The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

5781-5800hit(16314hit)

  • Mixed Bases for Efficient Inversion in F((22)2)2 and Conversion Matrices of SubBytes of AES

    Yasuyuki NOGAMI  Kenta NEKADO  Tetsumi TOYOTA  Naoto HONGO  Yoshitaka MORIKAWA  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1318-1327

    A lot of improvements and optimizations for the hardware implementation of SubBytes of Rijndael, in detail inversion in F28 have been reported. Instead of the Rijndael original F28, it is known that its isomorphic tower field F((22)2)2 has a more efficient inversion. Then, some conversion matrices are also needed for connecting these isomorphic binary fields. According to the previous works, it is said that the number of 1's in the conversion matrices is preferred to be small; however, they have not focused on the Hamming weights of the row vectors of the matrices. It plays an important role for the calculation architecture, in detail critical path delays. This paper shows the existence of efficient conversion matrices whose row vectors all have the Hamming weights less than or equal to 4. They are introduced as quite rare cases. Then, it is pointed out that such efficient conversion matrices can connect the Rijndael original F28 to some less efficient inversions in F((22)2)2 but not to the most efficient ones. In order to overcome these inconveniences, this paper next proposes a technique called mixed bases. For the towerings, most of previous works have used several kinds of bases such as polynomial and normal bases in mixture. Different from them, this paper proposes another mixture of bases that contributes to the reduction of the critical path delay of SubBytes. Then, it is shown that the proposed mixture contributes to the efficiencies of not only inversion in F((22)2)2 but also conversion matrices between the isomorphic fields F28 and F((22)2)2.

  • Optimum Frame Synchronization for OFDM Systems

    Heon HUH  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E94-B No:6
      Page(s):
    1732-1735

    Orthogonal frequency division multiplexing has emerged as a promising air interface scheme for wireless broadband communications. For OFDM systems, frame synchronization has received much attention in the literature, though simple correlators are still widely used in real systems. In this letter, we present the analytical expression of the optimal frame synchronizer for OFDM systems. Frame synchronization is posed as a maximum a posteriori probability estimation. We show that the resulting frame synchronizer consists of a correlation term and a correction term. The correction term accounts for the random data surrounding a synchronization word. Numerical results show the performance gain of the proposed frame synchronizer over a correlation scheme.

  • Parity-Check Matrix Extension to Lower the Error Floors of Irregular LDPC Codes

    Jianjun MU  Xiaopeng JIAO  Jianguang LIU  Rong SUN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:6
      Page(s):
    1725-1727

    Trapping sets have been identified as one of the main factors causing error floors of low-density parity-check (LDPC) codes at high SNR values. By adding several new rows to the original parity-check matrix, a novel method is proposed to eliminate small trapping sets in the LDPC code's Tanner graph. Based on this parity-check matrix extension, we design new codes with low error floors from the original irregular LDPC codes. Simulation results show that the proposed method can lower the error floors of irregular LDPC codes significantly at high SNR values over AWGN channels.

  • Background Calibration Techniques for Low-Power and High-Speed Data Conversion Open Access

    Atsushi IWATA  Yoshitaka MURASAKA  Tomoaki MAEDA  Takafumi OHMOTO  

     
    INVITED PAPER

      Vol:
    E94-C No:6
      Page(s):
    923-929

    Progress of roles and schemes of calibration techniques in data converters are reviewed. Correction techniques of matching error and nonlinearity in analog circuits have been developed by digital assist using high-density and low-power digital circuits. The roles of the calibration are not only to improve accuracy but also to reduce power dissipation and chip area. Among various calibration schemes, the background calibration has significant advantages to achieve robustness to fast ambient change. Firstly the nonlinearity calibrations for pipeline ADCs are reviewed. They have required new solutions for redundancy of the circuits, an error estimation algorithm and reference signals. Currently utilizing the calibration techniques, the performance of 100 Msps and 12 bit has been achieved with 10 mW power dissipation. Secondly the background calibrations of matching error in flash ADC and DAC with error feedback to the analog circuits are described. The flash ADC utilizes the comparator offset correction with successive approximation algorithm. The DAC adopts a self current matching scheme with an analog memory. Measured dissipation power of the ADC is 0.38 mW at 300 MHz clock. Effects of the background calibration to suppress crosstalk noise are also discussed.

