The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

13081-13100hit(21534hit)

  • Delay Fault Testing of Processor Cores in Functional Mode

    Virendra SINGH  Michiko INOUE  Kewal K. SALUJA  Hideo FUJIWARA  

     
    PAPER-Dependable Computing

      Vol:
    E88-D No:3
      Page(s):
    610-618

    This paper proposes an efficient methodology of delay fault testing of processor cores using their instruction sets. These test vectors can be applied in the functional mode of operation, hence, self-testing of processor core becomes possible for path delay fault testing. The proposed approach uses a graph theoretic model (represented as an Instruction Execution Graph) of the datapath and a finite state machine model of the controller for the elimination of functionally untestable paths at the early stage without looking into the circuit details and extraction of constraints for the paths that can potentially be tested. Parwan and DLX processors are used to demonstrate the effectiveness of our method.

  • Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems

    Wook SHIN  Jong-Youl PARK  Dong-Ik LEE  

     
    PAPER-Application Information Security

      Vol:
    E88-D No:3
      Page(s):
    619-627

    The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate attack trials from normal behaviors. This paper shows the specification of the extended concept and model, and presents simple analysis results.

  • Domain Name System--Past, Present and Future

    Shigeya SUZUKI  Motonori NAKAMURA  

     
    INVITED PAPER

      Vol:
    E88-B No:3
      Page(s):
    857-864

    Domain Name System--DNS is a key service of the Internet. Without DNS, we cannot use any useful Internet applications. At the beginning of the Internet, email or file transfer applications were provided. DNS provides key service to them--resource discovery. Nowadays, there are broad range of software making use of DNS as basis of their application. In this paper, we explain the evolution of DNS, how DNS works and recent activities including operational issues. Then, we describe EPC network which make use of RFID to bridge real world and the Internet, and how DNS helps to organize EPC network.

  • Address Autoconfiguration for Event-Driven Sensor Network

    Shinji MOTEGI  Kiyohito YOSHIHARA  Hiroki HORIUCHI  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    950-957

    An event-driven sensor network composed of a large number of sensor nodes has been widely studied. A sensor node sends packets to a sink when the node detects an event. For the sink to receive packets it fails to acquire, the sink must send re-transmission requests to the sensor node. To send the requests to the sensor node using unicast, the network address of the sensor node is required to distinguish the sensor node from others. Since it is difficult to allocate the address manually to a number of nodes, a reasonable option is to use existing address autoconfiguration methods. However, the methods waste the limited energy of the sensor nodes due to using a number of control messages to allocate a permanent address to every node. In this paper, we propose an energy-efficient address autoconfiguration method for the event-driven sensor network. The proposed method allocates a temporary address only to a sensor node which detects an event, on an on-demand basis. By performing simulation studies, we evaluated the proposed method and compared it with one of the existing methods based on the number of control messages for the address allocation. The results show that the number of control messages of the proposed method is small compared to that of the existing method. We also evaluated the process time overhead of the proposed method using the implemented system. Although the proposed method has little extra overhead, the results show the processing time is short enough for practical use.

  • An Iterative Decoding Method of Updating Redundant Likelihood Information

    Masayuki ARIYOSHI  Iwao SASASE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E88-B No:3
      Page(s):
    1045-1053

    This paper presents a novel decoding algorithm for turbo codes, in which the likelihood values for redundant parts are updated in order for those values to become more reliable. A criterion for updating the redundant likelihood values is proposed, which is based on the comparisons of the channel values with the re-generated values by the soft-input and soft-output encoders. It is shown that the proposed method can improve the error correcting capabilities, i.e., the improvement of BER/BLER performance and the achievable BER limit.

  • Multiuser MIMO Beamforming for Single Data Stream Transmission in Frequency-Selective Fading Channels

    Huy Hoang PHAM  Tetsuki TANIGUCHI  Yoshio KARASAWA  

     
    PAPER

      Vol:
    E88-A No:3
      Page(s):
    651-659

    In this paper, we propose a multiple-input multiple-output (MIMO) beamforming scheme for a multiuser system in frequency-selective fading channels. The maximum signal-to-noise and interference ratio (MSINR) is adopted as a criterion to determine the transmit and receive weight vectors. In order to maximize the output SINR over all users, two algorithms for base station are considered: the first algorithm is based on the receive weight vector optimization and the second algorithm is based on an iterative update of both transmit and receive weight vectors. Based on the result of single user MIMO beamforming, we analyze the interference channels cancellation ability of multiuser MIMO system. The first algorithm is a simple method and the second algorithm is a performative solution. Through computer simulations, it is shown that multiuser communication system is achievable using the proposed methods in frequency-selective fading condition.

