Masashi HOTTA Ryota OGAWA Mitsuo HANO
Existence of backward TE volume modes which are to be identified as Magnetostatic Wave (MSW) in anisotropic single-negative slab with partly negative permeability tensor component have already been revealed by present authors. In this paper, detailed modal analysis has been carried out for this kind of TE volume modes to find out their novel and peculiar properties. From these numerical results, it has been clarified that dispersion curve of the lowest order mode for thicker slab has a frequency of turning point below which both forward and backward waves can be simultaneously observed and also there is a critical slab thickness for each order of TE volume modes to exist.
Masayuki ABE Eike KILTZ Tatsuaki OKAMOTO
Every public-key encryption scheme has to incorporate a certain amount of randomness into its ciphertexts to provide semantic security against chosen ciphertext attacks (IND-CCA). The difference between the length of a ciphertext and the embedded message is called the ciphertext overhead. While a generic brute-force adversary running in 2t steps gives a theoretical lower bound of t bits on the ciphertext overhead for IND-CPA security, the best known IND-CCA secure schemes demand roughly 2t bits even in the random oracle model. Is the t-bit gap essential for achieving IND-CCA security? We close the gap by proposing an IND-CCA secure scheme whose ciphertext overhead matches the generic lower bound up to a small constant. Our scheme uses a variation of a four-round Feistel network in the random oracle model and hence belongs to the family of OAEP-based schemes. Maybe of independent interest is a new efficient method to encrypt long messages exceeding the length of the permutation while retaining the minimal overhead.
A generalized formulation of the instantaneous frequency based on the symmetric higher order differential energy operator is proposed. The motivation for the formulation is that there is some frequency misalignment in time when the ordinary higher order differential energy operator is used for the instantaneous frequency estimator. The special cases of the generalized formulation are also presented. The proposed instantaneous frequency estimators are compared with existing methods in terms of error performance measured in the mean absolute error. In terms of the estimation error performance, the third order instantaneous frequency estimator with the symmetrical structure shows the best result under noise free condition. Under noisy situation, the fourth order instantaneous frequency estimator with the symmetrical structure produces the best results. Application examples are provided to show the usefulness of the estimator.
Masayuki YOSHINO Katsuyuki OKEYA Camille VUILLAUME
A technique for computing the quotient (⌊ ab/n ⌋) of Euclidean divisions from the difference of two remainders (ab (mod n) - ab (mod n+1)) was proposed by Fischer and Seifert. The technique allows a 2-bit modular multiplication to work on most -bit modular multipliers. However, the cost of the quotient computation rises sharply when computing modular multiplications larger than 2 bits with a recursive approach. This paper addresses the computation cost and improves on previous 2-bit modular multiplication algorithms to return not only the remainder but also the quotient, resulting in an higher performance in the recursive approach, which becomes twice faster in the quadrupling case and four times faster in the octupling case. In addition to Euclidean multiplication, this paper proposes a new 2-bit Montgomery multiplication algorithm to return both of the remainder and the quotient.
Ching-Lin FAN Yi-Yan LIN Yan-Hang YANG Hung-Che CHEN
The electrical properties of poly-Si thin film transistors (TFTs) using rapid thermal annealing with various gate oxide thicknesses were studied in this work. It was found that Poly-Si TFT electrical characteristics with the thinnest gate oxide thickness after RTA treatment exhibits the largest performance improvement compared to TFT with thick oxide as a result of the increased incorporated amounts of the nitrogen and oxygen. Thus, the combined effects can maintain the advantages and avoid the disadvantages of scaled-down oxide, which is suitable for small-to-medium display mass production.
Phase information on wave scattering is not unique and greatly depends on a choice of the origin of coordinates in the measurement system. The present paper argues that the center of scattering for polygonal cylinders should not be a geometrical center of the obstacle such as a center of gravity but be a position that acts as a balance to the electrostatic field effects from edge points. The position is exactly determined in terms of edge positions, edge parameters and lengths of side of polygons. A few examples are given to illustrate a difference from the center of geometry.
