The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

9281-9300hit(21534hit)

  • Teletraffic Analysis of Direct Communication with Clustering

    Janne LEHTOMAKI  Isameldin SULIMAN  Kenta UMEBAYASHI  Yasuo SUZUKI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E92-A No:5
      Page(s):
    1356-1362

    In direct communication, terminals that are close to each other can communicate directly without traffic going through centralized controller such as a base station (BS). This brings several advantages. We study direct communication with localized distribution, so that users tend to gather around some areas (clusters/hot-spots) within the cell such as buildings. Previous analysis about clustering has focused on one dimensional scenarios. Here we present theoretical analysis of direct communication with two dimensional clustering. Additional analysis is presented for direct communication with correlated clusters. With correlated clusters some pairs of source and destination clusters are more probable than other pairs. According to our best knowledge, this is the first time that theoretical analysis is presented about clustering and correlated clusters in two dimensional scenarios. Simulations confirm the validity of the analysis. In addition to the exact results, we also suggest using the point-based approximation to rapidly and easily obtain results. The numerical results show that the gains from direct communication, in terms of blocking probability and carried traffic, depend on the offered traffic. Additionally, correlation in cluster selection is shown to significantly improve performance. Point-based approximation is shown to be very useful when the number of clusters is large.

  • A Trade-off Traitor Tracing Scheme

    Go OHTAKE  Kazuto OGAWA  Goichiro HANAOKA  Hideki IMAI  

     
    PAPER-Contents Protection

      Vol:
    E92-D No:5
      Page(s):
    859-875

    There has been a wide-ranging discussion on the issue of content copyright protection in digital content distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of content redistribution. Therefore, it cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that provides the advantages of dynamic traitor tracing schemes and also overcomes their problems.

  • Poly(3,4-Ethylenedioxythiophene): Poly(Styrenesulfonate) (PEDOT:PSS) Films for the Microbolometer Applications

    Hyeok Jun SON  Il Woong KWON  Yong Soo LEE  Hee Chul LEE  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    702-707

    In this paper, Poly(3,4-ethylenedioxythiophene): Poly (Styrenesulfonate) (PEDOT:PSS) thin films for application in a bolometer, a type of uncooled infrared image sensor, are presented. In addition, the TCR and 1/f noise dependencies of PEDOT:PSS thin films on the thermal treatment conditions are demonstrated. It is also shown that an appropriate thermal treatment can suppress the 1/f noise of PEDOT:PSS thin films while maintaining the resistivity and TCR. A high TCR value over -4%/ (within 10 ohmcm) through chemical treatment is also presented. The results of this study show that PEDOT:PSS thin films have potential for use as a bolometric material.

  • Quantum Random Access Coding

    Harumichi NISHIMURA  Rudy RAYMOND  

     
    INVITED PAPER

      Vol:
    E92-A No:5
      Page(s):
    1268-1275

    Quantum random access coding (QRAC) is one of the basic tools in quantum computing. It uses a quantum state for encoding the sender's bit string so that the receiver can recover any single bit of the bit string with high probability. This article surveys recent developments of QRAC, with some concrete examples of QRAC using one quantum bit, and its applications, focusing on communication complexity and locally decodable codes.

  • Efficient Implementation of Pairing-Based Cryptography on a Sensor Node

    Masaaki SHIRASE  Yukinori MIYAZAKI  Tsuyoshi TAKAGI  Dong-Guk HAN  Dooho CHOI  

     
    PAPER-Implementation Issues

      Vol:
    E92-D No:5
      Page(s):
    909-917

    Pairing-based cryptography provides us many novel cryptographic applications such as ID-based cryptosystems and efficient broadcast encryptions. The security problems in ubiquitous sensor networks have been discussed in many papers, and pairing-based cryptography is a crucial technique to solve them. Due to the limited resources in the current sensor node, it is challenged to optimize the implementation of pairings on sensor nodes. In this paper we present an efficient implementation of pairing over MICAz, which is widely used as a sensor node for ubiquitous sensor network. We improved the speed of ηT pairing by using a new efficient multiplication specialized for ATmega128L, called the block comb method and several optimization techniques to save the number of data load/store operations. The timing of ηT pairing over GF(2239) achieves about 1.93 sec, which is the fastest implementation of pairing over MICAz to the best of our knowledge. From our dramatic improvement, we now have much high possibility to make pairing-based cryptography for ubiquitous sensor networks practical.

