The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] bound(451hit)

141-160hit(451hit)

  • High-Tc Superconducting Electronic Devices Based on YBCO Step-Edge Grain Boundary Junctions Open Access

    Shane T. KEENAN  Jia DU  Emma E. MITCHELL  Simon K. H. LAM  John C. MACFARLANE  Chris J. LEWIS  Keith E. LESLIE  Cathy P. FOLEY  

     
    INVITED PAPER

      Vol:
    E96-C No:3
      Page(s):
    298-306

    We outline a number of high temperature superconducting Josephson junction-based devices including superconducting quantum interference devices (SQUIDs) developed for a wide range of applications including geophysical exploration, magnetic anomaly detection, terahertz (THz) imaging and microwave communications. All these devices are based on our patented technology for fabricating YBCO step-edge junction on MgO substrates. A key feature to the successful application of devices based on this technology is good stability, long term reliability, low noise and inherent flexibility of locating junctions anywhere on a substrate.

  • Unilateral Distance Bounding Protocol with Bidirectional Challenges

    Myung-Ho PARK  Ki-Gon NAM  Jin Seok KIM  Dae Hyun YUM  Pil Joong LEE  

     
    LETTER-Information Network

      Vol:
    E96-D No:1
      Page(s):
    134-137

    A distance bounding protocol provides an upper bound on the distance between communicating parties by measuring the round-trip time between challenges and responses. It is an effective countermeasure against mafia fraud attacks (a.k.a. relay attacks). The adversary success probability of previous distance bounding protocols without a final confirmation message such as digital signature or message authentication code is at least . We propose a unilateral distance bounding protocol without a final confirmation message, which reduces the adversary success probability to .

  • A Study on the Effective Boundary Condition for Periodic Surfaces with Perfect Conductivity

    Yasuhiko TAMURA  

     
    PAPER-Periodic Structures

      Vol:
    E96-C No:1
      Page(s):
    11-18

    This paper deals with a characteristic of the so-called effective boundary condition for a plane wave scattering from periodic surfaces with perfect conductivity. The perturbation solution with all orders is explicitly given under the effective boundary condition. It is newly found that such a perturbation solution satisfies the optical theorem under the exact boundary condition. A comparison between such a perturbation solution and a reference solution for the exact boundary condition by other methods is performed. Then, the validity of such a perturbation solution is concretely discussed.

  • A Long Range Dependent Internet Traffic Model Using Unbounded Johnson Distribution

    Sunggon KIM  Seung Yeob NAM  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E96-B No:1
      Page(s):
    301-304

    It is important to characterize the distributional property and the long-range dependency of traffic arrival processes in modeling Internet traffic. To address this problem, we propose a long-range dependent traffic model using the unbounded Johnson distribution. Using the proposed model, a sequence of traffic rates with the desired four quantiles and Hurst parameter can be generated. Numerical studies show how well the sequence of traffic rates generated by the proposed model mimics that of the real traffic rates using a publicly available Internet traffic trace.

  • Boundary Element Analysis of Beam Dynamics in Streak Camera Considering Space Charge Effects

    Hideki KAWAGUCHI  Kazunori MAEDA  Shohei KODATE  Yoshihiro ITO  

     
    PAPER-Numerical Techniques

      Vol:
    E96-C No:1
      Page(s):
    28-34

    Streak cameras are now widely used for measurements of ultra short phenomena, such as those in semi conductor luminescence and plasma gaseous discharge. To further improve the temporal resolution and carry out higher-dimensional measurements, it is necessary to understand the electron beam behavior in detail. Thus, numerical simulations play an important role in the analysis of the streak camera. The authors have been working on the development of a numerical simulation code that uses the finite difference method (FDM) for electric field analysis, the Runge-Kutta (R-K) method for charged particle motion determination, and the particle-in-cell (PIC) method for charge density calculation. However, the use of the PIC method leads to inaccuracy in the charge density calculation in cases of high-density electron beams. To improve the accuracy of the conventional analysis of the streak camera, we perform the boundary element (BE) analysis of the streak camera.

