The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SC(4570hit)

1481-1500hit(4570hit)

  • Noise Robust Gradient Descent Learning for Complex-Valued Associative Memory

    Masaki KOBAYASHI  Hirofumi YAMADA  Michimasa KITAHARA  

     
    LETTER-Nonlinear Problems

      Vol:
    E94-A No:8
      Page(s):
    1756-1759

    Complex-valued Associative Memory (CAM) is an advanced model of Hopfield Associative Memory. The CAM is based on multi-state neurons and has the high ability of representation. Lee proposed gradient descent learning for the CAM to improve the storage capacity. It is based on only the phases of input signals. In this paper, we propose another type of gradient descent learning based on both the phases and the amplitude. The proposed learning method improves the noise robustness and accelerates the learning speed.

  • 2-Dimensional Accurate Imaging with UWB Radar Using Indoor Multipath Echoes for a Target in Shadow Regions

    Shuhei FUJITA  Takuya SAKAMOTO  Toru SATO  

     
    PAPER-Sensing

      Vol:
    E94-B No:8
      Page(s):
    2366-2374

    UWB (Ultra Wide-Band) pulse radar is promising for surveillance systems because it has an outstanding high range-resolution. To realize an accurate UWB radar imaging system, we propose a new approach that employs multipath echoes from a target in an indoor environment. Using multipath echoes, the proposed system can accurately estimate images, even for targets in a shadow region where the targets are out of sight of the antenna. We apply a simple interferometry technique using the multiple mirror image antennas generated by multipath propagation. We find that this simple method also produces many undesired false image points. To tackle this issue, we also propose an effective false image reduction algorithm to obtain a clear image. Numerical simulations verify that most of the false image points are removed and the target shape is accurately estimated.

  • Kalman-Filtering-Based Joint Angle Measurement with Wireless Wearable Sensor System for Simplified Gait Analysis

    Hiroki SAITO  Takashi WATANABE  

     
    LETTER-Rehabilitation Engineering and Assistive Technology

      Vol:
    E94-D No:8
      Page(s):
    1716-1720

    The aim of this study is to realize a simplified gait analysis system using wearable sensors. In this paper, a joint angle measurement method using Kalman filter to correct gyroscope signals from accelerometer signals was examined in measurement of hip, knee and ankle joint angles with a wireless wearable sensor system, in which the sensors were attached on the body without exact positioning. The lower limb joint angles of three healthy subjects were measured during gait with the developed sensor system and a 3D motion measurement system in order to evaluate the measurement accuracy. Then, 10 m walking measurement was performed under different walking speeds with a healthy subject in order to find the usefulness of the system as a simplified gait analysis system. The joint angles were measured with reasonable accuracy, and the system showed joint angle changes that were similar to those shown in a previous report as walking speed changed. It would be necessary to examine the influence of sensor attachment position and method for more stable measurement, and also to study other parameters for gait evaluation.

  • A Wide Dynamic Range Variable Gain Amplifier with Enhanced IP1 dB and Temperature Compensation

    Hisayasu SATO  Takaya MARUYAMA  Toshimasa MATSUOKA  Kenji TANIGUCHI  

     
    PAPER-Integrated Electronics

      Vol:
    E94-C No:8
      Page(s):
    1311-1319

    This paper presents the design consideration of a four-stage variable gain amplifier (VGA) with a wide dynamic range for receivers. The VGA uses parallel amplifiers for the first and second amplifiers in order to improve the input third-order intercept point (IIP3) in the low gain region. To investigate the behavior of the VGA, the gain and linearity analyses are newly derived for the parallel amplifiers, and are compared with the measured results. In addition, the principle of the temperature compensation is described. The gain control range of 110 dB, the IP1 dB of -11 dBm, and noise figure (NF) of 5.1 dB were measured using a 0.5 µm 26 GHz fT BiCMOS process.

  • A 0.18 µm CMOS Wide-Band Injection-Locked Frequency Divider Using Push-Push Oscillator

    Sheng-Lyang JANG  Chia-Wei CHANG  Yu-Sheng CHEN  Jhin-Fang HUANG  Jau-Wei HSIEH  Chong-Wei HUANG  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E94-C No:8
      Page(s):
    1332-1335

    A novel divide-by-3 injection-locked frequency divider (ILFD) is proposed. The ILFD circuit is realized with a cross-coupled n-core MOS LC-tank oscillator embedded with a push-push signal generator and two injection MOSFETs for coupling the injection signal into the resonator. The ILFD uses the linear mixer to extend the locking range and has been implemented in a standard 0.18 µm CMOS process. The core power consumption of the ILFD core is 3.12 mW. The divider's free-running frequency is tunable from 4.26 GHz to 4.9 GHz by tuning the varactor's control bias, and at the incident power of 0 dBm the locking range of the ILFD used as a divide-by-3 divider is 1.5 GHz, from 12.5 GHz to 14.0 GHz.

