The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] URN(89hit)

1-20hit(89hit)

  • Effect of Return Current Cable in Three Different Calibration Environments on Ringing Damped Oscillations of Contact Discharge Current Waveform from ESD Generator

    Yukihiro TOZAWA  Takeshi ISHIDA  Jiaqing WANG  Osamu FUJIWARA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2023/09/06
      Vol:
    E106-B No:12
      Page(s):
    1455-1462

    Measurements of contact discharge current waveforms from an ESD generator with a test voltage of 4kV are conducted with the IEC specified arrangement of a 2m long return current cable in different three calibration environments that all comply with the IEC calibration standard to identify the occurrence source of damped oscillations (ringing), which has remained unclear since contact discharge testing was first adopted in 1989 IEC publication 801-2. Their frequency spectra are analyzed comparing with the spectrum calculated from the ideal contact discharge current waveform without ringing (IEC specified waveform) offered in IEC 61000-4-2 and the spectra derived from a simplified equivalent circuit based on the IEC standard in combination with the measured input impedances of one-ended grounding return current cable with the same arrangement in the same calibration environment as those for the current measurements. The results show that the measured contact discharge waveforms have ringing around the IEC specified waveform after the falling edge of the peak, causing their spectra from 20MHz to 200MHz, but the spectra from 40MHz to 200MHz significantly differ depending on the calibration environments even for the same cable arrangement, which do not almost affect the spectra from 20MHz to 40MHz and over 200MHz. In the calibration environment under the cable arrangement close to the reference ground, the spectral shapes of the measured contact discharge currents and their frequencies of the multiple peaks and dips roughly correspond to the spectral distributions calculated from the simplified equivalent circuit using the measured cable input impedances. These findings reveal that the root cause of ringing is mainly due to the resonances of the return current cable, and calibration environment under the cable arrangement away from the reference ground tends to mitigate the cable resonances.

  • On the Number of Affine Equivalence Classes of Vectorial Boolean Functions and q-Ary Functions

    Shihao LU  Haibin KAN  Jie PENG  Chenmiao SHI  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/08/24
      Vol:
    E106-A No:3
      Page(s):
    600-605

    Vectorial Boolean functions play an important role in cryptography, sequences and coding theory. Both affine equivalence and EA-equivalence are well known equivalence relations between vectorial Boolean functions. In this paper, we give an exact formula for the number of affine equivalence classes, and an asymptotic formula for the number of EA-equivalence classes of vectorial Boolean functions.

  • Return Loss Measurement Procedure for Multicore Fiber Connectors Open Access

    Kiyoshi KAMIMURA  Yuki FUJIMAKI  Haruki HOSHIKAWA  Kazuki IMAIZUMI  Kazuya IZAWA  Ryo NAGASE  

     
    PAPER

      Pubricized:
    2022/08/25
      Vol:
    E105-C No:12
      Page(s):
    721-728

    Multi-core fiber (MCF) is one of the most promising candidates for achieving ultra-wideband optical transmission in the near future. To build a network using MCF, a high-performance and reliable MCF connector is indispensable. We have developed an SC-type optical connector for MCF and confirmed its excellent optical performance, mechanical durability, and environmental reliability. To put the communication system using MCF into practical use, it is necessary to establish a procedure for measuring the initial connection characteristics. Fan-in / fan-out (FIFO) devices are indispensable for measuring the connection characteristics of MCF connectors. To measure the return loss of the MCF connector, it is necessary to remove the influence of reflection at the FIFO itself and at the connection points with the FIFO. In this paper, we compare four types of return loss measurement procedures (three usual method and a new method we proposed) and find that most stable measurement method involves using our new method, the OCWR method without FIFO. The OCWR method without FIFO is considered to be the most advantageous when used for outgoing inspection of connectors. The reason is that it eliminates the measurement uncertainty caused by the FIFO and enables speedy measurement.

