The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

3601-3620hit(16314hit)

  • QAM Periodic Complementary Sequence Sets

    Fanxin ZENG  Zhenyu ZHANG  

     
    LETTER-Information Theory

      Vol:
    E98-A No:6
      Page(s):
    1329-1333

    The mappings from independent binary variables to quadrature amplitude modulation (QAM) symbols are developed. Based the proposed mappings and the existing binary mutually uncorrelated complementary sequence sets (MUCSSs), a construction producing QAM periodic complementary sequence sets (PCSSs) is presented. The resultant QAM PCSSs have the same numbers and periods of sub-sequences as the binary MUCSSs employed, and the family size of new sequence sets is increased with exponent of periods of sub-sequences. The proposed QAM PCSSs can be applied to CDMA or OFDM communication systems so as to suppress multiple access interference (MAI) or to reduce peak-to-mean envelope power ratio (PMEPR), respectively.

  • Digitally Assisted Analog and RF Circuits Open Access

    Kenichi OKADA  

     
    INVITED PAPER

      Vol:
    E98-C No:6
      Page(s):
    461-470

    In this paper, the importance and perspective for the digitally-assisted analog and RF circuits are discussed, especially related to wireless transceivers. Digital calibration techniques for compensating I/Q mismatch, IM2, and LO impairments in cellular, 2.4,GHz WiFi, and 60,GHz WiGig transceivers are introduced with detailed analysis and circuit implementations. Future technology directions such as the shift from digitally-assisted analog circuit to digitally-designed analog circuit will also be discussed.

  • An I/O-Sized ADC with Second-Order TDC and MOM Capacitor Voltage-to-Time Converter

    Keisuke OKUNO  Toshihiro KONISHI  Shintaro IZUMI  Masahiko YOSHIMOTO  Hiroshi KAWAGUCHI  

     
    PAPER

      Vol:
    E98-C No:6
      Page(s):
    489-495

    We present an I/O-size second-order analog to digital converter (ADC) combined with a time-to-digital converter (TDC) and a voltage-to-time converter (VTC). Our proposed VTC is optimized for metal--oxide--metal (MOM) capacitances, and is charged to the MOM capacitances by an input voltage. In a standard 65-nm CMOS process, a signal to noise and distortion ratio (SNDR) of 50,dB (8 bits) is achievable at an input signal frequency of 78,kHz and a sampling rate of 20,MHz, where the respective area and power are 6468,mm$^{mathrm{2}}$ and 509 $mu$W. The measured maximum integral nonlinearity (INL) of the proposed ADC is $-$1.41 LSBs. The active area of the proposed ADC is smaller than an I/O buffer. The proposed ADC is useful as an ADC I/O.

  • Performance Analysis and Optimum Resource Allocation in Mobile Multihop Relay System

    Taejoon KIM  Seong Gon CHOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:6
      Page(s):
    1078-1085

    This paper analyzes the performance of a mobile multihop relay (MMR) system which uses intermediate mobile relay stations (RSs) to increase service coverage area and capacity of a communication system. An analytical framework for an MMR system is introduced, and a scheme for allocating the optimum radio resources to an MMR system is presented. It is very challenging to develop an analytical framework for an MMR system because more than two wireless links should be considered in analyzing the performance of such a system. Here, the joint effect of a finite queue length and an adaptive modulation and coding (AMC) scheme in both a base station (BS) and an RS are considered. The traffic characteristics from BS to RS are analyzed, and a three-dimensional finite-state Markov chain (FSMC) is built for the RS which considers incoming traffic from the BS as well. The RS packet loss rate and the RS average throughput are also derived. Moreover, maximum throughput is achieved by optimizing the amount of radio resources to be allocated to the wireless link between a BS and an RS.

