The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

8041-8060hit(21534hit)

  • Parallel DFA Architecture for Ultra High Throughput DFA-Based Pattern Matching

    Yi TANG  Junchen JIANG  Xiaofei WANG  Chengchen HU  Bin LIU  Zhijia CHEN  

     
    PAPER

      Vol:
    E93-D No:12
      Page(s):
    3232-3242

    Multi-pattern matching is a key technique for implementing network security applications such as Network Intrusion Detection/Protection Systems (NIDS/NIPSes) where every packet is inspected against tens of thousands of predefined attack signatures written in regular expressions (regexes). To this end, Deterministic Finite Automaton (DFA) is widely used for multi-regex matching, but existing DFA-based researches have claimed high throughput at an expense of extremely high memory cost, so fail to be employed in devices such as high-speed routers and embedded systems where the available memory is quite limited. In this paper, we propose a parallel architecture of DFA called Parallel DFA (PDFA) taking advantage of the large amount of concurrent flows to increase the throughput with nearly no extra memory cost. The basic idea is to selectively store the underlying DFA in memory modules that can be accessed in parallel. To explore its potential parallelism we intensively study DFA-split schemes from both state and transition points in this paper. The performance of our approach in both the average cases and the worst cases is analyzed, optimized and evaluated by numerical results. The evaluation shows that we obtain an average speedup of 100 times compared with traditional DFA-based matching approach.

  • Optimizing Position of Repeaters in Distributed MIMO Repeater System for Large Capacity

    Pham Thanh HIEP  Ryuji KOHNO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E93-B No:12
      Page(s):
    3616-3623

    Multiple-input multiple-output (MIMO) repeater systems have been discussed in several published papers. When a repeater has only one antenna element, the propagation environment is called keyhole. In this kind of scenario the achievable channel capacity and link quality are decreased. Another limit is when the number of the antenna elements of a repeater is larger than that of a MIMO transceiver, the channel capacity cannot be increased. In this paper, in order to obtain an upper bound of the channel capacity, we express a propagation process of the distributed MIMO repeater system with amplify-and-forward method by the numerical formular, and optimize the position of each repeater.

  • Statistical Timing Analysis Considering Clock Jitter and Skew due to Power Supply Noise and Process Variation

    Takashi ENAMI  Shinyu NINOMIYA  Ken-ichi SHINKAI  Shinya ABE  Masanori HASHIMOTO  

     
    PAPER-Device and Circuit Modeling and Analysis

      Vol:
    E93-A No:12
      Page(s):
    2399-2408

    Clock driver suffers from delay variation due to manufacturing and environmental variabilities as well as combinational cells. The delay variation causes clock skew and jitter, and varies both setup and hold timing margins. This paper presents a timing verification method that takes into consideration delay variation inside a clock network due to both manufacturing variability and dynamic power supply noise. We also discuss that setup and hold slack computation inherently involves a structural correlation problem due to common paths, and demonstrate that assigning individual random variables to upstream clock drivers provides a notable accuracy improvement in clock skew estimation with limited increase in computational cost. We applied the proposed method to industrial designs in 90 nm process. Experimental results show that dynamic delay variation reduces setup slack by over 500 ps and hold slack by 16.4 ps in test cases.

  • A Multi-Performance Processor for Reducing the Energy Consumption of Real-Time Embedded Systems

    Tohru ISHIHARA  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E93-A No:12
      Page(s):
    2533-2541

    This paper proposes an energy efficient processor which can be used as a design alternative for the dynamic voltage scaling (DVS) processors in embedded system design. The processor consists of multiple PE (processing element) cores and a selective set-associative cache memory. The PE-cores have the same instruction set architecture but differ in their clock speeds and energy consumptions. Only a single PE-core is activated at a time and the other PE-cores are deactivated using clock gating and signal gating techniques. The major advantage over the DVS processors is a small overhead for changing its performance. The gate-level simulation demonstrates that our processor can change its performance within 1.5 microsecond and dissipates about 10 nano-joule while conventional DVS processors need hundreds of microseconds and dissipate a few micro-joule for the performance transition. This makes it possible to apply our multi-performance processor to many real-time systems and to perform finer grained and more sophisticated dynamic voltage control.

