The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

7121-7140hit(21534hit)

  • Anonymous Credential with Attributes Certification after Registration

    Isamu TERANISHI  Jun FURUKAWA  

     
    PAPER-Authentication

      Vol:
    E95-A No:1
      Page(s):
    125-137

    An anonymous credential system enables individuals to selectively prove their attributes while all other knowledge remains hidden. We considered the applicability of such a system to large scale infrastructure systems and perceived that revocations are still a problem. Then we contrived a scenario to lessen the number of revocations by using more attributes. In this scenario, each individual needs to handle a huge number of attributes, which is not practical with conventional systems. In particular, each individual needs to prove small amounts of attributes among a huge number of attributes and the manager of the system needs to certify a huge number of attributes of individuals periodically. These processes consume extremely large resources. This paper proposes an anonymous credential system in which both a user's proving attributes set, which is included in a huge attribute set, and manager's certifying attributes are very efficient. Conclusion Our proposal enables an anonymous credential system to be deployed as a large scale infrastructure system.

  • Broadband Millimeter-Wave Microstrip Comb-Line Antenna Using Corporate Feeding System with Center-Connecting

    Atsushi KUNITA  Kunio SAKAKIBARA  Kazuyuki SEO  Nobuyoshi KIKUMA  Hiroshi HIRAYAMA  

     
    PAPER-Antennas

      Vol:
    E95-B No:1
      Page(s):
    41-50

    A broadband microstrip comb-line antenna using a corporate feeding system was developed. The antenna was composed of four colinearly-arranged comb-line antennas with traveling-wave excitation fed by a parallel-feeding circuit of tournament configuration. The total phase deviation due to frequency change became one fourth of the ordinary series feeding from the end of the antenna. Furthermore, the terminations of the inner two comb-lines were connected at the overall center of the developed antenna. Therefore, the narrowband matching elements are not necessary and the amplitude deviation of the aperture distribution for input from one side due to frequency change is compensated by deviation for input from the other side. Broad bandwidth can be expected by using the proposed configuration. The proposed antenna was designed at 76.5 GHz. The effect of the proposed feeding-circuit for broadband operation was confirmed by comparing the measured performances of the antennas fed by other feeding circuits; the end feeding, the center feeding and the ordinary corporate feeding. The bandwidth of the proposed corporate feeding antenna with the center connecting was approximately 14% and 7% wider than the antennas of the center feeding and of the ordinary corporate feeding, respectively.

  • Propagation Characteristics of Dielectric Waveguides with Arbitrary Inhomogeneous Media along the Middle Layer

    Ryosuke OZAKI  Tsuneki YAMASAKI  

     
    PAPER-Periodic Structures

      Vol:
    E95-C No:1
      Page(s):
    53-62

    In this paper, we apply an improved method for the guiding problem of dielectric waveguide with arbitrary inhomogeneous media along the middle layer introduced the defect layers, and analyzed the propagation characteristics of dielectric waveguide composed of dielectric circular cylinders and the arbitrary inhomogeneous media in the middle layer by using a combination of the improved Fourier series expansion method and multilayer method. Numerical results are given for the propagation constants in the first stop band regions, and the distribution of energy flow for both TE0 and TM0 modes. The influence of permittivity and the shape variation of arbitrary inhomogeneous media are discussed in the first stop band regions.

  • TE Plane Wave Reflection and Transmission from a Two-Dimensional Random Slab – Slanted Fluctuation –

    Yasuhiko TAMURA  

     
    PAPER-Random Media and Rough Surfaces

      Vol:
    E95-C No:1
      Page(s):
    36-43

    This paper deals with reflection and transmission of a TE plane wave from a two-dimensional random slab with slanted fluctuation by means of the stochastic functional approach. Such slanted fluctuation of the random slab is written by a homogeneous random field having a power spectrum with a rotation angle. By starting with the previous paper [IEICE Trans. Electron., Vol. E92-C, no.1, pp.77–84, January 2009], any statistical quantities are immediately obtained even for slanted fluctuation cases. The first-order incoherent scattering cross section is numerically calculated and illustrated in figures. It is then newly found that shift and separation phenomena of the leading or enhanced peaks at four characteristic scattering angles take place in the transmission and reflection sides, respectively.