  • A Forward/Reverse Body Bias Generator with Wide Supply-Range down to Threshold Voltage

    Norihiro KAMAE  Akira TSUCHIYA  Hidetoshi ONODERA  

     
    PAPER

      Vol:
    E98-C No:6
      Page(s):
    504-511

    A forward/reverse body bias generator (BBG) which operates under wide supply-range is proposed. Fine-grained body biasing (FGBB) is effective to reduce variability and increase energy efficiency on digital LSIs. Since FGBB requires a number of BBGs to be implemented, simple design is preferred. We propose a BBG with charge pumps for reverse body bias and the BBG operates under wide supply-range from 0.5,V to 1.2,V. Layout of the BBG was designed in a cell-based flow with an AES core and fabricated in a 65~nm CMOS process. Area of the AES core is 0.22 mm$^2$ and area overhead of the BBG is 2.3%. Demonstration of the AES core shows a successful operation with the supply voltage from 0.5,V to 1.2,V which enables the reduction of power dissipation, for example, of 17% at 400,MHz operation.

  • A Framework for Verifying the Conformance of Design to Its Formal Specifications

    Dieu-Huong VU  Yuki CHIBA  Kenro YATAKE  Toshiaki AOKI  

     
    PAPER-Formal Verification

      Pubricized:
    2015/02/13
      Vol:
    E98-D No:6
      Page(s):
    1137-1149

    Verification of a design with respect to its requirement specification is important to prevent errors before constructing an actual implementation. The existing works focus on verifications where the specifications are described using temporal logics or using the same languages as that used to describe the designs. Our work considers cases where the specifications and the designs are described using different languages. To verify such cases, we propose a framework to check if a design conforms to its specification based on their simulation relation. Specifically, we define the semantics of the specifications and the designs commonly as labelled transition systems (LTSs). We appreciate LTSs since they could interpret information about the system and actions that the system may perform as well as the effect of these actions. Then, we check whether a design conforms to its specification based on the simulation relation of their LTS. In this paper, we present our framework for the verification of reactive systems, and we present the case where the specifications and the designs are described in Event-B and Promela/Spin, respectively. We also present two case studies with the results of several experiments to illustrate the applicability of our framework on practical systems.

  • Improving Width-3 Joint Sparse Form to Attain Asymptotically Optimal Complexity on Average Case

    Hiroshi IMAI  Vorapong SUPPAKITPAISARN  

     
    LETTER

      Vol:
    E98-A No:6
      Page(s):
    1216-1222

    In this paper, we improve a width-3 joint sparse form proposed by Okeya, Katoh, and Nogami. After the improvement, the representation can attain an asymtotically optimal complexity found in our previous work. Although claimed as optimal by the authors, the average computation time of multi-scalar multiplication obtained by the representation is 563/1574n+o(n)≈0.3577n+o(n). That number is larger than the optimal complexity 281/786n+o(n)≈0.3575n+o(n) found in our previous work. To optimize the width-3 joint sparse form, we add more cases to the representation. After the addition, we can show that the complexity is updated to 281/786n+o(n)≈0.3575n+o(n), which implies that the modified representation is asymptotically optimal. Compared to our optimal algorithm in the previous work, the modified width-3 joint sparse form uses less dynamic memory, but it consumes more static memory.

  • Multiclass Probabilistic Classification for Support Vector Machines

    Ji-Sang BAE  Jong-Ok KIM  

     
    LETTER-Human-computer Interaction

      Pubricized:
    2015/02/23
      Vol:
    E98-D No:6
      Page(s):
    1251-1255

    Support Vector Machine (SVM) is one of the most widely used classifiers to categorize observations. This classifier deterministically selects a class that has the largest score for a classification output. In this letter, we propose a multiclass probabilistic classification method that reflects the degree of confidence. We apply the proposed method to age group classification and verify the performance.

  • Information Gathering for Wireless Sensor Networks with Information Converting to Wireless Physical Parameters Open Access

    Tomomi ENDOU  Shunta SAKAI  Takeo FUJII  

     
    PAPER-Network

      Vol:
    E98-B No:6
      Page(s):
    984-995

    Recently, the growing concepts that information communication technologies apply to social infrastructures have caused deep interests with wireless sensor networks (WSNs). WSNs can be used for various application areas such as home, health, factory and so on. For the different application areas, there are different technical issues (e.g., security, reliability, real time gathering, long life time, scalability). Efficient information gathering can be potentially obtained if we take a suitable information gathering method with considering the requirements of each WSN application. Thus, we have not persisted all information gathering perfectly and have proposed one of simple information gathering methods in response to the requirements of WSN applications in this paper. In the proposed method, the information is converted to physical-layer parameters of wireless communications, such as frequency and time. Also, simulations are performed to validate the effectiveness of the proposed method in real time gathering and estimating with high precision.

