The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] diff(926hit)

501-520hit(926hit)

  • Design and Evaluation of a 5454-bit Multiplier Based on Differential-Pair Circuitry

    Akira MOCHIZUKI  Hirokatsu SHIRAHAMA  Takahiro HANYU  

     
    PAPER-Digital

      Vol:
    E90-C No:4
      Page(s):
    683-691

    This paper presents a high-speed 5454-bit multiplier using fully differential-pair circuits (DPCs) in 0.18 µm CMOS. The DPC is a key component in maintaining an input signal-voltage swing of 0.2 V while providing a large current-driving capability. The combination of the DPC and the multiple-valued current-mode linear summation makes the critical path shortened and transistor counts reduced. The multiplier has an estimated multiply time of 1.88 ns with 74.2 mW at 400 MHz from a 1.8 V supply occupying a 0.85 mm2 active area.

  • Asymmetric Slope Dual Mode Differential Logic Circuit for Compatibility of Low-Power and High-Speed Operations

    Masao MORIMOTO  Makoto NAGATA  Kazuo TAKI  

     
    PAPER-Digital

      Vol:
    E90-C No:4
      Page(s):
    675-682

    Asymmetric Slope Dual Mode Differential Logic (ASDMDL) embodies high-speed dynamic and low-power static operations in a single design. Two-phase dual-rail logic signaling is used in a high-speed operation, where a logical evaluation is preceded by pre-charge, and it asserts one of the rails with an asymmetrically shortened rise transition to express a binary result. On the other hand, single-phase differential logic signaling eliminates pre-charge and leads to a low-power static operation. The operation mode is defined by the logic signaling styles, and no control signal is needed in the logic cell. The design of mixed CMOS and ASDMDL logic circuits can be automated with general logic synthesis and place-and-route techniques, since the physical ASDMDL cell is prepared in such a way to comply with a CMOS standard-cell design flow. A mixed ASDMDL/CMOS micro-processor in a 0.18-µm CMOS technology demonstrated 232 MHz operation, corresponding to 14% speed improvement over a full CMOS implementation. This was achieved by substituting ASDMDL cells for only 4% of the CMOS logic cells in data paths. The low-speed operation of ASDMDL at 100 MHz was nearly equivalent to that of CMOS. However, power consumption was reduced by 3% due to the use of ASDMDL complex logic cells. Area overhead was less than 4%.

  • Novel Square Photonic Crystal Fibers with Ultra-Flattened Chromatic Dispersion and Low Confinement Losses

    Feroza BEGUM  Yoshinori NAMIHIRA  S.M. Abdur RAZZAK  Nianyu ZOU  

     
    PAPER-Optoelectronics

      Vol:
    E90-C No:3
      Page(s):
    607-612

    This study proposes a novel structure of index-guiding square photonic crystal fibers (SPCF) having simultaneously ultra-flattened chromatic dispersion characteristics and low confinement losses in a wide wavelength range. The finite difference method (FDM) with anisotropic perfectly matched layers (PMLs) is used to analyze the various properties of square PCF. The findings reveal that it is possible to design five-ring PCFs with a flattened negative chromatic dispersion of 0-1.5 ps/(nm.km) in a wavelength range of 1.27 µm to 1.7 µm and a flattened chromatic dispersion of 01.15 ps/(nm.km) in a wavelength range of 1.25 µm to 1.61 µm. Simultaneously it also exhibited that the confinement losses are less than 10-9 dB/m and 10-10 dB/m in the wavelength range of 1.25 µm to 1.7 µm.

  • Diffraction Amplitudes from Periodic Neumann Surface: Low Grazing Limit of Incidence (III)

    Junichi NAKAYAMA  Kazuhiro HATTORI  Yasuhiko TAMURA  

     
    LETTER-Electromagnetic Theory

      Vol:
    E90-C No:2
      Page(s):
    536-538

    This paper deals with the singular behavior of the diffraction of transverse magnetic (TM) waves by a perfectly conductive triangular periodic surface at a low grazing limit of incidence. The wave field above the highest excursion of the surface is represented as a sum of Floquet modes with modified diffraction amplitudes, whereas the wave field inside a triangular groove is written as a sum of guided modes with unknown mode amplitudes. Then, two sets of equations are derived for such amplitudes. From the equation sets, all the amplitudes are analytically shown to vanish at a low grazing limit of incidence. From this fact, it is concluded analytically that no diffraction takes place and only reflection occurs at a low grazing limit of incidence for any period length and any triangle height. This theoretical result is verified by a numerical example.

