The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

4181-4200hit(21534hit)

  • Determining Image Base of Firmware Files for ARM Devices

    Ruijin ZHU  Yu-an TAN  Quanxin ZHANG  Fei WU  Jun ZHENG  Yuan XUE  

     
    PAPER-Software System

      Pubricized:
    2015/11/06
      Vol:
    E99-D No:2
      Page(s):
    351-359

    Disassembly, as a principal reverse-engineering tool, is the process of recovering the equivalent assembly instructions of a program's machine code from its binary representation. However, when disassembling a firmware file, the disassembly process cannot be performed well if the image base is unknown. In this paper, we propose an innovative method to determine the image base of a firmware file with ARM/Thumb instruction set. First, based on the characteristics of the function entry table (FET) for an ARM processor, an algorithm called FIND-FET is proposed to identify the function entry tables. Second, by using the most common instructions of function prologue and FETs, the FIND-BASE algorithm is proposed to determine the candidate image base by counting the matched functions and then choose the one with maximal matched FETs as the final result. The algorithms are applied on some firmwares collected from the Internet, and results indicate that they can effectively find out the image base for the majority of example firmware files.

  • A Linearly and Circularly Polarized Double-Band Cross Spiral Antenna

    Mayumi MATSUNAGA  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:2
      Page(s):
    430-438

    A novel circularly and linearly polarized loop antenna is presented. A simple loop configuration, twisted like a cross shape, has achieved radiating wide beam circular polarization simultaneously with linear polarization in two close bands. This cross configuration brings good circular polarization to a loop antenna because it uses the transmission line mode of a folded dipole antenna. For these reasons, the antenna is named the Cross Spiral Antenna (CSA). In this paper, a basic structure and the principle of the CSA radiating circular polarization with one port feeding is explained. The prototype CSA, which is tuned to around 1.57GHz and 1.6GHz, is tested for verifying the effectiveness of the suggested antenna configuration.

  • Simple Primary User Signal Area Estimation for Spectrum Measurement

    Kenta UMEBAYASHI  Kazuki MORIWAKI  Riki MIZUCHI  Hiroki IWATA  Samuli TIIRO  Janne J. LEHTOMÄKI  Miguel LÓPEZ-BENÍTEZ  Yasuo SUZUKI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:2
      Page(s):
    523-532

    This paper investigates a signal area (SA) estimation method for wideband and long time duration spectrum measurements for dynamic spectrum access. SA denotes the area (in time/frequency domain) occupied by the primary user's signal. The traditional approach, which utilizes only Fourier transform (FT) and energy detector (ED) for SA estimation, can achieve low complexity, but its estimation performance is not very high. Against this issue, we apply post-processing to improve the performance of the FT-based ED. Our proposed method, simple SA (S-SA) estimation, exploits the correlation of the spectrum states among the neighboring tiles and the fact that SA typically has a rectangular shape to estimate SA with high accuracy and relatively low complexity compared to a conventional method, contour tracing SA (CT-SA) estimation. Numerical results will show that the S-SA estimation method can achieve better detection performance. The SA estimation and processing can reduce the number of bits needed to store/transmit the observed information compared to the FT-based ED. Thus, in addition to improved detection performance it also compresses the data.

  • An Effective Range Ambiguity Resolution for LEO Satellite with Unknown Phase Deviation

    Seung Won CHO  Sang Jeong LEE  

     
    PAPER-Satellite Communications

      Vol:
    E99-B No:2
      Page(s):
    533-541

    Ranging is commonly used to measure the distance to a satellite, since it is one of the quickest and most effective methods of finding the position of a satellite. In general, ranging ambiguity is easily resolved using major and subsequent ambiguity-resolving tones. However, an induced unknown phase error could interfere with resolving the ranging ambiguity. This paper suggests an effective and practical method to resolve the ranging ambiguity without changing the original planned ranging tone frequencies when an unknown non-linear phase error exists. Specifically, the present study derives simple equations for finding the phase error from the physical relationship between the measured major and minor tones. Furthermore, a technique to select the optimal ambiguity integer and correct phase error is provided. A numerical analysis is performed using real measurements from a low earth orbit (LEO) satellite to show its suitability and effectiveness. It can be seen that a non-ambiguous range is acquired after compensating the unknown phase error.