  • FDTD Analysis with Overset Grid Generation Method for Rotating Body and Evaluation of Its Accuracy

    Shafrida SAHRANI  Michiko KURODA  

     
    PAPER-Numerical Techniques

      Vol:
    E96-C No:1
      Page(s):
    35-41

    This paper presents an alternative approach for the analysis of EM field by a rotating body with FDTD method and Overset Grid Generation method, considering Lorentz transformation for the higher velocity cases. This approach has been previously proposed for the case of linear and uniformly moving body against/to the incident wave. Here, the approach is expanded to a rotating body which includes the interpolation technique in the space and time increment along the cylindrical rotation at the fixed axis. First, the grid size ratios between the main mesh and the sub-mesh are studied. The appropriate choice of the grid size ratio is obtained. Then, the modulations of the EM field when the incident wave hits the rotating body in high velocity cases are analyzed. The relationship of the phase shift and the velocity is further observed. The observed EM fields are compared with the theoretical results and achieved good agreements in high relative velocities. The assessment of the numerical errors in a rotating environment is also highlighted. This numerical approach may have numerous situations to which it can be applied. This may be involved with the design of rotating devices such as microactuator, commutator and others.

  • Construction of Independent Set and Its Application for Designed Minimum Distance

    Junru ZHENG  Takayasu KAIDA  

     
    PAPER-Coding Theory

      Vol:
    E95-A No:12
      Page(s):
    2107-2112

    The shift bound is a good lower bound of the minimum distance for cyclic codes, Reed-Muller codes and geometric Goppa codes. It is necessary to construct the maximum value of the independent set. However, its computational complexity is very large. In this paper, we consider cyclic codes defined by their defining set, and a new method to calculate the lower bound of the minimum distance using the discrete Fourier transform (DFT) is shown. The computational complexity of this method is compared with the shift bound's one. Moreover construction of independent set is shown.

  • Implementation of a GPU-Oriented Absorbing Boundary Condition for 3D-FDTD Electromagnetic Simulation

    Keisuke DOHI  Yuichiro SHIBATA  Kiyoshi OGURI  Takafumi FUJIMOTO  

     
    PAPER-Parallel and Distributed Computing

      Vol:
    E95-D No:12
      Page(s):
    2787-2795

    In this paper, we propose and discuss efficient GPU implementation techniques of absorbing boundary conditions (ABCs) for a 3D finite-difference time-domain (FDTD) electromagnetic field simulation for antenna design. In view of architectural nature of GPUs, the idea of a periodic boundary condition is introduced to implementation of perfect matched layers (PMLs) as well as a transformation technique of PML equations for partial boundaries. We also present efficient implementation method of a non-uniform grid. The evaluation results with a typical simulation model reveal that our proposed technique almost double the simulation performance and eventually achieve the 55.8% of the peak memory bandwidth of a target GPU.

  • New Classes of Optimal Low Hit Zone Frequency Hopping Sequences with New Parameters by Interleaving Technique

    Xianhua NIU  Daiyuan PENG  Zhengchun ZHOU  

     
    PAPER-Sequences

      Vol:
    E95-A No:11
      Page(s):
    1835-1842

    In this paper, new design of optimal frequency hopping sequences (FHSs) with low hit zone (LHZ) with respect to the Peng-Fan-Lee bound is presented based on interleaving techniques. By the new design, new classes of optimal LHZ FHS sets with large family size are obtained. It is shown that all the sequences in the proposed FHS sets are shift distinct. The proposed FHS sets are suitable for quasi-synchronous time/frequency hopping code division multiple access systems to eliminate multiple-access interference.