  • Built-In Measurements in Low-Cost Digital-RF Transceivers Open Access

    Oren ELIEZER  Robert Bogdan STASZEWSKI  

     
    INVITED PAPER

      Vol:
    E94-C No:6
      Page(s):
    930-937

    Digital RF solutions have been shown to be advantageous in various design aspects, such as accurate modeling, design reuse, and scaling when migrating to the next CMOS process node. Consequently, the majority of new low-cost and feature cell phones are now based on this approach. However, another equally important aspect of this approach to wireless transceiver SoC design, which is instrumental in allowing fast and low-cost productization, is in creating the inherent capability to assess performance and allow for low-cost built-in calibration and compensation, as well as characterization and final-testing. These internal capabilities can often rely solely on the SoCs existing processing resources, representing a zero cost adder, requiring only the development of the appropriate algorithms. This paper presents various examples of built-in measurements that have been demonstrated in wireless transceivers offered by Texas Instruments in recent years, based on the digital-RF processor (DRPTM) technology, and highlights the importance of the various types presented; built-in self-calibration and compensation, built-in self-characterization, and built-in self-testing (BiST). The accompanying statistical approach to the design and productization of such products is also discussed, and fundamental terms related with these, such as 'soft specifications', are defined.

  • TSC-IRNN: Time- and Space-Constraint In-Route Nearest Neighbor Query Processing Algorithms in Spatial Network Databases

    Yong-Ki KIM  Jae-Woo CHANG  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E94-D No:6
      Page(s):
    1201-1209

    Although a large number of query processing algorithms in spatial network database (SNDB) have been studied, there exists little research on route-based queries. Since moving objects move only in spatial networks, route-based queries, like in-route nearest neighbor (IRNN), are essential for Location-based Service (LBS) and Telematics applications. However, the existing IRNN query processing algorithm has a problem in that it does not consider time and space constraints. Therefore, we, in this paper, propose IRNN query processing algorithms which take both time and space constraints into consideration. Finally, we show the effectiveness of our IRNN query processing algorithms considering time and space constraints by comparing them with the existing IRNN algorithm.

  • Optimal Power Allocation for Amplify-and-Forward Relaying Systems Using Maximum Ratio Transmission at the Source

    Jianxiong HUANG  Taiyi ZHANG  Runping YUAN  Jing ZHANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:6
      Page(s):
    1774-1777

    This letter investigates the performance of amplify-and-forward relaying systems using maximum ratio transmission at the source. A closed-form expression for the outage probability and a closed-form lower bound for the average bit error probability of the system are derived. Also, the approximate expressions for the outage probability and average bit error probability in the high signal-to-noise ratio regime are given, based on which the optimal power allocation strategies to minimize the outage probability and average bit error probability are developed. Furthermore, numerical results illustrate that optimizing the allocation of power can improve the system performance, especially in the high signal-to-noise ratio regime.

  • Introduction of the Parameter “Approach Ratio” for the Improvement of Higher Delivery Rate with Suppressing Network Resource Consumption in Delay Tolerant Network

    Masato HAYASHI  Susumu MATSUI  Naoki WAKAMIYA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E94-B No:6
      Page(s):
    1669-1679