  • Performance of Pre-FFT Type MMSE Adaptive Array Antenna with Iterative Weight Update in Presence of Sporadic Intra-System Interference

    Kazuto YANO  Makoto TAROMARU  Masazumi UEBA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:5
      Page(s):
    1852-1859

    This paper introduces our proposed pre-FFT type MMSE-AAA for an OFDM packet transmission system to suppress sporadic interference. The AAA scheme controls an antenna weight to minimize the mean square error between its output signals of two periods with identical transmitted waveform and iterates the weight updating process in an OFDM symbol to rapidly converge the weight. The average PER performance of the proposed AAA with the presence of a sporadic inter-system/intra-system interference signal is evaluated through computer simulations that assume an exponentially decaying 12-path LOS fading channel and IEEE 802.11a data frame transmission. Simulation results show that the proposed AAA can effectively suppress sporadic inter-system interference that is irrelevant to its arrival timing. Sporadic intra-system interference can also be suppressed by the proposed AAA more efficiently than inter-system interference as long as the interference arrives between 13% and 90% of the OFDM symbol duration after the beginning of an OFDM symbol of the desired signal.

  • A Novel Cooperative Relaying Network Scheme with Inter-Relay Data Exchange

    Salma Ait FARES  Fumiyuki ADACHI  Eisuke KUDOH  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1786-1795

    In this paper, we propose a novel scheme of cooperative relaying network based on data exchange between relays before forwarding their received data to destination. This inter-relay data exchange step is done during an additional middle-slot in order to enhance the transmit signals from relays to the destination under low transmit power condition. To reduce the propagation errors between relays as well as the required transmit power during this data exchange, only the relay possessing the highest SNR is engaged into exchanging data by forwarding its received signal to the other relays. As for the remaining non-selected relays, i.e. with low SNR, the transmitted signal is estimated by using both signals received separately at different time slots (i.e., 1st and 2nd slot) from source and the 'best' selected relay, respectively, emulating virtual antenna array where appropriate weights for the antenna array are developed. In addition, we investigate distributed transmit beamforming and maximum ratio combining at the relays and the destination, respectively, to combine coherently the received signals. At the relay optimal location and for low SNR condition, the proposed method has significant better outage behavior and average throughput than conventional methods using one or two time slots for transmission.

  • Collision-Based Power Attack for RSA with Small Public Exponent

    Kouichi ITOH  Dai YAMAMOTO  Jun YAJIMA  Wakaha OGATA  

     
    PAPER-Implementation Issues

      Vol:
    E92-D No:5
      Page(s):
    897-908

    This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 = d/ri and di,2 =(d (mod ri)) to calculate (cdi,1)ri cdi,2 (mod N). Using the combination of countermeasures, it was supposed that the implementation is secure against power attack. However, we firstly show the result to successfully attack the implementation of the combination of these countermeasures. We performed the experiment of this search on a PC, and complete d has been successfully revealed less than 10 hours for both attacks.

  • Visualization of Digital Audio Watermarking Methods Using Interval Wavelet Decomposition

    Teruya MINAMOTO  Mitsuaki YOSHIHARA  

     
    LETTER-Digital Signal Processing

      Vol:
    E92-A No:5
      Page(s):
    1363-1367

    In this letter, we propose new digital audio watermarking methods using interval wavelet decomposition. We develop not only non-blind type method, but also blind one. Experimental results demonstrate that the proposed methods give a watermarked audio clip of better quality and are robust against some attacks.

