The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

9601-9620hit(21534hit)

  • Analysis and Design of Sub-Threshold R-MOSFET Tunable Resistor

    Apisak WORAPISHET  Phanumas KHUMSAT  

     
    PAPER-Electronic Circuits

      Vol:
    E92-C No:1
      Page(s):
    135-143

    The sub-threshold R-MOSFET resistor structure which enables tuning range extension below the threshold voltage in the MOSFET with moderate to weak inversion operation is analyzed in detail. The principal operation of the sub-threshold resistor is briefly described. The analysis of its characteristic based on approximations of a general MOS equation valid for all regions is given along with discussion on design implication and consideration. Experiments and simulations are provided to validate the theoretical analysis and design, and to verify the feasibility at a supply voltage as low as 0.5 V using a low-threshold devices in a 1.8-V 0.18 µm CMOS process.

  • Attribute-Based Encryption with Partially Hidden Ciphertext Policies

    Takashi NISHIDE  Kazuki YONEYAMA  Kazuo OHTA  

     
    PAPER-Public Key Cryptography

      Vol:
    E92-A No:1
      Page(s):
    22-32

    We propose attribute-based encryption schemes where encryptor-specified policies (called ciphertext policies) are hidden. By using our schemes, an encryptor can encrypt data with a hidden access control policy. A decryptor obtains her secret key associated with her attributes from a trusted authority in advance and if the attributes associated with the decryptor's secret key do not satisfy the access control policy associated with the encrypted data, the decryptor cannot decrypt the data or guess even what access control policy was specified by the encryptor. We prove security of our construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption. In our security notion, even the legitimate decryptor cannot obtain the information about the access control policy associated with the encrypted data more than the fact that she can decrypt the data.

  • An Objective Perceptual Quality-Based ADTE for Adapting Mobile SVC Video Content

    Cheon Seog KIM  Hosik SOHN  Wesley De NEVE  Yong Man RO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E92-D No:1
      Page(s):
    93-96

    In this paper, we propose an Adaptation Decision-Taking Engine (ADTE) that targets the delivery of scalable video content in mobile usage environments. Our ADTE design relies on an objective perceptual quality metric in order to achieve video adaptation according to human visual perception, thus allowing to maximize the Quality of Service (QoS). To describe the characteristics of a particular usage environment, as well as the properties of the scalable video content, MPEG-21 Digital Item Adaptation (DIA) is used. Our experimental results show that the proposed ADTE design provides video content with a higher subjective quality than an ADTE using the conventional maximum-bit-allocation method.

  • VLSI Implementation of a VC-1 Main Profile Decoder for HD Video Applications

    Jinhyun CHO  Doowon LEE  Sangyong YOON  Sanggyu PARK  Soo-Ik CHAE  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E92-A No:1
      Page(s):
    279-290

    In this paper, we present a high-performance VC-1 main-profile decoder for high-definition (HD) video applications, which can decode HD 720p video streams with 30 fps at 80 MHz. We implemented the decoder with a one-poly eight-metal 0.13 µm CMOS process, which contains about 261,900 logic gates and on-chip memories of 13.9 KB SRAM and 13.1 KB ROM and occupies an area of about 5.1 mm2. In designing the VC-1 decoder, we used a template-based SoC design flow, with which we performed the design space exploration of the decoder by trying various configurations of communication channels. Moreover, we also describe architectures of the computation blocks optimized to satisfy the requirements of VC-1 HD applications.