    The delay/disruption tolerant network (DTN) has been researched actively in the last years because of its high applicability to ubiquitous network services such as sensor networks and intelligent transport system (ITS) networks. An efficient data forwarding method for those network services is one of the key components in DTN due to the limitation of wireless network resources. This paper proposes a new DTN scheme for vehicle network systems by introducing the parameter, “approach ratio”, which represents node movement history. The proposal utilizes passive copy strategy, where nodes within one hop area of packet forwarders receive, copy and store packets (namely, passive copies) for future forwarding, in order to obtain higher delivery rate and lower delivery delay whilst suppressing the network resource consumption. Depending on its approach ratio, a node with passive copy decides whether it forwards the passive copy or not by referring to the approach ratio threshold. The approach ratio allows our proposal to adjust the property of both single-copy type scheme, that can lower network resource consumption, and multi-copy type scheme, that can enhance the performance of delivery rate and delay time. In simulation evaluation, the proposal is compared with three typical existing schemes with respect to network consumption, delivery rate and delivery delay. Our proposal shows the superior performance regarding the targeted purpose. It is shown that the approach ratio plays the significant role to obtain the higher delivery rate and lower delay time, while keeping network resource consumption lower.

  • A Fundamental Analysis of Single Event Effects on Clocked CVSL Circuits with Gated Feedback

    Hiroshi HATANO  

     
    BRIEF PAPER-Semiconductor Materials and Devices

      Vol:
    E94-C No:6
      Page(s):
    1131-1134

    Clocked cascade voltage switch logic (C2VSL) circuits with gated feedback were newly designed for synchronous systems. In order to investigate single event transient (SET) effects on the C2VSL circuits, SET effects on C2VSL EX-OR circuits were analyzed using SPICE. Simulation results have indicated that the C2VSL have increased tolerance to SET.

  • Empirical Performance Evaluation of Raster-to-Vector Conversion Methods: A Study on Multi-Level Interactions between Different Factors

    Hasan S.M. AL-KHAFFAF  Abdullah Z. TALIB  Rosalina ABDUL SALAM  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E94-D No:6
      Page(s):
    1278-1288

    Many factors, such as noise level in the original image and the noise-removal methods that clean the image prior to performing a vectorization, may play an important role in affecting the line detection of raster-to-vector conversion methods. In this paper, we propose an empirical performance evaluation methodology that is coupled with a robust statistical analysis method to study many factors that may affect the quality of line detection. Three factors are studied: noise level, noise-removal method, and the raster-to-vector conversion method. Eleven mechanical engineering drawings, three salt-and-pepper noise levels, six noise-removal methods, and three commercial vectorization methods were used in the experiment. The Vector Recovery Index (VRI) of the detected vectors was the criterion used for the quality of line detection. A repeated measure ANOVA analyzed the VRI scores. The statistical analysis shows that all the studied factors affected the quality of line detection. It also shows that two-way interactions between the studied factors affected line detection.

  • Algorithms to Solve Massively Under-Defined Systems of Multivariate Quadratic Equations

    Yasufumi HASHIMOTO  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1257-1262

    It is well known that the problem to solve a set of randomly chosen multivariate quadratic equations over a finite field is NP-hard. However, when the number of variables is much larger than the number of equations, it is not necessarily difficult to solve equations. In fact, when n ≥ m(m+1) (n,m are the numbers of variables and equations respectively) and the field is of even characteristic, there is an algorithm to find one of solutions of equations in polynomial time (see [Kipnis et al., Eurocrypt '99] and also [Courtois et al., PKC '02]). In the present paper, we propose two new algorithms to find one of solutions of quadratic equations; one is for the case of n ≥ (about) m2-2m 3/2+2m and the other is for the case of n ≥ m(m+1)/2+1. The first one finds one of solutions of equations over any finite field in polynomial time, and the second does with O(2m) or O(3m) operations. As an application, we also propose an attack to UOV with the parameters given in 2003.

  • Performance Analysis of RFID Tag Anti-Collision Protocols with Channel Error

    Jun-Bong EOM  Tae-Jin LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:6
      Page(s):
    1761-1764

    Channel errors may exist in Radio Frequency IDentification (RFID) systems due to low power backscattering of tags. These errors prevent the rapid identification of tags, and reducing this deterioration is an important issue. This paper presents performance analysis of various tag anti-collision algorithms and shows that the performances of RFID systems can be improved by applying a proposed robust algorithm in error-prone environments.