  • Azim: Direction-Based Service System for Both Indoors and Outdoors

    Yohei IWASAKI  Nobuo KAWAGUCHI  Yasuyoshi INAGAKI  

     
    PAPER-Application

      Vol:
    E88-B No:3
      Page(s):
    1034-1044

    In this paper, we propose an advanced location-based service that we call a direction-based service, which utilizes both the position and direction of a user. The direction-based service enables a user to point to an object of interest for command or investigation. We also describe the design, implementation and evaluations of a direction-based service system named Azim. With this system, the direction of the user can be obtained by a magnetic-based direction sensor. The sensor is also used for azimuth-based position estimation, in which a user's position is estimated by having the user point to and measure azimuths of several markers or objects whose positions are already known. Because this approach does not require any other accurate position sensors or positive beacons, it can be deployed cost-effectively. Also, because the measurements are naturally associated with some degree of error, the position is calculated as a probability distribution. The calculation considers the error of direction measurement and the pre-obtained field information such as obstacles and magnetic field disturbance, which enables robust position measurements even in geomagnetically disturbed environments. For wide-area use, the system also utilizes a wireless LAN to obtain rough position information by identifying base stations. We have implemented a prototype system for the proposed method and some applications for the direction-based services. Furthermore, we have conducted experiments both indoors and outdoors, and exemplified that positioning accuracy by the proposed method is precise enough for a direction-based service.

  • Simulation of Ultrafast GaN/AlN Intersubband Optical Switches

    Nobuo SUZUKI  Norio IIZUKA  Kei KANEKO  

     
    PAPER

      Vol:
    E88-C No:3
      Page(s):
    342-348

    A one-dimensional finite-difference time-domain (FDTD) simulator for ultrafast optical switches based on intersubband transition (ISBT) in GaN/AlN waveguide is described. Influences of the inhomogeneous broadening and the 2D mode profile have been taken into consideration. The ultrafast optical response (τ 185 fs) measured in a GaN/AlN waveguide was successfully reproduced by the simulator. At present, however, the saturation characteristics of the fabricated device are mainly limited by the excess TM loss caused by the dislocation in MBE-grown nitride layers. When the dislocation density is reduced and the structure is optimized, the switching pulse energy will be improved to about 10 pJ. Further reduction ( 1 pJ) will be possible when low-loss submicron waveguides with spot-size converters are developed.

  • Adaptive Diagnosis of Variants of the Hypercube

    Aya OKASHITA  Toru ARAKI  Yukio SHIBATA  

     
    PAPER-Graphs and Networks

      Vol:
    E88-A No:3
      Page(s):
    728-735

    System-level fault diagnosis deals with the problem of identifying faulty nodes (processors) in a multiprocessor system. Each node is faulty or fault-free, and it can test other nodes in the system, and outputs the test results. The test result from a node is reliable if the node is fault-free, but the result is unreliable if it is faulty. In this paper, we prove that four variants of the hypercube: the crossed cube, the twisted cube, the Mobius cube, and the enhanced cube, are adaptively diagnosed using at most 4 parallel testing rounds, with at most n faulty nodes (for the enhanced cube, with at most n + 1 faulty nodes), where each processor participates in at most one test in each round. Furthermore, we propose another diagnosis algorithm for the n-dimensional enhanced cube with at most n + 1 faulty nodes, and show that it is adaptively diagnosed with at most 5 rounds in the worst case, but with at most 3 rounds if the number of existing faulty nodes is at most n -log(n + 1).

  • Wavelength Conversion Using Quasi-Phase Matched LiNbO3 Waveguides

    Masaki ASOBE  Yoshiki NISHIDA  Osamu TADANAGA  Hiroshi MIYAZAWA  Hiroyuki SUZUKI  

     
    INVITED PAPER

      Vol:
    E88-C No:3
      Page(s):
    335-341

    This paper describes recent progress in research on wavelength converters that employ quasi-phase-matched LiNbO3 (QPM-LN) waveguides. The basic structure and operating principle of these devices are presented. The conversion efficiency in difference frequency generation (DFG), second harmonic generation (SHG) and an SHG/DFG cascade scheme are explained. Device fabrication technologies such as periodic poling, and those used for annealed proton-exchanged (APE) waveguides, and direct bonded waveguides are introduced. An APE waveguide is used to demonstrate the wavelength conversion of broadband (> 1 Tbit/s) WDM signals. The low penalty conversion of high-speed (40 Gbit/s) based WDM signals is also reported. Excellent resistance to photorefractive damage in a direct bonded waveguide is presented. This high level of resistance enabled highly efficient wavelength conversion. A new design concept is introduced for a multiple QPM device based on the continuous phase modulation of a periodically poled structure. This multiple QPM device enables the variable wavelength conversion of WDM signals. High-speed wavelength switching between ITU-T grid wavelengths using a finely tuned multiple QPM device is also reported. QPM-LN based wavelength converters have several advantages, including the ability to convert high-speed signals of 1 THz or greater, no signal-to-noise (S/N) ratio degradation, no modulation format dependence, and they are capable of the simultaneous conversion of broadband WDM channels. They will therefore be key devices in future photonic networks.

