The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

3061-3080hit(16314hit)

  • Multiple k-Nearest Neighbor Classifier and Its Application to Tissue Characterization of Coronary Plaque

    Eiji UCHINO  Ryosuke KUBOTA  Takanori KOGA  Hideaki MISAWA  Noriaki SUETAKE  

     
    PAPER-Biological Engineering

      Pubricized:
    2016/04/15
      Vol:
    E99-D No:7
      Page(s):
    1920-1927

    In this paper we propose a novel classification method for the multiple k-nearest neighbor (MkNN) classifier and show its practical application to medical image processing. The proposed method performs fine classification when a pair of the spatial coordinate of the observation data in the observation space and its corresponding feature vector in the feature space is provided. The proposed MkNN classifier uses the continuity of the distribution of features of the same class not only in the feature space but also in the observation space. In order to validate the performance of the present method, it is applied to the tissue characterization problem of coronary plaque. The quantitative and qualitative validity of the proposed MkNN classifier have been confirmed by actual experiments.

  • A 3.5ppm/°C 0.85V Bandgap Reference Circuit without Resistors

    Jing WANG  Qiang LI  Li DING  Hirofumi SHINOHARA  Yasuaki INOUE  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E99-A No:7
      Page(s):
    1430-1437

    A CMOS bandgap reference circuit without resistors, which can successfully operate under 1V supply voltage is proposed. The improvement is realized by the technique of the voltage divider and a new current source. The most attractive merit is that the proposed circuit breaks the bottleneck of low supply voltage design caused by the constant bandgap voltage value (1.25V). Moreover, the temperature coefficient of the reference voltage Vref is improved by compensating the temperature dependence caused by the current source. The simulation results using a standard CMOS 0.18 um process show that the value of Vref can be achieved around 0.5 V with a minimum supply voltage of 0.85 V. Meanwhile, the temperature coefficient of the output voltage is only 3.5ppm/°C from 0 °C to 70 °C.

  • API-Based Software Birthmarking Method Using Fuzzy Hashing

    Donghoon LEE  Dongwoo KANG  Younsung CHOI  Jiye KIM  Dongho WON  

     
    PAPER-Information Network

      Pubricized:
    2016/04/15
      Vol:
    E99-D No:7
      Page(s):
    1836-1851

    The software birthmarking technique has conventionally been studied in fields such as software piracy, code theft, and copyright infringement. The most recent API-based software birthmarking method (Han et al., 2014) extracts API call sequences in entire code sections of a program. Additionally, it is generated as a birthmark using a cryptographic hash function (MD5). It was reported that different application types can be categorized in a program through pre-filtering based on DLL/API numbers/names. However, similarity cannot be measured owing to the cryptographic hash function, occurrence of false negatives, and it is difficult to functionally categorize applications using only DLL/API numbers/names. In this paper, we propose an API-based software birthmarking method using fuzzy hashing. For the native code of a program, our software birthmarking technique extracts API call sequences in the segmented procedures and then generates them using a fuzzy hash function. Unlike the conventional cryptographic hash function, the fuzzy hash is used for the similarity measurement of data. Our method using a fuzzy hash function achieved a high reduction ratio (about 41% on average) more than an original birthmark that is generated with only the API call sequences. In our experiments, when threshold ε is 0.35, the results show that our method is an effective birthmarking system to measure similarities of the software. Moreover, our correlation analysis with top 50 API call frequencies proves that it is difficult to functionally categorize applications using only DLL/API numbers/names. Compared to prior work, our method significantly improves the properties of resilience and credibility.

  • Q-Value Fine-Grained Adjustment Based RFID Anti-Collision Algorithm

    Jian SU  Xuefeng ZHAO  Danfeng HONG  Zhongqiang LUO  Haipeng CHEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:7
      Page(s):
    1593-1598

    Fast identification is an urgent demand for modern RFID systems. In this paper, we propose a novel algorithm, access probability adjustment based fine-grained Q-algorithm (APAFQ), to enhance the efficiency of RFID identification with low computation overhead. Specifically, instead of estimation accuracy, the target of most proposed anti-collision algorithms, the APAFQ scheme is driven by updating Q value with two different weights, slot by slot. To achieve higher identification efficiency, the reader adopts fine-grained access probability during the identification process. Moreover, based on the responses from tags, APAFQ adjusts the access probability adaptively. Simulations show the superiority of APAFQ over existing Aloha-based algorithms.

