The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

7401-7420hit(21534hit)

  • High-Performance Architecture for Concurrent Error Detection for AES Processors

    Takeshi SUGAWARA  Naofumi HOMMA  Takafumi AOKI  Akashi SATOH  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:10
      Page(s):
    1971-1980

    This paper proposes an efficient scheme for concurrent error detection for hardware implementations of the block cipher AES. In the proposed scheme, the circuit component for the round function is divided into two stages, which are used alternately for encryption (or decryption) and error checking in a pipeline. The proposed scheme has a limited overhead with respect to size and speed for the following reasons. Firstly, the need for a double number of clock cycles is eliminated by virtue of the reduced critical path. Secondly, the scheme only requires minimal additional circuitry for error detection since the detection is performed by the remaining encryption (or decryption) components within the pipeline. AES hardware with the proposed scheme was designed and synthesized by using 90-nm CMOS standard cell library with various constraints. As a result, the proposed circuit achieved 1.66 Gbps @ 12.9 Kgates for the compact version and 4.22 Gbps @ 30.7 Kgates for the high-speed version. These performance characteristics are comparable to those of a basic AES circuit without error detection, where the overhead of the proposed scheme is estimated to be 14.5% at maximum. The proposed circuit was fabricated in the form of a chip, and its error detection performance was evaluated through experiments. The chip was tested with respect to fault injection by using clock glitch, and the proposed scheme successfully detected and reacted to all introduced errors.

  • Optimum Threshold for Indoor UWB ToA-Based Ranging

    Marzieh DASHTI  Mir GHORAISHI  Katsuyuki HANEDA  Jun-ichi TAKADA  Kenichi TAKIZAWA  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E94-A No:10
      Page(s):
    2002-2012

    This paper proposes a method for setting the threshold for ultra-wide-band (UWB) threshold-based ranging in indoor scenarios. The optimum threshold is derived based on the full analysis of the ranging error, which is equivalent to the probability of correct detection of first arriving signal in time-based ranging techniques. It is shown that the probability of correct detection is a function of first arriving signal, which has variations with two independent distributions. On the one hand, the first arriving signal varies in different positions with the same range due to multipath interference and on the other, it is a function of distance due to free space path-loss. These two distributions are considered in the derivation of the ranging error, based on which the optimum threshold is obtained. A practical method to derive this threshold is introduced based on the standard channel model. Extensive Monte Carlo simulations, ray-tracing simulations and ranging measurements confirm the analysis and the superior performance of the proposed threshold scheme.

  • Architecture, Implementation, and Experiments of Programmable Network Using OpenFlow Open Access

    Hideyuki SHIMONISHI  Shuji ISHII  Lei SUN  Yoshihiko KANAUMI  

     
    INVITED PAPER

      Vol:
    E94-B No:10
      Page(s):
    2715-2722

    We propose a flexible and scalable architecture for a network controller platform used for OpenFlow. The OpenFlow technology was proposed as a means for researchers, network service creators, and others to easily design, test, and virtually deploy their innovative ideas in a large network infrastructure, which will accelerate research activities on Future Internet architectures. The technology enables the independent evolution of the network control plane and the data plane. Rather than having programmability within each network node, the separated OpenFlow controller provides network control through pluggable software. Our proposed network controller architecture will enable researchers to use their own software to control their own virtual networks. Flexibility and scalability were achieved by designing the network controller as a modularized and distributed system on a cluster of servers. Testing showed that a group of servers can efficiently cooperate to serve as a scalable OpenFlow controller. Testing using the nationwide JGN2plus network demonstrated that high-definition video can be delivered through OpenFlow-based point-to-point and point-to-multipoint paths.

  • Performance Evaluation of Inter-Layer 3 Networking with ID/Locator Separation Architecture

