The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

11221-11240hit(16314hit)

  • Proposal and Preliminary Experiments of Indoor Optical Wireless LAN Based on a CMOS Image Sensor with a High-Speed Readout Function Enabling a Low-Power Compact Module with Large Uplink Capacity

    Keiichiro KAGAWA  Tomohiro NISHIMURA  Takao HIRAI  Yasushi YAMASAKI  Hiroaki ASAZU  Tomoaki KAWAKAMI  Jun OHTA  Masahiro NUNOSHITA  Kunihiro WATANABE  

     
    PAPER

      Vol:
    E86-B No:5
      Page(s):
    1498-1507

    We propose a new scheme of indoor optical wireless LAN based on a special CMOS image sensor (CIS), which realizes a low-power compact communication module with large uplink capacity due to space division multiple access. In our scheme, all nodes and a hub utilize the CIS as a photoreceiver as well as a position-sensing device for finding the positions of the communication modules, while a single large photodiode is used in the conventional systems. Although conventional image sensors cannot detect modulated signals because they integrate photocurrents, our CIS has a high-speed readout function for receiving optical data from the specific pixels receiving optical signals. The advantages of the proposed scheme are 1) compact embodiment of the communication module due to no need of the bulky mechanical components for searching the other modules, 2) space division multiple access, which leads to 3) large capacity of uplink, and 4) applicability of simple modulation and coding schemes for optical signals. In our scheme, diffusive and narrow beam lights are complementally used for position detection and communication, respectively, which leads to the advantage 5) low power consumption of both light emitter and receiver circuits. To demonstrate two basic functional modes of our CIS: an IS (image sensor) mode and a COM (communication) mode, we fabricate an 88-pixel CIS by use of a 0.8µm BiCMOS technology. In the experiments, the image of a light source is successfully captured in the IS mode for integration time of 29.6msec and optical power of 1.1nW. After the functional mode of the pixel receiving the light is changed to the COM mode, the eye pattern of the modulated light is obtained from the pixel at frequency of 1MHz. We also fabricate a test pixel circuit with in-pixel amplifier, with which operation speed is improved to 100MHz.

  • A New User Mobility Based Adaptive Power Control in CDMA Systems

    HyeJeong LEE  Dong-Ho CHO  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E86-B No:5
      Page(s):
    1702-1705

    We propose a new closed-loop power control scheme for wireless mobile communication systems using an adaptive step size. The proposed scheme selects the basic power control step size by considering the speed of the mobile station and a variable step size by using instantaneous companding logic based on power control command bit patterns. We show its improved performance in view of the standard deviation of received power at the base station in consideration of channel BER.

  • Modification of New Carbon Based Nano-Materials for Field Emission Devices

    Chia-Fu CHEN  Chia-Lun TSAI  

     
    PAPER

      Vol:
    E86-C No:5
      Page(s):
    803-810

    Field emission display (FED) is evolving as a promising technique of flat panel displays in the future. In this paper, various carbon based nanostructures are acted as cathode materials for field emission devices. Dendrite-like diamond-like carbon emitters, carbon nanotubes, carbon nanotips are synthesized by microwave plasma chemical vapor deposition. Many factors affect the performance of field emitters, such as the shape, work function and aspect ratio of emission materials. Modified process of carbon based nano-materials for enhancing field emission efficiency are included intrinsic and extrinsic process. These reformations contain the p-type and n-type doping, carburization and new ultra well-aligned carbon nano-materials. It is found that carbon nano-materials grown on micropatterned diode show higher efficiency of FED. In addition, to achieve a low- turn-on field, the novel scheme involving a new fabrication process of gated structure metal-insulator-semiconductor (MIS) diode by IC technology is also presented.