  • Optimization Methods for Nop-Shadows Typestate Analysis

    Chengsong WANG  Xiaoguang MAO  Yan LEI  Peng ZHANG  

     
    PAPER-Dependable Computing

      Pubricized:
    2015/02/23
      Vol:
    E98-D No:6
      Page(s):
    1213-1227

    In recent years, hybrid typestate analysis has been proposed to eliminate unnecessary monitoring instrumentations for runtime monitors at compile-time. Nop-shadows Analysis (NSA) is one of these hybrid typestate analyses. Before generating residual monitors, NSA performs the data-flow analysis which is intra-procedural flow-sensitive and partially context-sensitive to improve runtime performance. Although NSA is precise, there are some cases on which it has little effects. In this paper, we propose three optimizations to further improve the precision of NSA. The first two optimizations try to filter interferential states of objects when determining whether a monitoring instrumentation is necessary. The third optimization refines the inter-procedural data-flow analysis induced by method invocations. We have integrated our optimizations into Clara and conducted extensive experiments on the DaCapo benchmark. The experimental results demonstrate that our first two optimizations can further remove unnecessary instrumentations after the original NSA in more than half of the cases, without a significant overhead. In addition, all the instrumentations can be removed for two cases, which implies the program satisfy the typestate property and is free of runtime monitoring. It comes as a surprise to us that the third optimization can only be effective on 8.7% cases. Finally, we analyze the experimental results and discuss the reasons why our optimizations fail to further eliminate unnecessary instrumentations in some special situations.

  • Variable Data-Flow Graph for Lightweight Program Slicing and Visualization

    Yu KASHIMA  Takashi ISHIO  Shogo ETSUDA  Katsuro INOUE  

     
    PAPER-Software Engineering

      Pubricized:
    2015/03/17
      Vol:
    E98-D No:6
      Page(s):
    1194-1205

    To understand the behavior of a program, developers often need to read source code fragments in various modules. System-dependence-graph-based (SDG) program slicing is a good candidate for supporting the investigation of data-flow paths among modules, as SDG is capable of showing the data-dependence of focused program elements. However, this technique has two problems. First, constructing SDG requires heavyweight analysis, so SDG is not suitable for daily uses. Second, the results of SDG-based program slicing are difficult to visualize, as they contain many vertices. In this research, we proposed variable data-flow graphs (VDFG) for use in program slicing techniques. In contrast to SDG, VDFG is created by lightweight analysis because several approximations are used. Furthermore, we propose using the fractal value to visualize VDFG-based program slice in order to reduce the graph complexity for visualization purposes. We performed three experiments that demonstrate the accuracy of VDFG program slicing with fractal value, the size of a visualized program slice, and effectiveness of our tool for source code reading.

  • Power-Absorption-Based Model for Power Compensation in WLAN Positioning Using Smartphone

    Masaaki YAMAMOTO  Tomoaki OHTSUKI  

     
    PAPER-Sensing

      Vol:
    E98-B No:6
      Page(s):
    1125-1132

    To achieve accurate wireless-local-area-network (WLAN) positioning, the directivity and influence of multipath fading on the power absorption by the user are clarified experimentally. Based on the results, a general model of the power absorption by the user is devised. The parameters of the model are estimated using maximum-likelihood estimation (MLE) and the magnetic sensor built into modern smartphones. The proposed method compensates the power absorption and the influence of multipath fading. According to experimental evaluations, the root-mean-square error (RMSE) of the proposed method is 34% lower than that of the conventional one. Namely, RMSE of the proposed method is 1.94m in a room.