  • Key Enabling Physical Layer Technologies for LTE-Advanced

    Meilong JIANG  Narayan PRASAD  Yan XIN  Guosen YUE  Amir KHOJASTEPOUR  Le LIU  Takamichi INOUE  Kenji KOYANAGI  Yoshikazu KAKURA  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1751-1759

    The 3GPP Long Term Evolution Advanced (LTE-A) system, as compared to the LTE system, is anticipated to include several new features and enhancements, such as the usage of channel bandwidth beyond 20 MHz (up 100 MHz), higher order multiple input multiple output (MIMO) for both downlink and uplink transmissions, larger capacity especially for cell edge user equipment, and voice over IP (VoIP) users, and wider coverage and etc. This paper presents some key enabling technologies including flexible uplink access schemes, advanced uplink MIMO receiver designs, cell search, adaptive hybrid ARQ, and multi-resolution MIMO precoding, for the LTE-A system.

  • 3G Radio Access Evolution -- HSPA and LTE for Mobile Broadband -- Open Access

    Erik DAHLMAN  Ylva JADING  Stefan PARKVALL  Hideshi MURAI  

     
    INVITED PAPER

      Vol:
    E92-B No:5
      Page(s):
    1432-1440

    This paper provides an overview of the 3GPP radio-access technologies for mobile broadband -- HSPA and its evolution, and LTE. The paper also discusses the current stage of the 3GPP activities on evolving LTE towards LTE-Advanced and full IMT-Advanced compliance.

  • Probabilistic Model Checking of the One-Dimensional Ising Model

    Toshifusa SEKIZAWA  Tatsuhiro TSUCHIYA  Koichi TAKAHASHI  Tohru KIKUNO  

     
    PAPER-Model Checking

      Vol:
    E92-D No:5
      Page(s):
    1003-1011

    Probabilistic model checking is an emerging verification technology for probabilistic analysis. Its use has been started not only in computer science but also in interdisciplinary fields. In this paper, we show that probabilistic model checking allows one to analyze the magnetic behaviors of the one-dimensional Ising model, which describes physical phenomena of magnets. The Ising model consists of elementary objects called spins and its dynamics is often represented as the Metropolis method. To analyze the Ising model with probabilistic model checking, we build Discrete Time Markov Chain (DTMC) models that represent the behavior of the Ising model. Two representative physical quantities, i.e., energy and magnetization, are focused on. To assess these quantities using model checking, we devise formulas in Probabilistic real time Computation Tree Logic (PCTL) that represent the quantities. To demonstrate the feasibility of the proposed approach, we show the results of an experiment using the PRISM model checker.

  • Over Current Protection for PFM Control DC-DC Converter

    Kouhei YAMADA  Satoshi SUGAHARA  Nobuo FUJII  

     
    PAPER-Analog Signal Processing

      Vol:
    E92-A No:5
      Page(s):
    1301-1307

    An over current protection method suitable for Fixed ON-time PFM (Pulse Frequency Modulation) Control DC-DC converters is proposed. It is based on inductor bottom current limiting, realized by monitoring the synchronous rectifier current and extending the OFF-phase of the main switch until it decreases to a predetermined limit, and can properly limit the output current even in case of short circuit. A Fixed ON-time PFM DC-DC converter with the proposed over current protection was designed and fabricated in CMOS IC. Its current limiting operation was verified with simulations and measurements.

  • A Simple Exact Error Rate Analysis for DS-CDMA with Arbitrary Pulse Shape in Flat Nakagami Fading

    Mohammad Azizur RAHMAN  Shigenobu SASAKI  Hisakazu KIKUCHI  Hiroshi HARADA  Shuzo KATO  

     
    LETTER

      Vol:
    E92-B No:5
      Page(s):
    1808-1812

    A simple exact error rate analysis is presented for random binary direct sequence code division multiple access (DS-CDMA) considering a general pulse shape and flat Nakagami fading channel. First of all, a simple model is developed for the multiple access interference (MAI). Based on this, a simple exact expression of the characteristic function (CF) of MAI is developed in a straight forward manner. Finally, an exact expression of error rate is obtained following the CF method of error rate analysis. The exact error rate so obtained can be much easily evaluated as compared to the only reliable approximate error rate expression currently available, which is based on the Improved Gaussian Approximation (IGA).