  • Performance Evaluation of TCP/IP over SCTP/IP Parallel Networking with Parallel Route Transmission

    Shota YAMADA  Daisuke ISHII  Satoru OKAMOTO  Naoaki YAMANAKA  

     
    LETTER-Network

      Vol:
    E94-B No:8
      Page(s):
    2394-2396

    In this paper, Transmission Control Protocol/Internet Protocol (TCP/IP) over Stream Control Transmission Protocol (SCTP)/IP parallel transmission system is proposed to realize large TCP/IP throughput. The proposed system enables SCTP/IP connection between switches by protocol stacking. The proposed system is implemented on a software switch to evaluate its performance. The evaluation result indicates that proposed system can achieve 90% throughput compared with serial transmission when the delay difference among parallel routes is 20 msec.

  • Multi-Static UWB Radar Approach Based on Aperture Synthesis of Double Scattered Waves for Shadow Region Imaging

    Shouhei KIDERA  Tetsuo KIRIMOTO  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E94-C No:8
      Page(s):
    1320-1323

    The applicability in harsh optical environments, such as dark smog, or strong backlight of ultra-wide band (UWB) pulse radar has a definite advantage over optical ranging techniques. We have already proposed the extended Synthetic Aperture Radar (SAR) algorithm employing double scattered waves, which aimed at enhancing the reconstructible region of the target boundary including shadow region. However, it still suffers from the shadow area for the target that has a sharp inclination or deep concave boundary, because it assumes a mono-static model, whose real aperture size is, in general, small. To resolve this issue, this study proposes an extension algorithm of the double scattered SAR based on a multi-static configuration. While this extension is quite simple, the effectiveness of the proposed method is nontrivial with regard to the expansion of the imaging range. The results from numerical simulations verify that our method significantly enhances the visible range of the target surfaces without a priori knowledge of the target shapes or any preliminary observation of its surroundings.

  • Modeling of Electric Vehicle Charging Systems in Communications Enabled Smart Grids

    Seung Jun BAEK  Daehee KIM  Seong-Jun OH  Jong-Arm JUN  

     
    LETTER-Information Network

      Vol:
    E94-D No:8
      Page(s):
    1708-1711

    We consider a queuing model with applications to electric vehicle (EV) charging systems in smart grids. We adopt a scheme where an Electric Service Company (ESCo) broadcasts a one bit signal to EVs, possibly indicating 'on-peak' periods during which electricity cost is high. EVs randomly suspend/resume charging based on the signal. To model the dynamics of EVs we propose an M/M/∞ queue with random interruptions, and analyze the dynamics using time-scale decomposition. There exists a trade-off: one may postpone charging activity to 'off-peak' periods during which electricity cost is cheaper, however this incurs extra delay in completion of charging. Using our model we characterize achievable trade-offs between the mean cost and delay perceived by users. Next we consider a scenario where EVs respond to the signal based on the individual loads. Simulation results show that peak electricity demand can be reduced if EVs carrying higher loads are less sensitive to the signal.

  • Lightweight Consistent Recovery Algorithm for Sender-Based Message Logging in Distributed Systems

    Jinho AHN  

     
    LETTER-Dependable Computing

      Vol:
    E94-D No:8
      Page(s):
    1712-1715

    Sender-based message logging (SBML) with checkpointing has its well-known beneficial feature, lowering highly failure-free overhead of synchronous logging with volatile logging at sender's memory. This feature encourages it to be applied into many distributed systems as a low-cost transparent rollback recovery technique. However, the original SBML recovery algorithm may no longer be progressing in some transient communication error cases. This paper proposes a consistent recovery algorithm to solve this problem by piggybacking small log information for unstable messages received on each acknowledgement message for returning the receive sequence number assigned to a message by its receiver. Our algorithm also enables all messages scheduled to be sent, but delayed because of some preceding unstable messages to be actually transmitted out much earlier than the existing ones.

  • More on the Impulse Sensitivity Functions of CMOS Differential LC Oscillators

    Shey-Shi LU  Hsiao-Chin CHEN  Shih-An YU  

     
    PAPER-Circuit Theory

      Vol:
    E94-A No:8
      Page(s):
    1671-1681

    The effective ISFs of differential LC oscillators are derived under the assumption that the drain-to-source current is linearly dependent on the gate-to-source voltage for transistors operated in saturation. Moreover, a new interpretation of phase noise is given by examining the real vector diagram of the carrier signal, upon which the noise voltage induced by the impulse noise current is superimposed. The distinct feature of our vector diagram lies in that the noise voltage is always parallel with the horizontal axis. From the Fourier transformations of the derived effective ISFs, the phase noise of differential LC oscillators can be formulated with physical meanings in the frequency domain. The proposed theory can well describe the translation of the noise spectra when the noises from the LC-tank, the switching transistors, and the tail current source are converted into the phase noise. Theoretical predictions from our formulas agree well with the simulation results.