Shinichiro OHNUKI Ryuichi OHSAWA Tsuneki YAMASAKI
Radar cross sections of polygonal cylinders are investigated by using a kind of mode matching methods. Applying two types of novel field-decomposition techniques, electromagnetic scattering analysis can be performed very precisely. We will discuss computational accuracy of our proposed method and the proper choice of field-decomposition techniques for a rectangular cylinder with various shapes of wedge cavities and bumps.
Arturo Arvizu MONDRAGON Juan-de-Dios Sachez LOPEZ Francisco-Javier Mendieta JIMENEZ
We present a BPSK coherent optical wireless link in a multiple-beam, multiple-aperture configuration. The data are recovered using the signal obtained by the coherent addition of a set of maximum likelihood optical phase estimates and a select-largest stage. The proposal offers higher performance than the combining methods commonly used in optical wireless systems with diversity transmission and coherent detection.
Peng WANG Xiaofeng ZHONG Limin XIAO Shidong ZHOU Jing WANG Yong BAI
In this letter, the performance improvement by the deployment of multiple antennas in cognitive radio systems is studied from a system-level view. The term opportunistic spectrum efficiency (OSE) is defined as the performance metric to evaluate the spectrum opportunities that can actually be exploited by the secondary user (SU). By applying a simple energy combining detector, we show that deploying multiple antennas at the SU transceiver can improve the maximum achievable OSE significantly. Numerical results also reveal that the improvement comes from the reduction of both the detection overhead and the false alarm probability.
This letter suggests a novel high capacity robust audio watermarking algorithm by using the high frequency band of the wavelet decomposition, for which the human auditory system (HAS) is not very sensitive to alteration. The main idea is to divide the high frequency band into frames and then, for embedding, the wavelet samples are changed based on the average of the relevant frame. The experimental results show that the method has very high capacity (about 5.5 kbps), without significant perceptual distortion (ODG in [-1, 0] and SNR about 33 dB) and provides robustness against common audio signal processing such as added noise, filtering, echo and MPEG compression (MP3).
Junko TAKAHASHI Toshinori FUKUNAGA
This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.
Vishal V. KULKARNI Hiroki ISHIKURO Tadahiro KURODA
A CMOS wireless transceiver operating in the 14-18 GHz range is proposed. The receiver uses direct conversion architecture for demodulation with a fast carrier and symbol timing recovery scheme. The transmitter uses a PLL and an up-conversion mixer to generate BPSK modulated signal. A ring oscillator is used in the PLL to make faster switching for burst transmission obtaining high speed low power operation. The transceiver operation has been verified by system simulation while the transmitter test-chip was fabricated in 65 nm CMOS technology and verified with measured results. The transmitter generates a bi-phase modulated signal with a center frequency of 16 GHz at a maximum data rate of 4 Gb/s and consumes 61 mW of power. To the best knowledge of authors, this is lowest power consumption among the reported transmitters that operate over 1 Gb/s range. The transceiver is proposed for a target communication distance of 10 cm.
In this paper, we analyze the coexistence issues of M-WiMAX TDD and WCDMA FDD systems. Smart antenna techniques are applied to mitigate the performance loss induced by adjacent channel interference (ACI) in the scenarios where performance is heavily degraded. In addition, an ACI model is proposed to capture the effect of transmit beamforming at the M-WiMAX base station. Furthermore, a MCS-based throughput analysis is proposed, to jointly consider the effects of ACI, system packet error rate requirement, and the available modulation and coding schemes, which is not possible by using the conventional Shannon equation based analysis. From the results, we find that the proposed MCS-based analysis method is quite suitable to analyze the system theoretical throughput in a practical manner.
Hiroyuki KAWAI Akihito MORIMOTO Kenichi HIGUCHI Mamoru SAWAHASHI
This paper investigates the gain of inter-Node B macro diversity for a scheduled-based shared channel using single-carrier FDMA radio access in the Evolved UTRA (UMTS Terrestrial Radio Access) uplink based on system-level simulations. More specifically, we clarify the gain of inter-Node B soft handover (SHO) with selection combining at the radio frame length level (=10 msec) compared to that for hard handover (HHO) for a scheduled-based shared data channel, considering the gains of key packet-specific techniques including channel-dependent scheduling, adaptive modulation and coding (AMC), hybrid automatic repeat request (ARQ) with packet combining, and slow transmission power control (TPC). Simulation results show that the inter-Node B SHO increases the user throughput at the cell edge by approximately 10% for a short cell radius such as 100-300 m due to the diversity gain from a sudden change in other-cell interference, which is a feature specific to full scheduled-based packet access. However, it is also shown that the gain of inter-Node B SHO compared to that for HHO is small in a macrocell environment when the cell radius is longer than approximately 500 m due to the gains from hybrid ARQ with packet combining, slow TPC, and proportional fairness based channel-dependent scheduling.
