The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] diff(926hit)

461-480hit(926hit)

  • Highly Reliable Multiple-Valued Current-Mode Comparator Based on Active-Load Dual-Rail Operation

    Masatomo MIURA  Takahiro HANYU  

     
    PAPER

      Vol:
    E91-C No:4
      Page(s):
    589-594

    In this paper, a multiple-valued current-mode (MVCM) circuit based on active-load dual-rail differential logic is proposed for a high-performance arithmetic VLSI system with crosstalk-noise immunity. The use of dual-rail complementary differential-pair circuits (DPCs), whose outputs are summed up by wiring makes it possible to reduce the common-mode noise, and yet enhance the switching speed. By using the diode-connected cross-coupled PMOS active loads, the rapid transition of switching in the DPC is relaxed appropriately, which can also eliminate spiked input noise. It is demonstrated that the noise reduction ratio and the switching delay of the proposed MVCM circuit in a 90 nm CMOS technology is superior to those of the corresponding ordinary implementation.

  • A Fuzzy Method for Medical Diagnosis of Headache

    Jeong-Yong AHN  Kill-Sung MUN  Young-Hyun KIM  Sun-Young OH  Beom-Soo HAN  

     
    LETTER-Biological Engineering

      Vol:
    E91-D No:4
      Page(s):
    1215-1217

    In this note we propose a fuzzy diagnosis of headache. The method is based on the relations between symptoms and diseases. For this purpose, we suggest a new diagnosis measure using the occurrence information of patient's symptoms and develop an improved interview chart with fuzzy degrees assigned according to the relation among symptoms and three labels of headache. The proposed method is illustrated by two examples.

  • Boundary Conditions for Numerical Stability Analysis of Periodic Solutions of Ordinary Differential Equations

    Sunao MURASHIGE  

     
    PAPER-Nonlinear Problems

      Vol:
    E91-A No:4
      Page(s):
    1162-1168

    This paper considers numerical methods for stability analyses of periodic solutions of ordinary differential equations. Stability of a periodic solution can be determined by the corresponding monodromy matrix and its eigenvalues. Some commonly used numerical methods can produce inaccurate results of them in some cases, for example, near bifurcation points or when one of the eigenvalues is very large or very small. This work proposes a numerical method using a periodic boundary condition for vector fields, which preserves a critical property of the monodromy matrix. Numerical examples demonstrate effectiveness and a drawback of this method.

  • MIMO System with Relative Phase Difference Time-Shift Modulation for Rician Fading Environment

    Kenichi KOBAYASHI  Takao SOMEYA  Tomoaki OHTSUKI  Sigit P.W. JAROT  Tsuyoshi KASHIMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:2
      Page(s):
    459-465

    Multiple-Input Multiple-Output (MIMO) systems that realize high-speed data transmission with multiple antennas at both transmitter and receiver are drawing much attention. In line-of sight (LOS) environments, the performance of MIMO systems depends largely on the difference of the phase difference of direct paths from transmit antennas to each receive antenna. When the phase difference of direct paths are close to each other, the spatial division multiplexing (SDM) channels are not orthogonal to each other so signal detection becomes difficult. In this paper, we propose a MIMO system with relative phase difference time-shift modulation (RPDTM) in Rician fading environments. The proposed scheme transmits independent signals from each antenna at each time slot where the relative phase difference between signal constellations used by transmit antennas varies in a pre-determined pattern. This transmission virtually changes the phase difference of direct paths from transmit antennas to each receive antenna without lowering data rate and without knowledge of the channels. In addition, forward error correction coding (ECC) is applied to exploit the time slots where the receiver can detect the signals easily to improve the detection performance. If there are time slots where the receiver can separate the received signal, the receiver can decode the data by using the time slots and the correlation between data. From the results of computer simulation, we show that MIMO system with RPDTM can achieve the better bit error rate (BER) than the conventional MIMO system. We also show that the MIMO system with RPDTM is effective by about Rician factor K = 10 dB.

  • A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6

    Jaeduck CHOI  Souhwan JUNG  

     
    LETTER-Network

      Vol:
    E91-B No:2
      Page(s):
    605-608

    This letter proposes a secure and efficient handover authentication scheme that requires a light-weight Diffie-Hellman operation at mobile nodes. Our scheme provides more enhanced securities like the PFS, PBS, and so on than the existing security-context-transfer schemes. Also, the mobile node delegates the exponent operation for the DH to the access router to reduce computational cost on it.

