The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] diff(926hit)

381-400hit(926hit)

  • Global Asymptotic Stability of FAST TCP Network with Heterogeneous Feedback Delays

    Joon-Young CHOI  Kyungmo KOO  Jin Soo LEE  

     
    PAPER-Network

      Vol:
    E93-B No:3
      Page(s):
    571-580

    We consider a single-link multi-source network with FAST TCP sources. We adopt a continuous-time dynamic model for FAST TCP sources, and propose a static model to adequately describe the queuing delay dynamics at the link. The proposed model turns out to have a structure that reveals the time-varying network feedback delay, which allows us to analyze FAST TCP with due consideration of the time-varying network feedback delay. Based on the proposed model, we establish sufficient conditions for the boundedness of congestion window of each source and for the global asymptotic stability. The asymptotic stability condition shows that the stability property of each source is affected by all other sources sharing the link. Simulation results illustrate the validity of the sufficient condition for the global asymptotic stability.

  • Noncoherent Maximum Likelihood Detection for Differential Spatial Multiplexing MIMO Systems

    Ziyan JIA  Katsunobu YOSHII  Shiro HANDA  Fumihito SASAMORI  Shinjiro OSHITA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    361-368

    In this paper, we propose a novel noncoherent maximum likelihood detection (NMLD) method for differential spatial multiplexing (SM) multiple-input multiple-output (MIMO) systems. Unlike the conventional maximum likelihood detection (MLD) method which needs the knowledge of channel state information (CSI) at the receiver, NMLD method has no need of CSI at either the transmitter or receiver. After repartitioning the observation block of multiple-symbol differential detection (MSDD) and following a decision feedback process, the decision metric of NMLD is derived by reforming that of MSDD. Since the maximum Doppler frequency and noise power are included in the derived decision metric, estimations of both maximum Doppler frequency and noise power are needed at the receiver for NMLD. A fast calculation algorithm (FCA) is applied to reduce the computational complexity of NMLD. The feasibility of the proposed NMLD is demonstrated by computer simulations in both slow and fast fading environments. Simulation results show that the proposed NMLD has good bit error rate (BER) performance, approaching that of the conventional coherent MLD with the extension of reference symbols interval. It is also proved that the BER performance is not sensitive to the estimation errors in maximum Doppler frequency and noise power.

  • A 0.9-V 12-bit 40-MSPS Pipeline ADC for Wireless Receivers

    Tomohiko ITO  Tetsuro ITAKURA  

     
    PAPER

      Vol:
    E93-A No:2
      Page(s):
    395-401

    A 0.9-V 12-bit 40-MSPS pipeline ADC with I/Q amplifier sharing technique is presented for wireless receivers. To achieve high linearity even at 0.9-V supply, the clock signals to sampling switches are boosted over 0.9 V in conversion stages. The clock-boosting circuit for lifting these clocks is shared between I-ch ADC and Q-ch ADC, reducing the area penalty. Low supply voltage narrows the available output range of the operational amplifier. A pseudo-differential (PD) amplifier with two-gain-stage common-mode feedback (CMFB) is proposed in views of its wide output range and power efficiency. This ADC is fabricated in 90-nm CMOS technology. At 40 MS/s, the measured SNDR is 59.3 dB and the corresponding effective number of bits (ENOB) is 9.6. Until Nyquist frequency, the ENOB is kept over 9.3. The ADC dissipates 17.3 mW/ch, whose performances are suitable for ADCs for mobile wireless systems such as WLAN/WiMAX.

  • Quasi-Static FDTD Method for Dosimetry in Human due to Contact Current

    Akimasa HIRATA  Yukinori TAKANO  Toshihiro NAGAI  

     
    PAPER

      Vol:
    E93-C No:1
      Page(s):
    60-65

    The present study proposes a quasi-static finite-difference time-domain (FDTD) method for dosimetry in humans due to contact current at low frequencies (10 kHz). Our attention focused on wave sources which can reduce computational time. The computational time was found to be reduced using a voltage source of a step function with smooth start. The computational time required for the proposed method was smaller than a quasi-static FDTD method proposed in a previous study. Comparison between our computational results and those in a previous study suggested the effectiveness of our proposal. The difference in in-situ electric field due to different human models was a factor of 2 or so.

  • Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks

    Yukiyasu TSUNOO  Teruo SAITO  Maki SHIGERI  Takeshi KAWABATA  

     
    PAPER-Cryptanalysis

      Vol:
    E93-A No:1
      Page(s):
    144-152

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 254.1 and a computational complexity of 2120.8, which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.

  • Secure Bit-Plane Based Steganography for Secret Communication

    Cong-Nguyen BUI  Hae-Yeoun LEE  Jeong-Chun JOO  Heung-Kyu LEE  

     
    PAPER-Application Information Security

      Vol:
    E93-D No:1
      Page(s):
    79-86

    A secure method for steganography is proposed. Pixel-value differencing (PVD) steganography and bit-plane complexity segmentation (BPCS) steganography have the weakness of generating blocky effects and noise in smooth areas and being detectable with steganalysis. To overcome these weaknesses, a secure bit-plane based steganography method on the spatial domain is presented, which uses a robust measure to select noisy blocks for embedding messages. A matrix embedding technique is also applied to reduce the change of cover images. Given that the statistical property of cover images is well preserved in stego-images, the proposed method is undetectable by steganalysis that uses RS analysis or histogram-based analysis. The proposed method is compared with the PVD and BPCS steganography methods. Experimental results confirm that the proposed method is secure against potential attacks.

  • The Vector Decomposition Problem

    Maki YOSHIDA  Shigeo MITSUNARI  Toru FUJIWARA  

     
    PAPER-Mathematics

      Vol:
    E93-A No:1
      Page(s):
    188-193

    This paper introduces a new computational problem on a two-dimensional vector space, called the vector decomposition problem (VDP), which is mainly defined for designing cryptosystems using pairings on elliptic curves. We first show a relation between the VDP and the computational Diffie-Hellman problem (CDH). Specifically, we present a sufficient condition for the VDP on a two-dimensional vector space to be at least as hard as the CDH on a one-dimensional subspace. We also present a sufficient condition for the VDP with a fixed basis to have a trapdoor. We then give an example of vector spaces which satisfy both sufficient conditions and on which the CDH is assumed to be hard in previous work. In this sense, the intractability of the VDP is a reasonable assumption as that of the CDH.

  • On Patarin's Attack against the IC Scheme

    Naoki OGURA  Shigenori UCHIYAMA  

     
    PAPER-Public Key Cryptography

      Vol:
    E93-A No:1
      Page(s):
    34-41

    In 2007, Ding et al. proposed an attractive scheme, which is called the -Invertible Cycles (IC) scheme. IC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against IC using Grobner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the IC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the IC- scheme. Moreover, we show some experimental results of a practical attack against the IC/IC- schemes. This is the first implementation of both our proposed attack and an attack based on Grobner basis algorithm for the even case, that is, a parameter is even.

  • Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    Junko TAKAHASHI  Toshinori FUKUNAGA  

     
    PAPER-Cryptanalysis

      Vol:
    E93-A No:1
      Page(s):
    136-143

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  • Multiple-Symbol Differential Detection for Unitary Space-Time-Frequency Coding

    Ziyan JIA  Shiro HANDA  Fumihito SASAMORI  Shinjiro OSHITA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:1
      Page(s):
    90-98

    In this paper, multiple-symbol differential detection (MSDD) is applied to the differential unitary space-time-frequency coding (DUSTFC) scheme over frequency selective fading multiple-input multiple-output (MIMO) channels. The motivation of applying MSDD is to compensate for the performance loss of conventional (two-symbol observation) differential detection comparing with coherent detection, by extending the observation interval and considering the fading autocorrelations. Since the differential coding of DUSTFC can be performed in time or frequency domain, both the time-domain and frequency-domain MSDD are investigated. After calculating the frequency-domain fading autocorrelation, the decision metrics of MSDD considering appropriate fading autocorrelations are derived in time and frequency domain respectively. Bit error rate (BER) performances of the two kinds of MSDD are analyzed by computer simulations. Simulation results demonstrate that a considerable performance gain can be got by applying MSDD in both cases, and the transmit diversity gain can also be enhanced by applying MSDD. So that it is proved that full advantage of transmit diversity with DUSTFC can be taken by applying MSDD.