  • Interconnection-Delay and Clock-Skew Estimate Modelings for Floorplan-Driven High-Level Synthesis Targeting FPGA Designs

    Koichi FUJIWARA  Kazushi KAWAMURA  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER

      Vol:
    E99-A No:7
      Page(s):
    1294-1310

    Recently, high-level synthesis techniques for FPGA designs (FPGA-HLS techniques) are strongly required in various applications. Both interconnection delays and clock skews have a large impact on circuit performance implemented onto FPGA, which indicates the need for floorplan-driven FPGA-HLS algorithms considering them. To appropriately estimate interconnection delays and clock skews at HLS phase, a reasonable model to estimate them becomes essential. In this paper, we demonstrate several experiments to characterize interconnection delays and clock skews in FPGA and propose novel estimate models called “IDEF” and “CSEF”. In order to evaluate our models, we integrate them into a conventional floorplan-driven FPGA-HLS algorithm. Experimental results demonstrate that our algorithm can realize FPGA designs which reduce the latency by up to 22% compared with conventional approaches.

  • A 0.0055mm2 480µW Fully Synthesizable PLL Using Stochastic TDC in 28nm FDSOI

    Dongsheng YANG  Tomohiro UENO  Wei DENG  Yuki TERASHIMA  Kengo NAKATA  Aravind Tharayil NARAYANAN  Rui WU  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER

      Vol:
    E99-C No:6
      Page(s):
    632-640

    A fully synthesizable all-digital phase-locked loop (AD-PLL) with a stochastic time-to-digital converter (STDC) is proposed in this paper. The whole AD-PLL circuit design is based on only standard cells from digital library, thus the layout of this AD-PLL can be automatically synthesized by a commercial place-and-route (P&R) tool with a foundry-provided standard-cell library. No manual layout and process modification is required in the whole AD-PLL design. In order to solve the delay mismatch issue in the delay-line-based time-to-digital converter (TDC), an STDC employing only standard D flip-flop (DFF) is presented to mitigate the sensitivity to layout mismatch resulted from automatic P&R. For the stochastic TDC, the key idea is to utilize the layout uncertainty due to automatic P&R which follows Gaussian distribution according to statistics theory. Moreover, the fully synthesized STDC can achieve a finer resolution compared to the conventional TDC. Implemented in a 28nm fully depleted silicon on insulator (FDSOI) technology, the fully synthesized PLL consumes only 480µW under 1.0V power supply while operating at 0.9GHz. It achieves a figure of merit (FoM) of -231.1dB with 4.0ps RMS jitter while occupying 0.0055mm2 chip area only.

  • Free Space Optic and mmWave Communications: Technologies, Challenges and Applications Open Access

    Tawfik ISMAIL  Erich LEITGEB  Thomas PLANK  

     
    INVITED PAPER

      Vol:
    E99-B No:6
      Page(s):
    1243-1254

    Increasing demand in data-traffic has been addressed over the last few years. It is expected that the data-traffic will present the significant part of the total backbone traffic. Accordingly, much more transmission systems will be required to support this growth. A free space optic (FSO) communication is the greatest promising technology supporting high-speed and high-capacity transport networks. It can support multi Gbit/s for few kilometers transmission distance. The benefits of an FSO system are widespread, low cost, flexibility, immunity to electromagnetic field, fast deployment, security, etc. However, it suffers from some drawbacks, which limit the deployment of FSO links. The main drawback in FSO is the degradation in the signal quality because of atmospheric channel impairments. In addition, it is high sensitive for illumination noise coming from external sources such as sun and lighting systems. It is more benefit that FSO and mmWave are operating as a complementary solution that is known as hybrid FSO/mmWave links. Whereas the mmWave is susceptible to heavy rain conditions and oxygen absorption, while fog has no particular effect. This paper will help to better understand the FSO and mmWave technologies and applications operating under various atmospheric conditions. Furthermore, in order to improve the system performance and availability, several modulation schemes will be discussed. In addition to, the hybrid FSO/mmWave with different diversity combining techniques are presented.