  • Priority-Based Wavelength Assignment Algorithm for Burst Switched WDM Optical Networks

    Xi WANG  Hiroyuki MORIKAWA  Tomonori AOYAMA  

     
    PAPER

      Vol:
    E86-B No:5
      Page(s):
    1508-1514

    Burst switched WDM optical networks are coming up as suitable network architectures for future Optical Internet backbones. However, the lack of optical processing capabilities results in increased burst blocking probability, which in turn lead to very limited network performance. Efficient contention resolution algorithm is therefore necessary. In this paper, we propose a distributed wavelength assignment algorithm named Priority-based Wavelength Assignment (PWA) for such networks. Each node selectively assigns wavelengths based on the wavelength priority information "learned" from its wavelength utilization history in a distributed manner. As the learning process progresses, nodes in the same part of the network tend to assign different wavelengths to avoid contentions. Simulation results show that the PWA can effectively reduce the blocking probability and increase the performance of burst optical networks compared to previous algorithms such as random assignment.

  • Dual DEB-GPS Scheduler for Delay-Constraint Applications in Ethernet Passive Optical Networks

    Lin ZHANG  Eung-Suk AN  Chan-Hyun YOUN  Hwan-Geun YEO  Sunhee YANG  

     
    PAPER

      Vol:
    E86-B No:5
      Page(s):
    1575-1584

    A broadband access network is required for supporting the increased Internet data traffic. One of the most cost-effective solutions is the Ethernet Passive Optical Networks (E-PONs) with the efficient bandwidth assignment function by which the upstream bandwidth can be shared among access users. To satisfy the services with heterogeneous QoS characteristics, it is very important to provide QoS guaranteed network access while utilize the bandwidth efficiently. In this paper, a dual DEB-GPS scheduler in E-PON is presented to provide delay-constraint and lossless QoS guarantee to QoS service and maximize the bandwidth to best-effort service. Simulation results show our scheme outperforms the conventional bandwidth allocation scheme in E-PON system.

  • An Alternative Analysis of Linear Dynamic Hashing Algorithm

    Ayad SOUFIANE  Tsuyoshi ITOKAWA  Ryozo NAKAMURA  

     
    PAPER

      Vol:
    E86-A No:5
      Page(s):
    1075-1081

    The linear hashing is a well-known dynamic hashing algorithm designed for internal main memory as well as external secondary memory. Traditional analysis of this search algorithm has been proposed under the assumption that all keys are uniformly accessed. In this paper, we present a discrete analysis of the average search cost of the linear dynamic hashing algorithm for internal main memory in consideration of the frequency of access on each key. In the proposed discrete analysis, the number of probes itself is regarded as a random variable and its probability distribution is derived concretely. Furthermore, the evaluate formula derived from the proposed analysis can exactly evaluate the average search cost in conformity with any probability distribution of the frequency of access. The proposed analysis is compared to the traditional one provided that the frequency of access on each key is uniform, and the differences are discussed.

  • Accelerating the CKY Parsing Using FPGAs

    Jacir L. BORDIM  Yasuaki ITO  Koji NAKANO  

     
    PAPER

      Vol:
    E86-D No:5
      Page(s):
    803-810

    The main contribution of this paper is to present an FPGA-based implementation of an instance-specific hardware which accelerates the CKY (Cocke-Kasami-Younger) parsing for context-free grammars. Given a context-free grammar G and a string x, the CKY parsing determines whether G derives x. We have developed a hardware generator that creates a Verilog HDL source to perform the CKY parsing for any given context-free grammar G. The generated source is embedded in an FPGA using the design software provided by the FPGA vendor. We evaluated the instance-specific hardware, generated by our hardware generator, using a timing analyzer and tested it using the Altera FPGAs. The generated hardware attains a speed-up factor of approximately 750 over the software CKY parsing algorithm.

  • Efficient Application of Hot-Carrier Reliability Simulation to Delay Library Screening for Reliability of Logic Designs

    Hisako SATO  Mariko OHTSUKA  Kazuya MAKABE  Yuichi KONDO  Kazumasa YANAGISAWA  Peter M. LEE  

     
    PAPER-Electronic Circuits

      Vol:
    E86-C No:5
      Page(s):
    842-849

    This paper presents an efficient application of hot-carrier reliability simulation to delay libraries of 0.18µm and 0.14µm gate length logic products. Using analysis of simple primitive inverter cells, a design rule was developed in restricting signal rise time, and delay libraries of actual products were screened to check whether the rise time restrictions were met. At 200MHz, maximum rise time (0-100%) triseMAX was 0.8nsec (17% of duty) under Δtd/td = 5%. For a 800,000 net product, only 25 simulations were done (each less than one minute CPU time) for the internal devices with screening done for this logic process. 30 nets were caught, but judged reliable due to their reduced duty.