    Hiroyuki URABAYASHI  Miki YAMAMOTO  Tomohiko YAGYU  

     
    PAPER

      Vol:
    E94-B No:10
      Page(s):
    2741-2750

    In research community of content distribution, a new communication paradigm of rendezvous-based abstraction which easily enables location-free content-oriented services, attracts great attention. ID/Locator separation architecture is originally proposed for resolving increase of routing table size in the current Internet but it has possibility of supporting this abstraction because host ID is clearly separated from its location. This feature of ID/Locator separation means an end host can be identified by ID independent of its network layer protocol. So, ID/Locator separation architecture enables communication with end host(s) operating different network-layer protocol, which might increase candidate paths between host pairs and improve content distribution path. In this paper, we evaluate this improvement of shortest path brought by inter-layer 3 networking. In inter-layer 3 networking, a shared node connecting different network layer plane plays an important role. We evaluate shortest path improvement with various shared node locations and show that strategic assignment of shared nodes brings large improvement. When multiple layer 3 networks are available for users, shortest path might be improved even only with multi-homing (without inter-layer 3 networking). We also evaluate shortest path improvement brought by multi-homing and inter-layer 3 networking for incremental deployment scenario of multi-homing. Our simulation results show that inter-layer 3 networking brings great improvement even with small number of users deploying multi-homing while only multi-homing itself brings small improvement.

  • Statistical Mechanics of On-Line Learning Using Correlated Examples

    Kento NAKAO  Yuta NARUKAWA  Seiji MIYOSHI  

     
    LETTER

      Vol:
    E94-D No:10
      Page(s):
    1941-1944

    We consider a model composed of nonlinear perceptrons and analytically investigate its generalization performance using correlated examples in the framework of on-line learning by a statistical mechanical method. In Hebbian and AdaTron learning, the larger the number of examples used in an update, the slower the learning. In contrast, Perceptron learning does not exhibit such behaviors, and the learning becomes fast in some time region.

  • A Novel Feeding Structure to Generate Multiple Transmission Zeros for Miniature Waveguide Bandpass Filters Composed of Frequency-Selective Surfaces

    Masataka OHIRA  Zhewang MA  Hiroyuki DEGUCHI  Mikio TSUJI  

     
    PAPER-Passive Devices and Circuits

      Vol:
    E94-C No:10
      Page(s):
    1586-1593

    In this paper, we propose a novel feeding structure for a coaxial-excited compact waveguide filter, which is composed of planar resonators called frequency-selective surfaces (FSSs). In our proposed feeding structure, new FSSs located at the input and output ports are directly excited by the coaxial line. By using the FSSs, the transition from the TEM mode to the TE10 mode is realized by the resonance of the FSSs. Therefore, the backshort length from the coaxial probe to the shorted waveguide end can be made much shorter than one-quarter of the guided wavelength. Additionally, the coaxial-excited FSS provides one transmission zero at each stopband. As a design example, a three-stage bandpass filter with 4% bandwidth at the X band is demonstrated. The designed filter has a very compact size of one cavity and has high skirt selectivity with six transmission zeros. The effectiveness of the design is confirmed by the comparison of frequency characteristics obtained by the simulation and measurement.

  • Statistical Analysis of Huge-Scale Periodic Array Antenna Including Randomly Distributed Faulty Elements

    Keisuke KONNO  Qiang CHEN  Kunio SAWAYA  Toshihiro SEZAI  

     
    PAPER-Microwave and Millimeter-Wave Antennas

      Vol:
    E94-C No:10
      Page(s):
    1611-1617

    On the huge-scale array antenna for SSPS (space solar power systems), the problem of faulty elements and effect of mutual coupling between array elements should be considered in practice. In this paper, the effect of faulty elements as well as mutual coupling on the performance of the huge-scale array antenna are analyzed by using the proposed IEM/LAC. The result shows that effect of faulty elements and mutual coupling on the actual gain of the huge-scale array antenna are significant.

  • ROCKET: A Robust Parallel Algorithm for Clustering Large-Scale Transaction Databases

    Woong-Kee LOH  Yang-Sae MOON  Heejune AHN  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E94-D No:10
      Page(s):
    2048-2051

    We propose a robust and efficient algorithm called ROCKET for clustering large-scale transaction databases. ROCKET is a divisive hierarchical algorithm that makes the most of recent hardware architecture. ROCKET handles the cases with the small and the large number of similar transaction pairs separately and efficiently. Through experiments, we show that ROCKET achieves high-quality clustering with a dramatic performance improvement.

  • Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes

    Atsuko MIYAJI  Kazumasa OMOTE  

     
    PAPER-Information Network

      Vol:
    E94-D No:10
      Page(s):
    1955-1965

    Wireless Sensor Networks (WSNs) rely on in-network aggregation for efficiency, that is, readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. However, the previous optimally secure in-network aggregation protocols against multiple corrupted nodes require two round-trip communications between each node and the base station, including the result-checking phase whose congestion is O(log n) where n is the total number of sensor nodes. In this paper, we propose an efficient and optimally secure sensor network aggregation protocol against multiple corrupted nodes by a random-walk adversary. Our protocol achieves one round-trip communication to satisfy optimal security without the result-checking phase, by conducting aggregation along with the verification, based on the idea of TESLA technique. Furthermore, we show that the congestion complexity, communication complexity and computational cost in our protocol are constant, i.e., O(1).

  • A Study of Multiple Characteristics Differential Cryptanalysis

    Saeed SADEGHIAN  Babak SADEGHIYAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:10
      Page(s):
    2053-2058

    In this paper, we study how exploiting multiple differential characteristics with a common initial difference and different output differences improves the complexity of differential cryptanalysis attack. We call such an approach Multiple Differential Cryptanalysis. We describe such an attack rigorously by studying the probability distribution of multiple differential characteristics and giving an attack algorithm based on LLR statistic. We also present a statistical analysis on the attack complexity based on LLR probabilistic technique. Our analysis shows that the data complexity of the proposed attack decreases as the number of characteristics increases. We do an experiment with the described method to show its improvements through cryptanalyzing a reduced round PRESENT block cipher with 5 rounds.

  • A Bayesian Model of Transliteration and Its Human Evaluation When Integrated into a Machine Translation System

    Andrew FINCH  Keiji YASUDA  Hideo OKUMA  Eiichiro SUMITA  Satoshi NAKAMURA  

     
    PAPER

      Vol:
    E94-D No:10
      Page(s):
    1889-1900

    The contribution of this paper is two-fold. Firstly, we conduct a large-scale real-world evaluation of the effectiveness of integrating an automatic transliteration system with a machine translation system. A human evaluation is usually preferable to an automatic evaluation, and in the case of this evaluation especially so, since the common machine translation evaluation methods are affected by the length of the translations they are evaluating, often being biassed towards translations in terms of their length rather than the information they convey. We evaluate our transliteration system on data collected in field experiments conducted all over Japan. Our results conclusively show that using a transliteration system can improve machine translation quality when translating unknown words. Our second contribution is to propose a novel Bayesian model for unsupervised bilingual character sequence segmentation of corpora for transliteration. The system is based on a Dirichlet process model trained using Bayesian inference through blocked Gibbs sampling implemented using an efficient forward filtering/backward sampling dynamic programming algorithm. The Bayesian approach is able to overcome the overfitting problem inherent in maximum likelihood training. We demonstrate the effectiveness of our Bayesian segmentation by using it to build a translation model for a phrase-based statistical machine translation (SMT) system trained to perform transliteration by monotonic transduction from character sequence to character sequence. The Bayesian segmentation was used to construct a phrase-table and we compared the quality of this phrase-table to one generated in the usual manner by the state-of-the-art GIZA++ word alignment process used in combination with phrase extraction heuristics from the MOSES statistical machine translation system, by using both to perform transliteration generation within an identical framework. In our experiments on English-Japanese data from the NEWS2010 transliteration generation shared task, we used our technique to bilingually co-segment the training corpus. We then derived a phrase-table from the segmentation from the sample at the final iteration of the training procedure, and the resulting phrase-table was used to directly substitute for the phrase-table extracted by using GIZA++/MOSES. The phrase-table resulting from our Bayesian segmentation model was approximately 30% smaller than that produced by the SMT system's training procedure, and gave an increase in transliteration quality measured in terms of both word accuracy and F-score.

  • A 22-mW 2.2%-EVM UWB Transmitter Using On-Chip Transformer and LO Leakage Calibration

    Yunfeng CHEN  Renliang ZHENG  Haipeng FU  Wei LI  Ning LI  Junyan REN  

     
    BRIEF PAPER-Integrated Electronics

      Vol:
    E94-C No:10
      Page(s):
    1706-1708

    A MB-OFDM UWB transmitter with on-chip transformer and LO leakage calibration for WiMedia bandgroup 1 is presented. The measurements show a gain-flatness of 1 dB, an LOLRR of -53 dBc/-43 dBc (wi/o cali), an EVM of 2.2% with a power consumption of 22 mW and an area of 1.26 mm2.