  • Prevention of Information Leakage by Photo-Coupling in Smart Card

    Sung-Shiou SHEN  Jung-Hui CHIU  

     
    PAPER-Side Channel Attacks

      Vol:
    E91-A No:1
      Page(s):
    160-167

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  • New Message Differences for Collision Attacks on MD4 and MD5

    Yu SASAKI  Lei WANG  Noboru KUNIHIRO  Kazuo OHTA  

     
    PAPER-Hash Functions

      Vol:
    E91-A No:1
      Page(s):
    55-63

    In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differences is the most important part of collision attacks against hash functions. So far, many researchers have tried to analyze Wang et al.'s method and proposed improved collision attacks. Although several researches proposed improved attacks, all improved results so far were based on the same message differences proposed by Wang et al. In this paper, we propose new message differences for collision attacks on MD4 and MD5. Our message differences of MD4 can generate a collision with complexity of less than two MD4 computations, which is faster than the original Wang et al.'s attack, and moreover, than the all previous attacks. This is the first result that improves the complexity of collision attack by using different message differences from Wang et al.'s. Regarding MD5, so far, no other message difference from Wang et al.'s is known. Therefore, study for constructing method of other message differences on MD5 should be interesting. Our message differences of MD5 generates a collision with complexity of 242 MD5 computations, which is slower than the latest best attack. However, since our attack needs only 1 bit difference, it has some advantages in terms of message freedom of collision messages.

  • Side Channel Attacks against Hash-Based MACs with PGV Compression Functions

    Katsuyuki OKEYA  

     
    PAPER-Side Channel Attacks

      Vol:
    E91-A No:1
      Page(s):
    168-175

    HMAC is one of the most famous keyed hash functions, and widely utilized. In order to design secure hash functions, we often use PGV construction consisting of 64 schemes, each of which utilizes a block cipher. If the underlying block cipher is ideal, 12 schemes are proven to be secure. In this paper, we evaluate the security of these schemes in view of side channel attacks. As it turns out, HMACs based on 11 out of 12 secure PGV schemes are vulnerable to side channel attacks, even if the underlying block cipher is secure against side channel attacks. These schemes are classified into two groups based on their vulnerabilities. For the first group which contains 8 schemes, we show that the attacker can reveal the whole key of HMAC, and selectively forge in consequence. For the other group which contains 3 schemes, we specify the importance of the execution sequence for the inner operations of the scheme, and refine it. If wrong orders of operations are used, the attacker can reveal a portion of the key of HMAC. Hence, the use of HMACs based on such PGV schemes as they are is not recommended when the resistance against side channel attacks is necessary.

  • A Novel Photonic Crystal Fiber Design for Large Effective Area and High Negative Dispersion

    Nguyen Hoang HAI  Yoshinori NAMIHIRA  Feroza BEGUM  Shubi F. KAIJAGE  Tatsuya KINJO  S.M. Abdur RAZZAK  Nianyu ZOU  

     
    LETTER-Optoelectronics

      Vol:
    E91-C No:1
      Page(s):
    113-116

    In this paper, we propose and demonstrate a novel type of PCF that has two cladding layers with Ge rods at the center core. We numerically show that it is possible to design a single mode PCF with large effective area greater than 200 µm2 over the whole wavelength above 1.2 µm. The proposed large mode area PCF (LMA-PCF) exhibits a high negative dispersion coefficient from -186 to -158 [ps/(nm-km)] in all wavelengths ranging from 1.2 µm to 1.8 µm. Effective single mode operation of LMA-PCF is confimed for the entire band of interest.

  • Multi-Level Confined Error Diffusion Algorithm for Flat Panel Display

    JunHak LEE  Takahiko HORIUCHI  Shoji TOMINAGA  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E91-D No:1
      Page(s):
    62-69

    The reduction of a structural pattern at specific gray levels or at the special condition of image data has mainly been discussed in digital halftone methods. This problem is more severe in some flat panel displays because their black levels typically are brighter than other displays blocks. The authors proposed an advanced confined error diffusion (ACED) algorithm which was a well-organized halftone algorithm for flat panel devices. In this paper, we extend the ACED algorithm to the multi-level systems, which are capable of displaying more than 2 levels. Our extension has two merits for the hardware implementation. First, it can be processed in real time using the look-up table based method. The second one is the flexibility of selecting the used gray level. This paper discusses the performance of the proposed algorithms with experimental results for natural test images.

  • Novel Uniform Asymptotic Solutions for the Back Scattering of a Whispering Gallery Mode by a Cylindrically Curved Conducting Sheet

    Toshihide AJIKI  Toyohiko ISHIHARA  

     
    PAPER-High-Frequency Asymptotic Methods

      Vol:
    E91-C No:1
      Page(s):
    26-33

    We have derived the novel extended UTD (Uniform Geometrical Theory of Diffraction) solution and the novel modified UTD solution for the back scattering of an incident whispering gallery (WG) mode on the edge of a cylindrically curved conducting sheet. By comparing with the reference solution obtained from the integral representation of the scattered field by integrating numerically along the integration path, we have confirmed the validity and the utility of the novel asymptotic solutions proposed in the present study. It is shown that the extended UTD solution can be connected smoothly to the modified UTD solution on the geometrical boundary separating the edge-diffracted ray and the surface-diffracted ray.