  • A Secrecy Criterion for Outsourcing Encrypted Databases Based on Inference Analysis

    Yasunori ISHIHARA  Yasuhiro USHIROZAKO  Kengo MORI  Jun FURUKAWA  

     
    LETTER-Database Security

      Pubricized:
    2015/02/13
      Vol:
    E98-D No:6
      Page(s):
    1161-1165

    In this letter, we propose a secrecy criterion for outsourcing encrypted databases. In encrypted databases, encryption schemes revealing some information are often used in order to manipulate encrypted data efficiently. The proposed criterion is based on inference analysis for databases: We simulate attacker's inference on specified secret information with and without the revealed information from the encrypted database. When the two inference results are the same, then secrecy of the specified information is preserved against outsourcing the encrypted database. We also show that the proposed criterion is decidable under a practical setting.

  • Performance Analysis of Distributed Broadcasting in IEEE 802.11p MAC Protocol

    Daein JEONG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:6
      Page(s):
    1086-1094

    In this paper, we propose an analysis of broadcasting in the IEEE 802.11p MAC protocol. We consider multi-channel operation which is specifically designed for VANET (Vehicular Ad hoc Networks) applications. This protocol supports channel switching; the device alternates between the CCH (Control Channel) and the SCH (Service Channel) during the fixed synchronization interval. It helps vehicles with a single transceiver to access the CCH periodically during which time they acquire or broadcast safety-related messages. Confining the broadcasting opportunity to the deterministic CCH interval entails a non-typical approach to the analysis. Our analysis is carried out considering 1) the time dependency of the system behavior caused by the channel switching, 2) the mutual influence among the vehicles using a multi-dimensional stochastic process, and 3) the generation of messages distributed over the CCH interval. The proposed analysis enables the prediction of the successful delivery ratio and the delay of the broadcast messages. Furthermore, we propose a refinement of the analysis to take account of the effects of hidden nodes on the system performance. The simulation results show that the proposed analysis is quite accurate in describing both the delivery ratio and delay, as well as in reflecting the hidden node effects. The benefits derived from the distributed generation of traffic are also evidenced by the results of experiments.

  • Algorithm for Identifying the Maximum Detour Hinge Vertices of a Permutation Graph

    Hirotoshi HONMA  Yoko NAKAJIMA  Yuta IGARASHI  Shigeru MASUYAMA  

     
    PAPER

      Vol:
    E98-A No:6
      Page(s):
    1161-1167

    A hinge vertex is a vertex in an undirected graph such that there exist two vertices whose removal makes the distance between them longer than before. Identifying hinge vertices in a graph can help detect critical nodes in communication network systems, which is useful for making them more stable. For finding them, an O(n3) time algorithm was developed for a simple graph, and, linear time algorithms were developed for interval and permutation graphs, respectively. Recently, the maximum detour hinge vertex problem is defined by Honma et al. For a hinge vertex u in a graph, the detour degree of u is the largest value of distance between any pair of x and y (x and y are adjacent to u) by removing u. A hinge vertex with the largest detour degree in G is defined as the maximum detour hinge vertex of G. This problem is motivated by practical applications, such as network stabilization with a limited cost, i.e., by enhancing the reliability of the maximum detour hinge vertex, the stability of the network is much improved. We previously developed an O(n2) time algorithm for solving this problem on an interval graph. In this study, we propose an algorithm that identifies the maximum detour hinge vertex on a permutation graph in O(n2) time, where n is the number of vertices in the graph.

  • Face Recognition Across Poses Using a Single 3D Reference Model

    Gee-Sern HSU  Hsiao-Chia PENG  Ding-Yu LIN  Chyi-Yeu LIN  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2015/02/24
      Vol:
    E98-D No:6
      Page(s):
    1238-1246

    Face recognition across pose is generally tackled by either 2D based or 3D based approaches. The 2D-based often require a training set from which the cross-pose multi-view relationship can be learned and applied for recognition. The 3D based are mostly composed of 3D surface reconstruction of each gallery face, synthesis of 2D images of novel views using the reconstructed model, and match of the synthesized images to the probes. The depth information provides crucial information for arbitrary poses but more methods are yet to be developed. Extended from a latest face reconstruction method using a single 3D reference model and a frontal registered face, this study focuses on using the reconstructed 3D face for recognition. The recognition performance varies with poses, the closer to the front, the better. Several ways to improve the performance are attempted, including different numbers of fiducial points for alignment, multiple reference models considered in the reconstruction phase, and both frontal and profile poses available in the gallery. These attempts make this approach competitive to the state-of-the-art methods.