  • Transitive Signature Scheme for Directed Trees

    Hidenori KUWAKADO  Hatsukazu TANAKA  

     
    PAPER

      Vol:
    E86-A No:5
      Page(s):
    1120-1126

    Micali and Rivest have proposed a transitive signature scheme for an undirected graph, which is suitable for signing data with undirected graph structure. The problem of finding a transitive signature scheme for a directed graph has remained an open problem. In this paper, we propose a transitive signature scheme for a directed tree. Since the directed tree is a special case of the directed graph, the proposed scheme is a partial solution for the open problem. We also show that a transitive signature scheme for the undirected graph can be constructed from a bundling homomorphism. This means that the transitive signature scheme for the undirected graph is closely related with a fail-stop signature scheme.

  • Piecewise Linear Operators on Sigma-Delta Modulated Signals and Their Application

    Hisato FUJISAKA  Yuji HIDAKA  Singo KAJITA  Mititada MORISUE  

     
    PAPER-Nonlinear Problems

      Vol:
    E86-A No:5
      Page(s):
    1249-1255

    Piecewise linear (PWL) circuit modules operating on sigma-delta (ΣΔ) modulated signals and nonlinear signal processors built of these modules are proposed. The proposed module library includes absolute circuits, min/max selectors and negative resistances. Their output signal-to-noise ratio is higher than 50dB when their oversampling ratio is 28. A nonlinear filter and a stochastic resonator are presented as applications of the PWL modules to ΣΔ domain signal processing. The filter is structured with 37% of logic gates consumed by an equivalent filter with a 5-bit parallel signal form.

  • Statistical Analysis of χ2-Attacks

    Norihisa ISOGAI  Atsuko MIYAJI  Masao NONAKA  

     
    PAPER

      Vol:
    E86-A No:5
      Page(s):
    1190-1197

    The χ2-attack was originally proposed by Knudsen and Meier. This attack is one of the most effective attacks for RC6. The χ2-attack can be used for both distinguishing attacks and for key recovery attacks. Although, up to the present, theoretical analysis of χ2-attacks, especially the relation between a distinguishing attack and a key recovery attack, has not been discussed, the security against key recovery attacks has been often discussed by the results of distinguishing attacks. In this paper, we investigate the theoretical relation between the distinguishing attack and the key recovery attack, and prove one theorem to evaluate the exact security against the key recovery attacks by using the results of the distinguishing attack. Furthermore we propose two key recovery attacks against RC5-64 and implement them. Our best key recovery attack can analyze RC5-64 with 16 rounds by using 2125.23 plaintexts with a success probability of 30%. This result works faster than exhaustive key search. As far as the authors know, this is the best result of known plaintext attacks to RC5-64. We also apply our theory on our key recovery attacks and demonstrate the validity.

  • Dynamic Capacity Resizing for Fair Bandwidth Sharing in Virtual Private Networks

    Seung Hyong RHEE  Takis KONSTANTOPOULOS  

     
    PAPER-Network

      Vol:
    E86-B No:5
      Page(s):
    1625-1631

    A virtual private network (VPN) service is likely to be used by customers as a replacement for networks constructed using private lines, and thus its functionality should include the performance guarantee provided to those customers. To provide guaranteed services, the network provider allocates appropriate capacities to multiple virtual backbone networks such that the underlying network can be shared among them. As VPN users are demanding reliable and dynamic allocation of capacities, recently the capacity resizing approach has been considered as a cost efficient way of providing virtual network services. We propose a new scheme for dynamic allocation of virtual link capacities. The allocated capacities are adjusted dynamically according to the users' requests such that their capacities are increased in a fair manner and the total reservation does not overwhelm the underlying network. Depending on the network's status and allocation policy, a virtual link may increase or decrease its capacity, for example, for a monetary incentive. VPN users send control packets whenever they want to resize their capacities, and the network handles them in an efficient and fair way. The simulation and analytic results in this paper show that our scheme is simple and robust such that the users and the network communicate using simple control packets and the link capacities are allocated efficiently.