  • A Fully Digital AGC System with 100 MHz Bandwidth and 35 dB Dynamic Range Power Detectors for DVB-S2 Application

    YoungGun PU  Kang-Yoon LEE  

     
    PAPER-Electronic Circuits

      Vol:
    E92-C No:1
      Page(s):
    127-134

    This paper presents a fully digital gain control system with a new high bandwidth and wide dynamic range power detector for DVB-S2 application. Because the peak-to-average power ratio (PAPR) of DVB-S2 system is so high and the settling time requirement is so stringent, the conventional closed-loop analog gain control scheme cannot be used. The digital gain control is necessary for the robust gain control and the direct digital interface with the baseband modem. Also, it has several advantages over the analog gain control in terms of the settling time and insensitivity to the process, voltage and temperature variation. In order to have a wide gain range with fine step resolution, a new AGC system is proposed. The system is composed of high-bandwidth digital VGAs, wide dynamic range power detectors with RMS detector, low power SAR type ADC, and a digital gain controller. To reduce the power consumption and chip area, only one SAR type ADC is used, and its input is time-interleaved based on four power detectors. Simulation and measurement results show that the new AGC system converges with gain error less than 0.25 dB to the desired level within 10 µs. It is implemented in a 0.18 µm CMOS process. The measurement results of the proposed IF AGC system exhibit 80-dB gain range with 0.25-dB resolution, 8nV/ input referred noise, and 5-dBm IIP3 at 60-mW power consumption. The power detector shows the 35 dB dynamic range for 100 MHz input.

  • Bandwidth Enhancement of Aperture Feed by an Air Rectangular Cavity Backing in a LTCC Post-Wall Waveguide

    JungAun LEE  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E92-C No:1
      Page(s):
    121-126

    The aperture feed with an air cavity in a LTCC (Low Temperature Co-fired Ceramics) post-wall waveguide with dielectric constant εr more than 5 is proposed for bandwidth enhancement in the millimeter wave band. A rectangular cavity is adopted because only one mask pattern of a rectangular can be used for each layer of LTCC for reducing the number of the design parameters and the cost. The fabrication limitation such as the spacing between the post edge and the aperture edge reduces the bandwidth. The feeding structures are designed at 61.25 GHz for a range of εr from 2.0 to 9.0. In the case of εr = 7.0, the bandwidth for reflection below -15 dB with the air cavity is 4.25 times that without the air cavity in simulation, and 3.10 times in measurement.

  • Some Remarks on the Extension of Numerical Data to the Complex Space for Radiation Patterns in Electromagnetic Scattering Problems

    Masahiro HASHIMOTO  

     
    LETTER

      Vol:
    E92-C No:1
      Page(s):
    109-111

    A numerical scheme for the analytic continuation of radiation patterns of the azimuthal coordinate θ into the whole space over the complex plane is given. The scattering data given over the real space [0, 2π] are extended into the complex plane by using the recurrence formulas. An example shows the validity of mathematically exact evaluation for the scattering from polygonal cylinders.

  • Weighted Association Rule Mining for Item Groups with Different Properties and Risk Assessment for Networked Systems

    Jungja KIM  Heetaek CEONG  Yonggwan WON  

     
    PAPER-Data Mining

      Vol:
    E92-D No:1
      Page(s):
    10-15

    In market-basket analysis, weighted association rule (WAR) discovery can mine the rules that include more beneficial information by reflecting item importance for special products. In the point-of-sale database, each transaction is composed of items with similar properties, and item weights are pre-defined and fixed by a factor such as the profit. However, when items are divided into more than one group and the item importance must be measured independently for each group, traditional weighted association rule discovery cannot be used. To solve this problem, we propose a new weighted association rule mining methodology. The items should be first divided into subgroups according to their properties, and the item importance, i.e. item weight, is defined or calculated only with the items included in the subgroup. Then, transaction weight is measured by appropriately summing the item weights from each subgroup, and the weighted support is computed as the fraction of the transaction weights that contains the candidate items relative to the weight of all transactions. As an example, our proposed methodology is applied to assess the vulnerability to threats of computer systems that provide networked services. Our algorithm provides both quantitative risk-level values and qualitative risk rules for the security assessment of networked computer systems using WAR discovery. Also, it can be widely used for new applications with many data sets in which the data items are distinctly separated.