  • The Optimal Subcarrier and Bit Allocation for Multiuser OFDM System: A Dual-Decomposition Approach

    Taehyung PARK  Sungbin IM  

     
    PAPER-Communication Theory and Signals

      Vol:
    E94-A No:9
      Page(s):
    1826-1832

    The advantages of the orthogonal frequency division multiplexing (OFDM) are high spectral efficiency, resiliency to RF interference, lower multi-path distortion and others. To further utilize the vast channel capacity of the multiuser OFDM, one has to find the efficient adaptive subcarrier and bit allocation among users. In this paper, we propose a 0-1 integer programming model formulating the optimal subcarrier and bit allocation problem of the multiuser OFDM. We proved that the continuous relaxation of our formulation is tighter than the previous convex optimization formulation based on perspective function and the Lagrangian dual bound of our formulation is equivalent to the linear programming relaxation bound. The proposed Lagrangian dual is seperable with respect to subcarriers and allows an efficient dual maximization algorithm. We compared the performance of the integer programming formulation and the Lagrangian dual of our formulation and the continuous relaxation and the primal heuristic proposed in [3]. Computer simulation on a system employing M-ary quadrature amplitude modulation (MQAM) assuming a frequency-selective channel consisting of three independent Rayleigh multipaths is carried out with the optimal subcarrier and bit allocation solution generated by the 0-1 integer programming model.

  • A High Capacity Cell Architecture Based on Distributed Antenna System and Frequency Allocation Scheme

    Chih-Wen (Wenson) CHANG  Chien-Yuan CHU  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:9
      Page(s):
    2690-2695

    In orthogonal frequency division multiple access (OFD-MA) systems, soft frequency reuse (SFR) and distributed antenna system (DAS) are two effective techniques to avoid excessive inter-cell interference (ICI). To gain the advantages of both, in this letter, we build a new cell architecture by jointly taking DAS and SFR into consideration to achieve the goal of high and well-balanced capacity. Furthermore, to rectify the shortfall in the literature, the capacity and outage probability in the multi-cell environment are derived by taking the complete channel effects into account, including the path loss, shadowing and Rayleigh fading. Simulations verify the superior performance and exactness of the analytical results.

  • Rounding Logistic Maps over Integers and the Properties of the Generated Sequences

    Takeru MIYAZAKI  Shunsuke ARAKI  Yasuyuki NOGAMI  Satoshi UEHARA  

     
    PAPER-Information Theory

      Vol:
    E94-A No:9
      Page(s):
    1817-1825

    Because of its simple structure, many reports on the logistic map have been presented. To implement this map on computers, finite precision is usually used, and therefore rounding is required. There are five major methods to implement rounding, but, to date, no study of rounding applied to the logistic map has been reported. In the present paper, we present experimental results showing that the properties of sequences generated by the logistic map are heavily dependent on the rounding method used and give a theoretical analysis of each method. Then, we describe why using the map with a floor function for rounding generates long aperiodic subsequences.

  • Software-Based Parallel Cryptographic Solution with Massive-Parallel Memory-Embedded SIMD Matrix Architecture for Data-Storage Systems

    Takeshi KUMAKI  Tetsushi KOIDE  Hans Jurgen MATTAUSCH  Masaharu TAGAMI  Masakatsu ISHIZAKI  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E94-D No:9
      Page(s):
    1742-1754

    This paper presents a software-based parallel cryptographic solution with a massive-parallel memory-embedded SIMD matrix (MTX) for data-storage systems. MTX can have up to 2,048 2-bit processing elements, which are connected by a flexible switching network, and supports 2-bit 2,048-way bit-serial and word-parallel operations with a single command. Furthermore, a next-generation SIMD matrix called MX-2 has been developed by expanding processing-element capability of MTX from 2-bit to 4-bit processing. These SIMD matrix architectures are verified to be a better alternative for processing repeated-arithmetic and logical-operations in multimedia applications with low power consumption. Moreover, we have proposed combining Content Addressable Memory (CAM) technology with the massive-parallel memory-embedded SIMD matrix architecture to enable fast pipelined table-lookup coding. Since both arithmetic logical operation and table-lookup coding execute extremely fast on these architectures, efficient execution of encryption and decryption algorithms can be realized. Evaluation results of the CAM-less and CAM-enhanced massive-parallel SIMD matrix processor for the example of the Advanced Encryption Standard (AES), which is a widely-used cryptographic algorithm, show that a throughput of up to 2.19 Gbps becomes possible. This means that several standard data-storage transfer specifications, such as SD, CF (Compact Flash), USB (Universal Serial Bus) and SATA (Serial Advanced Technology Attachment) can be covered. Consequently, the massive-parallel SIMD matrix architecture is very suitable for private information protection in several data-storage media. A further advantage of the software based solution is the flexible update possibility of the implemented-cryptographic algorithm to a safer future algorithm. The massive-parallel memory-embedded SIMD matrix architecture (MTX and MX-2) is therefore a promising solution for integrated realization of real-time cryptographic algorithms with low power dissipation and small Si-area consumption.