  • Multiple Antenna Transmitter Diversity by Using Adaptive Carrier Selection for OFDM-DS/CDMA in a Frequency Selective Fading Channel

    Kyesan LEE  Masao NAKAGAWA  

     
    PAPER-Wireless Communication Technology

      Vol:
    E86-B No:5
      Page(s):
    1605-1611

    In this paper, we propose a new transmitter diversity. We propose a combined system with path diversity gain of the distributed antennas and frequency diversity gain of the multi-carrier. The proposed system transmits different data using several sub-carriers which are correlated, while, transmitting the same data using several sub-carriers which are decorrelated. It can achieve combined path and frequency diversity in a variable frequency selective fading channel. It provides high data rate services by transmitting the different data using each correlated carrier, and supports good quality by transmitting the same data on decorrelated carriers using multiple antennas. The proposed system is applicable to multimedia service and can achieve high quality according to channel condition. Thus, the proposed system is sufficiently flexible enough to very support a variety of video, image, voice and data services at a high level of quality.

  • Simultaneous Processing and Routing of Packets in a Synchronous Optical Packet Switched Network

    Christina (Tanya) POLITI  Mike O'MAHONY  

     
    PAPER

      Vol:
    E86-B No:5
      Page(s):
    1515-1521

    A novel optical packet switch architecture is proposed that can support simultaneous processing and routing of packets in bands, without disturbing the granularity of the system. The packet router consists of a waveband converter and an AWG, combined in such a way that processing and switching of packets within and between the wavebands is allowed. The waveband converter is based on four-wave mixing in semiconductor optical amplifiers. Experimental results of the waveband conversion technique are presented to prove the feasibility of such a scheme. Simulation results of an 12 packet router are used to explain the operation of such a subsystem for a synchronous optical packet switched network.

  • A Hardware/Software Cosynthesis System for Processor Cores with Content Addressable Memories

    Nozomu TOGAWA  Takao TOTSUKA  Tatsuhiko WAKUI  Masao YANAGISAWA  Tatsuo OHTSUKI  

     
    PAPER

      Vol:
    E86-A No:5
      Page(s):
    1082-1092

    Content addressable memory (CAM) is one of the functional memories which realize word-parallel equivalence search. Since a CAM unit is generally used in a particular application program, we consider that appropriate design for CAM units is required depending on the requirements for the application program. This paper proposes a hardware/software cosynthesis system for CAM processors. The input of the system is an application program written in C including CAM functions and a constraint for execution time (or CAM processor area). Its output is hardware descriptions of a synthesized processor and a binary code executed on it. Based on the branch-and-bound method, the system determines which CAM function is realized by a hardware and which CAM function is realized by a software with meeting the given timing constraint (or area constraint) and minimizing the CAM processor area (or execution time of the application program). We expect that we can realize optimal CAM processor design for an application program. Experimental results for several application programs show that we can obtain a CAM processor whose area is minimum with meeting the given timing constraint.

  • A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems

    Katsuyuki OKEYA  Kouichi SAKURAI  

     
    PAPER

      Vol:
    E86-A No:5
      Page(s):
    1171-1180

    We show that a randomized addition-sub-traction chains countermeasure against side channel attacks is vulnerable to an SPA attack, which is a kind of side channel attack, under distinguishability between addition and doubling. The side channel attack takes advantage of information leaked during execution of a cryptographic procedure. The randomized addition-subtraction chains countermeasure was proposed by Oswald-Aigner, and is based on a random decision inserted into computations. However, the question of its immunity to side channel attacks is still controversial. The randomized addition-subtraction chains countermeasure has security flaw in timing attacks, another kind of side channel attack. We have implemented the proposed attack algorithm, whose input is a set of AD sequences, which consist of the characters "A" and "D" to indicate addition and doubling, respectively. Our program has clarified the effectiveness of the attack. The attack algorithm could actually detect secret scalars for given AD sequences. The average time to detect a 160-bit scalar was about 6 milliseconds, and only 30 AD sequences were enough to detect such a scalar. Compared with other countermeasures against side channel attacks, the randomized addition-subtraction chains countermeasure is much slower.