  • k-Degree Layer-Wise Network for Geo-Distributed Computing between Cloud and IoT

    Yiqiang SHENG  Jinlin WANG  Haojiang DENG  Chaopeng LI  

     
    PAPER

      Vol:
    E99-B No:2
      Page(s):
    307-314

    In this paper, we propose a novel architecture for a deep learning system, named k-degree layer-wise network, to realize efficient geo-distributed computing between Cloud and Internet of Things (IoT). The geo-distributed computing extends Cloud to the geographical verge of the network in the neighbor of IoT. The basic ideas of the proposal include a k-degree constraint and a layer-wise constraint. The k-degree constraint is defined such that the degree of each vertex on the h-th layer is exactly k(h) to extend the existing deep belief networks and control the communication cost. The layer-wise constraint is defined such that the layer-wise degrees are monotonically decreasing in positive direction to gradually reduce the dimension of data. We prove the k-degree layer-wise network is sparse, while a typical deep neural network is dense. In an evaluation on the M-distributed MNIST database, the proposal is superior to a state-of-the-art model in terms of communication cost and learning time with scalability.

  • Design of a Sensorless Controller Synthesized by Robust H∞ Control for Boost Converters

    Xutao LI  Minjie CHEN  Hirofumi SHINOHARA  Tsutomu YOSHIHARA  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E99-B No:2
      Page(s):
    356-363

    Small loop gain and low crossover frequency result in poor dynamic performance of a single-loop output voltage controlled boost converter in continuous conduction mode. Multi-loop current control can improve the dynamic performance, however, the cost, size and weight of the circuit will also be increased. Sensorless multi-loop control solves the problems, however, the difficulty of the closed-loop characteristics evaluation will be severely aggravated, because there are more parameters in the loops, meanwhile, different from the single-loop, the relationships between the loop gains and closed-loop characteristics including audio susceptibility and output impedance are generally indirect for the multi-loop. Therefore, in this paper, a novel robust H∞ synthesis approach in the time-domain is proposed to design a sensorless controller for boost converters, which need not solve any algebraic Riccati equation or linear matrix inequalities, and most importantly, provides an approach to parameterizing the controller by an adjustable parameter. The adjustable parameter behaves like a ‘knob’ on the dynamic performance, consequently, which makes the closed-loop characteristics evaluation straightforward. A boost converter is used to verify the proposed synthesis approach. Simulations show the great convenience of the closed-loop characteristics evaluation. Practical experiments confirm the simulations.

  • Compact Analytical Threshold Voltage Model of Strained Gate-All-Around MOSFET Fabricated on Si1-xGex Virtual Substrate

    Yefei ZHANG  Zunchao LI  Chuang WANG  Feng LIANG  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E99-C No:2
      Page(s):
    302-307

    In this paper, an analytical threshold voltage model of the strained gate-all-around MOSFET fabricated on the Si1-xGex virtual substrate is presented by solving the two-dimensional Poisson equation. The impact of key parameters such as the strain, channel length, gate oxide thickness and radius of the silicon cylinder on the threshold voltage has been investigated. It has been demonstrated that the threshold voltage decreases as the strain in the channel increases. The threshold voltage roll-off becomes severe when increasing the Ge content in the Si1-xGex virtual substrate. The model is found to tally well with the device simulator.

  • Emergency Optical Network Construction and Control with Multi-Vendor Interconnection for Quick Disaster Recovery

    Sugang XU  Noboru YOSHIKANE  Masaki SHIRAIWA  Takehiro TSURITANI  Hiroaki HARAI  Yoshinari AWAJI  Naoya WADA  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E99-B No:2
      Page(s):
    370-384