  • Study on Surface Characteristic of the Copper Nitride Films by Absorbed Oxygen Open Access

    Musun KWAK  Jongho JEON  Kyoungri KIM  Yoonseon YI  Sangjin AN  Donsik CHOI  Youngseok CHOI  Kyongdeuk JEONG  

     
    INVITED PAPER

      Vol:
    E95-C No:11
      Page(s):
    1744-1748

    The copper nitride surface characteristics according to atmospheric pressure plasma (APP) and excimer ultraviolet (EUV) treatment were compared using XPS and AFM. As the result of XPS analysis result, in C1s, the organic material removal effect was greater for EUV treatment than for APP, and the oxygen content was found to be low. In Cu (933 eV) area, the shoulder peak of Cu compound was detected, and the reduction was greater for EUV processing than for APP. In the AFM phase image which could be analyzed using the superficial viscoelasticity, the same trend was observed. On the copper nitride surface, the weak boundary O layer is formed according to the clean processing, and such phenomenon was interpreted as a factor for lowering the affinity with polymer.

  • Accurate 3-Dimensional Imaging Method Based on Extended RPM for Rotating Target Model

    Shouhei KIDERA  Hiroyuki YAMADA  Tetsuo KIRIMOTO  

     
    PAPER-Sensing

      Vol:
    E95-B No:10
      Page(s):
    3279-3289

    Three-dimensional (3-D) reconstruction techniques employed by airborne radars are essential for object recognition in scenarios where optically vision is blurry, and are required for the monitoring of disasters and coast-guard patrols. There have been reports on 3-D reconstruction methods that exploit the layover appearing in inverse synthetic aperture radar (ISAR) imagery, which are suitable for the recognition of artificial targets such as buildings, aircraft or ships. However, existing methods assume only a point target or the aggregate of point targets, and most require the tracking of the multiple points over sequential ISAR images. In the case of a solid object with a continuous boundary, such as a wire or polyhedral structure, the positioning accuracy of such methods is severely degraded owing to scattering centers continuously shifting on the target surface with changes in the rotation angle. To overcome this difficulty, this paper extends the original Range Points Migration (RPM) method to the ISAR observation model, where a double mono-static model with two transmitting and receiving antennas is introduced to suppress cross-range ambiguity. The results of numerical simulation and experimental validation demonstrate that the extended RPM method has a distinct advantage for accurate 3-D imaging, even for non-point targets.

  • Opportunistic Cooperative Positioning in OFDMA Systems

    Ziming HE  Yi MA  Rahim TAFAZOLLI  

     
    LETTER-Information Theory

      Vol:
    E95-A No:9
      Page(s):
    1642-1645

    This letter presents a novel opportunistic cooperative positioning approach for orthogonal frequency-division multiple access (OFDMA) systems. The basic idea is to allow idle mobile terminals (MTs) opportunistically estimating the arrival timing of the training sequences for uplink synchronization from active MTs. The major advantage of the proposed approach over state-of-the-arts is that the positioning-related measurements among MTs are performed without the paid of training overhead. Moreover, Cramer-Rao lower bound (CRLB) is utilized to derive the positioning accuracy limit of the proposed approach, and the numerical results show that the proposed approach can improve the accuracy of non-cooperative approaches with the a-priori stochastic knowledge of clock bias among idle MTs.

  • Known-Key Attacks on Generalized Feistel Schemes with SP Round Function

    HyungChul KANG  Deukjo HONG  Dukjae MOON  Daesung KWON  Jaechul SUNG  Seokhie HONG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:9
      Page(s):
    1550-1560

    We present attacks on the generalized Feistel schemes, where each round function consists of a subkey XOR, S-boxes, and then a linear transformation (i.e. a Substitution-Permutation (SP) round function). Our techniques are based on rebound attacks. We assume that the S-boxes have a good differential property and the linear transformation has an optimal branch number. Under this assumption, we firstly describe known-key distinguishers on the type-1, -2, and -3 generalized Feistel schemes up to 21, 13 and 8 rounds, respectively. Then, we use the distinguishers to make several attacks on hash functions where Merkle-Damgård domain extender is used and the compression function is constructed with Matyas-Meyer-Oseas or Miyaguchi-Preneel hash modes from generalized Feistel schemes. Collision attacks are made for 11 rounds of type-1 Feistel scheme. Near collision attacks are made for 13 rounds of type-1 Feistel scheme and 9 rounds of type-2 Feistel scheme. Half collision attacks are made for 15 rounds of type-1 Feistel scheme, 9 rounds of type-2 Feistel scheme, and 5 rounds of type-3 Feistel scheme.

