The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SiON(4624hit)

1961-1980hit(4624hit)

  • Non-Quasi-Static Carrier Dynamics of MOSFETs under Low-Voltage Operation

    Masataka MIYAKE  Daisuke HORI  Norio SADACHIKA  Uwe FELDMANN  Mitiko MIURA-MATTAUSCH  Hans Jurgen MATTAUSCH  Takahiro IIZUKA  Kazuya MATSUZAWA  Yasuyuki SAHARA  Teruhiko HOSHIDA  Toshiro TSUKADA  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    608-615

    We analyze the carrier dynamics in MOSFETs under low-voltage operation. For this purpose the displacement (charging/discharging) current, induced during switching operations is studied experimentally and theoretically for a 90 nm CMOS technology. It is found that the experimental transient characteristics can only be well reproduced in the circuit simulation of low voltage applications by considering the carrier-transit delay in the compact MOSFET model. Long carrier transit delay under the low voltage switching-on operation results in long duration of the displacement current flow. On the other hand, the switching-off characteristics are independent of the bias condition.

  • Collision-Based Power Attack for RSA with Small Public Exponent

    Kouichi ITOH  Dai YAMAMOTO  Jun YAJIMA  Wakaha OGATA  

     
    PAPER-Implementation Issues

      Vol:
    E92-D No:5
      Page(s):
    897-908

    This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 = d/ri and di,2 =(d (mod ri)) to calculate (cdi,1)ri cdi,2 (mod N). Using the combination of countermeasures, it was supposed that the implementation is secure against power attack. However, we firstly show the result to successfully attack the implementation of the combination of these countermeasures. We performed the experiment of this search on a PC, and complete d has been successfully revealed less than 10 hours for both attacks.

  • Spectral Narrowing Effect of a Novel Super-Grating Dual-Gate Structure for Plasmon-Resonant Terahertz Emitter

    Takuya NISHIMURA  Nobuhiro MAGOME  HyunChul KANG  Taiichi OTSUJI  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    696-701

    We have proposed a terahertz (THz) emitter utilizing two-dimensional plasmons (2DPs) in a super-grating dual-gate (SGG) high electron mobility transistor (HEMT). The plasmon under each grating gate has a unique feature that its resonant frequency is determined by the plasma-wave velocity over the gate length. Since the drain bias voltage causes a linear potential slope from the source to drain area, the sheet electron densities in periodically distributed 2DP cavities are dispersed. As a result, all the resonant frequencies are dispersed and undesirable spectral broadening occurs. A SGG structure can compensate for the sheet electron density distribution by modulating the grating dimension. The finite difference time domain simulation confirms its spectral narrowing effect. Within a wide detuning range for the gate and drain bias voltages giving a frequency shifting of 0.5 THz from an optimum condition, the SGG structure can preserve the spectral narrowing effect.

  • Investigation of Inter-Cell Transmission Power Control Using Overload Indicator for Selected Users for Evolved UTRA Uplink

    Daisuke NISHIKAWA  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  Mamoru SAWAHASHI  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1634-1640

    This paper proposes the use of inter-cell transmission power control (TPC) with overload indicator (OLI) signaling to user equipment (UE) in addition to intra-cell TPC for the Evolved UTRA uplink. In the proposed inter-cell OLI transmission method, a cell site (Node B) selects UEs offering high-level interferences to the cell site based on the measured path loss difference, and then, the cell site transmits the OLI signal to the selected UEs. The simulation results show that the inter-cell TPC improves both the average user throughput and cell-edge user throughput at 5% in the cumulative distribution function (CDF) curve, assuming the same sector throughput. For instance, when the sector throughput is 1 Mbps using 1.08 MHz bandwidth, the inter-cell TPC with the proposed UE-common OLI scheme increases the average user throughput and the 5%-cell edge user throughput by approximately 41% and 53%, respectively, compared to the case with intra-cell TPC only. Furthermore, when the inter-cell TPC with the proposed UE-individual OLI is employed, the corresponding average user throughput and the 5% user throughput are increased by approximately 87% and 94%, respectively.

  • Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs

    Shuhui HOU  Tetsutaro UEHARA  Takashi SATOH  Yoshitaka MORIMURA  Michihiko MINOH  

     
    PAPER-Contents Protection

      Vol:
    E92-D No:5
      Page(s):
    876-887

    In recent years, with the rapid growth of the Internet as well as the increasing demand for broadband services, live pay-television broadcasting via the Internet has become a promising business. To get this implemented, it is necessary to protect distributed contents from illegal copying and redistributing after they are accessed. Fingerprinting system is a useful tool for it. This paper shows that the anti-collusion code has advantages over other existing fingerprinting codes in terms of efficiency and effectivity for live pay-television broadcasting. Next, this paper presents how to achieve efficient and effective anti-collusion codes based on unital and affine plane, which are two known examples of balanced incomplete block design (BIBD). Meanwhile, performance evaluations of anti-collusion codes generated from unital and affine plane are conducted. Their practical explicit constructions are given last.

  • Performance of Pre-FFT Type MMSE Adaptive Array Antenna with Iterative Weight Update in Presence of Sporadic Intra-System Interference

    Kazuto YANO  Makoto TAROMARU  Masazumi UEBA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:5
      Page(s):
    1852-1859

    This paper introduces our proposed pre-FFT type MMSE-AAA for an OFDM packet transmission system to suppress sporadic interference. The AAA scheme controls an antenna weight to minimize the mean square error between its output signals of two periods with identical transmitted waveform and iterates the weight updating process in an OFDM symbol to rapidly converge the weight. The average PER performance of the proposed AAA with the presence of a sporadic inter-system/intra-system interference signal is evaluated through computer simulations that assume an exponentially decaying 12-path LOS fading channel and IEEE 802.11a data frame transmission. Simulation results show that the proposed AAA can effectively suppress sporadic inter-system interference that is irrelevant to its arrival timing. Sporadic intra-system interference can also be suppressed by the proposed AAA more efficiently than inter-system interference as long as the interference arrives between 13% and 90% of the OFDM symbol duration after the beginning of an OFDM symbol of the desired signal.

  • An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation

    Yongrui CUI  Mingchu LI  Yizhi REN  Kouichi SAKURAI  

     
    PAPER-Graphs and Networks

      Vol:
    E92-A No:5
      Page(s):
    1339-1346

    A novel adaptive reputation-based virtual organization formation is proposed. It restrains the bad performers effectively based on the consideration of the global experience of the evaluator and evaluates the direct trust relation between two grid nodes accurately by consulting the previous trust value rationally. It also consults and improves the reputation evaluation process in PathTrust model by taking account of the inter-organizational trust relationship and combines it with direct and recommended trust in a weighted way, which makes the algorithm more robust against collusion attacks. Additionally, the proposed algorithm considers the perspective of the VO creator and takes required VO services as one of the most important fine-grained evaluation criterion, which makes the algorithm more suitable for constructing VOs in grid environments that include autonomous organizations. Simulation results show that our algorithm restrains the bad performers and resists against fake transaction attacks and badmouth attacks effectively. It provides a clear advantage in the design of a VO infrastructure.

  • Recessed Channel Dual Gate Single Electron Transistors (RCDG-SETs) for Room Temperature Operation

    Sang Hyuk PARK  Sangwoo KANG  Seongjae CHO  Dong-Seup LEE  Jung Han LEE  Hong-Seon YANG  Kwon-Chil KANG  Joung-Eob LEE  Jong Duk LEE  Byung-Gook PARK  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    647-652

    A Recessed-Channel Dual-Gate Single Electron Transistor (RCDG-SET) which has the possibility of room temperature operation is proposed. Side gates of a RCDG-SET form electrical tunneling barriers around a recessed channel, which is newly introduced. Not only gate but also a recessed channel is self aligned to source and drain. Characteristics of a RCDG-SET are compared with those of previous DG-SETs through device simulation (SILVACO). Due to a recessed channel and a self aligned structure, MOSFET current which causes low Peak-to-Valley Current Ratio (PVCR) is suppressed. This property of a RCDG-SET is expected to contribute for room temperature operation.