  • Vertically Coupled Microring Resonator Filter for Integrated Add/Drop Node

    Yasuo KOKUBUN  

     
    INVITED PAPER

      Vol:
    E88-C No:3
      Page(s):
    349-362

    The add/drop wavelength filter is an essential component in the new-generation photonic network. Microring resonator filters using high index contrast (HIC) optical waveguides are recently attracting attention as add/drop filters owing to their compactness, functionality such as dispersion compensation, and ease of filter synthesis. In particular, the vertically coupled microring resonator (VCMRR) filter is highly suited for the dense, large-scale integration of filter circuits. In this review, the fundamental characteristics advantageous to the add/drop filter nodes are introduced, and the recent progress in the development of vertically coupled microring resonator filters achieved mainly by the author's group is described.

  • A Kernel-Based Fisher Discriminant Analysis for Face Detection

    Takio KURITA  Toshiharu TAGUCHI  

     
    PAPER-Pattern Recognition

      Vol:
    E88-D No:3
      Page(s):
    628-635

    This paper presents a modification of kernel-based Fisher discriminant analysis (FDA) to design one-class classifier for face detection. In face detection, it is reasonable to assume "face" images to cluster in certain way, but "non face" images usually do not cluster since different kinds of images are included. It is difficult to model "non face" images as a single distribution in the discriminant space constructed by the usual two-class FDA. Also the dimension of the discriminant space constructed by the usual two-class FDA is bounded by 1. This means that we can not obtain higher dimensional discriminant space. To overcome these drawbacks of the usual two-class FDA, the discriminant criterion of FDA is modified such that the trace of covariance matrix of "face" class is minimized and the sum of squared errors between the average vector of "face" class and feature vectors of "non face" images are maximized. By this modification a higher dimensional discriminant space can be obtained. Experiments are conducted on "face" and "non face" classification using face images gathered from the available face databases and many face images on the Web. The results show that the proposed method can outperform the support vector machine (SVM). A close relationship between the proposed kernel-based FDA and kernel-based Principal Component Analysis (PCA) is also discussed.

  • Subspace-Based Interference Suppression Technique for Long-Code Downlink CDMA Adaptive Receiver

    Samphan PHROMPICHAI  Peerapol YUVAPOOSITANON  Phaophak SIRISUK  

     
    PAPER

      Vol:
    E88-A No:3
      Page(s):
    676-684

    This paper presents a multiple constrained subspace based multiuser detector for synchronous long-code downlink multirate DS-CDMA systems. The novel receiver adapts its fractionally-spaced equaliser tap-weights based upon two modes, namely training and decision-directed modes. Switching between two modes is achieved by changing the code constraint in the associated subspace algorithm. Moreover, detection of the desired user requires the knowledge of the desired user's spreading code only. Simulation results show that the proposed receiver is capable of multiple access interference (MAI) suppression and multipath mitigation. Besides, the results reveal the improvement in terms of convergence speed and mean square error (MSE) of the proposed receiver over the existing receiver in both static and dynamic environments.

  • Wavelet-Based Semi-Fragile Watermarking with Tamper Detection

    Ke DING  Chen HE  Ling-ge JIANG  Hong-xia WANG  

     
    LETTER-Information Security

      Vol:
    E88-A No:3
      Page(s):
    787-790

    In this letter, a novel wavelet-based semi-fragile watermarking scheme is presented which exploiting the time-frequency feature of discrete wavelet transform (DWT) and high sensitivity on initial value of chaotic map. We also analyze the robustness to mild modification and fragility to malicious attack of our scheme. Its application includes tamper detection, image verification and copyright protection of multimedia content. Simulation results show the scheme can detect and localize malicious attacks with high peak signal-to-noise ratio (PSNR), while tolerating certain degree of JPEG compression and channel additive white Gaussian noise (AWGN).

  • Fast Macroblock Mode Determination to Reduce H.264 Complexity

    Ki-Hun HAN  Yung-Lyul LEE  

     
    LETTER-Image

      Vol:
    E88-A No:3
      Page(s):
    800-804

    The rate-distortion optimization (RDO) method is an informative technology that improves the coding efficiency, but increases the computational complexity, of the H.264 encoder. In this letter, a fast Macroblock mode determination algorithm is proposed to reduce the computational complexity of the H.264 encoder. The proposed method reduces the encoder complexity by 55%, while maintaining the same level of coding efficiency.