  • An Instantaneous Frequency Estimator Based on the Symmetric Higher Order Differential Energy Operator

    Byeong-Gwan IEM  

     
    PAPER-Digital Signal Processing

      Vol:
    E93-A No:1
      Page(s):
    227-232

    A generalized formulation of the instantaneous frequency based on the symmetric higher order differential energy operator is proposed. The motivation for the formulation is that there is some frequency misalignment in time when the ordinary higher order differential energy operator is used for the instantaneous frequency estimator. The special cases of the generalized formulation are also presented. The proposed instantaneous frequency estimators are compared with existing methods in terms of error performance measured in the mean absolute error. In terms of the estimation error performance, the third order instantaneous frequency estimator with the symmetrical structure shows the best result under noise free condition. Under noisy situation, the fourth order instantaneous frequency estimator with the symmetrical structure produces the best results. Application examples are provided to show the usefulness of the estimator.

  • General Impossible Differential Attack on 7-Round AES

    Meiling ZHANG  Weiguo ZHANG  Jingmei LIU  Xinmei WANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:1
      Page(s):
    327-330

    Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α,β). And a trade-off relation between the number of plaintexts and times of encryptions in the process of the attack is derived, which makes only some values of (α,β) allowed in the attack for different key length.

  • A Digital Differential Transmitter with Pseudo-LVDS Output Driver and Digital Mismatch Calibration

    Jun-Hyun BAE  Sang-Hune PARK  Jae-Yoon SIM  Hong-June PARK  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E93-C No:1
      Page(s):
    132-135

    A digital 3 Gbps 0.2 V differential transmitter is proposed using a voltage-mode pseudo-LVDS output driver. The delay mismatch between two pre-drivers is digitally calibrated by a modified digital DLL with the duty cycle correction. The height and width of eye opening are improved by 103% and 46%, respectively. The power consumption is 11.4 mW at 1.2 V with 0.18 µm process.

  • TE Plane Wave Scattering and Diffraction from a Periodic Surface with Semi-infinite Extent

    Yasuhiko TAMURA  

     
    PAPER

      Vol:
    E93-C No:1
      Page(s):
    9-16

    This paper studies scattering and diffraction of a TE plane wave from a periodic surface with semi-infinite extent. By use of a combination of the Wiener-Hopf technique and a perturbation method, a concrete representation of the wavefield is explicitly obtained in terms of a sum of two types of Fourier integrals. It is then found that effects of surface roughness mainly appear on the illuminated side, but weakly on the shadow side. Moreover, ripples on the angular distribution of the first-order scattering in the shadow side are newly found as interference between a cylindrical wave radiated from the edge and an inhomogeneous plane wave supported by the periodic surface.

  • A Modified Variable Error-Data Normalized Step-Size LMS Adaptive Filter Algorithm

    Chee-Hyun PARK  Kwang-Seok HONG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E92-B No:12
      Page(s):
    3903-3906

    This letter proposes a new adaptive filtering method that uses the last L desired signal samples as an extra input vector, besides the existing input data, to reduce mean square error. We have improved the convergence rate by adopting the squared norm of the past error samples, in addition to the modified cost function. The modified variable error-data normalized step-size least mean square algorithm provides fast convergence, ensuring a small final misadjustment. Simulation results indicate its superior mean square error performance, while its convergence rate equals that of existing methods. In addition, the proposed algorithm shows superior tracking capability when the system is subjected to an abrupt disturbance.