  • The Failure Probabilities of Random Linear Network Coding at Sink Nodes

    Dan LI  Xuan GUANG  Fang-Wei FU  

     
    LETTER-Information Theory

      Vol:
    E99-A No:6
      Page(s):
    1255-1259

    In the paradigm of network coding, when the network topology information cannot be utilized completely, random linear network coding (RLNC) is proposed as a feasible coding scheme. But since RLNC neither considers the global network topology nor coordinates codings between different nodes, it may not achieve the best possible performance of network coding. Hence, the performance analysis of RLNC is very important for both theoretical research and practical applications. Motivated by a fact that different network topology information can be available for different network communication problems, we study and obtain several upper and lower bounds on the failure probability at sink nodes depending on different network topology information in this paper, which is also the kernel to discuss some other types of network failure probabilities. In addition, we show that the obtained upper bounds are tight, the obtained lower bound is asymptotically tight, and we give the worst cases for different scenarios.

  • A 10-bit 20-MS/s Asynchronous SAR ADC with Meta-Stability Detector Using Replica Comparators

    Sang-Min PARK  Yeon-Ho JEONG  Yu-Jeong HWANG  Pil-Ho LEE  Yeong-Woong KIM  Jisu SON  Han-Yeol LEE  Young-Chan JANG  

     
    BRIEF PAPER

      Vol:
    E99-C No:6
      Page(s):
    651-654

    A 10-bit 20-MS/s asynchronous SAR ADC with a meta-stability detector using replica comparators is proposed. The proposed SAR ADC with the area of 0.093mm2 is implemented using a 130-nm CMOS process with a 1.2-V supply. The measured peak ENOBs for the full rail-to-rail differential input signal is 9.6bits.

  • User-Centric Approach for Bandwidth Allocation Method Based on Quality of Experience

    Huong PHAM-THI  Takumi MIYOSHI  

     
    PAPER

      Vol:
    E99-B No:6
      Page(s):
    1282-1290

    This paper focuses on the bandwidth allocation methods based on real user experience for web browsing applications. Because the Internet and its services are rapidly increasing, the bandwidth allocation problem has become one of the typical challenges for Internet service providers (ISPs) and network planning with respect to providing high service quality. The quality of experience (QoE) plays an important role in the success of services, and the guarantee of QoE accordingly represents an important goal in network resource control schemes. To cope with this issue, this paper proposes two user-centric bandwidth resource allocation methods for web browsing applications. The first method dynamically allocates bandwidth by considering the same user's satisfaction in terms of QoE with respect to all users in the system, whereas the second method introduces an efficient trade-off between the QoE of each user group and the average QoE of all users. The purpose of these proposals is to provide a flexible solution to reasonably allocate limited network resources to users. By considering service quality from real users' perception viewpoint, the proposed allocation methods enable us to understand actual users' experiences. Compared to previous works, the numerical results show that the proposed bandwidth allocation methods achieve the following contributions: improving the QoE level for dissatisfied users and providing a fair distribution, as well as retaining a reasonable average QoE.

  • Constructions of Gaussian Integer Sequences with Zero Correlation Zone

    Xiaoyu CHEN  Deming KONG  Chengqian XU  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:6
      Page(s):
    1260-1263

    Based on a perfect Gaussian integer sequence, shift and combination operations are performed to construct Gaussian integer sequences with zero correlation zone (ZCZ). The resultant sequence sets are optimal or almost optimal with respect to the Tang-Fan-Matsufuji bound. Furthermore, the ZCZ Gaussian integer sequence sets can be provided for quasi-synchronous code-division multiple-access systems to increase transmission data rate and reduce interference.