    Past disasters, e.g., mega-quakes, tsunamis, have taught us that it is difficult to fully repair heavily damaged network systems in a short time. The only method for quickly restoring core communications is to start by fully utilizing the surviving network resources from different networks. However, as these networks might be built using different vendors' products (which are often incompatible with each other), the interconnection and utilization of these surviving resources are not straightforward. In this paper, we consider an all-optical multi-vendor interconnection method as an efficient reactive approach during disaster recovery. First, we introduce a disaster recovery scenario in which we use the multi-vendor interconnection approach. Second, we present two sub-problems and propose solutions: (1) network planning problem for multi-vendor interconnection-based emergency optical network construction and (2) interconnection problem for multi-vendor optical networks including both the data-plane and the control-and-management-plane. To enable the operation of multi-vendor systems, command translation middleware is developed for individual vendor-specific network control-and-management systems. Simulations are conducted to evaluate our proposal for sub-problem (1). The results reveal that multi-vendor interconnection can lead to minimum-cost network recovery. Additionally, an emergency optical network prototype is implemented on a two-vendor optical network test-bed to address sub-problem (2). Demonstrations of both the data-plane and the control-and-management-plane validate the feasibility of the multi-vendor interconnection approach in disaster recovery.

  • Improved Edge Boxes with Object Saliency and Location Awards

    Peijiang KUANG  Zhiheng ZHOU  Dongcheng WU  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2015/11/12
      Vol:
    E99-D No:2
      Page(s):
    488-495

    Recently, object-proposal methods have attracted more and more attention of scholars and researchers for its utility in avoiding exhaustive sliding window search in an image. Object-proposal method is inspired by a concept that objects share a common feature. There exist many object-proposal methods which are either in segmentation fashion or engineering categories depending on low-level feature. Among those object-proposal methods, Edge Boxes, which is based on the number of contours that a bounding box wholly contains, has the state of art performance. Since Edge Boxes sometimes misses proposing some obvious objects in some images, we propose an appropriate version of it based on our two observations. We call the appropriate version as Improved Edge Boxes. The first of our observations is that objects have a property which can help us distinguish them from the background. It is called object saliency. An appropriate way we employ to calculate object saliency can help to retrieve some objects. The second of our observations is that objects ‘prefer’ to appear at the center part of images. For this reason, a bounding box that appears at the center part of the image is likely to contain an object. These two observations are going to help us retrieve more objects while promoting the recall performance. Finally, our results show that given just 5000 proposals we achieve over 89% object recall but 87% in Edge Boxes at the challenging overlap threshold of 0.7. Further, we compare our approach to some state-of-the-art approaches to show that our results are more accurate and faster than those approaches. In the end, some comparative pictures are shown to indicate intuitively that our approach can find more objects and more accurate objects than Edge Boxes.

  • Threshold-Based Distributed Continuous Top-k Query Processing for Minimizing Communication Overhead

    Kamalas UDOMLAMLERT  Takahiro HARA  Shojiro NISHIO  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2015/11/11
      Vol:
    E99-D No:2
      Page(s):
    383-396

    In this paper, we propose a communication-efficient top-k continuous query processing method on distributed local nodes where data are horizontally partitioned. A designated coordinator server takes the role of issuing queries from users to local nodes and delivering the results to users. The final results are requested via a top-k subscription which lets local nodes know which data and updates need to be returned to users. Our proposed method makes use of the active previously posed queries to identify a small set of needed top-k subscriptions. In addition, with the pre-indexed nodes' skylines, the number of local nodes to be subscribed can be significantly reduced. As a result, only a small number of subscriptions are informed to a small number of local nodes resulting in lower communication overhead. Furthermore, according to dynamic data updates, we also propose a method that prevents nodes from reporting needless updates and also maintenance procedures to preserve the consistency. The results of experiments that measure the volume of transferred data show that our proposed method significantly outperforms the previously proposed methods.

  • Insecurity of a Certificateless Aggregate Signature Scheme

    Han SHEN  Jianhua CHEN  Hao HU  Jian SHEN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E99-A No:2
      Page(s):
    660-662

    Recently, H. Liu et al. [H. Liu, M. Liang, and H. Sun, A secure and efficient certificateless aggregate signature scheme, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, vol.E97-A, no.4, pp.991-915, 2014] proposed a new certificateless aggregate signature (CLAS) scheme and demonstrated that it was provably secure in the random oracle model. However, in this letter, we show that their scheme cannot provide unforgeability, i.e., an adversary having neither the user's secret value nor his/her partial private key can forge a legal signature of any message.