Hiroshi TOKITO Masahiro SASABE Go HASEGAWA Hirotaka NAKANO
Wireless mesh networks have been attracting many users in recent years. By connecting base stations (mesh nodes) with wireless connections, these network can achieve a wide-area wireless environment with flexible configuration and low cost at the risk of radio interference between wireless links. When we utilize wireless mesh networks as infrastructures for Internet access, all network traffic from mobile nodes goes through a gateway node that is directly connected to the wired network. Therefore, it is necessary to distribute the traffic load by deploying multiple gateway nodes. In this paper, we propose a spanning tree construction algorithm for TDMA-based wireless mesh networks with multiple gateway nodes so as to maximize the traffic volume transferred between the mesh network and the Internet (system throughput) by taking account of the traffic load on the gateway nodes, the access link capacity and radio interference. Through a performance evaluation, we show that the proposed algorithm increases the system throughput regardless of the bottleneck position and achieves up to 3.1 times higher system throughput than a conventional algorithm.
Hiroyuki YOTSUYANAGI Masayuki YAMAMOTO Masaki HASHIZUME
In this paper, the scan chain ordering method for BIST-aided scan test for reducing test data and test application time is proposed. In this work, we utilize the simple LFSR without a phase shifter as PRPG and configure scan chains using the compatible set of flip-flops with considering the correlations among flip-flops in an LFSR. The method can reduce the number of inverter codes required for inverting the bits in PRPG patterns that conflict with ATPG patterns. The experimental results for some benchmark circuits are shown to present the feasibility of our test method.
Eunil CHO Sungho LEE Jaejun LEE Sangwook NAM
This paper presents a design of a monolithic transformer using bond wires. The proposed transformer structure has several advantages such as high power handling and high efficiency. It shows that the measured insertion loss at the 1.9 GHz range is -1.54 dB (70%), which is higher than the spiral transformer of the same size. Also, it shows a phase error of less than 1 degree.
Jin-Ho CHUNG Yun Kyoung HAN Kyeongcheol YANG
In this paper we present a construction method for quaternary sequences from a binary sequence of even period, which preserves the period and autocorrelation of the given binary sequence. By applying the method to the binary sequences with three-valued autocorrelation, we construct new quaternary sequences with three-valued autocorrelation, which are balanced or almost balanced. In particular, we construct new balanced quaternary sequences whose autocorrelations are three-valued and have out-of-phase magnitude 2, when their periods are N=pm-1 and N≡ 2 (mod 4) for any odd prime p and any odd integer m. Their out-of-phase autocorrelation magnitude is the known optimal value for N≠ 2,4,8, and 16.
In this paper, we propose a technique for estimating the degree or intensity of emotional expressions and speaking styles appearing in speech. The key idea is based on a style control technique for speech synthesis using a multiple regression hidden semi-Markov model (MRHSMM), and the proposed technique can be viewed as the inverse of the style control. In the proposed technique, the acoustic features of spectrum, power, fundamental frequency, and duration are simultaneously modeled using the MRHSMM. We derive an algorithm for estimating explanatory variables of the MRHSMM, each of which represents the degree or intensity of emotional expressions and speaking styles appearing in acoustic features of speech, based on a maximum likelihood criterion. We show experimental results to demonstrate the ability of the proposed technique using two types of speech data, simulated emotional speech and spontaneous speech with different speaking styles. It is found that the estimated values have correlation with human perception.
Wen-An TSOU Wen-Shen WUEN Kuei-Ann WEN
A circuit technique to correct Vdd/PM distortion and improve efficiency as supply modulation of cascode class-E PAs has been proposed. The experimental result shows that the phase distortion can be improved from 20 degrees to 5 degrees. Moreover, a system co-simulation result demonstrated that the EVM can be improved from -17 dB to -19 dB.