  • Single-Image Camera Calibration for Furniture Layout Using Natural-Marker-Based Augmented Reality

    Kazumoto TANAKA  Yunchuan ZHANG  

     
    LETTER-Multimedia Pattern Processing

      Pubricized:
    2022/03/09
      Vol:
    E105-D No:6
      Page(s):
    1243-1248

    We propose an augmented-reality-based method for arranging furniture using natural markers extracted from the edges of the walls of rooms. The proposed method extracts natural markers and estimates the camera parameters from single images of rooms using deep neural networks. Experimental results show that in all the measurements, the superimposition error of the proposed method was lower than that of general marker-based methods that use practical-sized markers.

  • Comparison of a Probabilistic Returning Scheme for Preemptive and Non-Preemptive Schemes in Cognitive Radio Networks with Two Classes of Secondary Users

    Yuan ZHAO  Wuyi YUE  Yutaka TAKAHASHI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2021/09/24
      Vol:
    E105-B No:3
      Page(s):
    338-346

    In this paper, we consider the transmission needs of communication networks for two classes of secondary users (SUs), named SU1 and SU2 (lowest priority) in cognitive radio networks (CRNs). In such CRNs, primary users (PUs) have preemptive priority over both SU1's users (SU1s) and SU2's users (SU2s). We propose a preemptive scheme (referred to as the P Scheme) and a non-preemptive scheme (referred to as the Non-P Scheme) when considering the interactions between SU1s and SU2s. Focusing on the transmission interruptions to SU2 packets, we present a probabilistic returning scheme with a returning probability to realize feedback control for SU2 packets. We present a Markov chain model to develop some formulas for SU1 and SU2 packets, and compare the influences of the P Scheme and the Non-P Scheme in the proposed probabilistic returning scheme. Numerical analyses compare the impact of the returning probability on the P Scheme and the Non-P Scheme. Furthermore, we optimize the returning probability and compare the optimal numerical results yielded by the P Scheme and the Non-P Scheme.

  • Alleviating File System Journaling Problem in Containers for DBMS Consolidation

    Asraa ABDULRAZAK ALI MARDAN  Kenji KONO  

     
    PAPER-Software System

      Pubricized:
    2021/04/01
      Vol:
    E104-D No:7
      Page(s):
    931-940

    Containers offer a lightweight alternative over virtual machines and become a preferable choice for application consolidation in the clouds. However, the sharing of kernel components can violate the I/O performance and isolation in containers. It is widely recognized that file system journaling has terrible performance side effects in containers, especially when consolidating database management systems (DBMSs). The sharing of journaling modules among containers causes performance dependency among them. This dependency violates resource consumption enforced by the resource controller, and degrades I/O performance due to the contention of the journaling module. The operating system developers have been working on novel designs of file systems or new journaling mechanisms to solve the journaling problems. This paper shows that it is possible to overcome journaling problems without re-designing file systems or implementing a new journaling method. A careful configuration of containers in existing file systems can gracefully solve the problems. Our recommended configuration consists of 1) per-container journaling by presenting each container with a virtual block device to have its own journaling module, and 2) accounting journaling I/Os separately for each container. Our experimental results show that our configuration resolves journaling-related problems, improves MySQL performance by 3.4x, and achieves reasonable performance isolation among containers.

  • ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets

    Toshinori USUI  Tomonori IKUSE  Yuto OTSUKI  Yuhei KAWAKOYA  Makoto IWAMURA  Jun MIYOSHI  Kanta MATSUURA  

     
    PAPER-Network and System Security

      Pubricized:
    2020/04/07
      Vol:
    E103-D No:7
      Page(s):
    1476-1492