  • Feasibility of Interference Alignment for MIMO Two-Way Interference Channel

    Kiyeon KIM  Janghoon YANG  Dong Ku KIM  

     
    LETTER-Digital Signal Processing

      Vol:
    E99-A No:2
      Page(s):
    651-655

    The feasibility condition of interference alignment (IA) for multiple-input multiple-output two-way interference channel is studied in this paper. A necessary condition and a sufficient condition on the IA feasibility are established and the sum degrees of freedom (DoF) for a broad class of network topologies is characterized. The numerical results demonstrate that two-way operation with appropriate IA is able to achieve larger sum DoF than the conventional one-way operation.

  • An Optimization Strategy for CFDMiner: An Algorithm of Discovering Constant Conditional Functional Dependencies

    Jinling ZHOU  Xingchun DIAO  Jianjun CAO  Zhisong PAN  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/11/06
      Vol:
    E99-D No:2
      Page(s):
    537-540

    Compared to the traditional functional dependency (FD), the extended conditional functional dependency (CFD) has shown greater potential for detecting and repairing inconsistent data. CFDMiner is a widely used algorithm for mining constant-CFDs. But the search space of CFDMiner is too large, and there is still room for efficiency improvement. In this paper, an efficient pruning strategy is proposed to optimize the algorithm by reducing the search space. Both theoretical analysis and experiments have proved the optimized algorithm can produce the consistent results as the original CFDMiner.

  • A Further Improvement on Bit-Quad-Based Euler Number Computing Algorithm

    Bin YAO  Lifeng HE  Shiying KANG  Xiao ZHAO  Yuyan CHAO  

     
    LETTER-Pattern Recognition

      Pubricized:
    2015/10/30
      Vol:
    E99-D No:2
      Page(s):
    545-549

    The Euler number is an important topological property in a binary image, and it can be computed by counting certain bit-quads in the binary image. This paper proposes a further improved bit-quad-based algorithm for computing the Euler number. By scanning image rows two by two and utilizing the information obtained while processing the previous pixels, the number of pixels to be checked for processing a bit-quad can be decreased from 2 to 1.5. Experimental results demonstrated that our proposed algorithm significantly outperforms conventional Euler number computing algorithms.

  • Energy-Efficient Distributed Spectrum Sensing with Combined Censoring in Cognitive Radios

    Li FENG  Yujun KUANG  Binwei WU  Zeyang DAI  Qin YU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:2
      Page(s):
    455-464

    In this paper, we propose a novel censor-based cooperative spectrum sensing strategy, called adaptive energy-efficient sensing (AES), in which both sequential sensing and censoring report mechanism are employed, aiming to reduce the sensing energy consumption of secondary user relays (SRs). In AES, an anchor secondary user (SU) requires cooperative sensing only when it does not detect the presence of PU by itself, and the cooperative SR adopts decision censoring report only if the sensing result differs from its previous one. We derive the generalized-form expressions false alarm and detection probabilities over Rayleigh fading channels for AES. The sensing energy consumption is also analyzed. Then, we study sensing energy overhead minimization problem and show that the sensing time allocation can be optimized to minimize the miss detection probability and sensing energy overhead. Finally, numerical results show that the proposed strategy can remarkably reduce the sensing energy consumption while only slightly degrading the detection performance compared with traditional scheme.

  • Photonics for Millimeter-Wave and Terahertz Sensing and Measurement Open Access

    Tadao NAGATSUMA  Shintaro HISATAKE  Hai Huy NGUYEN PHAM  

     
    INVITED PAPER

      Vol:
    E99-C No:2
      Page(s):
    173-180

    This paper describes recent progress of photonically-enabled systems for millimeter-wave and terahertz measurement applications. After briefly explaining signal generation schemes as a foundation of photonics-based approach, system configurations for specific applications are discussed. Then, practical demonstrations are presented, which include frequency-domain spectroscopy, phase-sensitive measurement, electric-field measurement, and 2D/3D imaging.

