Hidetoshi ISHIDA Kazuo MIYATSUJI Tsuyoshi TANAKA Daisuke UEDA Chihiro HAMAGUCHI
A novel method to obtain a compact plastic package with higher isolation by providing subsidiary inner ground leads between outer leads is proposed and demonstrated. The effect of the subsidiary ground leads is investigated by using a 3-dimensional electromagnetic field simulation and measuring the fabricated packages. Newly designed package with subsidiary ground leads achieves higher isolation by more than 10 dB at 3 GHz as compared to a conventional package. This package is applied to GaAs SPDT switch IC's. Isolation of the switch IC's is improved by 5 dB at 3 GHz by the subsidiary inner ground leads. The isolation characteristics are discussed based on the equivalent circuit extracted from the simulation results.
Kazuhiko NAKAHARA Shinichi KANEKO Yasushi ITOH
Miniaturized opto and microwave receiver module using DCCPWs (Double Conductor Coplanar Waveguides) have been developed for active phased array antennas. The module comprised by a microstrip-to-slot transition, two chips of low-noise MMIC amplifiers, and a laser diode module is fabricated on an ultra-thin package with 10301.5 mm3 in size and 2 g in weight to achieve an ultra-thin structure of active phased array antenna panels. The ultra-thin structure is attributed to the design of low-noise MMIC amplifiers using DCCPWs and laser diode modules using silicon V-groove technology and fiber alignment method.
A new data-I/O scheme with a hidden writing-recovery architecture has been developed for the megabit-class high operating frequency SRAMs. Read-out nodes in the memory cell are separated from bitline-connected writing nodes so as not to delay sensing initiation due to uncompleted bitline recovery. The data stored in a memory cell are read-out by sensing the differential current signal on a double-rail virtual-GND line along bitlines. Each pair of virtual-GND lines is imaginarily short-circuited by a sense amplifier, so that the read-out circuitry would have large immunity against virtual-GND-line noises. The critical noise level associated with data destruction is analyzed at various supply voltages. The virtual-GND-line-sensed memory cell with the squashed topology, the swing-suppression-type low-power writing circuitry, and the current-sense amplifier with extra negative feedback loops, --which are used in the data-I/O scheme are also mentioned. Assuming a sub array in megabit-class SRAMs, 4 K-words 6 -bits test chip was fabricated with a 0.5-µm CMOS process. The SRAM achieved 180-MHz operation at a typical 3.3-V, 25 condition. The power dissipation at the practical operating frequency of 133-MHz was 50-mW.
Sirou HIROSAKA Akimasa HIRATA Toshiyuki SHIOZAWA
In order to enhance the energy transfer efficiency in a rectangular Cherenkov laser, we propose to vary properly the permittivity of a loaded dielectric in the transverse direction. With the aid of particle simulation, we investigate the amplification characteristics of the rectangular Cherenkov laser with a dielectric permittivity varied in the transverse direction, demonstrating the effectiveness of our proposal for efficiency enhancement.
In this paper, we present a traffic scheduling algorithm, called the Delay-Bound Monotonic with Average Rate Reservation (DM/ARR), which generates minimum output burstiness streams. We assume that connection i is policed by the leaky bucket algorithm with parameters (σi,ρi) where σi is the bucket size (or burstiness) and ρi is the leaky rate. Compared with the totally isolated scheme where connection i is allocated a bandwidth ri=max{σi/di,ρi} (di is the delay bound requirement of connection i), the DM/ARR algorithm has a better performance in the sense that it has a larger admission region. We prove that, among all possible scheduling algorithms that satisfy the delay bound requirements of established connections, DM/ARR results in the minimum output burstiness. This is important because a smaller burstiness implies a smoother traffic and thus the receiver (or next switch node in a multihop network) can handle it more easily. Numerical results show that the admission region of the DM/ARR algorithm is close to that of the earliest deadline first algorithm. A packetized version is studied for ATM networks.