    Return-oriented programming (ROP) has been crucial for attackers to evade the security mechanisms of recent operating systems. Although existing ROP detection approaches mainly focus on host-based intrusion detection systems (HIDSes), network-based intrusion detection systems (NIDSes) are also desired to protect various hosts including IoT devices on the network. However, existing approaches are not enough for network-level protection due to two problems: (1) Dynamic approaches take the time with second- or minute-order on average for inspection. For applying to NIDSes, millisecond-order is required to achieve near real time detection. (2) Static approaches generate false positives because they use heuristic patterns. For applying to NIDSes, false positives should be minimized to suppress false alarms. In this paper, we propose a method for statically detecting ROP chains in malicious data by learning the target libraries (i.e., the libraries that are used for ROP gadgets). Our method accelerates its inspection by exhaustively collecting feasible ROP gadgets in the target libraries and learning them separated from the inspection step. In addition, we reduce false positives inevitable for existing static inspection by statically verifying whether a suspicious byte sequence can link properly when they are executed as a ROP chain. Experimental results showed that our method has achieved millisecond-order ROP chain detection with high precision.

  • Suzaku: A Churn Resilient and Lookup-Efficient Key-Order Preserving Structured Overlay Network

    Kota ABE  Yuuichi TERANISHI  

     
    PAPER-Network

      Pubricized:
    2019/03/05
      Vol:
    E102-B No:9
      Page(s):
    1885-1894

    A key-order preserving structured overlay network is a class of structured overlay network that preserves, in its structure, the order of keys to support efficient range queries. This paper presents a novel key-order preserving structured overlay network “Suzaku”. Similar to the conventional Chord#, Suzaku uses a periodically updated finger table as a routing table, but extends its uni-directional finger table to bi-directional, which achieves ⌈log2 n⌉-1 maximum lookup hops in the converged state. Suzaku introduces active and passive bi-directional finger table update algorithms for node insertion and deletion. This method maintains good lookup performance (lookup hops increase nearly logarithmically against n) even in churn situations. As well as its good performance, the algorithms of Suzaku are simple and easy to implement. This paper describes the principles of Suzaku, followed by simulation evaluations, in which it showed better performance than the conventional networks, Chord# and Skip Graph.

  • Calibration of Turntable Based 3D Scanning Systems

    Duhu MAN  Mark W. JONES  Danrong LI  Honglong ZHANG  Zhan SONG  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2019/05/30
      Vol:
    E102-D No:9
      Page(s):
    1833-1841

    The consistent alignment of point clouds obtained from multiple scanning positions is a crucial step for many 3D modeling systems. This is especially true for environment modeling. In order to observe the full scene, a common approach is to rotate the scanning device around a rotation axis using a turntable. The final alignment of each frame data can be computed from the position and orientation of the rotation axis. However, in practice, the precise mounting of scanning devices is impossible. It is hard to locate the vertical support of the turntable and rotation axis on a common line, particularly for lower cost consumer hardware. Therefore the calibration of the rotation axis of the turntable is an important step for the 3D reconstruction. In this paper we propose a novel calibration method for the rotation axis of the turntable. With the proposed rotation axis calibration method, multiple 3D profiles of the target scene can be aligned precisely. In the experiments, three different evaluation approaches are used to evaluate the calibration accuracy of the rotation axis. The experimental results show that the proposed rotation axis calibration method can achieve a high accuracy.

  • A P2P Sensor Data Stream Delivery System That Guarantees the Specified Reachability under Churn Situations

    Tomoya KAWAKAMI  Tomoki YOSHIHISA  Yuuichi TERANISHI  

     
    PAPER

      Pubricized:
    2019/02/06
      Vol:
    E102-D No:5
      Page(s):
    932-941

    In this paper, we propose a method to construct a scalable sensor data stream delivery system that guarantees the specified delivery quality of service (i.e., total reachability to destinations), even when delivery server resources (nodes) are in a heterogeneous churn situation. A number of P2P-based methods have been proposed for constructing a scalable and efficient sensor data stream system that accommodates different delivery cycles by distributing communication loads of the nodes. However, no existing method can guarantee delivery quality of service when the nodes on the system have a heterogeneous churn rate. As an extension of existing methods, which assign relay nodes based on the distributed hashing of the time-to-deliver, our method specifies the number of replication nodes, based on the churn rate of each node and on the relevant delivery paths. Through simulations, we confirmed that our proposed method can guarantee the required reachability, while avoiding any increase in unnecessary resource assignment costs.

