The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

7321-7340hit(16314hit)

  • A Linear Processing Scheme in Multiuser Downlink MIMO Broadcasting Channel with Fixed Relays

    Jie XU  Ling QIU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:2
      Page(s):
    679-682

    In this letter, we propose a novel singular value decomposition zero-forcing beamforming (SVD-ZFBF) relaying scheme in the multiuser downlink MIMO broadcasting channel with fixed relays. Based on the processing scheme, we apply SUS [5] to select users at the relay station (RS) and develop a joint power allocation strategy at the base station (BS) and RS. By increasing the power at RS or selecting active users to obtain more multiuser diversity, SVD-ZFBF can approach an upper bound and outperform SVD-ZFDPC [1] with much lower complexity. Moreover, we show that the noise power ratio of RS to users significantly impacts the performance.

  • Side Information Inserted Pilot Tone Transmission for PAPR Reduction in OFDM

    Lei WANG  Dongweon YOON  Sang Kyu PARK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:2
      Page(s):
    687-690

    In order to reduce the peak-to-average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) signals over fading channels, the selected mapping (SLM) scheme and channel estimation technique can be used. Because of the side information of SLM, however, the data rate decreases in the conventional transmission method. In this letter, to overcome this impairment, we propose a technique which transmits side information by using pilot tones. Numerical analysis and computer simulations show that this method can maintain the PAPR reduction ability of SLM while improving error performance.

  • Fractional Frequency Reuse with Ordering to Increase Capacity of OFDM Systems

    Seung-Moo CHO  Tae-Jin LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:2
      Page(s):
    654-657

    We present a novel frequency partitioning technique of fractional frequency reuse (FFR) that reduces the effect of co-channel interference and increases the capacity of OFDM systems. The usable sub-channel sets are classified into the common sub-channel sets for all cells and the dedicated sub-channel sets for specific cell types in FFR. The proposed fractional frequency reuse with ordering scheme (FFRO) can decrease the amount of interference in the common sub-channel sets by specially designing the sub-channel sets and the order of sub-channel assignment for specific cell types. Simulation results show that the proposed FFRO yields enhanced performance for both uniform and non-uniform distributions of traffic load.

  • Performance of Digital Modulation in Double Nakagami-m Fading Channels with MRC Diversity

    Wannaree WONGTRAIRAT  Pornchai SUPNITHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:2
      Page(s):
    559-566

    In this paper, we derive the average bit error probability (BEP) for common digital modulation schemes and the outage probability of double Nakagami-m channels with MRC diversity. First, the probability density function (PDF) and moment generating function (MGF) of received signal with maximal ratio combining (MRC) receiver diversity are computed. The derived MGF results are simplified in terms of a generalized hypergeometric function 2F0. The derived BEP expressions find applications in existing wireless systems such as satellite mobile communication system, mobile-to-mobile communication system and multiple-input multiple-output (MIMO) wireless communication system. In addition, the obtained general MGF expression considers combined Rayleigh Nakagami-m, double Rayleigh, single Rayleigh, single Nakagami-m, and non-fading or additive white Gaussian noise (AWGN) channels as special cases. The simulation results agree well with the theoretical results.

  • A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity

    Huanfei MA  Haibin KAN  Hideki IMAI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:2
      Page(s):
    671-674

    Construction of quaternion design for Space-Time-Polarization Block Codes (STPBCs) is a hot but difficult topic. This letter introduces a novel way to construct high dimensional quaternion designs based on any existing low dimensional quaternion orthogonal designs(QODs) for STPBC, while preserving the merits of the original QODs such as full diversity and simple decoding. Furthermore, it also provides a specific schema to reach full diversity and maximized code gain by signal constellation rotation on the polarization plane.

  • A Novel Probabilistic Passive Attack on the Protocols HB and HB+

    Jose CARRIJO  Rafael TONICELLI  Hideki IMAI  Anderson C.A. NASCIMENTO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:2
      Page(s):
    658-662

    We present a very simple probabilistic, passive attack against the protocols HB and HB+. Our attack presents some interesting features: it requires less captured transcripts of protocol executions when compared to previous results; It makes possible to trade the amount of required transcripts for computational complexity; the value of noise used in the protocols HB and HB+ need not be known.