  • Low Grazing Scattering from Sinusoidal Neumann Surface with Finite Extent: Undersampling Approximation

    Junichi NAKAYAMA  Yasuhiko TAMURA  

     
    PAPER-Scattering and Diffraction

      Vol:
    E91-C No:1
      Page(s):
    9-16

    A transverse magnetic (TM) plane wave is diffracted by a periodic surface into discrete directions. However, only the reflection and no diffraction take place when the angle of incidence becomes a low grazing limit. On the other hand, the scattering occurs even at such a limit, if the periodic surface is finite in extent. To solve such contradiction, this paper deals with the scattering from a perfectly conductive sinusoidal surface with finite extent. By the undersampling approximation introduced previously, the total scattering cross section is numerically calculated against the angle of incidence for several corrugation widths up to more than 104 times of wavelength. It is then found that the total scattering cross section is linearly proportional to the corrugation width in general. But an exception takes place at a low grazing limit of incidence, where the total scattering cross section increases almost proportional to the square root of the corrugation width. This suggests that, when the corrugation width goes to infinity, the total scattering cross section diverges and the total scattering cross section per unit surface vanishes at a low grazing limit of incidence. Then, it is concluded that, at a low grazing limit of incidence, no diffraction takes place by a periodic surface with infinite extent and the scattering occurs from a periodic surface with finite extent.

  • Dual-Level LVDS Technique for Reducing Data Transmission Lines by Half in LCD Driver IC's

    Doo-Hwan KIM  Sung-Hyun YANG  Kyoung-Rok CHO  

     
    PAPER-Electronic Circuits

      Vol:
    E91-C No:1
      Page(s):
    72-80

    This paper proposes a dual-level low voltage differential signaling (DLVDS) circuit aimed at low power consumption and reducing transmission lines for LCD driver IC's. We apply two-bit binary data to the DLVDS circuit as inputs, and then the circuit converts these two inputs into two kinds of fully differential signal levels. In the DLVDS circuit, two transmission lines are sufficient to transfer two-bit binary inputs while keeping the conventional LVDS features. The receiver recovers the original two-bit binary data through a level decoding circuit. The proposed circuit was fabricated using a commercial 0.25 µm CMOS technology. Under a 2.5 V supply voltage, the circuit shows a data rate of 1-Gbps/2-line and power consumption of 35 mW.

  • A Simple Asynchronous UWB Position Location Algorithm Based on Single Round-Trip Transmission

    Suckchel YANG  Dongwoo KANG  Young NAMGOONG  Yoan SHIN  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E91-A No:1
      Page(s):
    430-432

    We propose a simple asynchronous UWB (Ultra Wide Band) position location algorithm with low complexity, power consumption and processing delay. In the proposed algorithm, only a single RTTX (Round-Trip Transmission) of UWB pulses is utilized based on the ToA (Time of Arrival) principle. Hence, the proposed algorithm decreases power consumption and processing delay as compared to the basic ToA based on triple RTTXs. Moreover, unlike the TDoA (Time Difference of Arrival) algorithm, the proposed algorithm can perform the position location with low complexity since it does not require strict synchronization between multiple beacons. Simulation results using IEEE 802.15.4a UWB channel models reveal that the proposed algorithm achieves closely comparable position location performance of the basic ToA and TDoA algorithms.

  • An Analysis of Leakage Factors for Dual-Rail Pre-Charge Logic Style

    Daisuke SUZUKI  Minoru SAEKI  

     
    PAPER-Side Channel Attacks

      Vol:
    E91-A No:1
      Page(s):
    184-192

    In recent years, certain countermeasures against differential power analysis (DPA) at the logic level have been proposed. Recently, Popp and Mangard proposed a new countermeasure-masked dual-rail pre-charge logic (MDPL); this countermeasure combines dual-rail circuits with random masking to improve the wave dynamic differential logic (WDDL). They claimed that it could implement secure circuits using a standard CMOS cell library without special constraints for the place-and-route method because the difference between the loading capacitances of all the pairs of complementary logic gates in MDPL can be compensated for by the random masking. In this paper, we particularly focus on the signal transition of MDPL gates and evaluate the DPA-resistance of MDPL in detail. Our evaluation results reveal that when the input signals have different delay times, leakage occurs in the MDPL as well as WDDL gates, even if MDPL is effective in reducing the leakage caused by the difference in loading capacitances. Furthermore, in order to validate our evaluation, we demonstrate a problem with different input signal delays by conducting measurements for an FPGA.