Katsuya ODA Eiji OHUE Masamichi TANABE Hiromi SHIMAMOTO Katsuyoshi WASHIO
A selectively grown Si1-xGex base heterojunction bipolar transistor (HBT) was fabricated, and effects of Ge and B profiles on the device performance were investigated. Since no obvious leakage current was observed, it is shown that good crystallinity of Si1-xGex was achieved by using a UHV/CVD system with high-pressure H2 pre-cleaning of the substrate. Very high current gain of 29,000 was obtained in an HBT with a uniform Ge profile by both increasing electron injection from the emitter to the base and reducing band gap energy in the base. Since the Early voltage is affected by the grading of Ge content in the base, the HBT with the graded Ge profile provides very high Early voltage. However, the breakdown voltage is degraded by increasing Ge content because of reducing bandgap energy and changing dopant profile. To increase the cutoff frequency, dopant diffusion must be suppressed, and carrier acceleration by the internal drift field with the graded Ge profile has an additional effect. By doing them, an extremely high cutoff frequency of 130 GHz was obtained in HBT with graded Ge profiles.
Katsuya SHINOHARA Norimasa OHTSUKI Yoshinori TAKEUCHI Masaharu IMAI
This paper proposes an ASIP performance optimization method taking clock frequency into account. The performance of an instruction set processor can be measured using the execution time of an application program, which can be determined by the clock cycles to perform the application program divided by the applied clock frequency. Therefore, the clock frequency should also be tuned in order to maximize the performance of the processor under the given design constraints. Experimental results show that the proposed method determines an optimal combination of FUs considering clock frequency.
Midori ASAKA Masahiko TSUCHIYA Takefumi ONABUTA Shunji OKAZAWA Shigeki GOTO
At the Information-technology Promotion Agency (IPA), we have been developing a network intrusion detection system called IDA (Intrusion Detection Agent system). IDA system has two distinctive features that most conventional intrusion detection systems lack. First, it has a mechanism for tracing the origin of a break-in by means of mobile agents. Second, it has a new and efficient method of detecting intrusions: rather than continuously monitoring the user's activities, it watches for an event that meets the criteria of an MLSI (Mark Left by Suspected Intruders) and may relate to an intrusion. By this method, IDA described herein can reduce the processing overhead of systems and networks. At present, IDA can detect local attacks that are initiated against a machine to which the attacker already has access and he or she attempts to exceed his or her authority. This paper mainly describes how IDA detects local attacks and traces intrusions.
Tetsuya YOSHIDA Koichi HORI Shinichi NAKASUKA
This paper proposes a new method to improve cooperation in concurrent systems within the framework of Multi-Agent Systems (MAS) by utilizing reinforcement learning. When subsystems work independently and concurrently, achieving appropriate cooperation among them is important to improve the effectiveness of the overall system. Treating subsystems as agents makes it easy to explicitly deal with the interactions among them since they can be modeled naturally as communication among agents with intended information. In our approach agents try to learn the appropriate balance between exploration and exploitation via reward, which is important in distributed and concurrent problem solving in general. By focusing on how to give reward in reinforcement learning, not the learning equation, two kinds of reward are defined in the context of cooperation between agents, in contrast to reinforcement learning within the framework of single agent. In our approach reward for insistence by individual agent contributes to facilitating exploration and reward for concession to other agents contributes to facilitating exploitation. Our cooperation method was examined through experiments on the design of micro satellites and the result showed that it was effective to some extent to facilitate cooperation among agents by letting agents themselves learn the appropriate balance between insistence and concession. The result also suggested the possibility of utilizing the relative magnitude of these rewards as a new control parameter in MAS to control the overall behavior of MAS.
This paper presents a new approach to simulation of Dynamically Reconfigurable Logic (DRL) systems, which offers better accuracy of modelling dynamic reconfiguration than previously reported techniques. Our method, named Clock Morphing (CM), is based on modelling dynamic reconfiguration via a reconfigured module clock signal, while using a dedicated signal value to indicate dynamic reconfiguration. We discuss problems associated with the other approaches to DRL simulation and describe the main principles behind the proposed technique. We further demonstrate feasibility of a CM DRL simulation on its example implementation in VHDL.