  • Analytical Model of the Single Threshold Mechanism with Hysteresis for Multi-Service Networks

    Maciej SOBIERAJ  Maciej STASIAK  Joanna WEISSENBERG  Piotr ZWIERZYKOWSKI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E95-B No:1
      Page(s):
    120-132

    This paper presents a new generalized single threshold model that can be used in communications and cellular networks. In the proposed model, called Single Hysteresis Model (SHM), it is assumed that the amount of resources accessible for a new call of a given class can depend on two load areas of the system. The switching between areas is modulated by the two-state Markov chain which determines the average time the system spends in a particular load area, i.e. the area in which calls of selected classes with a reduced amount of resources (high load area) and with the initial amount of resources (low load area) are serviced. The results obtained for the discussed analytical model are compared with the results of the simulation of an exemplary WCDMA radio interface carrying a mixture of different multi-rate traffic streams. The research study confirms high accuracy of the proposed model.

  • On-Chip In-Place Measurements of Vth and Signal/Substrate Response of Differential Pair Transistors

    Yoji BANDO  Satoshi TAKAYA  Toru OHKAWA  Toshiharu TAKARAMOTO  Toshio YAMADA  Masaaki SOUDA  Shigetaka KUMASHIRO  Tohru MOGAMI  Makoto NAGATA  

     
    PAPER-Electronic Circuits

      Vol:
    E95-C No:1
      Page(s):
    137-145

    In-place AC measurements of the signal gain and substrate sensitivity of differential pair transistors of an analog amplifier are combined with DC characterization of the threshold voltage (Vth) of the same transistors. An on-chip continuous time waveform monitoring technique enables in-place matrix measurements of differential pair transistors with a variety of channel sizes and geometry, allowing the wide coverage of experiments about the transistor-level physical layout dependency of substrate noise response. A prototype test structure uses a 90-nm CMOS technology and demonstrates the geometry-dependent variation of substrate sensitivity of transistors in operation.

  • A Multiband Monopole Antenna with Modified Fractal Loop Parasitic for DCS 1800, WLAN, WiMAX and IMT Advanced Systems

    Chatree MAHATTHANAJATUPHAT  Norakamon WONGSIN  Prayoot AKKARAEKTHALIN  

     
    PAPER-Antennas

      Vol:
    E95-B No:1
      Page(s):
    27-33

    A multiband monopole antenna with modified fractal loop parasitic is presented. Especially, bow-tie stubs and a modified fractal loop are attached to the sides and bottom of a strip line monopole antenna, respectively, in order to generate the multi-resonant frequencies for the applications of wireless communication systems. The characteristics of the presented antenna have been examined by using the simulation software. The comparison between the simulated and measured results confirms the good agreement. The results show good multiband operation with 10 dB impedance bandwidths of 15.55%, 8.75%, and 31.94% at the resonant frequencies of 1.8 GHz, 2.4 GHz, and 3.6 GHz, respectively, which cover the operating band applications of DCS 1800, WLAN (IEEE802.11 b/g), WiMAX, and IMT advanced system (4G mobile communication system).

  • Time-Efficient Multiple-Stage Spectrum Sensing for Cognitive Radio Systems

    Jung Min PARK  Seong-Lyun KIM  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:1
      Page(s):
    341-344

    To opportunistically use the licensed band, spectrum sensing has a vital role as the core component in cognitive radio systems. However, the accurate detection of the primary signal is always accompanied by significant overhead, reducing the secondary throughput. In this letter, we suggest remedying this problem by adopting multiple-stage spectrum sensing (MSS) technique. Furthermore, we investigate how our proposed MSS can be incorporated into the collaborative spectrum sensing. Our results are encouraging in that the proposed MSS with collaboration significantly reduces the sensing time compared to the conventional sensing scheme.

  • An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments

    Jangseong KIM  Joonsang BAEK  Jianying ZHOU  Taeshik SHON  

     
    PAPER-Security

      Vol:
    E95-D No:1
      Page(s):
    117-125

    Recently, numerous service discovery protocols have been introduced in the open literature. Unfortunately, many of them did not consider security issues, and for those that did, many security and privacy problems still remain. One important issue is to protect the privacy of a service provider while enabling an end-user to search an alternative service using multiple keywords. To deal with this issue, the existing protocols assumed that a directory server should be trusted or owned by each service provider. However, an adversary may compromise the directory server due to its openness property. In this paper, we suggest an efficient verification of service subscribers to resolve this issue and analyze its performance and security. Using this method, we propose an efficient and secure service discovery protocol protecting the privacy of a service provider while providing multiple keywords search to an end-user. Also, we provide performance and security analysis of our protocol.