  • Context-Based Segmentation of Renal Corpuscle from Microscope Renal Biopsy Image Sequence

    Jun ZHANG  Jinglu HU  

     
    PAPER-Image

      Vol:
    E98-A No:5
      Page(s):
    1114-1121

    A renal biopsy is a procedure to get a small piece of kidney for microscopic examination. With the development of tissue sectioning and medical imaging techniques, microscope renal biopsy image sequences are consequently obtained for computer-aided diagnosis. This paper proposes a new context-based segmentation algorithm for acquired image sequence, in which an improved genetic algorithm (GA) patching method is developed to segment different size target. To guarantee the correctness of first image segmentation and facilitate the use of context information, a boundary fusion operation and a simplified scale-invariant feature transform (SIFT)-based registration are presented respectively. The experimental results show the proposed segmentation algorithm is effective and accurate for renal biopsy image sequence.

  • Performance Analysis of an LMS Based Adaptive Feedback Canceller for On-Channel Repeaters

    Jihoon CHOI  Young-Ho JUNG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:5
      Page(s):
    908-916

    An on-channel repeater (OCR) performing simultaneous reception and transmission at the same frequency is beneficial to improve spectral efficiency and coverage. In an OCR, it is important to cancel the feedback interference caused by imperfect isolation between the transmit and receive antennas, and least mean square (LMS) based adaptive filters are commonly used for this purpose. In this paper, we analyze the performance of the LMS based adaptive feedback canceller in terms of its transient behavior and the steady-state mean square error (MSE). Through a theoretical analysis, we derive iterative equations to compute transient MSEs and provide a procedure to simply evaluate steady-state MSEs for the adaptive feedback canceller. Simulation results performed to verify the theoretical MSEs show good agreement between the proposed theoretical analysis and the empirical results.

  • A Novel Processing Scheme of Dynamic Programming Based Track-Before-Detect in Passive Bistatic Radar

    Xin GUAN  Lihua ZHONG  Donghui HU  Chibiao DING  

     
    PAPER-Sensing

      Vol:
    E98-B No:5
      Page(s):
    962-973

    Weak target detection is a key problem in passive bistatic radar (PBR). Track-before-detect (TBD) is an effective solution which has drawn much attention recently. However, TBD has not been fully developed in PBR. In this paper, the transition function and the selection of parameters in dynamic programming are analyzed in PBR. Then a novel processing scheme of dynamic programming based TBD is proposed to reduce the computation complexity without severely decreasing the detection performance. Discussions including complexity, detection performance, threshold determination, selection of parameters and detection of multitarget, are presented in detail. The new method can provide fast implementation with only a slight performance penalty. In addition, good multitarget detection performance can be achieved by using this method. Simulations are carried out to present the performance of the proposed processing scheme.

  • Analysis on Non-Ideal Nonlinear Characteristics of Graphene-Based Three-Branch Nano-Junction Device

    Xiang YIN  Masaki SATO  Seiya KASAI  

     
    PAPER

      Vol:
    E98-C No:5
      Page(s):
    434-438

    We investigate the origin of non-ideal transfer characteristics in graphene-based three-branch nano-junction (TBJ) devices. Fabricated graphene TBJs often show asymmetric nonlinear voltage transfer characteristic, although symmetric one should appear ideally. A simple model considering the contact resistances in two input electrodes is deduced and it suggests that the non-ideal characteristic arises from inequality of the metal-graphene contact resistances in the inputs. We fabricate a graphene TBJ device with electrically equal contacts by optimizing the contact formation process and almost ideal nonlinear characteristic was successfully demonstrated.

3601-3620hit(16314hit)