  • Performance Analysis of Control Signal Transmission Technique for Cognitive Radios in Dynamic Spectrum Access Networks

    Ren SAKATA  Tazuko TOMIOKA  Takahiro KOBAYASHI  

     
    PAPER-Spectrum Allocation

      Vol:
    E92-B No:12
      Page(s):
    3597-3605

    When cognitive radio (CR) systems dynamically use the frequency band, a control signal is necessary to indicate which carrier frequencies are currently available in the network. In order to keep efficient spectrum utilization, this control signal also should be transmitted based on the channel conditions. If transmitters dynamically select carrier frequencies, receivers have to receive control signals without knowledge of their carrier frequencies. To enable such transmission and reception, this paper proposes a novel scheme called DCPT (Differential Code Parallel Transmission). With DCPT, receivers can receive low-rate information with no knowledge of the carrier frequencies. The transmitter transmits two signals whose carrier frequencies are spaced by a predefined value. The absolute values of the carrier frequencies can be varied. When the receiver acquires the DCPT signal, it multiplies the signal by a frequency-shifted version of the signal; this yields a DC component that represents the data signal which is then demodulated. The performance was evaluated by means of numerical analysis and computer simulation. We confirmed that DCPT operates successfully even under severe interference if its parameters are appropriately configured.

  • Filter Size Determination of Moving Average Filters for Extended Differential Detection of OFDM Preambles

    Minjoong RIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:12
      Page(s):
    3953-3956

    OFDM (Orthogonal Frequency Division Multiplexing) is widely used in wideband wireless communication systems due to its excellent performance. One of the most important operations in OFDM receivers is preamble detection. This paper addresses a general form of extended differential detection methods, which is a combination of differential detection and a moving average filter. This paper also presents a filter size determination method that achieves satisfactory performance in various channel environments.

  • Squared Range Weighted Least Squares Source Localization Based on the Element-Wise and Vector-Wise Orthogonality Principles

    Chee-Hyun PARK  Kwang-Seok HONG  

     
    LETTER-Sensing

      Vol:
    E92-B No:12
      Page(s):
    3972-3975

    Estimating a location of mobile phones or sound source is of considerable interest in wireless communications and signal processing. In this letter, we propose squared range weighted least squares (SRWLS) using the range estimate attained from the Taylor series-based maximum likelihood. The weight can be determined more accurately when using the proposed method, compared with the existing methods using the variance of noise. The simulation results show that the proposed method is superior to the existing methods in RMSE as the measurement noise amount of sensors increases.

  • Characterization of Liquid Crystal Alignment on Rubbed Polyimide Film by Grazing-Incidence X-Ray Diffraction Open Access

    Tomoyuki KOGANEZAWA  Ichiro HIROSAWA  Hidenori ISHII  Takahiro SAKAI  

     
    INVITED PAPER

      Vol:
    E92-C No:11
      Page(s):
    1371-1375

    We developed a new method for characterizing molecular distribution in very thin liquid crystal layer (5-40 nm) evaporated onto rubbed polyimide film used by grazing-incidence X-ray diffraction (GIXD). The diffraction peaks corresponding to intermolecular correlation perpendicular to longitudinal axis of liquid crystal molecule and the clear anisotropic distribution of liquid crystal molecules in a thin layer were successfully observed. We found that in the vicinity of the alignment film, the intermolecular spacing correlation perpendicular to longitudinal axis of the 5CB molecule was expanded by the alignment film, and that the ordering of the 5CB was not so high. As the distance from the alignment film the spacing came close to the intrinsic intermolecular spacing.

  • Effects of Address-on-Time on Wall Voltage Variation during Address-Period in AC Plasma Display Panel

    Byung-Tae CHOI  Hyung Dal PARK  Heung-Sik TAE  

     
    PAPER

      Vol:
    E92-C No:11
      Page(s):
    1347-1352

    To explain the variation of the address discharge during an address period, the wall voltage variation during an address period was investigated as a function of the address-on-time by using the Vt closed curves. It was observed that the wall voltage between the scan and address electrodes was decreased with an increase in the address-on-time. It was also observed that the wall voltage variation during an address period strongly depended on the voltage difference between the scan and address electrodes. Based on this result, the modified driving waveform to raise the level of Vscanw, was proposed to minimize the voltage difference between the scan and address electrodes. However, the modified driving waveform resulted in the increase in the falling time of scan pulse. Finally, the overlapped double scan waveform was proposed to reduce a falling time of scan pulse under the raised voltage level of Vscanw, also.

381-400hit(926hit)