  • Configuring a Low-Cost, Power-Saving Multiple Server Backup System: Experimental Results

    Mitsuyoshi KITAMURA  

     
    PAPER-Network Management/Operation

      Vol:
    E95-B No:1
      Page(s):
    189-197

    In this study, a low-cost, power-saving and reliable Multiple Server Backup System (MSBS) was configured and tested. The MSBS is based on a Dynamic Backup Server System (DBSS) and is able to recover many different server functions. To configure the DBSS, the mode segmentation method is introduced to simplify system control design and improve applicability to other systems. Experiments based on a mail server showed that the DBSS has sufficient ability to deal with various types of issues, including software and hardware failures. Furthermore, it is important to evaluate the virtual server performance in recovering target server functions. The well-known clock time inaccuracy problem of the virtual server is solved using the network access method regardless of the failure.

  • Performance Analysis of Energy Pattern and Power Patterns for UWB Antenna and Narrowband Antenna Open Access

    Dau-Chyrh CHANG  Chao-Hsiang LIAO  Powen HSU  

     
    INVITED PAPER

      Vol:
    E95-B No:1
      Page(s):
    2-9

    Power patterns in the frequency domain are usually used to describe the antenna performance in narrowband communication systems; however, they are not sufficient for ultra wideband (UWB) antennas in wideband communication systems. In this paper, energy pattern and energy gain are introduced to describe the performance of UWB antennas. Numerical simulations and measurements are used to demonstrate the difference between power patterns and energy patterns for narrowband Yagi-Uda antenna, UWB CPW–fed bow-tie slot antenna, and UWB comb taper slot antenna. The results of simulations and measurements are agreement not only in energy pattern, but also in received voltage at various observation angles. For narrowband antennas, the energy patterns are similar to that of the power patterns in the main beam region. However, there are quite differences between power pattern in frequency domain and energy pattern in time domain for UWB antennas.

  • Efficient Address Generation for Permutation Polynomial Based Interleavers over Integer Rings

    Jonghoon RYU  

     
    LETTER-Coding Theory

      Vol:
    E95-A No:1
      Page(s):
    421-424

    Permutation polynomial based interleavers over integer rings have recently received attention for their excellent channel coding performance, elegant algebraic properties and simplicity of implementation. In this letter, it is shown that permutation polynomial based interleavers of practical interest is decomposed into linear permutation polynomials. Based on this observation, it is shown that permutation polynomial based interleavers as well as their inverses can be efficiently implemented.

  • Optimization of Field Decomposition for a Mode Matching Technique

    Shinichiro OHNUKI  Takahisa MOCHIZUKI  Kenichiro KOBAYASHI  Tsuneki YAMASAKI  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E95-C No:1
      Page(s):
    101-104

    We introduce a novel method to optimize field decomposition for a mode matching technique. Using our method, expanded mode numbers can be minimized to achieve the desired digits of computational accuracy.

  • Conservation of Energy in a Waveguide System with an Imperfection Core

    Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E95-C No:1
      Page(s):
    97-100

    Asymptotic expansions of the amplitudes of the direct and scattered waves in a waveguide system with an imperfection core are derived for large core number and the partial cancellation of the direct wave by the scattered wave is shown in detail. The total power of light in the cross section of a waveguide system is analytically derived and it is shown that the total power of the sum of the direct and scattered waves decreases from that of the direct wave because of the cancellation, the difference of the total power transfers to the localized wave and the total power of light is conserved.

  • A Clustering K-Anonymity Scheme for Location Privacy Preservation

    Lin YAO  Guowei WU  Jia WANG  Feng XIA  Chi LIN  Guojun WANG  

     
    PAPER-Privacy

      Vol:
    E95-D No:1
      Page(s):
    134-142

    The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of Location-Based Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity scheme for location privacy preservation (namely CK) is proposed. The CK scheme does not rely on a trusted third party to anonymize the location information of users. In CK scheme, the whole area that all the users reside is divided into clusters recursively in order to get cloaked area. The exact location information of the user is replaced by the cloaked spatial temporal boundary (STB) including K users. The user can adjust the resolution of location information with spatial or temporal constraints to meet his personalized privacy requirement. The experimental results show that CK can provide stringent privacy guarantees, strong robustness and high QoS (Quality of Service).