  • An Interference Rejection Combining Technique for an SFBC-OFDM System with Multiple Carrier Frequency Offsets

    Mina LEE  Rothna PEC  Kyu Seok KIM  Chang Hwan PARK  Yong Soo CHO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:2
      Page(s):
    481-487

    In this paper, an interference rejection combining (IRC) technique is proposed for SFBC-OFDM cellular systems that exhibit multiple carrier frequency offsets (CFOs). The IRC weight and the corresponding value for CFO compensation in the proposed technique are obtained by maximizing the post-SINR, i.e., minimizing both the interference signal and inter-channel interference (ICI) terms caused by multiple CFOs. The performance of the conventional IRC and proposed IRC techniques is evaluated by computer simulation for an SFBC-OFDM cellular system with multiple CFOs.

  • Performance of ZigBee Based Fall Detection Alarm System

    Mohamed Hadi HABAEBI  Mabruka Mohamed AGEL  Alhareth ZYOUD  

     
    PAPER-Network

      Vol:
    E99-B No:2
      Page(s):
    385-391

    Accidental falling among elderly people has become a public health concern. Thus, there is a need for systems that detect a fall when it happens. This paper presents a portable real-time remote health monitoring system that can remotely monitor patients' movements. The system is designed and implemented using ZigBee wireless technologies, and the data is analysed using Matlab. The purpose of this research is to determine the acceleration thresholds for fall detection, using tri-axial accelerometer readings at the head, waist, and knee. Seven voluntary subjects performed purposeful falls and Activities of Daily Living (ADL). The results indicated that measurements from the waist and head can accurately detect falls; the sensitivity and reliability measurements of fall detection ranged between 80% and 90%. In contrast, the measurements showed that the knee is not a useful position for the fall detection.

  • Improving Performance by Countering Human Body Shadowing in 60GHz Band Wireless Systems by Using Two Transmit and Two Receive Antennas

    Tomoaki NAGAYAMA  Shigeki TAKEDA  Masahiro UMEHIRA  Kenichi KAGOSHIMA  Teruyuki MIYAJIMA  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:2
      Page(s):
    422-429

    This paper proposes the use of two transmit and two receive antennas spaced at roughly the width of a human body to improve communication quality in the presence of shadowing by a human body in the 60GHz band. In the proposed method, the transmit power is divided between the two transmit antennas, and the receive antenna that provides the maximum receive level is then chosen. Although the receive level is reduced by 3dB, the maximum attenuation caused by human body shadowing is totally suppressed. The relationship between the antenna element spacing and the theoretical spacing based on the 1st. Fresnel zone theory is clarified. Experiments confirm that antenna spacing several centimeters wider than that given by the 1st. Fresnel zone theory is enough to attain a significant performance improvement.

  • An Effective Carrier Frequency and Phase Offset Tracking Scheme in the Case of Symbol Rate Sampling

    Yunhua LI  Bin TIAN  Ke-Chu YI  Quan YU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:2
      Page(s):
    337-346

    In modern communication systems, it is a critical and challenging issue for existing carrier tracking techniques to achieve near-ideal carrier synchronization without the help of pilot signals in the case of symbol rate sampling and low signal-to-noise ratio (SNR). To overcome this issue, this paper proposes an effective carrier frequency and phase offset tracking scheme which has a robust confluent synchronization architecture whose main components are a digital frequency-locked loop (FLL), a digital phase-locked loop (PLL), a modified symbol hard decision block and some sampling rate conversion blocks. As received signals are sampled at symbol baud rate, this carrier tracking scheme is still able to obtain precise estimated values of carrier synchronization parameters under the condition of very low SNRs. The performance of the proposed carrier synchronization scheme is also evaluated by using Monte-Carlo method. Simulation results confirm the feasibility of this carrier tracking scheme and demonstrate that it ensures that both the rate-3/4 irregular low-density parity-code (LDPC) coded system and the military voice transmission system utilizing the direct sequence spread spectrum (DSSS) technique achieve satisfactory bit-error rate (BER) performance at correspondingly low SNRs.

4181-4200hit(21534hit)