  • Complicated Superstable Periodic Orbits in a Simple Spiking Neuron Model with Rectangular Threshold Signal

    Yusuke MATSUOKA  

     
    LETTER-Nonlinear Problems

      Vol:
    E101-A No:11
      Page(s):
    1944-1948

    We studied complicated superstable periodic orbits (SSPOs) in a spiking neuron model with a rectangular threshold signal. The neuron exhibited SSPOs with various periods that changed dramatically when we varied the parameter space. Using a one-dimensional return map defined by the spike phase, we evaluated period changes and showed its complicated distribution. Finally, we constructed a test circuit to confirm the typical phenomena displayed by the mathematical model.

  • A Bayesian Game to Estimate the Optimal Initial Resource Demand for Entrant Virtual Network Operators

    Abu Hena Al MUKTADIR  Ved P. KAFLE  Pedro MARTINEZ-JULIA  Hiroaki HARAI  

     
    PAPER

      Pubricized:
    2017/09/19
      Vol:
    E101-B No:3
      Page(s):
    667-678

    Network virtualization and slicing technologies create opportunity for infrastructure-less virtual network operators (VNOs) to enter the market anytime and provide diverse services. Multiple VNOs compete to provide the same kinds of services to end users (EUs). VNOs lease virtual resources from the infrastructure provider (InP) and sell services to the EUs by using the leased resources. The difference between the selling and leasing is the gross profit for the VNOs. A VNO that leases resources without precise knowledge of future demand, may not consume all the leased resources through service offers to EUs. Consequently, the VNO experiences loss and resources remain unused. In order to improve resource utilization and ensure that new entrant VNOs do not face losses, proper estimation of initial resource demand is important. In this paper, we propose a Bayesian game with Cournot oligopoly model to properly estimate the optimal initial resource demands for multiple entrant competing VNOs (players) with the objective of maximizing the expected profit for each VNO. The VNOs offer the same kinds of services to EUs with different qualities (player's type), which are public information. The exact service quality with which a VNO competes in the market is private information. Therefore, a VNO assumes the type of its opponent VNOs with certain probability. We derive the Bayesian Nash equilibrium (BNE) of the presented game and evaluate numerically the effect of service qualities and prices on the expected profit and market share of the VNOs.

  • A Safe and Comprehensive Route Finding Algorithm for Pedestrians Based on Lighting and Landmark Conditions

    Siya BAO  Tomoyuki NITTA  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER-Intelligent Transport System

      Vol:
    E100-A No:11
      Page(s):
    2439-2450

    In this paper, we propose a safe and comprehensive route finding algorithm for pedestrians based on lighting and landmark conditions. Safety and comprehensiveness can be predicted by the five possible indicators: (1) lighting conditions, (2) landmark visibility, (3) landmark effectiveness, (4) turning counts along a route, and (5) road widths. We first investigate impacts of these five indicators on pedestrians' perceptions on safety and comprehensiveness during route findings. After that, a route finding algorithm is proposed for pedestrians. In the algorithm, we design the score based on the indicators (1), (2), (3), and (5) above and also introduce a turning count reduction strategy for the indicator (4). Thus we find out a safe and comprehensive route through them. In particular, we design daytime score and nighttime score differently and find out an appropriate route depending on the time periods. Experimental simulation results demonstrate that the proposed algorithm obtains higher scores compared to several existing algorithms. We also demonstrate that the proposed algorithm is able to find out safe and comprehensive routes for pedestrians in real environments in accordance with questionnaire results.