  • A Robust Algorithm for Extracting Signals with Temporal Structure

    Yibing LI  Wei NIE  Fang YE  

     
    PAPER-Biological Engineering

      Pubricized:
    2016/03/15
      Vol:
    E99-D No:6
      Page(s):
    1671-1677

    The separation of signals with temporal structure from mixed sources is a challenging problem in signal processing. For this problem, blind source extraction (BSE) is more suitable than blind source separation (BSS) because it has lower computation cost. Nowadays many BSE algorithms can be used to extract signals with temporal structure. However, some of them are not robust because they are too dependent on the estimation precision of time delay; some others need to choose parameters before extracting, which means that arbitrariness can't be avoided. In order to solve the above problems, we propose a robust source extraction algorithm whose performance doesn't rely on the choice of parameters. The algorithm is realized by maximizing the objective function that we develop based on the non-Gaussianity and the temporal structure of source signals. Furthermore, we analyze the stability of the algorithm. Simulation results show that the algorithm can extract the desired signal from large numbers of observed sensor signals and is very robust to error in the estimation of time delay.

  • Convertible Nominative Signatures from Standard Assumptions without Random Oracles

    Goichiro HANAOKA  Jacob SCHULDT  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1107-1121

    While standard signatures provide an efficient mechanism for information certification, the lack of privacy protecting measures makes them unsuitable if sensitive or confidential information is being certified. In this paper, we revisit nominative signatures, first introduced by Kim, Park and Won, which provides the functionality and security guarantees required to implement a certification system allowing the user (and not the authority) to control the verifiability of an obtained certificate. Unlike systems based on related primitives, the use of nominative signatures protects the user against authority information leaks and impersonation attacks based on these. We refine the security model of nominative signatures, and propose a new efficient scheme which is provably secure based on the computational Diffie-Hellman problem and the decisional linear problem. To the best of our knowledge, our scheme is the the only nominative signature scheme which is provably secure in the standard model based on standard assumptions. Furthermore, unlike most previous schemes, the proposed scheme provides signatures which hide both the signer and user identity. Hence, through our nominative signature scheme, we achieve an efficient non-transferable user certification scheme with strong security guarantees.

  • RSFQ 4-bit Bit-Slice Integer Multiplier

    Guang-Ming TANG  Kazuyoshi TAKAGI  Naofumi TAKAGI  

     
    PAPER

      Vol:
    E99-C No:6
      Page(s):
    697-702

    A rapid single-flux-quantum (RSFQ) 4-bit bit-slice multiplier is proposed. A new systolic-like multiplication algorithm suitable for RSFQ implementation is developed. The multiplier is designed using the cell library for AIST 10-kA/cm2 1.0-µm fabrication technology (ADP2). Concurrent flow clocking is used to design a fully pipelined RSFQ logic design. A 4n×4n-bit multiplier consists of 2n+17 stages. For verifying the algorithm and the logic design, a physical layout of the 8×8-bit multiplier has been designed with target operating frequency of 50GHz and simulated. It consists of 21 stages and 11,488 Josephson junctions. The simulation results show correct operation up to 62.5GHz.

  • Score Level Fusion for Network Traffic Application Identification

    Masatsugu ICHINO  Hiroaki MAEDA  Hiroshi YOSHIURA  

     
    PAPER-Internet

      Vol:
    E99-B No:6
      Page(s):
    1341-1352

    A method based on score level fusion using logistic regression has been developed that uses packet header information to classify Internet applications. Applications are classified not on the basis of the individual flows for each type of application but on the basis of all the flows for each type of application, i.e., the “overall traffic flow.” The overall traffic flow is divided into equal time slots, and the applications are classified using statistical information obtained for each time slot. Evaluation using overall traffic flow generated by five types of applications showed that its true and false positive rates are better than those of methods using feature level fusion.

  • Pseudo-CMOS with Re-Pull-Down Transistor: A Low Power Inverter Design for Thin-Film Transistors

    Lihao ZHONG  Ruohe YAO  Fei LUO  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E99-C No:6
      Page(s):
    727-729

    In order to further optimize the power consumption of Pseudo-CMOS inverter, this paper proposes a Re-Pull-Down transistor scheme. Two additional transistors are used to build another pull-down network. With this design, the quiescent current of the inverter can be reduced while the ratioless nature is preserved. Based on the reduced input gate area, two output transistors are set wider to compensate for the pull-up speed. The simulation result shows that, compared with Pseudo-CMOS inverter, the maximum quiescent current of the Re-Pull-Down transistor scheme inverter is reduced by 37.6% in the static analysis. Besides, the average power consumption is reduced by 30.8% in the 5-stage ring oscillator test.