  • Hybrid TOA/AOA Geometrical Positioning Schemes for Mobile Location

    Chien-Sheng CHEN  Szu-Lin SU  Yih-Fang HUANG  

     
    PAPER

      Vol:
    E92-B No:2
      Page(s):
    396-402

    In this paper we present hybrid positioning schemes that combine time of arrival (TOA) and angle of arrival (AOA) measurements from only two base stations (BSs) to locate the mobile station (MS) in non-line-of-sight (NLOS) environments. The proposed methods utilize two TOA circles and two AOA lines to find all the possible intersections to locate the MS without requiring a priori information about the NLOS error. The commonly known Taylor series algorithm (TSA) and the hybrid lines of position algorithm (HLOP) have convergence problems, and the relative positioning between the MS and the BSs greatly affects the location accuracy. The resulting geometry creates a situation where small measurement errors can lead to significant errors in the estimated MS location. Simulation results show that the proposed methods always perform better than TSA and HLOP for different levels of NLOS errors, particularly when the MS/BSs have an undesirable geometric layout.

  • Design for Delay Fault Testability of 2-Rail Logic Circuits

    Kentaroh KATOH  Kazuteru NAMBA  Hideo ITO  

     
    LETTER-Dependable Computing

      Vol:
    E92-D No:2
      Page(s):
    336-341

    This paper presents a scan design for delay fault testability of 2-rail logic circuits. The flip flops used in the scan design are based on master-slave ones. The proposed scan design provides complete fault coverage in delay fault testing of 2-rail logic circuits. In two-pattern testing with the proposed scan design, initial vectors are set using the set-reset operation, and the scan-in operation for initial vectors is not required. Hence, the test application time is reduced to about half that of the enhanced scan design. Because the additional function is only the set-reset operation of the slave latch, the area overhead is small. The evaluation shows that the differences in the area overhead of the proposed scan design from those of the standard scan design and the enhanced scan design are 2.1 and -14.5 percent on average, respectively.

  • A RFID EPC C1 Gen2 System with Channel Coding Capability in AWGN Noise Environments

    Ki Yong JEON  Sung Ho CHO  

     
    LETTER-Devices/Circuits for Communications

      Vol:
    E92-B No:2
      Page(s):
    608-611

    In this letter, we propose a new scheme for the tag structure of the EPCglobal Class-1 Generation-2 (EPC C1 Gen2) standard equipped with a channel encoding block and the corresponding decoding block in the receiver of the reader system. The channel coded tag is designed to fully accommodate the EPC C1 Gen2 standard. The use of the proposed channel encoding block increases the number of logic gates in the tag by no more than 5%. The proposed reader system is designed to be used in the mixed tag modes as well, where the channel coded tags and existing tags co-exist in the same inventory round. The performances of the proposed tags and the corresponding reader systems are also presented by comparing the number of EPC error frames and the tag identification time with those of the conventional tags and reader systems.

  • On the Infimum and Supremum of Fuzzy Inference by Single Input Type Fuzzy Inference

    Hirosato SEKI  Hiroaki ISHII  

     
    PAPER-General Fundamentals and Boundaries

      Vol:
    E92-A No:2
      Page(s):
    611-617

    Fuzzy inference has played a significant role in many applications. Although the simplified fuzzy inference method is currently mostly used, the problem is that the number of fuzzy rules becomes very huge and so the setup and adjustment of fuzzy rules become difficult. On the other hand, Yubazaki et al. have proposed a "single input rule modules connected fuzzy inference method" (SIRMs method) whose final output is obtained by summarizing the product of the importance degrees and the inference results from single input fuzzy rule module. Seki et al. have shown that the simplified fuzzy inference method and the SIRMs method are equivalent when the sum of diagonal elements in rules of the simplified fuzzy inference method is equal to that of cross diagonal elements. This paper clarifies the conditions for the infimum and supremum of the fuzzy inference method using the single input type fuzzy inference method, from the view point of fuzzy inference.