  • Adaptive and Iterative ITI Canceller for Inter-Track Asynchronous Shingled Write Magnetic Recording

    Masaaki FUJII  

     
    PAPER-Storage Technology

      Vol:
    E95-C No:1
      Page(s):
    155-162

    An adaptive and iterative intertrack-interference (ITI) cancelling scheme is described for multi-track signal detection in inter-track asynchronous shingled write magnetic recording. There is write-clock frequency drift in asynchronous recording systems. Read-back signals obtained with a wide read head scanning narrow tracks thus suffer from not only intersymbol interference (ISI) but also time-variant ITI. To efficiently cope with static ISI and time-variant ITI, multi-track soft interference cancellers and two-dimensional partial-response filters are incorporated based on per-survivor processing into each trellis state defined in a one-dimensional/two-dimensional trellis-switching max-log-MAP detector. In addition, the computational complexity can be reduced based on channel interpolation and intermittent TDPR-filter control by allowing small degradation in signal detection. Computer simulation results in media-noise-dominant environments demonstrate that the proposed adaptive and iterative ITI canceller achieves bit error rates close to those obtained in a non-ITI case when the read-head off-track ratio is up to 50% in write-clock frequency difference of 0.02%.

  • A Basic Fuzzy-Estimation Theory for Available Operation of Extremely Complicated Large-Scale Network Systems

    Kazuo HORIUCHI  

     
    PAPER-Circuit Theory

      Vol:
    E95-A No:1
      Page(s):
    338-345

    In this paper, we shall describe a basic fuzzy-estimation theory based on the concept of set-valued operators, suitable for available operation of extremely complicated large-scale network systems. Fundamental conditions for availability of system behaviors of such network systems are clarified in a form of β-level fixed point theorem for system of fuzzy-set-valued operators. Here, the proof of this theorem is accomplished by the concept of Hausdorff's ball measure of non-compactness introduced into the Banach space.

  • Software Protection Combined with Tamper-Proof Device

    Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Yutaka MIYAKE  

     
    PAPER-Software Protection

      Vol:
    E95-A No:1
      Page(s):
    213-222

    Establishment of a practical software protection method is a major issue in software distribution. There are several approaches to the issue; however, no practical, secure method for mobile phone applications has been proposed. In this paper, we propose a new software protection scheme combined with a tamper-proof device (TPD) in order to achieve computational security against illegal analysis and copying of the target program. Our scheme achieves a reasonable level of security for encoding the data and variables in a program. The program on a mobile phone deals only with encoded data that is difficult to compromise, and the TPD plays a role of decoding execution results. We implemented the proposed scheme on a 3G mobile phone and a user identification module (UIM). An analysis and copying of the protected program impose exponential computation complexities under our attack model.

  • High Efficiency Control Method for the Hall Thruster System through Constant Flow Rate Control by Power Supply Control

    Hiroyuki OSUGA  Fujio KUROKAWA  Taichiro TAMIDA  Naoji YAMAMOTO  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E95-B No:1
      Page(s):
    133-142

    We present a new power supply control method, which achieves constant flow Rate control for the thrust of a 20 mN-class Hall thruster. First, we present observations of a 20 mN-class Hall thruster with oscillation-mode-map. We make a theoretical study of the thrust and experiments on electrical characteristics of the Hall thruster, and conclude that thrust, thrust efficiency and low frequency oscillation are clearly determined by the external control parameters, anode voltage, gas flow rate, and magnetic flux density. Second, we discuss how to control the power supplies to suppress the power consumption, especially when the operation or thruster conditions change temporarily during use. The new method will be a very important guideline for Hall thruster system design and operation, in particular making it easy to manage the power consumption in a satellite by controlling the thrust resources. As a result of performance experiments for a 20 mN-class Hall thruster, over 36% thrust efficiency of the Hall thruster was found to be sensitive to the anode voltage and applied magnetic flux density. The new power control method achieves constant flow rate control method of the thrust. The benefits are light weight and low cost.

  • Small Wearable Antenna with Folded Ground for Body-Centric Wireless Communications

    Zhengyi LI  Kazuyuki SAITO  Masaharu TAKAHASHI  Koichi ITO  

     
    LETTER-Antennas

      Vol:
    E95-B No:1
      Page(s):
    109-112

    The miniaturization of electronic devices is leading to the creation of body-centric wireless communications, in which wireless devices are attached to human body. However, the human body environment is often uninviting for wireless signals owing to the mutual influence between the human body and wireless devices' antennas, namely wearable antennas. Therefore, wearable antennas need to be carefully designed. In this paper, a small wearable antenna with folded ground at 2.4 GHz is proposed. The folded ground has two effects: one is to improve efficiency and the other is to enhance bandwidth. When the antenna is very close to human body, it has an efficiency of 50.7% and a wide operation bandwidth of 130 MHz.

7121-7140hit(21534hit)