  • A Practical Extended Harmonic Disturbance Observer Design for Robust Current Control of Speed Sensorless DC Motor Drives

    In Hyuk KIM  Young Ik SON  

     
    LETTER-Systems and Control

      Vol:
    E99-A No:6
      Page(s):
    1243-1246

    An extended harmonic disturbance observer is designed for speed (or position) sensorless current control of DC motor subject to a biased sinusoidal disturbance and parameter uncertainties. The proposed method does not require the information on the mechanical part of the motor equation. Theoretical analysis via the singular perturbation theory is performed to verify that the feedforward compensation using the estimation can improve the robust transient performance of the closed-loop system. A stability condition is derived against parameter uncertainties. Comparative experimental results validate the robustness of the proposed method against the uncertainties.

  • A Similarity Study of Interactive Content-Based Image Retrieval Scheme for Classification of Breast Lesions

    Hyun-chong CHO  Lubomir HADJIISKI  Berkman SAHINER  Heang-Ping CHAN  Chintana PARAMAGUL  Mark HELVIE  Alexis V. NEES  Hyun Chin CHO  

     
    PAPER-Biological Engineering

      Pubricized:
    2016/02/29
      Vol:
    E99-D No:6
      Page(s):
    1663-1670

    To study the similarity between queries and retrieved masses, we design an interactive CBIR (Content-based Image Retrieval) CADx (Computer-aided Diagnosis) system using relevance feedback for the characterization of breast masses in ultrasound (US) images based on radiologists' visual similarity assessment. The CADx system retrieves masses that are similar to query masses from a reference library based on six computer-extracted features that describe the texture, width-to-height, and posterior shadowing of the mass. The k-NN retrieval with Euclidean distance similarity measure and the Rocchio relevance feedback algorithm (RRF) are used. To train the RRF parameters, the similarities of 1891 image pairs from 62 (31 malignant and 31 benign) masses are rated by 3 MQSA (Mammography Quality Standards Act) radiologists using a 9-point scale (9=most similar). The best RRF parameters are chosen based on 3 observer experiments. For testing, 100 independent query masses (49 malignant and 51 benign) and 121 reference masses on 230 (79 malignant and 151 benign) images were collected. Three radiologists rated the similarity between the query masses and the computer-retrieved masses. Average similarity ratings without and with RRF were 5.39 and 5.64 for the training set and 5.78 and 6.02 for the test set, respectively. Average AUC values without and with RRF were, respectively, 0.86±0.03 and 0.87±0.03 for the training set and 0.91±0.03 and 0.90±0.03 for the test set. On average, masses retrieved using the CBIR system were moderately similar to the query masses based on radiologists' similarity assessments. RRF improved the similarity of the retrieved masses.

  • Steady State Analysis of the TCP Network with RED Algorithm

    Daisuke ITO  Tetsushi UETA  

     
    LETTER-Nonlinear Problems

      Vol:
    E99-A No:6
      Page(s):
    1247-1250

    The transmission control protocol with a random early detection (TCP/RED) is an important algorithm for a TCP congestion control [1]. It has been expressed as a simple second-order discrete-time hybrid dynamical model, and shows unique and typical nonlinear phenomena, e.g., bifurcation phenomena or chaotic attractors [2], [3]. However, detailed behavior is unclear due to discontinuity that describes the switching of transmission phases in TCP/RED, but we have proposed its analysis method in previous study. This letter clarifies bifurcation structures with it.

  • A Convolution Theorem for Multiple-Valued Logic Polynomials of a Semigroup Type and Their Fast Multiplication

    Hajime MATSUI  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1025-1033

    In this paper, a convolution theorem which is analogous to the theorem for Fourier transform is shown among a certain type of polynomials. We establish a fast method of the multiplication in a special class of quotient rings of multivariate polynomials over q-element finite field GF(q). The polynomial which we treat is one of expressing forms of the multiple-valued logic function from the product of the semigroups in GF(q) to GF(q). Our results can be applied to the speedup of both software and hardware concerning multiple-valued Boolean logic.

3061-3080hit(16314hit)