  • HDLs Modeling Technique for Burst-Mode and Extended Burst-Mode Asynchronous Circuits

    Jung-Lin YANG  Jau-Cheng WEI  Shin-Nung LU  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E93-A No:12
      Page(s):
    2590-2599

    A hardware description languages (HDLs) based modeling technique for asynchronous circuits is presented in this paper. A HDLs handshake package has been developed for expressing handshake-style digital systems in both VHDL and Verilog. Burst-mode and extended burst-mode (BM/XBM) circuits were used to demonstrate the usefulness of this work. This research successfully prototyped comparators, adders, RSA encoder/decoder, and several self-timed circuits for the full-custom IC and FPGAs designs. Furthermore, the HDLs handshake package implemented by this research can be utilized to develop behavioral test benches for studying and analyzing asynchronous designs. Extracting detailed timing information from asynchronous finite state machines (AFSMs), detecting delay faults for synthesized self-timed functional modules, and locating fundamental mode violation within realized AFSMs are proven applications. The anticipated HDL modeling technique and the transformation procedure are detailed in the rest of this paper.

  • Flow-Admission Control Based on Equality of Heterogeneous Traffic (Two-Type Flow Model)

    Sumiko MIYATA  Katsunori YAMAOKA  

     
    PAPER-Network System

      Vol:
    E93-B No:12
      Page(s):
    3564-3576

    Multimedia applications such as video and audio have recently come into much wider use. Because this heterogeneous traffic consumes most of the network's resources, call admission control (CAC) is required to maintain high-quality services. User satisfaction depends on CAC's success in accommodating application flows. Conventional CACs do not take into consideration user satisfaction because their main purpose is to improve the utilization of resources. Moreover, if we assume a service where an ISP provides a "flat-based charging," each user may receive same user satisfaction as a result of users being accommodated in a network, even if each has a different bandwidth. Therefore, we propose a novel CAC to maximize total user satisfaction based on a new philosophy where heterog eneous traffic is treated equally in networks. Theoretical analysis is used to derive optimal thresholds for various traffic configurations with a full search system. We also carried out theoretical numerical analysis to demonstrate the effectiveness of our new CAC. Moreover, we propose a sub-optimal threshold configuration obtained by using an approximation formula to develop practical CAC from these observations. We tested and confirmed that performance could be improved by using sub-optimal parameters.

  • Tradeoffs between Throughput and Fairness of Parallel Round Robin Scheduling in DAS

    Zhanjun JIANG  Dongming WANG  Xiaohu YOU  

     
    LETTER

      Vol:
    E93-B No:12
      Page(s):
    3530-3533

    Both multiplexing and multi-user diversity are exploited based on Round Robin (RR) scheduling to achieve tradeoffs between average throughput and fairness in distributed antenna systems (DAS). Firstly, a parallel Round Robin (PRR) scheduling scheme is presented based on the multi-user multiplexing in spatial domain to enhance the throughput, which inherits the excellent fairness performance of RR. Then a parallel grouping Round Robin (PGRR) is proposed to exploit multi-user diversity based on PRR. Due to the integration of multi-user diversity and multi-user multiplexing, a great improvement of throughput is achieved in PGRR. However, the expense of the improvement is at the degradation of fairness since the "best channel criteria" is used in PGRR. Simulations verify analysis conclusions and show that tradeoffs between throughput and fairness can be achieved in PGRR.

  • Evaluation of SAR and Temperature Elevation Using Japanese Anatomical Human Models for Body-Worn Devices

    Teruo ONISHI  Takahiro IYAMA  Lira HAMADA  Soichi WATANABE  Akimasa HIRATA  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E93-B No:12
      Page(s):
    3643-3646

    This paper investigates the relationship between averaged SAR (Specific Absorption Rate) over 10 g mass and temperature elevation in Japanese numerical anatomical models when devices are mounted on the body. Simplifying the radiation source as a half-wavelength dipole, the generated electrical field and SAR are calculated using the FDTD (Finite-Difference Time-Domain) method. Then the bio-heat equation is solved to obtain the temperature elevation due to the SAR derived using the FDTD method as heat source. Frequencies used in the study are 900 MHz and 1950 MHz, which are used for mobile phones. In addition, 3500 MHz is considered because this frequency is reserved for IMT-Advanced (International Mobile Telecommunication-Advanced System). Computational results obtained herein show that the 10 g-average SAR and the temperature elevation are not proportional to frequency. In addition, it is clear that those at 3500 MHz are lower than that at 1950 MHz even though the frequency is higher. It is the point to be stressed here is that good correlation between the 10 g-average SAR and the temperature elevation is observed even for the body-worn device.