  • A Uniform Asymptotic Solution for Whispering Gallery Mode Radiation from a Cylindrically Curved Concave Conducting Surface

    Keiji GOTO  Toshihide AJIKI  Toru KAWANO  Toyohiko ISHIHARA  

     
    PAPER-High-Frequency Asymptotic Methods

      Vol:
    E90-C No:2
      Page(s):
    243-251

    When a cylindrically curved concave conducting surface is terminated abruptly at the edge, the whispering gallery (WG) mode propagating toward the edge direction is radiated into the free space from the aperture plane at the edge. In this paper, by applying the new analysis method, we shall derive a uniform geometrical theory of diffraction solution (UTD) for the electric-type WG mode radiation field applicable in the transition region near the geometrical boundaries produced by the incident modal ray on the edge of the curved surface. The UTD is represented by the summation of the solution for the geometrical ray converted from the modal ray of the WG mode and the solution for the uniform edge diffracted ray scattered at the cylindrically curved edge. By comparing with the reference solution obtained numerically from the integral representation of the radiation field, we will confirm the validity and the utility of the UTD proposed in this paper.

  • Ridge-Type Zn-Indiffused Mach-Zehnder Modulator in LiNbO3

    Ruey-Ching TWU  Chia-Chih HUANG  Way-Seen WANG  

     
    LETTER

      Vol:
    E90-C No:2
      Page(s):
    481-483

    A ridge-type Zn-indiffused Mach-Zehnder modulator operating at 1.55 µm wavelength is demonstrated on a z-cut LiNbO3 substrate for the first time. The measured results show that the values of voltage-length product can be reduced from 9.6 V-cm to 8.1 V-cm with the etched depth of 1.7 µm.

  • Optical Switch by Light Intensity Control in Cascaded Coupled Waveguides

    Hiroki KISHIKAWA  Nobuo GOTO  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E90-C No:2
      Page(s):
    492-498

    Lightwave switching is discussed with a cascaded connection of optical couplers with light intensity control elements. By employing wavelength-selective amplifiers such as a waveguide-type Raman amplifier, all-optical wavelength-selective switching can be realized. We discuss analytically using coupled-mode theory that the lightwave switching is feasible by controlling the intensity of propagating lightwave. The switching operation is verified numerically using finite-difference beam-propagation method. As a result, the expected operation is realized and some characteristics involved with dependencies of wavelength and phase are also investigated. A preliminary experiment using attenuators, beam splitters and mirrors is also described to verify the switching operation with only light-intensity control in interferometers.

  • Cross-Correlation Properties of Cyclotomic Sequences

    Kai CAI  Rongquan FENG  Zhiming ZHENG  

     
    PAPER-Coding Theory

      Vol:
    E90-A No:1
      Page(s):
    281-286

    Sequences with good correlation properties are widely used in engineering applications, especially in the area of communications. Among the known sequences, cyclotomic families have the optimal autocorrelation property. In this paper, we decide the cross-correlation function of the known cyclotomic sequences completely. Moreover, to get our results, the relations between the multiplier group and the decimations of the characteristic sequence are also established for an arbitrary difference set.

  • Diffusion-Type Autonomous Decentralized Flow Control for Multiple Flows

    Chisa TAKANO  Masaki AIDA  

     
    PAPER-Network

      Vol:
    E90-B No:1
      Page(s):
    21-30

    We have proposed a diffusion-type flow control mechanism to achieve the extremely time-sensitive flow control required for high-speed networks. In this mechanism, each node in a network manages its local traffic flow only on the basis of the local information directly available to it, by using predetermined rules. In this way, the implementation of decision-making at each node can lead to optimal performance for the whole network. Our previous studies concentrated on the flow control for a single flow. In this paper, we propose a diffusion-type flow control mechanism for multiple flows. The proposed scheme enables a network to quickly recover from a state of congestion and to achieve fairness among flows.

  • Annealing Induced Diffusion Dynamics in As Ion-Implanted GaAs

    Hiroyuki SHINOJIMA  Ryuzi YANO  

     
    PAPER-Micro/Nano Fabrication

      Vol:
    E90-C No:1
      Page(s):
    46-50

    We determine the annealing dynamics of AsGa antisite defects in As ion-implanted GaAs. An Arrhenius plot of the carrier decay rate or the defect density vs. the annealing temperature in the high temperature regime gives an energy EPA, which is different from true activation energy. The annealing time dependence of EPA obtained by the two diffusion models (self diffusion of AsGa antisite defects and VGa vacancy assisted diffusion of AsGa antisite defects) are compared with EPA's obtained from already published works. The results prove that the diffusion of AsGa antisite defects is assisted by the VGa vacancy defects that exist in a high density.