  • An Area Efficiency Hybrid Decoupling Scheme for Charge Pump Noise Suppression in Non-volatile Memory

    Mengshu HUANG  Leona OKAMURA  Tsutomu YOSHIHARA  

     
    PAPER

      Vol:
    E94-C No:6
      Page(s):
    968-976

    An area efficiency hybrid decoupling scheme is proposed to suppress the charge pump noise during F-N tunneling program in non-volatile memory (NVM). The proposed scheme is focused on suppressing the average noise power in frequency domain aspect, which is more suitable for the program error reduction in NVMs. The concept of active capacitor is utilized. Feed forward effect of the amplifier is firstly considered in the impedance analysis, and a trade-off relation between in-band and out-band frequency noise decoupling performance is shown. A fast optimization based on average noise power is made to achieve minimum error in the F-N tunneling program. Simulation results show very stable output voltage in different load conditions, the average ripple voltage is 17 mV with up to 20 dB noise-suppression-ratio (NSR), and the F-N tunneling program error is less than 5 mV for a 800 µs program pulse. A test chip is also fabricated in 0.18 µm technology. The area overhead of the proposed scheme is 2%. The measurement results show 24.4 mV average ripple voltage compared to 72.3 mV of the conventional one with the same decoupling capacitance size, while the noise power suppression achieves 15.4 dB.

  • Deciding Shellability of Simplicial Complexes with h-Assignments

    Sonoko MORIYAMA  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1238-1241

    If a d-dimensional pure simplicial complex C has a shelling, which is a specific total order of all facets of C, C is said to be shellable. We consider the problem of deciding whether C is shellable or not. This problem is solved in linear time of m, the number of all facets of C, if d = 1 or C is a pseudomanifold in d = 2. Otherwise it is unknown at this point whether the decision of shellability can be solved in polynomial time of m. Thus, for the latter case, we had no choice but to apply a brute force method to the decision problem; namely checking up to the m! ways to see if one can arrange all the m facets of C into a shelling. In this paper, we introduce a new concept, called h-assignment, to C and propose a practical method using h-assignments to decide whether C is shellable or not. Our method can make the decision of shellability of C by smaller sized computation than the brute force method.

  • Neary: Conversational Field Detection Based on Situated Sound Similarity

    Toshiya NAKAKURA  Yasuyuki SUMI  Toyoaki NISHIDA  

     
    PAPER

      Vol:
    E94-D No:6
      Page(s):
    1164-1172

    This paper proposes a system called Neary that detects conversational fields based on similarity of auditory situation among users. The similarity of auditory situation between each pair of the users is measured by the similarity of frequency property of sound captured by head-worn microphones of the individual users. Neary is implemented with a simple algorithm and runs on portable PCs. Experimental result shows Neary can successfully distinguish groups of conversations and track dynamic changes of them. This paper also presents two examples of Neary deployment to detect user contexts during experience sharing in touring at the zoo and attending an academic conference.

  • Channel Estimation Improvement with Frequency Domain MMSE Equalization for PCP-SC System

    Yafei HOU  Tomohiro HASE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:6
      Page(s):
    1690-1698

    In this paper, we propose a simple but effective way of improving the performance of channel estimation (CE) for pilot cyclic prefixed single carrier (PCP-SC) system. The proposed method utilizes the property that the shifting signal of the PCP pilot signal can also be utilized to estimate the channel information. The receiver can continuously estimate the channel information by just shifting the received pilot signal. Regardless of the signal-to-noise ratio (SNR) and the pilot type, the proposed method can achieve about a 1.72 dB performance gain in terms of the mean squared error (MSE) of channel estimation with a slight increase in computational complexity. The BER performance with the proposed CE improvement are evaluated in a multipath fading channel using a zero-forcing (ZF) equalizer and an minmum mean squared error (MMSE) equalizer by computer simulation. It is shown that the proposed CE improvment method using an MMSE equalizer which has an unbiased vlaue of noise variance (NV) estimator gives a promising BER performance. The proposed method also benefits the estimation of the SNR for the single carrier system.