  • GMPLS-Based Multiple Failure Recovery Employing Restoration Scheme Escalation in Optical Path Networks

    Yoshiaki SONE  Wataru IMAJUKU  Naohide NAGATSU  Masahiko JINNO  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    46-58

    Bolstering survivable backbone networks against multiple failures is becoming a common concern among telecom companies that need to continue services even when disasters occur. This paper presents a multiple-failure recovery scheme that considers the operation and management of optical paths. The presented scheme employs scheme escalation from pre-planned restoration to full rerouting. First, the survivability of this scheme against multiple failures is evaluated considering operational constraints such as route selection, resource allocation, and the recovery order of failed paths. The evaluation results show that scheme escalation provides a high level of survivability even under operational constraints, and this paper quantitatively clarifies the impact of these various operational constraints. In addition, the fundamental functions of the scheme escalation are implemented in the Generalized Multi-Protocol Label Switching control plane and verified in an optical-cross-connect-based network.

  • Joint Stream-Wise THP Transceiver Design for the Multiuser MIMO Downlink

    Wei MIAO  Xiang CHEN  Ming ZHAO  Shidong ZHOU  Jing WANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    209-218

    This paper addresses the problem of joint transceiver design for Tomlinson-Harashima Precoding (THP) in the multiuser multiple-input-multiple-output (MIMO) downlink under both perfect and imperfect channel state information at the transmitter (CSIT). For the case of perfect CSIT, we differ from the previous work by performing stream-wise (both inter-user and intra-user) interference pre-cancelation at the transmitter. A minimum total mean square error (MT-MSE) criterion is used to formulate our optimization problem. By some convex analysis of the problem, we obtain the necessary conditions for the optimal solution. An iterative algorithm is proposed to handle this problem and its convergence is proved. Then we extend our designed algorithm to the robust version by minimizing the conditional expectation of the T-MSE under imperfect CSIT. Simulation results are given to verify the efficacy of our proposed schemes and to show their superiorities over existing MMSE-based THP schemes.

  • A Study on Temporal Dark Image Sticking in AC-PDP Using Vacuum-Sealing Method

    Choon-Sang PARK  Heung-Sik TAE  

     
    PAPER-Electronic Displays

      Vol:
    E92-C No:1
      Page(s):
    161-165

    Minimizing the residual impurity gases is a key factor for reducing temporal dark image sticking. Therefore, this paper uses a vacuum-sealing method that minimizes the residual impurity gases by enhancing the base vacuum level, and the resultant change in temporal dark image sticking is then examined in comparison to that with the conventional sealing method using 42-in. ac-PDPs with a high Xe (11%) content. As a result of monitoring the difference in the display luminance, infrared emission, and perceived luminance between the cells with and without temporal dark image sticking, the vacuum-sealing method is demonstrated to reduce temporal dark image sticking by decreasing the residual impurity gases and increasing the oxygen vacancy in the MgO layer. Furthermore, the use of a modified driving waveform along with the vacuum-sealing method is even more effective in reducing temporal dark image sticking.

  • A Chosen-IV Key Recovery Attack on Py and Pypy

    Takanori ISOBE  Toshihiro OHIGASHI  Hidenori KUWAKADO  Masakatu MORII  

     
    PAPER-Application Information Security

      Vol:
    E92-D No:1
      Page(s):
    32-40

    In this paper, we propose an effective key recovery attack on stream ciphers Py and Pypy with chosen IVs. Our method uses an internal-state correlation based on the vulnerability that the randomization of the internal state in the KSA is inadequate, and it improves two previous attacks proposed by Wu and Preneel (a WP-1 attack and a WP-2 attack). For a 128-bit key and a 128-bit IV, the WP-1 attack can recover a key with 223 chosen IVs and time complexity 272. First, we improve the WP-1 attack by using the internal-state correlation (called a P-1 attack). For a 128-bit key and a 128-bit IV, the P-1 attack can recover a key with 223 chosen IVs and time complexity 248, which is 1/224 of that of the WP-1 attack. The WP-2 attack is another improvement on the WP-1 attack, and it has been known as the best previous attack against Py and Pypy. For a 128-bit key and a 128-bit IV, the WP-2 attack can recover a key with 223 chosen IVs and time complexity 224. Second, we improve the WP-2 attack by using the internal-state correlation as well as the P-1 attack (called a P-2 attack). For a 128-bit key and a 128-bit IV, the P-2 attack can recover a key with 223 chosen IVs and time complexity 224, which is the same capability as that of the WP-2 attack. However, when the IV size is from 64 bits to 120 bits, the P-2 attack is more effective than the WP-2 attack. Thus, the P-2 attack is the known best attack against Py and Pypy.