Sin Jun KANG Seok Ho JANG Hee Soo HWANG Kwang Bang WOO
In this paper, an effective method of system modeling and dynamic scheduling to improve operation and control for the Back-End process of semiconductor manufacturing is developed by using Colored Timed Petri-Nets (CTPNs). The simulator of a CTPNs model was utilized to generate a new heuristic scheduling method with genetic algorithm(GA) which enables us to obtain the optimal values of the weighted delay time and standard deviation of lead time.
In general, when many functions and services are added to a system, verification and validation become difficult. In design and development in telecommunication services, conflicts that arise from combined telecommunication services have been discussed from various viewpoints. However, correctly and efficiently detecting all conflicts is still not possible and the resolution of conflicts primarily depends on expert designers, who are finding that these problems are beyond their ability. Thus, the burden on the designer must also be alleviated at the design stage. Service interference, which is discussed in this paper, is a kind of conflict. A problem of service interference is that during service, other services interfere with the ongoing service behavior. That is to say, a strange state arises, or an input event doesn't work, or a strange transition occurs, etc. The detection of service interference by only comparing states among services is not enough since the state transition must be considered in the service interference. This paper proposes how to automatically detect the service interference with a rule-based system and an extended adjacency matrix. The proposed method uses and combines features of both the adjacency matrix and rule-based system. The method first generates the extended adjacency matrix by the rule application, then extracts sequences of the state, the event, and the rule applications, and then detects the service interference with the extracted sequences.
Hiroaki IWASHITA Tsuneo NAKATA
We present a symbolic language emptiness check algorithm based on forward state traversal. A verification property is given by a set of error traces written in ω-regular expression and is manipulated explicitly as a non-deterministic state transition graph. State space of the design model is implicitly traversed along the explicit graph. This method has a large amount of flexibility for controlling state traversal on the property space. It should become a good framework of incremental or approximate verification of ω-regular properties.
Nei KATO Hiroaki NITOU Kohei OHTA Glenn MANSFIELD Yoshiaki NEMOTO
Internet communication is increasingly becoming an important element in daily life. Keeping this network safe from malicious elements is an urgent task for network management. To maintain the security level networks are generally, monitored for indications of usage with ill-intentions. Such indications are events which need to be collated, correlated and analyzed in real-time to be effective. However, on an average medium to large size network the number of such events are very large. This makes it practically impossible to analyze the information in real-time and provide the necessary security measures. In this paper, we propose a mechanism that keeps the number of events, to be analyzed, low thereby making it possible to provide ample security measures. We discuss a real-time Intrusion Detection System (IDS) for detecting network attacks. The system looks out for TCP ACK/RST packets, which are generally caused by network scans. The system can extract the tendency of network flows in real-time, based on the newly developed time-based clustering and Dynamic Access Tree creation techniques. The algorithm, implemented and deployed on a medium size backbone network using RMON (Remote MONitoring) technology, successfully detected 195 intrusion attempts during a one month period. The results of the pilot deployment are discussed. In this paper, the proposal, implementation and evaluation will be described.
Motohiro SUZUKI Hiroyuki MAEOMICHI Nobuhisa SHIRAISHI Yoshiaki KIRIHA
We have developed an active Q adaptor (AQA) to achieve integration of multiple management protocols and dynamic modification of managed object (MO) definitions. To achieve dynamic modification, we introduce a new MO framework, called dynamic-MO, which has the ability of modifying its own definition. A dynamic-MO is composed of meta-data and some behavior programs. Meta-data lists attributes of a dynamic-MO in a text format and a behavior program describes actions of a dynamic-MO in scripting language such as Java, Tcl, etc. In our AQA architecture, modules which manage individual components of a dynamic-MO communicate among themselves via an object request broker (ORB) in order to achieve system scalability with high performance. To realize the functionality of a dynamic-MO, we propose interfaces among these modules that are independent of dynamic-MO definitions and an update mechanism of behavior programs. We define the interfaces based on the common management information protocol (CMIP) operations to avoid re-defining the interfaces when dynamic-MO definitions are modified. Furthermore, to execute modified behavior programs without any negative influence on the workings of the other behavior programs, we employ a Java class-loader which has its own specific naming-space on a Java virtual machine (Java VM). With all of these features, our AQA is extremely promising for developing programmable network management systems for end-to-end management of heterogeneous telecommunication networks.