  • The Q-Enhanced CMOS Active Bandpass Filter with Two-Stage Self-Calibration

    Hangue PARK  Jongwook ZEONG  Wonsuk CHOI  Jung Han CHOI  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E93-C No:12
      Page(s):
    1700-1703

    A Q-enhanced 8th order CMOS active bandpass filter is presented employing a novel two-stage self-calibration technique. The proposed active filter shows the better out-band attenuation performance than other reported CMOS active bandpass filters. The proposed calibration method enables the stable filtering operation affected by neither the input power variation nor the strong interference power. It is fabricated using 65 nm CMOS process. The measured 3 dB bandwidth is 54 MHz at 2.37 GHz. The insertion loss is 2.9 dB and the out-band attenuation is 27.5 dB at 15 MHz offset frequency. The performance of the filter remains unchanged for 5% supply voltage variations.

  • A Censor-Based Cooperative Spectrum Sensing Scheme Using Fuzzy Logic for Cognitive Radio Sensor Networks

    Thuc KIEU-XUAN  Insoo KOO  

     
    LETTER

      Vol:
    E93-B No:12
      Page(s):
    3497-3500

    This letter proposes a novel censor-based scheme for cooperative spectrum sensing on Cognitive Radio Sensor Networks. A Takagi-Sugeno's fuzzy system is proposed to make the decision on the presence of the licensed user's signal based on the observed energy at each cognitive sensor node. The local spectrum sensing results are aggregated to make the final sensing decision at the fusion center after being censored to reduce transmission energy and reporting time. Simulation results show that significant improvement of the spectrum sensing accuracy, and saving energy as well as reporting time are achieved by our scheme.

  • Temperature-Aware Leakage Estimation Using Piecewise Linear Power Models

    Yongpan LIU  Huazhong YANG  

     
    PAPER-Integrated Electronics

      Vol:
    E93-C No:12
      Page(s):
    1679-1691

    Due to the superlinear dependence of leakage power consumption on temperature, and spatial variations in on-chip thermal profiles, methods of leakage power estimation that are known to be accurate require detailed knowledge of thermal profiles. Leakage power depends on the integrated circuit (IC) thermal profile and circuit design style. Here, we show that piecewise linear models can be used to permit accurate leakage estimation over the operating temperature ranges of the ICs. We then show that for typical IC packages and cooling structures, a given amount of heat introduced at any position in the active layer will have a similar impact on the average temperature of the layer. These two observations support the proof that, for wide ranges of design styles and operating temperatures, extremely fast, coarse-grained thermal models, combined with piecewise linear leakage power consumption models, enable the estimation of chip-wide leakage power consumption. These results are further confirmed through comparisons with leakage estimates based on detailed, time-consuming thermal analysis techniques. Experimental results indicate that, when compared with a leakage analysis technique that relies on accurate spatial temperature estimation, the proposed technique yields a 59,259 to 1,790,000 speedup in estimating leakage power consumption, while maintaining accuracy.

  • Regularity-Oriented Analog Placement with Conditional Design Rules

    Shigetoshi NAKATAKE  Masahiro KAWAKITA  Takao ITO  Masahiro KOJIMA  Michiko KOJIMA  Kenji IZUMI  Tadayuki HABASAKI  

     
    PAPER-Physical Level Design

      Vol:
    E93-A No:12
      Page(s):
    2389-2398

    This paper presents a novel regularity evaluation of placement structure and techniques for handling conditional design rules along with dynamic diffusion sharing and well island generation, which are developed based on Sequence-Pair. The regular structures such as topological rows, arrays and repetitive structures are characterized by the way of forming sub-sequences of a sequence-pair. A placement objective is formulated balancing the regularity and the area efficiency. Furthermore, diffusion sharing and well island can be also identified looking into forming of a sequence-pair. In experiments, we applied our regularity-oriented placement mixed with the constraint-driven technique to real analog designs, and attained the results comparable to manual designs even when imposing symmetry constraints. Besides, the results also revealed the regularity serves to increase row-structures applicable to the diffusion sharing for area saving and wire-length reduction.