  • Efficient Arithmetic in Optimal Extension Fields Using Simultaneous Multiplication

    Mun-Kyu LEE  Kunsoo PARK  

     
    LETTER-Information Security

      Vol:
    E86-A No:5
      Page(s):
    1316-1321

    A new algorithm for efficient arithmetic in an optimal extension field is proposed. The new algorithm improves the speeds of multiplication, squaring, and inversion by performing two subfield multiplications simultaneously within a single integer multiplication instruction of a CPU. Our algorithm is used to improve throughputs of elliptic curve operations.

  • Novel Methods of Estimating Polarization Dependence in Semiconductor Optical Amplifiers Integrated with Spot-Size Convertors

    Toshio ITO  Katsuaki MAGARI  Yasuo SHIBATA  Yoshihiro KAWAGUCHI  Yasuhiro KONDO  Yuichi TOHMORI  Yasuhiro SUZUKI  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E86-C No:5
      Page(s):
    831-837

    We propose a novel method of precisely measuring the polarization dependence of single pass gain (PDG) in a semiconductor optical amplifier integrated with spot-size convertors (SS-SOA). By averaging the signal gain of a SS-SOA over a wide wavelength range using the amplified spontaneous emission (ASE) of an erbium doped fiber (EDF), the PDG can be accurately estimated. This is because the influence of gain ripples on the measurement results are drastically reduced. We successfully evaluated the PDG of an angled-facet SS-SOA, even before the process of anti-reflection coating, within a small error of 0.5dB. The EDF-ASE technique is useful in sampling tests and selecting angled-facet SS-SOA chips from wafers. The polarization dependence of the coupling efficiency (PDCE) between a SS-SOA and optical fiber is also evaluated by measuring the photo-current of the active layer for TE and TM input signals. It is possible, therefore, to specify the polarization characteristics of the active region and spot-size converter region, which are indispensable parameters for the design of the SS-SOA.

  • Linear Complexities of Periodic Sequences Obtained from Sequences over Z4 and Z8 by One-Symbol Substitution

    Tsutomu MORIUCHI  Satoshi UEHARA  Takayasu KAIDA  Kyoki IMAMURA  

     
    PAPER-Information Theory

      Vol:
    E86-A No:5
      Page(s):
    1285-1293

    In this paper, we will show that some families of periodic sequences over Z4 and Z8 with period multiple of 2r-1 generated by r-th degree basic primitive polynomials assorted by the root of each polynomial, and give the exact distribution of sequences for each family. We also point out such an instability as an extreme increase of their linear complexities for the periodic sequences by one-symbol substitution, i.e., from the minimum value to the maximum value, for all the substitutions except one.

  • Thermal Stability of Electron Field Emission from Polycrystalline Diamond Film

    Akimitsu HATTA  Taku SUMITOMO  Hideo INOMOTO  Akio HIRAKI  

     
    PAPER

      Vol:
    E86-C No:5
      Page(s):
    825-830

    Electron field emission from polycrystalline diamond films has been investigated. Electron emission was measured locally at randomly chosen point on a diamond film fabricated by a microwave plasma chemical deposition method. In the original film, there were some points with a large emission current where flaws were found after the measurements, some points with a small and stable emission current without any flaw, and the other points with no emission. At the point of no emission, the film was electrically broken down by applying a high voltage. After the intentional breaking down, a small and stable emission always appeared there with no flaw. The maximum emission current extracted from an emission site was usually 1µA with no structural flaw found after the measurements. By using a simple model of emission site consisting of a core conductor embedded in insulator, the limitation of emission current is estimated from heating by the current and heat transfer to the insulator.

11221-11240hit(16314hit)