  • A Reordering Heuristic for Accelerating the Convergence of the Solution of Some Large Sparse PDE Matrices on Structured Grids by the Krylov Subspace Methods with the ILUT Preconditioner

    Sangback MA  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E92-A No:5
      Page(s):
    1322-1330

    Given a sparse linear system, A x = b, we can solve the equivalent system P A PT y = P b, x = PT y, where P is a permutation matrix. It has been known that, for example, when P is the RCMK (Reverse Cuthill-Mckee) ordering permutation, the convergence rate of the Krylov subspace method combined with the ILU-type preconditioner is often enhanced, especially if the matrix A is highly nonsymmetric. In this paper we offer a reordering heuristic for accelerating the solution of large sparse linear systems by the Krylov subspace methods with the ILUT preconditioner. It is the LRB (Line Red/Black) ordering based on the well-known 2-point Red-Black ordering. We show that for some model-like PDE (partial differential equation)s the LRB ordered FDM (Finite Difference Method)/FEM (Finite Element Method) discretization matrices require much less fill-ins in the ILUT factorizations than those of the Natural ordering and the RCMK ordering and hence, produces a more accurate preconditioner, if a high level of fill-in is used. It implies that the LRB ordering could outperform the other two orderings combined with the ILUT preconditioned Krylov subspace method if the level of fill-in is high enough. We compare the performance of our heuristic with that of the RCMK (Reverse Cuthill-McKee) ordering. Our test matrices are obtained from various standard discretizations of two-dimensional and three-dimensional model-like PDEs on structured grids by the FDM or the FEM. We claim that for the resulting matrices the performance of our reordering strategy for the Krylov subspace method combined with the ILUT preconditioner is superior to that of RCMK ordering, when the proper number of fill-in was used for the ILUT. Also, while the RCMK ordering is known to have little advantage over the Natural ordering in the case of symmetric matrices, the LRB ordering still can improve the convergence rate, even if the matrices are symmetric.

  • Application of the Compact Channel Thermal Noise Model of Short Channel MOSFETs to CMOS RFIC Design

    Jongwook JEON  Ickhyun SONG  Jong Duk LEE  Byung-Gook PARK  Hyungcheol SHIN  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    627-634

    In this paper, a compact channel thermal noise model for short-channel MOSFETs is presented and applied to the radio frequency integrated circuit (RFIC) design. Based on the analysis of the relationship among different short-channel effects such as velocity saturation effect (VSE), channel-length modulation (CLM), and carrier heating effect (CHE), the compact model for the channel thermal noise was analytically derived as a simple form. In order to simulate MOSFET's noise characteristics in circuit simulators, an appropriate methodology is proposed. The used compact noise model is verified by comparing simulated results to the measured data at device and circuit level by using 65 nm and 130 nm CMOS technologies, respectively.

  • Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks

    Yi WANG  Liang DONG  Taotao LIANG  Xinyu YANG  Deyun ZHANG  

     
    PAPER-Networks

      Vol:
    E92-D No:5
      Page(s):
    1103-1124

    Routing algorithms with low overhead, stable link and independence of the total number of nodes in the network are essential for the design and operation of the large-scale wireless mobile ad hoc networks (MANET). In this paper, we develop and analyze the Cluster Based Location-Aided Routing Protocol for MANET (C-LAR), a scalable and effective routing algorithm for MANET. C-LAR runs on top of an adaptive cluster cover of the MANET, which can be created and maintained using, for instance, the weight-based distributed algorithm. This algorithm takes into consideration the node degree, mobility, relative distance, battery power and link stability of mobile nodes. The hierarchical structure stabilizes the end-to-end communication paths and improves the networks' scalability such that the routing overhead does not become tremendous in large scale MANET. The clusterheads form a connected virtual backbone in the network, determine the network's topology and stability, and provide an efficient approach to minimizing the flooding traffic during route discovery and speeding up this process as well. Furthermore, it is fascinating and important to investigate how to control the total number of nodes participating in a routing establishment process so as to improve the network layer performance of MANET. C-LAR is to use geographical location information provided by Global Position System to assist routing. The location information of destination node is used to predict a smaller rectangle, isosceles triangle, or circle request zone, which is selected according to the relative location of the source and the destination, that covers the estimated region in which the destination may be located. Thus, instead of searching the route in the entire network blindly, C-LAR confines the route searching space into a much smaller estimated range. Simulation results have shown that C-LAR outperforms other protocols significantly in route set up time, routing overhead, mean delay and packet collision, and simultaneously maintains low average end-to-end delay, high success delivery ratio, low control overhead, as well as low route discovery frequency.