  • Distributed Location Service with Spatial Awareness for Mobile Ad Hoc Networks

    Shyr-Kuen CHEN  Tay-Yu CHEN  Pi-Chung WANG  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3400-3408

    A mobile ad-hoc network (MANET) consists of a collection of wireless mobile nodes without any fixed network infrastructure. Since the mobile nodes form a constantly changing topology, the design of efficient and scalable routing protocols is a fundamental challenge in MANETs. In the current literature, position-based routing protocols are regarded as having better scalability and lower control overhead than topology-based routing protocols. Since location services are the most critical part of position-based routing protocols, we present a multi-home-region scheme, Distributed Virtual Home Region with Spatial Awareness (DVHR-SA), to improve the performance of location service in this paper. Our scheme adaptively selects different update and query procedures according to the location of a source node. The simulation results show that DVHR-SA shortens the lengths of the update, query and reply paths. Our scheme also reduces the overall network message overhead. Therefore, DVHR-SA is considerably fast and stable.

  • Effect of Power Allocation Schemes on MIMO Two-Way Multi-Hop Network

    Jonghyun LEE  Gia Khanh TRAN  Kei SAKAGUCHI  Kiyomichi ARAKI  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3362-3370

    Recently, wireless multi-hop network using MIMO two-way relaying technique has been attracted much attention owing to its high network efficiency. It is well known that the MIMO two-way multi-hop network (MTMN) can provide its maximum throughput in uniform topology of node location. However, in realistic environments with non-uniform topology, network capacity degrades severely due to unequal link quality. Furthermore, the end-to-end capacity also degrades at high SNR due to far (overreach) interference existing in multi-hop relay scenarios. In this paper, we focus on several power allocation schemes to improve the end-to-end capacity performance of MTMN with non-uniform topology and far interference. Three conventional power allocation schemes are reformulated and applied under the system model of MTMN. The first two are centralized methods, i.e., Eigenvector based Power Allocation (EPA) which employs linear algebra and Optimal Power Allocation (OPA) using convex optimization. The last one is Distributed Power Allocation (DPA) using game theory. It is found from numerical analyses that the power allocation schemes are effective for MTMN in terms of end-to-end capacity improvement, especially in non-uniform node arrangement and at high SNR.

  • Web API Database Systems for Rapid Web Application Development

    Takeru INOUE  Hiroshi ASAKURA  Yukio UEMATSU  Hiroshi SATO  Noriyuki TAKAHASHI  

     
    PAPER

      Vol:
    E93-D No:12
      Page(s):
    3181-3193

    Web APIs are offered in many Web sites for Ajax and mashup, but they have been developed independently since no reusable database component has been specifically created for Web applications. In this paper, we propose WAPDB, a distributed database management system for the rapid development of Web applications. WAPDB is designed on Atom, a set of Web API standards, and provides several of the key features required for Web applications, including efficient access control, an easy extension mechanism, and search and statistics capabilities. By introducing WAPDB, developers are freed from the need to implement these features as well as Web API processing. In addition, its design totally follows the REST architectural style, which gives uniformity and scalability to applications. We develop a proof-of-concept application with WAPDB, and find that it offers great cost effectiveness with no significant impact on performance; in our experiments, the development cost is reduced to less than half with the overhead (in use) of response times of just a few msec.

  • The Gaussian MIMO Broadcast Channel under Receive Power Protection Constraints Open Access

    Ian Dexter GARCIA  Kei SAKAGUCHI  Kiyomichi ARAKI  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3448-3460