  • Symmetric Discharge Logic against Differential Power Analysis

    Jong Suk LEE  Jae Woon LEE  Young Hwan KIM  

     
    LETTER

      Vol:
    E90-A No:1
      Page(s):
    234-240

    Differential power analysis (DPA) is an effective technique that extracts secret keys from cryptographic systems through statistical analysis of the power traces obtained during encryption and decryption operations. This letter proposes symmetric discharge logic (SDL), a circuit-level countermeasure against DPA, which exhibits uniform power traces for every clock period by maintaining a set of discharge paths independent of input values. This feature minimizes differences in power traces and improves resistance to DPA attacks. HSPICE simulations for the test circuits using 0.18 µm TSMC CMOS process parameters indicate that SDL reduces power differences by an order of magnitude, compared to the existing circuit-level technique.

  • Leakage Analysis of DPA Countermeasures at the Logic Level

    Minoru SAEKI  Daisuke SUZUKI  Tetsuya ICHIKAWA  

     
    PAPER-Side Channel Attacks

      Vol:
    E90-A No:1
      Page(s):
    169-178

    In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate, and are naturally applicable to various actual devices for simulating power analysis. Furthermore, we demonstrate the weakness of previously known hardware countermeasures for both our model and FPGA and suggest secure conditions for the hardware countermeasure.

  • Embedded Image Coding Using Context Adaptive Wavelet Difference Reduction

    Poonlap LAMSRICHAN  Teerapat SANGUANKOTCHAKORN  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    81-89

    It is well-known that one of the best wavelet-based image compression techniques, called Wavelet Difference Reduction-WDR, has both simple algorithm and comparative rate-distortion results comparing to other coders in the literature. In this paper, we propose an algorithm to enhance the performance of WDR coder in a very efficient way. The methodology is highly based on the context adaptive model. High-order statistical context modeling is used for significant coefficients prediction by scanning order adaptation of WDR. In binary mode, the coder is clearly better than Set Partitioning in Hierarchical Trees (SPIHT). A new conditional Arithmetic Coding (AC) using array of contexts is specifically designed for WDR-based coder. Based on our simulation results of all images in the test set which covers various types of images, it is apparent that our proposed coder in AC mode generates the rate-distortion results that are superior to those of all other WDR-based coders in the literature. Furthermore, it is very competitive to SPIHT-AC and JPEG2000, the best coders, at all bit rates.

  • Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level

    Daisuke SUZUKI  Minoru SAEKI  Tetsuya ICHIKAWA  

     
    PAPER-Side Channel Attacks

      Vol:
    E90-A No:1
      Page(s):
    160-168

    This paper proposes a new countermeasure, Random Switching Logic (RSL), against DPA (Differential Power Analysis) and Second-Order DPA at the logic level. RSL makes a signal transition uniform at each gate and suppresses the propagation of glitch to allow power consumption to be independent of predictable data. Furthermore, we implement basic logic circuits on the FPGA (Field Programmable Gate Array) by using RSL, and evaluate the effectiveness. As a result, we confirm the fact that the secure circuit can be structured against DPA and Second-Order DPA.

  • Universally Composable Hierarchical Hybrid Authenticated Key Exchange

    Haruki OTA  Kazuki YONEYAMA  Shinsaku KIYOMOTO  Toshiaki TANAKA  Kazuo OHTA  

     
    PAPER-Protocols

      Vol:
    E90-A No:1
      Page(s):
    139-151

    Password-based authenticated key exchange protocols are more convenient and practical, since users employ human-memorable passwords that are simpler to remember than cryptographic secret keys or public/private keys. Abdalla, Fouque, and Pointcheval proposed the password-based authenticated key exchange protocol in a 3-party model (GPAKE) in which clients trying to establish a secret do not share a password between themselves but only with a trusted server. On the other hand, Canetti presented a general framework, which is called universally composable (UC) framework, for representing cryptographic protocols and analyzing their security. In this framework, the security of protocols is maintained under a general protocol composition operation called universal composition. Canetti also proved a UC composition theorem, which states that the definition of UC-security achieves the goal of concurrent general composition. A server must manage all the passwords of clients when the 3-party password-based authenticated key exchange protocols are realized in large-scale networks. In order to resolve this problem, we propose a hierarchical hybrid authenticated key exchange protocol (H2AKE). In H2AKE, forwarding servers are located between each client and a distribution server, and the distribution server sends the client an authentication key via the forwarding servers. In H2AKE, public/private keys are used between servers, while passwords are also used between clients and forwarding servers. Thus, in H2AKE, the load on the distribution server can be distributed to the forwarding servers concerning password management. In this paper, we define hierarchical hybrid authenticated key exchange functionality. H2AKE is the universal form of the hierarchical (hybrid) authenticated key exchange protocol, which includes a 3-party model, and it has the characteristic that the construction of the protocol can flexibly change according to the situation. We also prove that H2AKE is secure in the UC framework with the security-preserving composition property.