  • Simulation of Retention Characteristics in Double-Gate Structure Multi-Bit SONOS Flash Memory

    Doo-Hyun KIM  Il Han PARK  Seongjae CHO  Jong Duk LEE  Hyungcheol SHIN  Byung-Gook PARK  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    659-663

    This paper presents a detailed study of the retention characteristics in scaled multi-bit SONOS flash memories. By calculating the oxide field and tunneling currents, we evaluate the charge trapping mechanism. We calculate transient retention dynamics with the ONO fields, trapped charge, and tunneling currents. All the parameters were obtained by physics-based equations and without any fitting parameters or optimization steps. The results can be used with nanoscale nonvolatile memory. This modeling accounts for the VT shift as a function of trapped charge density, time, silicon fin thickness and type of trapped charge, and can be used for optimizing the ONO geometry and parameters for maximum performance.

  • An Efficient Fault Syndromes Simulator for SRAM Memories

    Wan Zuha WAN HASAN  Izhal ABD HALIN  Roslina MOHD SIDEK  Masuri OTHMAN  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    639-646

    Testing and diagnosis techniques play a key role in the advance of semiconductor memory technology. The challenge of failure detection has created intensive investigation on efficient testing and diagnosis algorithm for better fault coverage and diagnostic resolution. At present, March test algorithm is used to detect and diagnose all faults related to Random Access Memories. However, the test and diagnosis process are mainly done manually. Due to this, a systematic approach for developing and evaluating memory test algorithm is required. This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. The simulator allows a user through a GUI to select a March based test algorithm depending on the desired fault coverage and diagnostic resolution. Experimental results show that using the simulator for testing is more efficient than that of the traditional testing algorithm. This new simulator makes it possible for a detailed list of stuck-at faults, transition faults and coupling faults covered by each algorithm and its percentage to be displayed after a set of test algorithms has been chosen. The percentage of diagnostic resolution is also displayed. This proves that the simulator reduces the trade-off between test time, fault coverage and diagnostic resolution. Moreover, the chosen algorithm can be applied to incorporate with memory built-in self-test and diagnosis, to have a better fault coverage and diagnostic resolution. Universities and industry involved in memory Built-in-Self test, Built-in-Self repair and Built-in-Self diagnose will benefit by saving a few years on researching an efficient algorithm to be implemented in their designs.

  • Precoding Technique for Minimizing BER of MIMO-OFDM System Employing MLD under Multicell Co-channel Interference

    Boonsarn PITAKDUMRONGKIJA  Kazuhiko FUKAWA  Satoshi SUYAMA  Hiroshi SUZUKI  Atsuo UMI  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1573-1581

    This paper proposes a MIMO-OFDM precoder that can minimize a BER upper bound of the maximum likelihood detector (MLD) under a non-cooperative downlink multicell co-channel interference (CCI) environment. Since there is no cooperation among base stations (BSs), it is assumed that information on the interference can be estimated at a mobile station (MS) and then fed back to the desired BS for the precoder. The proposed scheme controls its precoding parameters under a transmit power constraint so as to minimize the BER upper bound, which is derived from the pairwise error probability (PEP) averaged with respect to CCI plus noise. Computer simulations demonstrate that the proposed precoder can effectively improve BER performance of cell edge users and is superior in terms of BER to the eigenmode and the minimum mean squared error (MMSE) precoded transmissions which aim to maximize the channel capacity and to minimize MSE, respectively.

9281-9300hit(21534hit)