    A Gaussian MIMO broadcast channel (GMBC) models the MIMO transmission of Gaussian signals from a transmitter to one or more receivers. Its capacity region and different precoding schemes for it have been well investigated, especially for the case wherein there are only transmit power constraints. In this paper, a special case of GMBC is investigated, wherein receive power constraints are also included. By imposing receive power constraints, the model, called protected GMBC (PGMBC), can be applied to certain scenarios in spatial spectrum sharing, secretive communications, mesh networks and base station cooperation. The sum capacity, capacity region, and application examples for the PGMBC are discussed in this paper. Sub-optimum precoding algorithms are also proposed for the PGMBC, where standard user precoding techniques are performed over a BC with a modified channel, which we refer to as the "protection-implied BC." In the protection-implied BC, the receiver protection constraints have been implied in the channel, which means that by satisfying the transmit power constraints on the protection implied channel, receiver protection constraints are guaranteed to be met. Any standard single-user or multi-user MIMO precoding scheme may then be performed on the protection-implied channel. When SINR-matching duality-based precoding is applied on the protection-implied channel, sum-capacity under full protection constraints (zero receive power), and near-sum-capacity under partial protection constraints (limited non-zero receive power) are achieved, and were verified by simulations.

  • Time Domain Feedback Equalizer for Fast Fading Channel in OFDM with Scattered Pilot

    Yutaro NAKAGAWA  Yukitoshi SANADA  

     
    LETTER

      Vol:
    E93-A No:12
      Page(s):
    2691-2695

    In this letter, a new feedback equalization scheme to suppress inter-carrier interference (ICI) in an OFDM system using scattered pilot is investigated. On a fast fading channel severe ICI occurs due to a Doppler shift and it deteriorates a bit error rate (BER) seriously because of small subcarrier spacing. In an ISDB-T receiver the equalization is mainly processed in a frequency domain because the scattered pilot is transmitted over the subcarriers. However, the frequency domain equalization may not suppress severe ICI in the case of the fast fading channel with a large Doppler shift. The proposed equalization scheme uses the scattered pilot symbols transformed in a time domain as the reference signal for feedback taps. Numerical results through computer simulation show that the proposed scheme improves the BER performance especially with low carrier-to-noise ratio (CNR) conditions.

  • Register File Size Reduction through Instruction Pre-Execution Incorporating Value Prediction

    Yusuke TANAKA  Hideki ANDO  

     
    PAPER-Computer System

      Vol:
    E93-D No:12
      Page(s):
    3294-3305

    Two-step physical register deallocation (TSD) is an architectural scheme that enhances memory-level parallelism (MLP) by pre-executing instructions. Ideally, TSD allows exploitation of MLP under an unlimited number of physical registers, and consequently only a small register file is needed for MLP. In practice, however, the amount of MLP exploitable is limited, because there are cases where either 1) pre-execution is not performed; or 2) the timing of pre-execution is delayed. Both are due to data dependencies among the pre-executed instructions. This paper proposes the use of value prediction to solve these problems. This paper proposes the use of value prediction to solve these problems. Evaluation results using the SPECfp2000 benchmark confirm that the proposed scheme with value prediction for predicting addresses achieves equivalent IPC, with a smaller register file, to the previous TSD scheme. The reduction rate of the register file size is 21%.

  • An Efficient Inter-Carrier Interference Cancellation Scheme for OFDM Systems with Frequency Estimation Errors

    Wei-Wen HU  Chih-Peng LI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:12
      Page(s):
    3600-3605

    One of the major drawbacks of orthogonal frequency division multiplexing (OFDM) systems is their vulnerability to synchronization errors. To remedy the inter-carrier interference (ICI) effect caused by carrier frequency offset (CFO) estimation errors, this paper proposes a weighted linear parallel ICI cancellation (WLPICIC) equalizer. The optimal weights in the WLPICIC scheme are derived in closed-form expressions by maximizing the average signal-to-interference ratio (SIR) at the WLPICIC output of each sub-carrier. The simulation results show that the WLPICIC equalizer significantly improves the performance of OFDM systems with frequency estimation errors in both AWGN channels and frequency selective fading channels.

  • Improvement of the Efficient Secret Broadcast Scheme

    Eun-Jun YOON  Muhammad KHURRAM KHAN  Kee-Young YOO  

     
    LETTER-Information Network

      Vol:
    E93-D No:12
      Page(s):
    3396-3399

    In 2009, Jeong et al. proposed a secure binding encryption scheme and an efficient secret broadcast scheme. This paper points out that the schemes have some errors and cannot operate correctly, contrary to their claims. In addition, this paper also proposes improvements of Jeong et al.'s scheme that can withstand the proposed attacks.

8041-8060hit(21534hit)