  • Calculation of Lightning-Induced Voltages on Overhead Lines from Oblique Return Stroke Channel above Stratified Lossy Ground in Time Domain

    Xiaojia WANG  Yazhou CHEN  Haojiang WAN  Qingxi YANG  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2017/02/17
      Vol:
    E100-B No:8
      Page(s):
    1454-1461

    In this paper, the effect of the tilt angle of return stroke channel and the stratified lossy ground on the lightning-induced voltages on the overhead lines are studied using the modified transmission-line model with linear current decay with height (MTLL). The results show that the lightning-induced voltages from oblique discharge channel are larger than those from the vertical discharge channel, and the peak values of the induced voltages will increase with increasing the tilt angle. When the ground is horizontally stratified, the peak of the induced voltages will increase with increasing the conductivity of the lower layer at different distances. When the upper ground conductivity increases, the voltage peak values will decrease if the overhead line is nearby the lightning strike point and increase if the overhead line is far from the lightning strike point. Moreover, the induced voltages are mainly affected by the conductivity of the lower layer soil when the conductivity of the upper layer ground is smaller than that of the lower layer ground at far distances. When the ground is vertically stratified, the induced voltages are mainly affected by the conductivity of the ground near the strike point when the overhead line and the strike point are located above the same medium; if the overhead line and the strike point are located above different mediums, both of the conductivities of the vertically stratified ground will influence the peak of the induced voltages and the conductivity of the ground which is far from the strike point has much more impact on induced voltages.

  • A Routing Method Using Directed Grid-Graph for Self-Aligned Quadruple Patterning

    Takeshi IHARA  Toshiyuki HONGO  Atsushi TAKAHASHI  Chikaaki KODAMA  

     
    PAPER

      Vol:
    E100-A No:7
      Page(s):
    1473-1480

    Self-Aligned Quadruple Patterning (SAQP) is an important manufacturing technique for sub 14nm technology node. Although various routing algorithms for SAQP have been proposed, it is not easy to find a dense SAQP compliant routing pattern efficiently. Even though a grid for SAQP compliant routing pattern was proposed, it is not easy to find a valid routing pattern on the grid. The routing pattern of SAQP on the grid consists of three types of routing. Among them, third type has turn prohibition constraint on the grid. Typical routing algorithms often fail to find a valid routing for third type. In this paper, a simple directed grid-graph for third type is proposed. Valid SAQP compliant two dimensional routing patterns are found effectively by utilizing the proposed directed grid-graph. Experiments show that SAQP compliant routing patterns are found efficiently by our proposed method.

  • Low-Cost Adaptive and Fault-Tolerant Routing Method for 2D Network-on-Chip

    Ruilian XIE  Jueping CAI  Xin XIN  Bo YANG  

     
    LETTER-Computer System

      Pubricized:
    2017/01/20
      Vol:
    E100-D No:4
      Page(s):
    910-913

    This letter presents a Preferable Mad-y (PMad-y) turn model and Low-cost Adaptive and Fault-tolerant Routing (LAFR) method that use one and two virtual channels along the X and Y dimensions for 2D mesh Network-on-Chip (NoC). Applying PMad-y rules and using the link status of neighbor routers within 2-hops, LAFR can tolerate multiple faulty links and routers in more complicated faulty situations and impose the reliability of network without losing the performance of network. Simulation results show that LAFR achieves better saturation throughput (0.98% on average) than those of other fault-tolerant routing methods and maintains high reliability of more than 99.56% on average. For achieving 100% reliability of network, a Preferable LAFR (PLAFR) is proposed.

  • Improvement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks

    Donghoon LEE  Jaewook JUNG  Younsung CHOI  Dongho WON  

     
    LETTER-Cryptography and Information Security

      Vol:
    E99-A No:12
      Page(s):
    2585-2590

    Return-oriented programming (ROP) attacks, which have been increasing in number recently, are an exploitation technique that can bypass non-executable page protection methods by using codes that exist within benign programs or modules. There have been many studies on defense against ROP attacks, but most of them have high overhead or high time complexity in terms of the detection of gadgets. In this letter, we suggest an ROP defense technique which is fast, space-efficient, and of lower detection time complexity; it uses a compiler-based approach. The most recent ROP defense technique is a compiler-based zero-sum defender suggested by Kim et al., achieving very low overhead. However, it still did not solve the issue of time complexity regarding detection. Our technique performs a specific computation to identify gadgets at the resetting position immediately before and after a return instruction. This method can efficiently identify a series of gadgets performed without calls and defend against them. In our experiment, the performance overhead was 1.62% and the file size overhead was 4.60%; our proposed technique achieved O(1) in terms of time complexity while having almost the same overhead as the zero-sum defender.