  • Swift Communication Range Recognition Method for Quick and Accurate Position Estimation of Passive RFID Tags

    Manato FUJIMOTO  Tomotaka WADA  Atsuki INADA  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Measurement Technology

      Vol:
    E95-A No:9
      Page(s):
    1596-1605

    Radio frequency identification (RFID) system has gained attention as a new identification source that achieves a ubiquitous environment. Each RFID tag has a unique ID and is attached to an object. A user reads the unique ID of an RFID tag by using RFID readers and obtains the information on the object. One of the important technologies that use the RFID systems is the position estimation of RFID tags. Position estimation means estimating the location of the object with the RFID tag. Acquiring the location information of the RFID tag can be very useful. If a user can know the position of the RFID tag, the position estimation can be applied to a navigation system for walkers. In this paper, we propose a new position estimation method named Swift Communication Range Recognition (S-CRR) as an extended improvement on previous CRR that shortens the estimation delay. In this method, the position of an RFID tag is estimated by selecting the communication area model that corresponds to its boundary angles. We evaluated its performance by experiments and simulations of the RFID system. As the results, we found that S-CRR can estimate the position of an RFID tag comparatively accurately and quickly.

  • All-Optical Monitoring Path Computation Using Lower Bounds of Required Number of Paths

    Nagao OGINO  Hajime NAKAMURA  

     
    PAPER-Network

      Vol:
    E95-B No:8
      Page(s):
    2576-2585

    To reduce the cost of fault management in all-optical networks, it is a promising approach to detect the degradation of optical signal quality solely at the terminal points of all-optical monitoring paths. The all-optical monitoring paths must be routed so that all single-link failures can be localized using route information of monitoring paths where signal quality degradation is detected. However, route computation for the all-optical monitoring paths that satisfy the above condition is time consuming. This paper proposes a procedure for deriving the lower bounds of the required number of monitoring paths to localize all single-link failures, and proposes an efficient monitoring path computation method based on the derived lower bounds. The proposed method repeats the route computation for the monitoring paths until feasible routes can be found, while the assumed number of monitoring paths increases, starting from the lower bounds. With the proposed method, the minimum number of monitoring paths with the overall shortest routes can be obtained quickly by solving several small-scale integer linear programming problems when the possible terminal nodes of monitoring paths are arbitrarily given. Thus, the proposed method can minimize the required number of monitors for detecting the degradation of signal quality and the total overhead traffic volume transferred through the monitoring paths.

  • Automated Adaptor Generation for Behavioral Mismatching Services Based on Pushdown Model Checking

    Hsin-Hung LIN  Toshiaki AOKI  Takuya KATAYAMA  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E95-D No:7
      Page(s):
    1882-1893

    In this paper, we introduce an approach of service adaptation for behavior mismatching services using pushdown model checking. This approach uses pushdown systems as model of adaptors so that capturing non-regular behavior in service interactions is possible. Also, the use of pushdown model checking integrates adaptation and verification. This guarantees that an adaptor generated by our approach not only solves behavior mismatches but also satisfies usual verification properties if specified. Unlike conventional approaches, we do not count on specifications of adaptor contracts but take only information from behavior interfaces of services and perform fully automated adaptor generation. Three requirements relating to behavior mismatches, unbounded messages, and branchings are retrieved from behavior interfaces and used to build LTL properties for pushdown model checking. Properties for unbounded messages, i.e., messages sent and received arbitrary multiple times, are especially addressed since it characterizes non-regular behavior in service composition. This paper also shows some experimental results from a prototype tool and provides directions for building BPEL adaptors from behavior interface of generated adaptor. The results show that our approach does solve behavior mismatches and successfully capture non-regular behavior in service composition under the scale of real service applications.

