Shun-ichi AZUMA Takahiro YOSHIDA Toshiharu SUGIE
This paper addresses the designability of Boolean networks, i.e., the existence of a Boolean function satisfying an attractor condition under a given network structure. In particular, we present here a necessary and sufficient condition of the designability of Boolean networks with multiple attractors. The condition is characterized by the cyclicity of network structures, which allows us to easily determine the designability.
Jaesik HWANG Jaepil SEO Ji-Won CHO Hyung-Min PARK
This letter describes a speech enhancement algorithm for stereo signals corrupted by diffuse noise. It estimates the noise signal and also a beamformed target signal based on blind target signal cancelation derived from sparsity minimization. Enhanced target speech is obtained by Wiener filtering using both the signals. Experimental results demonstrate the effectiveness of the proposed method.
Surachai THONGKAEW Tsuyoshi ISSHIKI Dongju LI Hiroaki KUNIEDA
The Process Virtual Machine (VM) is typical software that runs applications inside operating systems. Its purpose is to provide a platform-independent programming environment that abstracts away details of the underlying hardware, operating system and allows bytecodes (portable code) to be executed in the same way on any other platforms. The Process VMs are implemented using an interpreter to interpret bytecode instead of direct execution of host machine codes. Thus, the bytecode execution is slower than those of the compiled programming language execution. Several techniques including our previous paper, the “Fetch/Decode Hardware Extension”, have been proposed to speed up the interpretation of Process VMs. In this paper, we propose an additional methodology, the “Hardware Extension with Hybrid Execution” to further enhance the performance of Process VMs interpretation and focus on Register-based model. This new technique provides an additional decoder which can classify bytecodes into either simple or complex instructions. With “Hybrid Execution”, the simple instruction will be directly executed on hardware of native processor. The complex instruction will be emulated by the “extra optimized bytecode software handler” of native processor. In order to eliminate the overheads of retrieving and storing operand on memory, we utilize the physical registers instead of (low address) virtual registers. Moreover, the combination of 3 techniques: Delay scheduling, Mode predictor HW and Branch/goto controller can eliminate all of the switching mode overheads between native mode and bytecode mode. The experimental results show the improvements of execution speed on the Arithmetic instructions, loop & conditional instructions and method invocation & return instructions can be achieved up to 16.9x, 16.1x and 3.1x respectively. The approximate size of the proposed hardware extension is 0.04mm2 (or equivalent to 14.81k gates) and consumes an additional power of only 0.24mW. The stated results are obtained from logic synthesis using the TSMC 90nm technology @ 200MHz.
Guang Kuo LU Man Lin XIAO Ping WEI Hong Shu LIAO
This letter investigates the circularity of fractional Fourier transform (FRFT) coefficients containing noise only, and proves that all coefficients coming from white Gaussian noise are circular via the discrete FRFT. In order to use the spectrum kurtosis (SK) as a Gaussian test to check if linear frequency modulation (LFM) signals are present in a set of FRFT points, the effect of the noncircularity of Gaussian variables upon the SK of FRFT coefficients is studied. The SK of the α th-order FRFT coefficients for LFM signals embedded in a white Gaussian noise is also derived in this letter. Finally the signal detection algorithm based on FRFT and SK is proposed. The effectiveness and robustness of this algorithm are evaluated via simulations under lower SNR and weaker components.
Huiqian JIANG Mika FUJISHIRO Hirokazu KODERA Masao YANAGISAWA Nozomu TOGAWA
Camellia is a block cipher jointly developed by Mitsubishi and NTT of Japan. It is designed suitable for both software and hardware implementations. One of the design-for-test techniques using scan chains is called scan-path test, in which testers can observe and control the registers inside the LSI chip directly in order to check if the LSI chip correctly operates or not. Recently, a scan-based side-channel attack is reported which retrieves the secret information from the cryptosystem using scan chains. In this paper, we propose a scan-based attack method on the Camellia cipher using scan signatures. Our proposed method is based on the equivalent transformation of the Camellia algorithm and the possible key candidate reduction in order to retrieve the secret key. Experimental results show that our proposed method sucessfully retrieved its 128-bit secret key using 960 plaintexts even if the scan chain includes the Camellia cipher and other circuits and also sucessfully retrieves its secret key on the SASEBO-GII board, which is a side-channel attack standard evaluation board.
Cheng JI Daisuke ANZAI Jianqing WANG Ikuko MORI Osamu FUJIWARA
We conduct, in accordance with IEC 61000-4-2, an electrostatic discharge (ESD) test for a small size battery-operated control circuit board in a myoelectric artificial hand system to investigate the influence of the induced noises by indirect ESDs from an ESD generator to a horizontal coupling plane (HCP) and a vertical coupling plane (VCP). A photo-coupler is set between the small size control board and a motor control circuit to suppress noise in the pulse width modulation (PWM) signals. Two types of ESD noise are observed at the output pins of PWM signals. One type is the ESD noise itself (called Type A) and the other one is the ESD noise superimposed over the PWM pulses (Type B). No matter which polarity the charge voltages of the ESD generator have, both types can be observed and the Type A is dominant in the output pulses. Moreover, the ESD interference in the HCP case is found to be stronger than that in the VCP case usually. In the PWM signals observed at the photo-coupler output, on the other hand, Type A noises tend to increase for positive polarity and decrease for negative polarity, while Type B noises tend to increase at -8kV test level in the HCP case. These results suggest that the photo-coupler does not work well for ESD noise suppression. One of the reasons has been demonstrated to be due to the driving capability of the photo-coupler, and other one is due to the presence of a parasitic capacitance between the input and output of the photo-coupler. The parasitic capacitance can yield a capacitive coupling so that high-frequency ESD noises pass through the photo-coupler.