  • A Robust 3D Face Recognition Algorithm Using Passive Stereo Vision

    Akihiro HAYASAKA  Koichi ITO  Takafumi AOKI  Hiroshi NAKAJIMA  Koji KOBAYASHI  

     
    PAPER

      Vol:
    E92-A No:4
      Page(s):
    1047-1055

    The recognition performance of the conventional 3D face recognition algorithm using ICP (Iterative Closest Point) is degraded for the 3D face data with expression changes. Addressing this problem, we consider the use of the expression-invariant local regions of a face. We find the expression-invariant regions through the distance analysis between 3D face data with the neutral expression and smile, and propose a robust 3D face recognition algorithm using passive stereo vision. We demonstrate efficient recognition performance of the proposed algorithm compared with the conventional ICP-based algorithm through the experiment using a stereo face image database which includes the face images with expression changes.

  • Improvement of Speech Quality in Distance-Based Howling Canceller

    Akira SOGAMI  Arata KAWAMURA  Youji IIGUNI  

     
    PAPER

      Vol:
    E92-A No:4
      Page(s):
    1039-1046

    In this paper, we propose a distance-based howling canceller with high speech quality. We have developed a distance-based howling canceller that uses only distance information by noticing the property that howling occurs according to the distance between a loudspeaker and a microphone. This method estimates the distance by transmitting a pilot signal from the loudspeaker to the microphone. Multiple frequency candidates for each howling are computed from the estimated distance and eliminated by cascading notch filters that have nulls at them. However degradation of speech quality occurs at the howling canceller output. The first cause is a shot noise occurrence at the beginning and end of the pilot signal transmission due to the discontinuous change of the amplitude. We thus develop a new pilot signal that is robust against ambient noises. We can then reduce the shot noise effect by taking the amplitude small. The second one is a speech degradation caused from overlapped stopbands of the notch filters. We thus derive a condition on the bandwidths so that stopbands do not overlap, and propose an adaptive bandwidth scheme which changes the bandwidth according to the distance.

  • Lagrangian Relaxation Based Inter-Layer Signal Via Assignment for 3-D ICs

    Song CHEN  Liangwei GE  Mei-Fang CHIANG  Takeshi YOSHIMURA  

     
    PAPER

      Vol:
    E92-A No:4
      Page(s):
    1080-1087

    Three-dimensional integrated circuits (3-D ICs), i.e., stacked dies, can alleviate the interconnect problem coming with the decreasing feature size and increasing integration density, and promise a solution to heterogenous integration. The vertical connection, which is generally implemented by the through-the-silicon via, is a key technology for 3-D ICs. In this paper, given 3-D circuit placement or floorplan results with white space reserved between blocks for inter-layer interconnections, we proposed methods for assigning inter-layer signal via locations. Introducing a grid structure on the chip, the inter-layer via assignment of two-layer chips can be optimally solved by a convex-cost max-flow formulation with signal via congestion optimized. As for 3-D ICs with three or more layers, the inter-layer signal via assignment is modeled as an integral min-cost multi-commodity flow problem, which is solved by a heuristic method based on the lagrangian relaxation. Relaxing the capacity constraints in the grids, we transfer the min-cost multi-commodity flow problem to a sequence of lagrangian sub-problems, which are solved by finding a sequence of shortest paths. The complexity of solving a lagrangian sub-problem is O(nntng2), where nnt is the number of nets and ng is the number of grids on one chip layer. The experimental results demonstrated the effectiveness of the method.