  • Selective Scanning Scheme for Femtocells in IEEE 802.16e Systems

    Shin-Hun KANG  Jinwoo PARK  Jae-Hyun KIM  

     
    LETTER-Network

      Vol:
    E94-B No:8
      Page(s):
    2382-2385

    Femtocell is considered a promising solution for indoor service enhancement in IEEE 802.16e cellular systems. However, the scanning scheme of IEEE 802.16e is not suitable for direct use in scanning femtocells in terms of efficiency and scan duration. In this paper, we propose an efficient scanning scheme for femtocells in IEEE 802.16e systems. The proposed scheme can achieve a lower scanning overhead by reducing the number of femtocells needed to be scanned. Numerical results show that the proposed scanning scheme can reduce the control message overhead and the scan duration.

  • Detecting Stealthy Spreaders by Random Aging Streaming Filters

    MyungKeun YOON  Shigang CHEN  

     
    PAPER-Internet

      Vol:
    E94-B No:8
      Page(s):
    2274-2281

    Detecting spreaders, or scan sources, helps intrusion detection systems (IDS) identify potential attackers. The existing work can only detect aggressive spreaders that scan a large number of distinct destinations in a short period of time. However, stealthy spreaders may perform scanning deliberately at a low rate. We observe that these spreaders can easily evade the detection because current IDS's have serious limitations. Being lightweight, the proposed scheme can detect scan sources in high speed networking while residing in SRAM. By theoretical analysis and experiments on real Internet traffic traces, we demonstrate that the proposed scheme detects stealthy spreaders successfully.

  • A 4.7 µA Quiescent Current, 450 mA CMOS Low-Dropout Regulator with Fast Transient Response

    Sau Siong CHONG  Hendra KWANTONO  Pak Kwong CHAN  

     
    PAPER-Electronic Circuits

      Vol:
    E94-C No:8
      Page(s):
    1271-1281

    This paper presents a new low-dropout (LDO) regulator with low-quiescent, high-drive and fast-transient performance. This is based on a new composite power transistor composed of a shunt feedback class-AB embedded gain stage and the application of dynamic-biasing schemes to both the error amplifier as well as the composite power transistor. The proposed LDO regulator has been simulated and validated using BSIM3 models and GLOBALFOUNDRIES 0.18-µm CMOS process. The simulation results have shown that the LDO regulator consumes 4.7 µA quiescent current at no load, regulating the output at 1 V from a minimum 1.2 V supply. It is able to deliver up to 450 mA load current with a dropout of 200 mV. It can be stabilized using a 4.7 µF output capacitor with a 0.1 Ω ESR resistor. The maximum transient output voltage is 64.6 mV on the basis of a load step change of 450 mA/10 ns under typical condition. The full load transient response is less than 350 ns.

  • Probabilistic Broadcast-Based Cache Invalidation Scheme for Location Dependent Data in Mobile Environments

    Shigeaki TAGASHIRA  Yutaka KAMINISHI  Yutaka ARAKAWA  Teruaki KITASUKA  Akira FUKUDA  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E94-D No:8
      Page(s):
    1590-1601

    Data caching is widely known as an effective power-saving technique, in which mobile devices use local caches instead of original data placed on a server, in order to reduce the power consumption necessary for network accesses. In such data caching, a cache invalidation mechanism is important in preventing these devices from unintentionally accessing invalid data. In this paper, we propose a broadcast-based protocol for cache invalidation in a location-aware system. The proposed protocol is designed to reduce the access time required for obtaining necessary invalidation reports through broadcast media and to avoid client-side sleep fragmentation while retrieving the reports. In the proposed protocol, a Bloom filter is used as the data structure of an invalidation report, in order to probabilistically check the invalidation of caches. Furthermore, we propose three broadcast scheduling methods that are intended to achieve flexible broadcasting structured by the Bloom filter: fragmentation avoidance scheduling method (FASM), metrics balancing scheduling method (MBSM), and minimizing access time scheduling method (MASM). The broadcast schedule is arranged for consecutive accesses to geographically neighboring invalidation reports. In addition, the effectiveness of the proposed methods is evaluated by simulation. The results indicate that the MBSM and MASM achieve a high rate of performance scheduling. Compared to the FASM, the MBSM reduces the access time by 34%, while the fragmentations on the resultant schedule increase by 40%, and the MASM reduces the access time by 40%, along with an 85% increase in the number of fragmentations.

