367-375

    Similarity search is an important and fundamental problem, and thus widely used in various fields of computer science including multimedia, computer vision, database, information retrieval, etc. Recently, since loitering behavior often leads to abnormal situations, such as pickpocketing and terrorist attacks, its analysis attracts increasing attention from research communities. In this paper, we present AntiLoiter, a loitering discovery system adopting efficient similarity search on surveillance videos. As we know, most of existing systems for loitering analysis, mainly focus on how to detect or identify loiterers by behavior tracking techniques. However, the difficulties of tracking-based methods are known as that their analysis results are heavily influenced by occlusions, overlaps, and shadows. Moreover, tracking-based methods need to track the human appearance continuously. Therefore, existing methods are not readily applied to real-world surveillance cameras due to the appearance discontinuity of criminal loiterers. To solve this problem, we abandon the tracking method, instead, propose AntiLoiter to efficiently discover loiterers based on their frequent appearance patterns in longtime multiple surveillance videos. In AntiLoiter, we propose a novel data structure Luigi that indexes data using only similarity value returned by a corresponding function (e.g., face matching). Luigi is adopted to perform efficient similarity search to realize loitering discovery. We conducted extensive experiments on both synthetic and real surveillance videos to evaluate the efficiency and efficacy of our approach. The experimental results show that our system can find out loitering candidates correctly and outperforms existing method by 100 times in terms of runtime.

  • Decentralized Similarity Control of Composite Nondeterministic Discrete Event Systems with Local Specifications

    Masanori HOSHINO  Shigemasa TAKAI  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    395-405

    We consider a decentralized similarity control problem for composite nondeterministic discrete event systems, where each subsystem has its own local specification and the entire specification is described as the synchronous composition of local specifications. We present necessary and sufficient conditions for the existence of a complete decentralized supervisor that solves a similarity control problem under the assumption that any locally uncontrollable event is not shared by other subsystems. We also show that the system controlled by the complete decentralized supervisor that consists of maximally permissive local supervisors is bisimilar to the one controlled by the maximally permissive monolithic supervisor under the same assumption.

  • Accuracy Improvement of Estimated Perceived Brightness Maps by Helmholtz-Kohlrausch Effect Using a Correction Coefficient

    Shinichi HASHIMOTO  Takaya SHIZUME  Hiroaki TAKAMATSU  Yoshifumi SHIMODAIRA  Gosuke OHASHI  

     
    PAPER-HUMAN PERCEPTION

      Vol:
    E100-A No:2
      Page(s):
    565-571

    The Helmholtz-Kohlrausch (H-K) effect is a phenomenon in which the perceived brightness levels induced by two stimuli are different even when two color stimuli have the same luminance and different chroma in a particular hue. This phenomenon appears on display devices, and the wider the gamut these devices have, the more the perceived brightness is affected by the H-K effect. The quantification of this effect can be expected to be useful for the development and evaluation of a wide range of display devices. However, quantification of the H-K effect would require considerable subjective evaluation experimentation, which would be a major burden. Therefore, the authors have derived perceived brightness maps for natural images using an estimation equation for the H-K effect without experimentation. The results of comparing and analyzing the calculated maps and ground truth maps obtained through subjective evaluation experiments confirm strong correlation coefficients between such maps overall. However, a tendency for the estimation of the calculation map to be poor on high chroma strongly influenced by the H-K effect was also confirmed. In this study, we propose an accuracy improvement method for the estimation of the H-K effect by correcting the calculation maps using a correction coefficient obtained by focusing on this tendency, and we confirm the effectiveness of our method.

  • On the Interference Alignment Designs for Secure Multiuser MIMO Systems

    Kha HOANG HA  Thanh TUNG VU  Trung QUANG DUONG  Nguyen-Son VO  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:2
      Page(s):
    670-679

    In this paper, we propose two secure multiuser multiple-input multiple-output (MIMO) transmission approaches based on interference alignment (IA) in the presence of an eavesdropper. To deal with the information leakage to the eavesdropper as well as the interference signals from undesired transmitters (Txs) at desired receivers (Rxs), our approaches aim to design the transmit precoding and receive subspace matrices to minimize both the total inter-main-link interference and the wiretapped signals (WSs). The first proposed IA scheme focuses on aligning the WSs into proper subspaces while the second one imposes a new structure on the precoding matrices to force the WSs to zero. In each proposed IA scheme, the precoding matrices and the receive subspaces at the legitimate users are alternatively selected to minimize the cost function of a convex optimization problem for every iteration. We provide the feasible conditions and the proofs of convergence for both IA approaches. The simulation results indicate that our two IA approaches outperform the conventional IA algorithm in terms of the average secrecy sum rate.

  • Scattering of a Plane Wave by the End-Face of an Ordered Waveguide System

    Akira KOMIYAMA  

     
    BRIEF PAPER

      Vol:
    E100-C No:1
      Page(s):
    75-79

    We deal with the scattering of a plane wave by the end-face of an ordered waveguide system composed of identical cores of equal space by the perturbation method and derive analytically the diffraction amplitude. It is shown that the results are in relatively good agreement with those obtained by the numerical method.

  • A Computationally Efficient Schnorr-Euchner Enumeration for Solving Integer Least-Squares Problem in Wireless Communications

    Junil AHN  Jaewon CHANG  Chiho LEE  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:1
      Page(s):
    327-331

    The integer least-squares (ILS) problem frequently arises in wireless communication systems. Sphere decoding (SD) is a systematic search scheme for solving ILS problem. The enumeration of candidates is a key part of SD for selecting a lattice point, which will be searched by the algorithm. Herein, the authors present a computationally efficient Schnorr-Euchner enumeration (SEE) algorithm to solve the constrained ILS problems, where the solution is limited into the finite integer lattice. To trace only valid lattice points within the underlying finite lattice, the authors devise an adaptive computation of the enumeration step and counting the valid points enumerated. In contrast to previous SEE methods based on a zig-zag manner, the proposed method completely avoids enumerating invalid points outside the finite lattice, and it further reduces real arithmetic and logical operations.