  • An Automatic Unpacking Method for Computer Virus Effective in the Virus Filter Based on Paul Graham's Bayesian Theorem

    Dengfeng ZHANG  Naoshi NAKAYA  Yuuji KOUI  Hitoaki YOSHIDA  

     
    PAPER

      Vol:
    E92-B No:4
      Page(s):
    1119-1127

    Recently, the appearance frequency of computer virus variants has increased. Updates to virus information using the normal pattern matching method are increasingly unable to keep up with the speed at which viruses occur, since it takes time to extract the characteristic patterns for each virus. Therefore, a rapid, automatic virus detection algorithm using static code analysis is necessary. However, recent computer viruses are almost always compressed and obfuscated. It is difficult to determine the characteristics of the binary code from the obfuscated computer viruses. Therefore, this paper proposes a method that unpacks compressed computer viruses automatically independent of the compression format. The proposed method unpacks the common compression formats accurately 80% of the time, while unknown compression formats can also be unpacked. The proposed method is effective against unknown viruses by combining it with the existing known virus detection system like Paul Graham's Bayesian Virus Filter etc.

  • Packet Error Rate for Retry Limit Based Block Transmission in Wireless Local Area Networks

    Chie DOU  Yu-Ming LI  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E92-B No:4
      Page(s):
    1401-1403

    This letter derives the packet error rate (PER) in terms of the retry limit and the channel error probability in wireless local area networks (WLANs), when an additional number of retries is allocated to a block of packets to be transmitted. We prove that the lower bound of the PER is the dropping probability which is defined as the probability of any given packet being dropped after its retry limit has been reached.

  • A Combined Polling and Random Access Technique for Enhanced Anti-Collision Performance in RFID Systems

    Jeong Geun KIM  

     
    LETTER-Network

      Vol:
    E92-B No:4
      Page(s):
    1357-1360

    In this paper we propose a novel RFID anti-collision technique that intelligently combines polling and random access schemes. These two fundamentally different medium access control protocols are coherently integrated in our design while functionally complementing each other. The polling mode is designed to enable fast collision-free identification for the tags that exist within reader's coverage across the sessions. In contrast, the random access mode attempts to read the tags uncovered by the polling mode. Our proposed technique is particularly suited for a class of RFID applications in which a stationary reader periodically attempts to identify the tags with slow mobility. Numerical results show that our proposed technique yields much faster identification time against the existing approaches under various operating conditions.

  • Self-Routing Nonblocking WDM Switches Based on Arrayed Waveguide Grating

    Yusuke FUKUSHIMA  Xiaohong JIANG  Achille PATTAVINA  Susumu HORIGUCHI  

     
    PAPER-Switching for Communications

      Vol:
    E92-B No:4
      Page(s):
    1173-1182

    Arrayed waveguide grating (AWG) is a promising technology for constructing high-speed large-capacity WDM switches, because it can switch fast, is scalable to large size and consumes little power. To take the full advantage of high-speed AWG, the routing control of a massive AWG-based switch should be as simple as possible. In this paper, we focus on the self-routing design of AWG-based switches with O(1) constant routing complexity and propose a novel construction of self-routing AWG switches that can guarantee the attractive nonblocking property for both the wavelength-to-wavelength and wavelength-to-fiber request models. We also fully analyze the proposed design in terms of its blocking property, hardware cost and crosstalk performance and compare it against traditional designs. It is expected that the proposed construction will be useful for the design and all-optical implementation of future ultra high-speed optical packet/burst switches.

  • VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

    Yasufumi MORIOKA  Takeshi HIGASHINO  Katsutoshi TSUKAMOTO  Shozo KOMAKI  

     
    PAPER

      Vol:
    E92-B No:4
      Page(s):
    1144-1152

    This paper proposes a VoIP (Voice over Internet Protocol) session capacity expansion method that uses periodic packet transmission suppression control for wireless LANs. The proposed method expands the VoIP session capacity of an AP without critically degrading the QoS (Quality of Service) of all stations. Simulation results show the proposed method with 0.5% packet suppression control on each station expands a VoIP session capacity by up to 5% compared to a legacy method while satisfying required QoS for all stations.