  • Motion-Based Boundary Tracking of Moving Object Using Parametric Active Contour Model

    Boo Hwan LEE  Il CHOI  Gi Joon JEON  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E90-D No:1
      Page(s):
    355-363

    This paper presents a motion-based boundary tracking method for a moving deformable object in an image sequence using a parametric active contour model. Deciding the local converging directions of the contour points is essential for correctly extracting the boundary of a moving deformable object. Thus, a new energy function for a parametric active contour model is proposed based on the addition of a directional energy term using a frame difference map to the greedy snake. The frame difference map is used to obtain motion information on an object with fast and non-rigid motion. Plus, updating rules for the frame difference map are also developed to encourage the stable convergence of the contour points. Experiments on a set of synthetic and real image sequences show that the proposed method could fully track a speedy deformable object while exactly extracting the boundary of the object in every frame.

  • A Study on Higher Order Differential Attack of KASUMI

    Nobuyuki SUGIO  Hiroshi AONO  Sadayuki HONGO  Toshinobu KANEKO  

     
    PAPER-Symmetric Cryptography

      Vol:
    E90-A No:1
      Page(s):
    14-21

    This paper proposes novel calculuses of linearizing attack that can be applied to higher order differential attack. Higher order differential attack is a powerful and versatile attack on block ciphers. It can be roughly summarized as follows: (1) Derive an attack equation to estimate the key by using the higher order differential properties of the target cipher, (2) Determine the key by solving an attack equation. Linearizing attack is an effective method of solving attack equations. It linearizes an attack equation and determines the key by solving a system of linearized equations using approaches such as the Gauss-Jordan method. We enhance the derivation algorithm of the coefficient matrix for linearizing attack to reduce computational cost (fast calculus 1). Furthermore, we eliminate most of the unknown variables in the linearized equations by making the coefficient column vectors 0 (fast calculus 2). We apply these algorithms to an attack of the five-round variant of KASUMI and show that the attack complexity is equivalent to 228.9 chosen plaintexts and 231.2 KASUMI encryptions.

  • Verification of Au Nanodot Size Dependence on Coulomb Step Width by Non-contact Atomic-force Spectroscopy

    Yasuo AZUMA  Masayuki KANEHARA  Toshiharu TERANISHI  Yutaka MAJIMA  

     
    LETTER-Evaluation of Organic Materials

      Vol:
    E89-C No:12
      Page(s):
    1755-1757

    We demonstrate single electron counting on an alkanethiol-protected Au nanodot in a double-barrier tunneling structure by noncontact atomic-force spectroscopy (nc-AFS). The Coulomb step width dependence on the Au nanodot diameter is observed. Evaluation of fractional charge Q0 and contact potential difference by nc-AFS reveals a Vd-independent voltage shift due to Q0.

  • Heat Treatment Effect on Polymer Light-Emitting Device Based on Poly(9,9-dioctylfluorene) during Maskless Dye-Diffusion Technique

    Kazuya TADA  Mitsuyoshi ONODA  

     
    LETTER-Organic Molecular Devices

      Vol:
    E89-C No:12
      Page(s):
    1775-1776

    It has been shown that the maskless dye-diffusion technique is applicable to a conjugated polymer poly(9,9-dioctylfluorene). The introduction of Coumarin 6 and Nile red results in green and white emission, with the increased onset voltage for the both cases. It has also been confirmed that the heat treatment effect during the maskless dye diffusion technique results in not the increase but the decrease of the onset voltage, indicating that the dye plays a role of carrier trap in the polymer.

  • Adaptive Noise Estimation Using Least-Squares Line in Wavelet Packet Transform Domain

    Sung-il JUNG  Younghun KWON  Sung-il YANG  

     
    LETTER-Speech and Hearing

      Vol:
    E89-D No:12
      Page(s):
    3002-3005

    In this letter, we suggest a noise estimation method which can be applied for speech enhancement in various noise environments. The proposed method consists of the following two main processes to analyze and estimate efficiently the noise from the noisy speech. First, a least-squares line is used, which is obtained by applying coefficient magnitudes in node with a uniform wavelet packet transform to a least squares method. Next, a differential forgetting factor and a correlation coefficient per subband are applied, where each subband consists of several nodes with the uniform wavelet packet transform. In particular, this approach has the ability to update noise estimation by using the estimated noise at the previous frame only instead of employing the statistical information of long past frames and explicit nonspeech frames detection consisted of noise signals. In objective assessments, we observed that the performance of the proposed method was better than that of the compared methods. Furthermore, our method showed a reliable result even at low SNR.

501-520hit(926hit)