  • An Algorithm for Attitude Signal Simulation Based on Visible Satellite Synchronous Scheduling

    Qing CHANG  Wei QI  Lvqian ZHANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:7
      Page(s):
    2114-2117

    In view of the frequent and complex changes of GNSS visible satellite constellation in attitude determination system, an improved attitude signal simulation algorithm for high dynamic satellite signal simulator is proposed. Based on Software Radio architecture, elevation calculation in the antenna coordinate system and channel state control logic under the condition of carrier attitude changes are introduced into the algorithm to implement synchronous scheduling of visible satellite constellation and attitude signal simulation. This work guarantees the simulator to run constantly and stably for a long time with the advantages of high precision and low complexity. Compared with synchronous positioning results from the receiver, the simulation results show that not only can the output signals of the simulator accurately reflect the carrier's attitude characteristics, but also no step error is generated and the positioning precision is not influenced when visible satellite constellation changes.

  • Information-Theoretic Secrecy with Access to Decryption Oracles

    Christopher PORTMANN  Keisuke TANAKA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:7
      Page(s):
    1585-1590

    We analyze the security notion of information-theoretic secrecy against an adversary who can make adaptive queries to the decryption oracle, and show that it is equivalent to requiring that the encryption scheme can perfectly encrypt +1 different messages. This immediately yields a lower bound on the key length and an optimal construction, namely (+1)-wise independent permutations. This also gives an operational interpretation to the notion of decryption oracles in information-theoretic security.

  • Optimal Selection Criterion of the Modulation and Coding Scheme in Consideration of the Signaling Overhead of Mobile WiMAX Systems

    Jaewoo SO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:7
      Page(s):
    2153-2157

    An optimal selection criterion of the modulation and coding scheme (MCS) for maximizing spectral efficiency is proposed in consideration of the signaling overhead of mobile WiMAX systems with a hybrid automatic repeat request mechanism. A base station informs users about the resource assignments in each frame, and the allocation process generates a substantial signaling overhead, which influences the system throughput. However, the signaling overhead was ignored in previous MCS selection criteria. In this letter, the spectral efficiency is estimated on the basis of the signaling overhead and the number of transmissions. The performance of the proposed MCS selection criterion is evaluated in terms of the spectral efficiency in the mobile WiMAX system, with and without persistent allocation.

  • Efficient Iterative Frequency Domain Equalization for Single Carrier System with Insufficient Cyclic Prefix

    Chuan WU  Dan BAO  Xiaoyang ZENG  Yun CHEN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:7
      Page(s):
    2174-2177

    In this letter we present efficient iterative frequency domain equalization for single-carrier (SC) transmission systems with insufficient cyclic prefix (CP). Based on minimum mean square error (MMSE) criteria, iterative decision feedback frequency domain equalization (IDF-FDE) combined with cyclic prefix reconstruction (CPR) is derived to mitigate inter-symbol interference (ISI) and inter-carrier interference (ICI). Computer simulation results reveal that the proposed scheme significantly improves the performance of SC systems with insufficient CP compared with previous schemes.

  • A Development of Cascade Granular Neural Networks

    Keun-Chang KWAK  

     
    LETTER-Biocybernetics, Neurocomputing

      Vol:
    E94-D No:7
      Page(s):
    1515-1518

    This paper studies the design of Cascade Granular Neural Networks (CGNN) for human-centric systems. In contrast to typical rule-based systems encountered in fuzzy modeling, the proposed method consists of two-phase development for CGNN. First, we construct a Granular Neural Network (GNN) which could be treated as a preliminary design. Next, all modeling discrepancies are compensated by a second GNN with a collection of rules that become attached to the regions of the input space where the error is localized. These granular networks are constructed by building a collection of user-centric information granules through Context-based Fuzzy c-Means (CFCM) clustering. Finally, the experimental results on two examples reveal that the proposed approach shows good performance in comparison with the previous works.

  • Differential Behavior Equivalent Classes of Shift Register Equivalents for Secure and Testable Scan Design

    Katsuya FUJIWARA  Hideo FUJIWARA  Hideo TAMAMOTO  

     
    PAPER-Dependable Computing

      Vol:
    E94-D No:7
      Page(s):
    1430-1439

    It is important to find an efficient design-for-testability methodology that satisfies both security and testability, although there exists an inherent contradiction between security and testability for digital circuits. In our previous work, we reported a secure and testable scan design approach by using extended shift registers that are functionally equivalent but not structurally equivalent to shift registers, and showed a security level by clarifying the cardinality of those classes of shift register equivalents (SR-equivalents). However, SR-equivalents are not always secure for scan-based side-channel attacks. In this paper, we consider a scan-based differential-behavior attack and propose several classes of SR-equivalent scan circuits using dummy flip-flops in order to protect the scan-based differential-behavior attack. To show the security level of those SR-equivalent scan circuits, we introduce a differential-behavior equivalent relation and clarify the number of SR-equivalent scan circuits, the number of differential-behavior equivalent classes and the cardinality of those equivalent classes.

1481-1500hit(4570hit)