  • Shadow Theory of Diffraction Grating

    Junichi NAKAYAMA  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    17-24

    This paper deals with a new formulation for the diffraction of a plane wave by a periodic grating. As a simple example, the diffraction of a transverse magnetic wave by a perfectly conductive periodic array of rectangular grooves is discussed. On the basis of a shadow hypothesis such that no diffraction takes place and only the reflection occurs with the reflection coefficient -1 at a low grazing limit of incident angle, this paper proposes the scattering factor as a new concept. In terms of the scattering factor, several new formulas on the diffraction amplitude, the diffraction efficiency and the optical theorem are obtained. It is newly found that the scattering factor is an even function due to the reciprocity. The diffraction efficiency is defined for a propagating incident wave as well as an evanescent incident wave. Then, it is theoretically found that the 0th order diffraction efficiency becomes unity and any other order diffraction efficiencies vanish when a real angle of incidence becomes low grazing. Numerical examples of the scattering factor and diffraction efficiency are illustrated in figures.

  • Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography

    Yasuyuki NOGAMI  Yumi SAKEMI  Takumi OKIMOTO  Kenta NEKADO  Masataka AKANE  Yoshitaka MORIKAWA  

     
    PAPER-Mathematics

      Vol:
    E92-A No:1
      Page(s):
    182-189

    For ID-based cryptography, not only pairing but also scalar multiplication must be efficiently computable. In this paper, we propose a scalar multiplication method on the circumstances that we work at Ate pairing with Barreto-Naehrig (BN) curve. Note that the parameters of BN curve are given by a certain integer, namely mother parameter. Adhering the authors' previous policy that we execute scalar multiplication on subfield-twisted curve (Fp2) instead of doing on the original curve E(Fp12), we at first show sextic twisted subfield Frobenius mapping (ST-SFM) in (Fp2). On BN curves, note is identified with the scalar multiplication by p. However a scalar is always smaller than the order r of BN curve for Ate pairing, so ST-SFM does not directly applicable to the above circumstances. We then exploit the expressions of the curve order r and the characteristic p by the mother parameter to derive some radices such that they are expressed as a polynomial of p. Thus, a scalar multiplication [s] can be written by the series of ST-SFMs . In combination with the binary method or multi-exponentiation technique, this paper shows that the proposed method runs about twice or more faster than plain binary method.

  • A Robust Detection in the Case of Strong Narrowband Jammer with Unknown Nonstationary Power

    Victor GOLIKOV  Olga LEBEDEVA  

     
    LETTER-Communication Theory and Signals

      Vol:
    E92-A No:1
      Page(s):
    337-341

    We present likelihood-ratio test (LRT) for detecting a signal in the presence of a known colored clutter, a white noise and a strong jammer with unknown nonstationary power. We have suggested the test allowing to remove completely all components of the jammer. It has been obtained the asymptotic inverse covariance matrix of the clutter with the jammer when the jammer power tends to infinite. Using this formula we developed the asymptotic LRT detection test. The performance of the new test statistic is analyzed and compared with well known eigencanceler-based detector. The effect of the jammer removing on the performance is evaluated for an example scenario.

  • Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time

    Jong-In LEE  Ho-Jung BANG  Tai-Hyo KIM  Sung-Deok CHA  

     
    PAPER-Dependable Computing

      Vol:
    E92-D No:1
      Page(s):
    24-31

    Automated static timing analysis methods provide a safe but usually overestimated worst-case execution time (WCET) due to infeasible execution paths. In this paper, we propose a visual language, User Constraint Language (UCL), to obtain a tight WCET estimation. UCL provides intuitive visual notations with which users can easily specify various levels of flow information to characterize valid execution paths of a program. The user constraints specified in UCL are translated into finite automata. The combined automaton, constructed by a cross-production of the automata for program and user constraints, reflects the static structure and possible dynamic behavior of the program. It contains only the execution paths satisfying user constraints. A case study using part of a software program for satellite flight demonstrates the effectiveness of UCL and our approach.

  • Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate

    Kouichi ITOH  Tetsuya IZU  Wakaha OGATA  Takeshi SHIMOYAMA  Masahiko TAKENAKA  

     
    PAPER-Digital Signature

      Vol:
    E92-A No:1
      Page(s):
    67-75

    This paper studies two types of documents in which an adversary can forge a signature on a chosen document. One type is that a nonce is padded on an input document. The time-stamp protocol is a good example of this type. Another is a structured document (such as PS or PDF) whose contents are described in a body part and information (such as generated time and a generator) are in a meta part. In fact, this paper shows how to forge a time-stamp, a signature on a PDF and an X.509 certificate by the extended forgery attack and numerical examples. Forged signature by the original or the extended attacks is only accepted by the clients whose length check of zero-field is loosely implemented. As a result, we found that the latest versions of Adobe's Acrobat and Acrobat Reader accept the forged time-stamp and the forged signature on a PDF document. Target of this attack is RSASSA-PKCS1-v1_5, which does not have provable security. We also show the expanded attack might forge the signature of RSASSA-PSS, which has provable security, when the length check of zero-field is omitted or loosely implemented.

  • An ISI Suppressing Method for SIMO-OFDM System Utilizing the Characteristic of the ETP-OFDM Model

    Quoc-Anh VU  Yoshio KARASAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    268-276

    This paper proposes a Inter-symbol Interference (ISI) suppressing method For Orthogonal Frequency Division Multiplexing (OFDM) system. In the environments where the delay spread exceeds the guard interval, the occurrence of ISI results in a degradation of system performance. A receiving method based on the Equivalent Transmission Path (ETP) model is proposed for Single-Input Multiple-Output (SIMO) OFDM system. Compared to the receiving scheme using Maximal Ratio Combining (MRC) method, the proposed one shows better performance in suppressing errors due to ISI. The paper also points out that the ETP-based model can be used for detecting the desired signal in the multi-user OFDM system. Simulation results of the system performance show the effectiveness of the proposed method over the conventional OFDM system in suppressing ISI.

  • Low Grazing Scattering from a Surface with a Finite Periodic Array of Rectangular Grooves

    Junichi NAKAYAMA  Yasuhiko TAMURA  Kiyoshi TSUTSUMI  

     
    LETTER-Electromagnetic Theory

      Vol:
    E92-C No:1
      Page(s):
    166-168

    This paper deals with the scattering of a transverse magnetic (TM) plane wave from a perfectly conductive surface with a finite periodic array of rectangular grooves. By use of the method in a previous paper [IEICE TRANS. ELECTRON. VOL.E90-C, no.4, pp.903-906, APRIL 2007], the total scattering cross section is numerically calculated for several different numbers of grooves at a low grazing angle of incidence. It is newly found that, when the corrugation width becomes thousands times of wavelength, the total scattering cross section slightly depends on the groove depth and the period, and becomes almost proportional to square root of the corrugation width with a small correction.

  • Estimation of Reflection Coefficient and Surface Impedance from Absolute Values of the Near Field with Periodic Change

    Michinari SHIMODA  Masazumi MIYOSHI  Kazunori MATSUO  Yoshitada IYAMA  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    92-101

    An inverse scattering problem of estimating the reflection coefficient and the surface impedance from two sets of absolute values of the near field with periodic change is investigated. The problem is formulated in terms of a nonlinear simultaneous equations which is derived from the relation between the two sets of absolute values and the field defined by a finite summation of the modal functions by applying the Fourier analysis. The reflection coefficient is estimated by solving the equations by Newton's method through the successive algorithm with the increment of the number of truncation in the summation one after another. Numerical examples are given and the accuracy of the estimation is discussed.