  • Real-Time Counting People in Crowded Areas by Using Local Empirical Templates and Density Ratios

    Dao-Huu HUNG  Gee-Sern HSU  Sheng-Luen CHUNG  Hideo SAITO  

     
    PAPER-Recognition

      Vol:
    E95-D No:7
      Page(s):
    1791-1803

    In this paper, a fast and automated method of counting pedestrians in crowded areas is proposed along with three contributions. We firstly propose Local Empirical Templates (LET), which are able to outline the foregrounds, typically made by single pedestrians in a scene. LET are extracted by clustering foregrounds of single pedestrians with similar features in silhouettes. This process is done automatically for unknown scenes. Secondly, comparing the size of group foreground made by a group of pedestrians to that of appropriate LET captured in the same image patch with the group foreground produces the density ratio. Because of the local scale normalization between sizes, the density ratio appears to have a bound closely related to the number of pedestrians who induce the group foreground. Finally, to extract the bounds of density ratios for groups of different number of pedestrians, we propose a 3D human models based simulation in which camera viewpoints and pedestrians' proximity are easily manipulated. We collect hundreds of typical occluded-people patterns with distinct degrees of human proximity and under a variety of camera viewpoints. Distributions of density ratios with respect to the number of pedestrians are built based on the computed density ratios of these patterns for extracting density ratio bounds. The simulation is performed in the offline learning phase to extract the bounds from the distributions, which are used to count pedestrians in online settings. We reveal that the bounds seem to be invariant to camera viewpoints and humans' proximity. The performance of our proposed method is evaluated with our collected videos and PETS 2009's datasets. For our collected videos with the resolution of 320 × 240, our method runs in real-time with good accuracy and frame rate of around 30 fps, and consumes a small amount of computing resources. For PETS 2009's datasets, our proposed method achieves competitive results with other methods tested on the same datasets [1],[2].

  • Training Convergence in Range-Based Cooperative Positioning with Stochastic Positional Knowledge

    Ziming HE  Yi MA  Rahim TAFAZOLLI  

     
    LETTER-Information Theory

      Vol:
    E95-A No:7
      Page(s):
    1200-1204

    This letter investigates the training convergence in range-based cooperative positioning with stochastic positional knowledge. Firstly, a closed-form of squared position-error bound (SPEB) is derived with error-free ranging. Using the derived closed-form, it is proved that the SPEB reaches its minimum when at least 2 out of N (> 2) agents send training sequences. Finally, numerical results are provided to elaborate the theoretical analysis with zero-mean Gaussian ranging errors.

  • Performance Analysis of Lateral Velocity Estimation Based on Fractional Fourier Transform

    Yechao BAI  Xinggan ZHANG  Lan TANG  Yao WEI  

     
    LETTER-Sensing

      Vol:
    E95-B No:6
      Page(s):
    2174-2178

    The lateral velocity is of importance in cases like target identification and traffic management. Conventional Doppler methods are not capable of measuring lateral velocities since they quantify only the radial component. Based on the spectrogram characteristic of laterally moving targets, an algorithm based on fractional Fourier transform has been studied in the signal processing literature. The algorithm searches the peak position of the transformation, and calculates the lateral velocity from the peak position. The performance analysis of this algorithm is carried out in this paper, which shows that this algorithm approaches Cramer-Rao bound with reasonable computational complexity. Simulations are conducted at last to compare the analytical performance and the experimental result.

  • Waveform Optimization for MIMO Radar Based on Cramer-Rao Bound in the Presence of Clutter

    Hongyan WANG  Guisheng LIAO  Jun LI  Liangbing HU  Wangmei GUO  

     
    PAPER-Sensing

      Vol:
    E95-B No:6
      Page(s):
    2087-2094

    In this paper, we consider the problem of waveform optimization for multi-input multi-output (MIMO) radar in the presence of signal-dependent noise. A novel diagonal loading (DL) based method is proposed to optimize the waveform covariance matrix (WCM) for minimizing the Cramer-Rao bound (CRB) which improves the performance of parameter estimation. The resulting nonlinear optimization problem is solved by resorting to a convex relaxation that belongs to the semidefinite programming (SDP) class. An optimal solution to the initial problem is then constructed through a suitable approximation to an optimal solution of the relaxed one (in a least squares (LS) sense). Numerical results show that the performance of parameter estimation can be improved considerably by the proposed method compared to uncorrelated waveforms.

141-160hit(451hit)