  • An Effective Self-Adaptive Admission Control Algorithm for Large Web Caches

    Chul-Woong YANG  Ki Yong LEE  Yon Dohn CHUNG  Myoung Ho KIM  Yoon-Joon LEE  

     
    LETTER-Contents Technology and Web Information Systems

      Vol:
    E92-D No:4
      Page(s):
    732-735

    In this paper, we propose an effective Web cache admission control algorithm. By selectively admitting objects into the cache, the proposed algorithm can significantly reduce the amount of disk I/O on a Web cache while maintaining a high hit ratio. The proposed algorithm adaptively adjusts its own admission control parameter, requiring no user-supplied parameters. Through extensive experiments, we show the effectiveness of the proposed algorithm.

  • Efficient Heterodyne Digital Receiver with Direct RF-to-Digital Conversion for Software Defined Radio

    Minseok KIM  Takayuki MOTEKI  Koichi ICHIGE  Hiroyuki ARAI  

     
    PAPER

      Vol:
    E92-A No:4
      Page(s):
    1056-1062

    This paper presents a framework of multimode fully digital receiver implementation using direct RF-to-digital conversion. In this architecture the entire band including multiple RF systems is directly converted to digital by a wideband high speed ADC, and the RF systems can be easily switched by only digital signal processing with the minimum analog RF components. The digital RF front-end consists of parallel processing blocks for parallel data streams considering practical ADC's configuration. The RF signals are converted into baseband through digital IF stage and the data rates are made down by two steps of decimation. In this paper, a principle investigation into a dualmode system implementation is presented for simplicity. The circuit resource and the robustness to the spurs (spurious outputs) of an NCO (numerically controlled oscillator) in the proposed design will be presented. The proposed architecture was implemented with an FPGA on the developed prototype system and the operations were also verified.

  • Impact of GVD on the Performance of 2-D WH/TS OCDMA Systems Using Heterodyne Detection Receiver

    Ngoc T. DANG  Anh T. PHAM  Zixue CHENG  

     
    PAPER-Communication Theory and Signals

      Vol:
    E92-A No:4
      Page(s):
    1182-1191

    In this paper, a novel model of Gaussian pulse propagation in optical fiber is proposed to comprehensively analyze the impact of Group Velocity Dispersion (GVD) on the performance of two-dimensional wavelength hopping/time spreading optical code division multiple access (2-D WH/TS OCDMA) systems. In addition, many noise and interferences, including multiple access interference (MAI), optical beating interference (OBI), and receiver's noise are included in the analysis. Besides, we propose to use the heterodyne detection receiver so that the receiver's sensitivity can be improved. Analytical results show that, under the impact of GVD, the number of supportable users is extremely decreased and the maximum transmission length (i.e. the length at which BER 10-9 can be maintained) is remarkably shortened in the case of normal single mode fiber (ITU-T G.652) is used. The main factor that limits the system performance is time skewing. In addition, we show how the impact of GVD is relieved by dispersion-shifted fiber (ITU-T G.653). For example, a system with 321 Gbit/s users can achieve a maximum transmission length of 111 km when transmitted optical power per bit is -5 dBm.

  • Low-Leakage and Low-Power Implementation of High-Speed Logic Gates

    Tsung-Yi WU  Liang-Ying LU  

     
    PAPER

      Vol:
    E92-C No:4
      Page(s):
    401-408

    In this paper, we propose novel transmission-gate-based (TG-based) AND gates, TG-based OR gates, and pass-transistor logic gates that have new structures and have lower transistor counts than those proposed by other authors. All our proposed gates operate in full swing and have less leakage currents and shorter delays than conventional CMOS gates. Compared with the conventional 65 nm CMOS gates, our proposed 65 nm gates in this paper can improve leakage currents, dynamic power consumption, and propagation delays by averages of 42.4%, 8.1%, and 13.5%, respectively. Logic synthesizers can use them to facilitate power reduction. The experimental results show that a commercial power optimization tool can further reduce the leakage current and dynamic power up to 39.85% and 18.69%, respectively, when the standard cell library used by the tool contains our proposed gates.

1961-1980hit(4624hit)