  • CCP-Based Plant-Wide Optimization and Application to the Walking-Beam-Type Reheating Furnace

    Yan ZHANG  Hongyan MAO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2016/06/17
      Vol:
    E99-D No:9
      Page(s):
    2239-2247

    In this paper, the integration of dynamic plant-wide optimization and distributed generalized predictive control (DGPC) is presented for serially connected processes. On the top layer, chance-constrained programming (CCP) is employed in the plant-wide optimization with economic and model uncertainties, in which the constraints containing stochastic parameters are guaranteed to be satisfied at a high level of probability. The deterministic equivalents are derived for linear and nonlinear individual chance constraints, and an algorithm is developed to search for the solution to the joint probability constrained problem. On the lower layer, the distributed GPC method based on neighborhood optimization with one-step delay communication is developed for on-line control of the whole system. Simulation studies for furnace temperature set-points optimization problem of the walking-beam-type reheating furnace are illustrated to verify the effectiveness and practicality of the proposed scheme.

  • Characteristics of Lightning Electromagnetic Fields Generated by Tortuous Channel

    Xiaojia WANG  Yazhou CHEN  Haojiang WAN  Lipeng WANG  Qingxi YANG  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E99-B No:7
      Page(s):
    1558-1565

    The analytic expressions of lightning electromagnetic fields generated by tortuous channel with an inclined lower section are obtained by decomposing the current infinitesimal and solving Maxwell's equations. By using the transmission line model and pulse function to express the channel-base current, the influence of length and tilt angle of the oblique part on lightning electromagnetic fields as well as the distribution laws of electromagnetic fields for different azimuth angles are analyzed. The results show that the electromagnetic fields in near area are mainly determined by the lower section of the tortuous discharge channel, and the peak values of electromagnetic fields in different field regions will increase with the increasing of the length of the lower section when L1 is shorter than the distance that return-stroke speed multiplied by peak time. Whereas the length of the lower section is longer than the distance that return-stroke speed multiplied by peak time, the waveforms of electromagnetic fields will overlap each other and won't be influenced by oblique part length of the discharge channel before the return-stroke current arrives at the inflection point. Moreover, the peak values of electromagnetic fields will decrease with the increase of tilt angle (the azimuth angle φ = 2π/3) and azimuth angle, and the impact of channel geometry on the electromagnetic field strengthens with the distance.

  • Inductance and Current Distribution Extraction in Nb Multilayer Circuits with Superconductive and Resistive Components Open Access

    Coenrad FOURIE  Naoki TAKEUCHI  Nobuyuki YOSHIKAWA  

     
    INVITED PAPER

      Vol:
    E99-C No:6
      Page(s):
    683-691

    We describe a calculation tool and modeling methods to find self and mutual inductance and current distribution in superconductive multilayer circuit layouts. Accuracy of the numerical solver is discussed and compared with experimental measurements. Effects of modeling parameter selection on calculation results are shown, and we make conclusions on the selection of modeling parameters for fast but sufficiently accurate calculations when calibration methods are used. Circuit theory for the calculation of branch impedances from the output of the numerical solver is discussed, and compensation for solution difficulties is shown through example. We elaborate on the construction of extraction models for superconductive integrated circuits, with and without resistive branches. We also propose a method to calculate current distribution in a multilayer circuit with multiple bias current feed points. Finally, detailed examples are shown where the effects of stacked vias, bias pillars, coupling, ground connection stacks and ground return currents in circuit layouts for the AIST advanced process (ADP2) and standard process (STP2) are analyzed. We show that multilayer inductance and current distribution extraction in such circuits provides much more information than merely branch inductance, and can be used to improve layouts; for example through reduced coupling between conductors.

1-20hit(89hit)