  • Oscillatory Neural Activity during Performance of a Cognitive Task in the Presence of Fluctuating Ambient Noise

    Kazuo KATO  Satoshi YASUKAWA  Kazunori SUZUKI  Atsuo ISHIKAWA  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2016/10/13
      Vol:
    E100-D No:1
      Page(s):
    181-189

    The purpose of this study was to identify the key variables that determine the quality of the auditory environment, for the purposes of workplace auditory design and assessment. To this end, we characterized changes in oscillatory neural activity in electroencephalographic (EEG) data recorded from subjects who performed an intellectual activity while exposed to fluctuating ambient noise. Seven healthy men participated in the study. Subjects performed a verbal and spatial task that used the 3-back task paradigm to study working memory. During the task, subjects were presented with auditory stimuli grouped by increasing high-frequency content: (1) a sound with frequencies similar to Brownian noise and no modulation; (2) an amplitude-modulated sound with frequencies similar to white noise; (3) amplitude-modulated pink noise; and (4) amplitude-modulated Brownian noise. Upon presentation, we observed a characteristic change in three EEG bands: theta (4-8Hz), alpha (8-13Hz), and beta (13-30Hz). In particular, a frequency-dependent enhancement and reduction of power was observed in the theta and beta bands, respectively.

  • On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks

    Hiraku MORITA  Jacob C.N. SCHULDT  Takahiro MATSUDA  Goichiro HANAOKA  Tetsu IWATA  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    73-90

    In the ordinary security model for signature schemes, we consider an adversary that tries to forge a signature on a new message using only his knowledge of other valid message and signature pairs. To take into account side channel attacks such as tampering or fault-injection attacks, Bellare and Kohno (Eurocrypt 2003) formalized related-key attacks (RKA), where stronger adversaries are considered. In the RKA security model for signature schemes, we consider an adversary that can also manipulate the signing key and obtain signatures computed under the modified key. RKA security is defined with respect to the related-key deriving functions which are used by an adversary to manipulate the signing key. This paper considers RKA security of three established signature schemes: the Schnorr signature scheme, a variant of DSA, and a variant of ElGamal signature scheme. First, we show that these signature schemes are secure against a weak notion of RKA with respect to polynomial functions. Second, we demonstrate that, on the other hand, none of the Schnorr signature scheme, DSA, nor the ElGamal signature scheme achieves the standard notion of RKA security with respect to linear functions, by showing concrete attacks on these. Lastly, we show that slight modifications of the Schnorr signature scheme, (the considered variant of) DSA, and the variant of ElGamal signature scheme yield fully RKA secure schemes with respect to polynomial functions.

  • Detecting Motor Learning-Related fNIRS Activity by Applying Removal of Systemic Interferences

    Isao NAMBU  Takahiro IMAI  Shota SAITO  Takanori SATO  Yasuhiro WADA  

     
    LETTER-Biological Engineering

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    242-245

    Functional near-infrared spectroscopy (fNIRS) is a noninvasive neuroimaging technique, suitable for measurement during motor learning. However, effects of contamination by systemic artifacts derived from the scalp layer on learning-related fNIRS signals remain unclear. Here we used fNIRS to measure activity of sensorimotor regions while participants performed a visuomotor task. The comparison of results using a general linear model with and without systemic artifact removal shows that systemic artifact removal can improve detection of learning-related activity in sensorimotor regions, suggesting the importance of removal of systemic artifacts on learning-related cerebral activity.

  • An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan

    Fakir Sharif HOSSAIN  Tomokazu YONEDA  Michiko INOUE  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/10/20
      Vol:
    E100-D No:1
      Page(s):
    130-139

    Due to outsourcing of numerous stages of the IC manufacturing process to different foundries, the security risk, such as hardware Trojan becomes a potential threat. In this paper, we present a layout aware localized hardware Trojan detection method that magnifies the detection sensitivity for small Trojan in power-based side-channel analysis. A scan segmentation approach with a modified launch-on-capture (LoC) transition delay fault test pattern application technique is proposed so as to maximize the dynamic power consumption of any target region. The new architecture allows activating any target region and keeping others quiet, which reduces total circuit toggling activity. We evaluate our approach on ISCAS89 benchmark and two practical circuits to demonstrate its effectiveness in side-channel analysis.

  • Optimizing Video Delivery for Enhancing User Experience in Wireless Networks

    Jongwon YOON  

     
    PAPER-Network

      Pubricized:
    2016/08/04
      Vol:
    E100-B No:1
      Page(s):
    131-139

    With the proliferation of hand-held devices in recent years, mobile video streaming has become an extremely popular application. However, Internet video streaming to mobile devices faces several problems, such as unstable connections, long latency, high jitter, etc. We present a system, OptVid, which enhances the user's experiences of video streaming service on cellular networks. OptVid takes the user's profile and provides seamless adaptive bitrate streaming by leveraging the video transcoding solution. It provides very agile bitrate adaptation, especially in the mobile scenario where the wireless channel is not stable. We prototype video transcoding on a WiMAX testbed to bridge the gap between the wireless channel capacity and the video quality. Our evaluations reveal that OptVid provides better user experience than conventional schemes in terms of PSNR, video stalls, and buffering time. OptVid does not require any additional storage since it transcodes videos on-the-fly upon receiving requests and delivers them directly to the client.

661-680hit(4570hit)