  • A Framework for Detection of Traffic Anomalies Based on IP Aggregation

    Marat ZHANIKEEV  Yoshiaki TANAKA  

     
    PAPER-Networks

      Vol:
    E92-D No:1
      Page(s):
    16-23

    Traditional traffic analysis is can be performed online only when detection targets are well specified and are fairly primitive. Local processing at measurement point is discouraged as it would considerably affect major functionality of a network device. When traffic is analyzed at flow level, the notion of flow timeout generates differences in flow lifespan and impedes unbiased monitoring, where only n-top flows ordered by a certain metric are considered. This paper proposes an alternative manner of traffic analysis based on source IP aggregation. The method uses flows as basic building blocks but ignores timeouts, using short monitoring intervals instead. Multidimensional space of metrics obtained through IP aggregation, however, enhances capabilities of traffic analysis by facilitating detection of various anomalous conditions in traffic simultaneously.

  • An Enhanced Front-End Algorithm for Reducing Channel Change Time in DVB-T System

    Inwhee JOE  Jongsung CHOI  

     
    LETTER-Broadcast Systems

      Vol:
    E92-B No:1
      Page(s):
    350-353

    To address the low performance for channel scanning in the DVB-T system, we propose an enhanced front-end algorithm in this paper. The proposed algorithm consists of Auto Scan and Normal Scan, which is a part of the tuning algorithm for front-end (tuner) drivers in the DVB-T receiver. The key idea is that the frequency offset is saved when performing Auto Scan in order to reduce the channel change time for Normal Scan. In addition, the results of a performance evaluation demonstrate that our enhanced front-end algorithm improves the performance of channel scanning significantly, as compared to the generic front-end algorithm.

  • Performance Evaluation of MIMO-OFDM with Twin Turbo Decoder

    Yasuyuki HATAKAWA  Noriaki MIYAZAKI  Toshinori SUZUKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    228-236

    This paper proposes Twin Turbo (T2) MIMO-OFDM (Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing). The advanced iterative decoder, called the T2 decoder, decreases the transmission error rate compared to conventional turbo decoders because it uses the correlation information among the bits mapped on an identical symbol of multi-level modulation and updates the channel reliability. When T2 is applied to a MIMO-OFDM, the required symbol energy to noise power density ratio (Es/N0) can be reduced more effectively than when T2 is applied to SISO (Single Input Single Output). This is because T2 can use the correlation among the bits not only mapped on an identical symbol but also transmitted from different antennas. Moreover, T2 achieves good performance in a correlated MIMO channel because the average minimum squared Euclidean distances between symbol replica candidates consisting of signals transmitted from multiple transmitter antennas are reduced. Computer simulations verify that the required Es/N0 of T2 MIMO-OFDM using 16QAM is 1.9 dB lower than that of a conventional turbo decoder when the correlation coefficients of transmitter and receiver antennas are 0.8. A computational complexity analysis clarifies the relation between the increase in computational complexity and the reduction in the required Es/N0.

  • CRRT: Congestion-Aware and Rate-Controlled Reliable Transport in Wireless Sensor Networks

    Muhammad Mahbub ALAM  Choong Seon HONG  

     
    PAPER-Network

      Vol:
    E92-B No:1
      Page(s):
    184-199

    For successful data collection in wireless sensor networks, it is important to ensure that the required delivery ratio is maintained while keeping a fair rate for every sensor. Furthermore, emerging high-rate applications might require complete reliability and the transfer of large volume of data, where persistent congestion might occur. These requirements demand a complete but efficient solution for data transport in sensor networks which reliably transports data from many sources to one or more sinks, avoids congestion and maintains fairness. In this paper, we propose congestion-aware and rate-controlled reliable transport (CRRT), an efficient and low-overhead data transport mechanism for sensor networks. CRRT uses efficient MAC retransmission to increase one-hop reliability and end-to-end retransmission for loss recovery. It also controls the total rate of the sources centrally, avoids the congestion in the bottleneck based on congestion notifications from intermediate nodes and centrally assigns the rate to the sources based on rate assignment policy of the applications. Performance of CRRT is evaluated in NS-2 and simulation results demonstrate the effectiveness of CRRT.

9601-9620hit(21534hit)