  • A New Steering Law with Designated Direction Escape (DDE) for Control Moment Gyros

    Seung-Mok LEE  Seung-Wu RHEE  

     
    LETTER-Systems and Control

      Vol:
    E92-A No:1
      Page(s):
    315-317

    In this letter we provide a steering law for redundant single-gimbal control moment gyros. The proposed steering law is an extended version of the singular direction avoidance (SDA) steering law based on the singular value decomposition (SVD). All internal singularities are escapable for any non-zero constant torque command using the proposed steering law.

  • Simple Remarks on Carmichael Numbers

    Shigenori UCHIYAMA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:1
      Page(s):
    326-328

    An odd composite number n for which an-1 ≡ 1 (mod n) for all integers a coprime to n is called a Carmichael number. This paper shows that some class of Carmichael numbers which have relatively large prime factors can be recognized in deterministic polynomial time under the assumption of the Extended Riemann Hypothesis (ERH). Also some related problems are discussed.

  • Self-Vth-Cancellation High-Efficiency CMOS Rectifier Circuit for UHF RFIDs

    Koji KOTANI  Takashi ITO  

     
    PAPER-Integrated Electronics

      Vol:
    E92-C No:1
      Page(s):
    153-160

    A high-efficiency CMOS rectifier circuit for UHF RFID applications was developed. The rectifier utilizes a self-Vth-cancellation (SVC) scheme in which the threshold voltage of MOSFETs is cancelled by applying gate bias voltage generated from the output voltage of the rectifier itself. A very simple circuit configuration and zero power dissipation characteristics in biasing enable excellent power conversion efficiency (PCE), especially under small RF input power conditions. At higher RF input power conditions, the PCE of the rectifier automatically decreases. This is the built-in self-power-regulation function. The proposed SVC CMOS rectifier was fabricated with a 0.35-µm CMOS process and the measured performance was compared with those of conventional nMOS, pMOS, and CMOS rectifiers and other types of Vth cancellation rectifiers as well. The SVC CMOS rectifier achieves 32% of PCE at the -10 dBm RF input power condition. This PCE is larger than rectifiers reported to date under this condition.

  • An ISI Suppressing Method for SIMO-OFDM System Utilizing the Characteristic of the ETP-OFDM Model

    Quoc-Anh VU  Yoshio KARASAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    268-276

    This paper proposes a Inter-symbol Interference (ISI) suppressing method For Orthogonal Frequency Division Multiplexing (OFDM) system. In the environments where the delay spread exceeds the guard interval, the occurrence of ISI results in a degradation of system performance. A receiving method based on the Equivalent Transmission Path (ETP) model is proposed for Single-Input Multiple-Output (SIMO) OFDM system. Compared to the receiving scheme using Maximal Ratio Combining (MRC) method, the proposed one shows better performance in suppressing errors due to ISI. The paper also points out that the ETP-based model can be used for detecting the desired signal in the multi-user OFDM system. Simulation results of the system performance show the effectiveness of the proposed method over the conventional OFDM system in suppressing ISI.

  • SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks

    LeXuan HUNG  Sungyoung LEE  Young-Koo LEE  Heejo LEE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:1
      Page(s):
    131-142

    For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol -- Secure COodination-based Data dissEmination (SCODE) -- for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.

  • The Vacuum Impedance and Unit Systems

    Masao KITANO  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    3-8

    In the electromagnetic theory, the vacuum impedance Z0 is a universal constant, which is as important as the velocity of light c0 in vacuum. Unfortunately, however, its significance is not appreciated so well and sometimes the presence itself is ignored. It is partly because in the Gaussian system of units, which has widely been used for long time, Z0 is a dimensionless constant and of unit magnitude. In this paper, we clarify that Z0 is a fundamental parameter in electromagnetism and plays major roles in the following scenes: reorganizing the structure of the electromagnetic formula in reference to the relativity; renormalizing the quantities toward natural unit systems starting from the SI unit system; and defining the magnitudes of electromagnetic units.

7321-7340hit(16314hit)