  • Reliable Decision-Aided Multiuser Detection for Cooperative CDMAs

    Hoang-Yang LU  Yen-Yu CHEN  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E94-A No:9
      Page(s):
    1892-1895

    In this paper, we propose a simple, yet effective, multiuser detection scheme for a two-hop cooperative CDMAs. In phase 1, the minimum mean square error (MMSE) detector at the destination is used to identify reliable decisions of direct transmissions from the sources and return them to the relays. Then, in phase 2, based on the reliable decisions, the relays and the destination successively utilize the maximum likelihood (ML) detectors to estimate the residual symbols. Due to the destination estimating the symbols separately from direct transmissions and the relaying signals, as a result the destination does not need the information about the relays' decision performance for the construction of the ML detector. Hence, the proposed scheme is more feasible than existing approaches for practical implementation. In addition, due to the ML detectors in phase 2 only estimating the residual symbols, the number of computations performed by the ML detectors can be reduced significantly. The results of simulations and complexity analysis demonstrate the efficiency and effectiveness of the proposed scheme.

  • The Marking Construction Problem of Petri Nets and Its Heuristic Algorithms

    Satoshi TAOKA  Toshimasa WATANABE  

     
    PAPER-Concurrent Systems

      Vol:
    E94-A No:9
      Page(s):
    1833-1841

    The marking construction problem (MCP) of Petri nets is defined as follows: “Given a Petri net N, an initial marking Mi and a target marking Mt, construct a marking that is closest to Mt among those which can be reached from Mi by firing transitions.” MCP includes the well-known marking reachability problem of Petri nets. MCP is known to be NP-hard, and we propose two schemas of heuristic algorithms: (i) not using any algorithm for the maximum legal firing sequence problem (MAX LFS) or (ii) using an algorithm for MAX LFS. Moreover, this paper proposes four pseudo-polynomial time algorithms: MCG and MCA for (i), and MCHFk and MC_feideq_a for (ii), where MCA (MC_feideq_a, respectively) is an improved version of MCG (MCHFk). Their performance is evaluated through results of computing experiment.

  • Master-Slave Coupled Piecewise Constant Spiking Oscillators

    Yusuke MATSUOKA  

     
    LETTER-Nonlinear Problems

      Vol:
    E94-A No:9
      Page(s):
    1860-1863

    This paper presents pulse-coupled piecewise constant spiking oscillators (PWCSOs) consisting of two PWCSOs and a coupling method is master-slave coupling. The slave PWCSO exhibits chaos because of chaotic response of the master one. However, if the parameter varies, the slave PWCSO can exhibit the phenomena as a periodicity in the phase plane. We focus on such phenomena and corresponding bifurcation. Using the 2-D return map, we clarify its mechanism.

  • Spurious Suppression and Design Based on Microstrip Open Loop Ring Resonator Bandpass Filters

    Pichai ARUNVIPAS  Chokchai SANGDAO  Ravee PHROMLOUNGSRI  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E94-C No:9
      Page(s):
    1447-1454

    This paper presents novel structures of band-pass filters using two configurations of open loop ring resonators (OPLRR): a resonator with embedded quadruply-stepped impedance transmission lines (QSITL) in coupled lines, and a stepped impedance resonator (SIR). Both types of OPLRR have the capability of suppressing the second spurious response and shifting the third spurious response to a higher frequency as well. To demonstrate the performances of both proposed resonators, two sections of each structure with cascaded and crossed configurations at an operating frequency of 0.9 GHz are presented. Both methodologies are easy to design and implement. The methodology with a SIR has a better performance than the SITL. The measurement results of the proposed circuits are in full agreement with the simulated prediction results.

7401-7420hit(21534hit)