  • Transformation and Chained Structure for a Class of Nonlinear Affine Control Systems

    Tatsuya KAI  

     
    LETTER-Nonlinear Problems

      Vol:
    E94-A No:6
      Page(s):
    1468-1472

    This letter is devoted to derivation of a transformation law which converts a class of nonlinear affine control systems with n-states and 2-iputs into simpler systems with chained structure. First, we give a problem formulation that we consider throughout this letter. We next introduce a transformation law and gives its mathematical certification. Then, we apply the transformation method to an example and consider control design based on chained structure for the example in order to confirm the effectiveness of our approach.

  • A Scheme of IEEE 802.11e HCCA Polling and Queue Management for Bandwidth Guarantee per Session

    Young-Hwan KIM  Jung-Bong SUK  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:6
      Page(s):
    1680-1689

    Video applications such as video conferencing among multiple users and video surveillance systems require multiple video connections and QoS guarantee. These days the video systems equipped with IEEE 802.11 LAN interfaces allows a broadband wireless access to the Internet at a reasonable price. However, according to the current IEEE 802.11e HCCA standard, if more than two video sessions are to be established simultaneously, some of them must share the TXOP because the available number of TSIDs for video transmission is restricted to two. In order to resolve this problem, we devise a scheme which can establish up to 13 video sessions by slightly modifying the frame structure while maintaining the compatibility with the current standard. Our scheme is implemented on the NCTUns 4.0 network simulator, and evaluated numerically in terms of throughput, delay, and PSNR. Also real video clips are used as input to our simulation. The results showed that our scheme guarantees the transmission bandwidth requested by each video session.

  • Proposal of a Next Generation Network Architecture Based on Web Service Technologies

    Yoshitoshi MURATA  Tsuyoshi TAKAYAMA  Nobuyoshi SATO  Kei KIKUCHI  

     
    LETTER

      Vol:
    E94-B No:6
      Page(s):
    1617-1620

    The IP Multimedia Subsystem (IMS) establishes a session between end terminals as a client/server application in the Next Generation Network (NGN). These days, many application services are being provided as Web services. In this letter, we propose a new NGN architecture conforming to the architectural styles of Representational State Transfer (REST), which is a Web service technology for solving interoperability and traffic concentration problems in the Session Initiation Protocol (SIP).

  • An Efficient Algorithm for Generating Slanted Ellipse Using Simultaneous Recurrences

    Munetoshi NUMADA  Hiroyasu KOSHIMIZU  Yasuyo HATANO  Takayuki FUJIWARA  Takuma FUNAHASHI  

     
    PAPER-Computer Graphics

      Vol:
    E94-A No:6
      Page(s):
    1458-1463

    Thus far, there have been many reports and publications on the algorithm for the efficient generation of a circle or an ellipse by the parametric method. In this parametric method, we compute a trigonometric function only at the time of setting the initial condition for generating graphics incrementally using the recurrence formula consisting of the arithmetical operations of addition, subtraction, and multiplication in the main loop. This means that the key to the faster generation of a circle or an ellipse is to reduce the number of multiplication operations. In the conventional methods, the numbers of multiplication operations required to generate a single point each for a circle and an ellipse are three and four, respectively. However, in this paper, we propose a method that makes it possible to generate a slanted ellipse by performing only two multiplication operations per point. The key to this is to use simultaneous recurrences. The proposed method allows a simpler initial setup than any of the conventional methods, thus performing the computation more efficiently. In addition, the new method proposed here causes no theoretical errors, with the rounding error being similar to or less than that of any conventional method.

5781-5800hit(16314hit)