Kiyohito YOSHIHARA Gen HATTORI Keizo SUGIYAMA Sadao OBANA
For backup of failed VPs (Virtual Paths) in ATM (Asynchronous Transfer Mode) networks, many self-healing algorithms have already been proposed. However, since the existing algorithms recover each failed VP with a single backup VP, a problem arises in that those algorithms cannot necessarily provide a failed VP having a higher recovery priority with a larger recovery ratio, which is the ratio of the bandwidth of a backup VP to that of a failed VP. For a solution to the problem, this paper proposes a new self-healing algorithm which recovers each failed VP with one or more backup VPs. We also evaluate its availability by comparing with an existing algorithm through simulations.
Sigit Puspito Wigati JAROT Masao NAKAGAWA
In this paper, a method of Transmission Power Control (TPC) for Orthogonal Frequency Division Multiplexing Direct Sequence Code Division Multiple Access (OFDM-DS-CDMA), in order to compensate for power attenuation at each subcarrier, is proposed. Instead of assigning same power levels for all-subcarriers, different transmission power levels are assigned to different subcarriers, according to the attenuation of the subcarriers. System performance, in terms of Bit Error Rate (BER), has been evaluated by Monte Carlo simulation. The simulation results presented significant improvement, the proposed system performed much better than the system without TPC. It is shown that the Each Carrier TPC performs better than All Carriers TPC, which all carriers are controlled uniformly, hence Each Carrier TPC is more suitable for OFDM-DS-CDMA system.
Seung-Hoon HWANG Dong-Hee KIM Soo-In LEE Keum-Chan WHANG
In this letter, the probability of error performance improvements by rain fade countermeasure techniques is analyzed in a Ka-band geostationary satellite communication system using synchronous CDMA scheme, when power control and macrodiversity are used as rain fade countermeasures. Numerical results show that the composite power control plus macroscopic selection diversity system is better than that of utilizing only one technique as a countermeasure of rain fading.
Young-Hee KIM Jong-Ki NAM Young-Soo SOHN Hong-June PARK Ki-Bong KU Jae-Kyung WEE Joo-Sun CHOI Choon-Sung PARK
A fully on-chip current controlled open-drain output driver using a bandgap reference current generator was designed for high bandwidth DRAMs. It reduces the overhead of receiving a digital code from an external source for the compensation of the temperature and supply voltage variations. The correct value of the current control register is updated at the end of every auto refresh cycle. The operation at the data rate up to 0.8 Gb/s was verified by SPICE simulation using a 0.22 µm triple-well CMOS technology.
Kazutomi MORI Kenichiro CHOUMEI Teruyuki SHIMURA Tadashi TAKAGI Yukio IKEDA Osami ISHIDA
A GSM900/DCS1800 dual-band AlGaAs/GaAs HBT (heterojunction bipolar transistor) MMIC (monolithic microwave integrated circuit) power amplifier has been developed. It includes power amplifiers for GSM900 and DCS1800, constant voltage bias circuits and a d. c. switch. In order to achieve high efficiency, the outside-base/center-via-hole layout is applied to the final-stage HBT of the MMIC amplifier. The layout can realize uniform output load impedance and thermal distribution of each HBT finger. The developed MMIC amplifier could provided output power of 34.5 dBm and power-added efficiency of 53.4% for GSM900, and output power of 32.0 dBm and power-added efficiency of 41.8% for DCS1800.