  • ADPE: Agent-Based Decentralized Process Engine

    Shih-Chien CHOU  

     
    PAPER-Software Engineering

      Vol:
    E88-D No:3
      Page(s):
    603-609

    Process-centered software engineering environments (PSEEs) facilitate controlling complicated software processes. Traditional PSEEs are generally centrally controlled, which may result in the following drawbacks: (1) the server may become a bottleneck and (2) when the server is down, processes need to be suspended. To overcome the drawbacks, we developed a decentralized process engine ADPE (agent-based decentralized process engine). ADPE can be embedded in any PSEE to decentralize the PSEE. This paper presents ADPE.

  • Scalable Multi-Layer GMPLS Networks Based on Hierarchical Cloud-Routers

    Daisaku SHIMAZAKI  Eiji OKI  Kohei SHIOMOTO  Naoaki YAMANAKA  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    1119-1127

    This paper proposes the hierarchical cloud-router network (HCRN) to overcome the scalability limit in a multi-layer generalized multi-protocol label switching (GMPLS) network. We define a group of nodes as a virtual node, called the cloud-router (CR). A CR consists of several nodes or lower-level CRs. A CR is modeled as a multiple switching capability (SC) node when it includes more than one kind of SC, which is fiber SC, lambda SC, time-division multiplexing (TDM) SC, packet SC, even if there are no actual multiple switching capability nodes in the CR. The CR advertises its abstracted CR internal structure, which is abstracted link state information inside the CR. A large-scale, multi-layer network can then achieve scalability by advertising the CR internal structure throughout the whole network. In this scheme, the ends of a link connecting two CRs are defined as interfaces of the CRs. We adopt the CR internal cost scheme between CR interfaces to abstract the network. This CR internal cost is advertised outside the CR via the interfaces. Our performance evaluation has shown that HCRN can handle a larger number of nodes than a normal GMPLS network. It can also bear more frequent network topology changes than a normal GMPLS network.

  • Approximate Maximum Likelihood Approach for Code Acquisition in DS-CDMA Systems with Multiple Antennas

    Sangchoon KIM  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E88-B No:3
      Page(s):
    1054-1065

    The problem of estimating code timings in DS-CDMA systems with multiple antennas is considered in the presence of multipath time-varying fading channels and near-far environments. We present an efficient algorithm for an approximate maximum likelihood approach of jointly estimating the multipath timings of a desired user for DS-CDMA systems that consist of multiple antennas either uncorrelated or fully correlated in space. The procedures of the algorithm to estimate code-timings are developed in order to better exploit the time-varying characteristics of the fading process. In the multipath fading channels, the solution of the proposed algorithms is based on successively optimizing the criterion for increasing numbers of multipath delays. It is shown via simulation results that the modified approaches of the approximate maximum likelihood algorithm much more improve its acquisition performance in the time-varying fading channels. It is seen that the acquisition performance of multiple antennas based acquisition scheme is much better than that of a single antenna based timing estimator in the presence of multipath fading channels and the near-far problem. Furthermore, it is observed that the proposed algorithms outperform the correlator and MUSIC estimator in the multiuser environments with near-far situation on time-varying Rayleigh fading channels.

  • ABST M-Type K-Nearest Neighbor (ABSTM-KNN) for Image Denoising

    Francisco GALLEGOS-FUNES  Volodymyr PONOMARYOV  Jose DE-LA-ROSA  

     
    LETTER-Image

      Vol:
    E88-A No:3
      Page(s):
    798-799

    We present the Ansari-Bradley-Siegel-Tukey M-type K-nearest neighbor (ABSTM-KNN) filter to remove impulse noise from corrupted images. Extensive simulations have demonstrated that the proposed filter consistently outperforms other filters by balancing the tradeoff between noise suppression and detail preservation.

  • Dynamic and Adaptive Morphing of Three-Dimensional Mesh Using Control Maps

    Tong-Yee LEE  Chien-Chi HUANG  

     
    PAPER-Computer Graphics

      Vol:
    E88-D No:3
      Page(s):
    646-651

    This paper describes a dynamic and adaptive scheme for three-dimensional mesh morphing. Using several control maps, the connectivity of intermediate meshes is dynamically changing and the mesh vertices are adaptively modified. The 2D control maps in parametric space that include curvature map, area deformation map and distance map, are used to schedule the inserting and deleting vertices in each frame. Then, the positions of vertices are adaptively moved to better positions using weighted centroidal voronoi diagram (WCVD) and a Delaunay triangulation is finally used to determine the connectivity of mesh. In contrast to most previous work, the intermediate mesh connectivity gradually changes and is much less complicated. We demonstrate several examples of aesthetically pleasing morphs created by the proposed method.

13081-13100hit(21534hit)