  • Lifetime Prediction Routing Protocol for Wireless Sensor Networks

    Minho SEO  Wonik CHOI  Yoo-Sung KIM  Jaehyun PARK  

     
    LETTER-Network

      Vol:
    E90-B No:12
      Page(s):
    3680-3681

    We propose LPDD (Lifetime Prediction Directed Diffusion), a novel energy-aware routing protocol for sensor networks that aims at increasing network survivability without a significant increase in latency. The key concept behind the protocol is the adaptive selection of routes by predicting the battery lifetime of the minimum energy nodes along the routes.

  • Incentive Service Differentiation for P2P Content Sharing by Wireless Users

    Masato YAMADA  Kenichiro SATO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER-Network

      Vol:
    E90-B No:12
      Page(s):
    3561-3571

    Wireless content sharing where peers share content and services via wireless access networks requires user contributions, as in fixed P2P content sharing. However, in wireless access environments, since the resources of mobile terminals are strictly limited, mobile users are not as likely to contribute as ones in fixed environments. Therefore, incentives to encourage user contributions are more significant in wireless access environments. Although an incentive service differentiation architecture where the content transfer rate is adjusted according to the contributions of each downloading user has been already proposed for fixed P2P, it may not work well in wireless access environments because several factors effect wireless throughput. In this paper, we propose a novel architecture for contribution-based transfer-rate differentiation using wireless quality of service (QoS) techniques that motivates users to contribute their resources for wireless content sharing. We also propose a radio resource assignment method for our architecture. Computer simulations and game-theoretic calculations validate our architecture.

  • Improved MACs from Differentially-Uniform Permutations

    Kazuhiko MINEMATSU  Toshiyasu MATSUSHIMA  

     
    PAPER-Information Security

      Vol:
    E90-A No:12
      Page(s):
    2908-2915

    This paper presents MACs that combine a block cipher and its component such as a reduced-round version. Our MACs are faster than the standard MAC modes such as CBC-MAC, and provably secure if the block cipher is pseudorandom and its component is a permutation with a small differential probability. Such a MAC scheme was recently proposed by one of authors, and we provide improvements about security and treading-off between speed and amount of preprocessing.

  • Effect of Rubbing on Polymers for Liquid Crystal Alignment Film Studied by Grazing-Incidence X-ray Diffraction and Reflection Ellipsometry

    Ichiro HIROSAWA  Tomoyuki KOGANEZAWA  Takahiro SAKAI  

     
    PAPER

      Vol:
    E90-C No:11
      Page(s):
    2070-2075

    Rubbed polyimide films have been widely used as liquid crystal alignment films for liquid crystal displays (LCDs). We investigated the effect of rubbing on the surface molecules of polyimide films by using grazing incidence X-ray diffraction (GIXD) and reflection ellipsometry. We found that rubbing not only caused the polymer chains to align in the direction of rubbing but also to elongate near the film surface. However, the in-plane distribution of surface polymer chains of polyimide film was not found to be dependent on the rubbing conditions.

  • Applicability of Camera Works to Free Viewpoint Videos with Annotation and Planning

    Ryuuki SAKAMOTO  Itaru KITAHARA  Megumu TSUCHIKAWA  Kaoru TANAKA  Tomoji TORIYAMA  Kiyoshi KOGURE  

     
    PAPER

      Vol:
    E90-D No:10
      Page(s):
    1637-1648

    This paper shows the effectiveness of a cinematographic camera for controlling 3D video by measuring its effects on viewers with several typical camera works. 3D free-viewpoint video allows us to set its virtual camera on arbitrary positions and postures in 3D space. However, there have been neither investigations on adaptability nor on dependencies between the camera parameters of the virtual camera (i.e., positions, postures, and transitions) nor the impressions of viewers. Although camera works on 3D video based on expertise seems important for making intuitively understandable video, it has not yet been considered. When applying camera works to 3D video using the planning techniques proposed in previous research, generating ideal output video is difficult because it may include defects due to image resolution limitation, calculation errors, or occlusions as well as others caused by positioning errors of the virtual camera in the planning process. Therefore, we conducted an experiment with 29 subjects with camera-worked 3D videos created using simple annotation and planning techniques to determine the virtual camera parameters. The first point of the experiment examines the effects of defects on viewer impressions. To measure such impressions, we conducted a semantic differential (SD) test. Comparisons between ground truth and 3D videos with planned camera works show that the present defects of camera work do not significantly affect viewers. The experiment's second point examines whether the cameras controlled by planning and annotations affected the subjects with intentional direction. For this purpose, we conducted a factor analysis for the SD test answers whose results indicate that the proposed virtual camera control, which exploits annotation and planning techniques, allows us to realize camera working direction on 3D video.

461-480hit(926hit)