Minoru FUJISHIMA Shuhei AMAKAWA Kyoya TAKANO Kosuke KATAYAMA Takeshi YOSHIDA
There have recently been more and more reports on CMOS integrated circuits operating at terahertz (≥ 0.1THz) frequencies. However, design environments and techniques are not as well established as for RF CMOS circuits. This paper reviews recent progress made by the authors in terahertz CMOS design for low-power and high-speed wireless communication, including device characterization and modeling techniques. Low-power high-speed wireless data transfer at 11Gb/s and 19pJ/bit and a 7-pJ/bit ultra-low-power transceiver chipset are presented.
Yutaka FUKUCHI Kouji HIRATA Joji MAEDA
In all-optical switches using the cascade of second harmonic generation and difference frequency mixing in periodically poled lithium niobate (PPLN) waveguide devices, walk-off between the fundamental and second harmonic pulses causes crosstalk between neighboring symbols, and limits the switching performance. In this paper, we numerically study retiming characteristics of all-optical switches that employ the PPLN waveguide devices with consideration for the effects of the crosstalk and for the input timing of the data and clock pulses. We find that the time offset between the data and clock pulses can control the timing jitter of the switched output; an appropriate offset can reduce the jitter while improving the switching efficiency.
Yuta IDA Chang-Jun AHN Takahiro MATSUMOTO Shinya MATSUFUJI
Amplify-and-forward (AF) relay multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) systems can achieve high data rate and high quality communications. On the other hand, it has to estimate all channels between the source-relay and relay-destination nodes in the destination node. In MIMO/OFDM systems, high time resolution carrier interferometry (HTRCI) has been proposed to achieve an accurate channel estimation (CE) with a small number of pilot signals. However, since it has many interferences, an accurate CE is not obtained and the system performance is degraded in AF relay MIMO/OFDM systems. Therefore, in this paper, we propose the complex HTRCI (C-HTRCI) pilot signal and the enhanced minimum mean square error (E-MMSE) equalization to achieve an accurate CE and to improve the system performance for AF relay MIMO/OFDM systems.
Yan REN Guilin WANG Yunhong HU Qiuyan WANG
In this paper, we first propose a notion of multiple authorities attribute-based designated confirmer signature scheme with unified verification. In a multiple authorities attribute-based designated confirmer signature scheme with unified verification, both the signer and the designated confirmer can run the same protocols to confirm a valid signature or disavow an invalid signature. Then, we construct a multiple authorities attribute-based designated confirmer signature scheme with unified verification. Finally, we prove the correctness and security of the proposed scheme.
The advanced front-end (AFE) for automatic speech recognition (ASR) was standardized by the European Telecommunications Standards Institute (ETSI). The AFE provides speech enhancement realized by an iterative Wiener filter (IWF) in which a smoothed FFT spectrum over adjacent frames is used to design the filter. We have previously proposed robust time-varying complex Auto-Regressive (TV-CAR) speech analysis for an analytic signal and evaluated the performance of speech processing such as F0 estimation and speech enhancement. TV-CAR analysis can estimate more accurate spectrum than FFT, especially in low frequencies because of the nature of the analytic signal. In addition, TV-CAR can estimate more accurate speech spectrum against additive noise. In this paper, a time-invariant version of wide-band TV-CAR analysis is introduced to the IWF in the AFE and is evaluated using the CENSREC-2 database and its baseline script.
Sung-Ho YOON Jun-Sang PARK Ji-Hyeok CHOI Youngjoon WON Myung-Sup KIM
Considering diversified HTTP types, the performance bottleneck of signature-based classification must be resolved. We define a signature model classifying the traffic in multiple dimensions and suggest a hierarchical signature structure to remove signature redundancy and minimize search space. Our experiments on campus traffic demonstrated 1.8 times faster processing speed than the Aho-Corasick matching algorithm in Snort.
Mingyi GAO Takayuki KUROSU Karen SOLIS-TRAPALA Takashi INOUE Shu NAMIKI
High gain extinction ratio and stable control of the phase in phase sensitive amplification are fundamental to realize either phase regeneration or quadrature squeezing of phase modulated signals in an efficient and robust manner. In this paper, we show that a combination of our previously demonstrated “sideband-assisted” dual-pump phase sensitive amplifier with a gain extinction ratio of more than 25dB, and a phase-locked loop based stabilization technique, enable efficient QPSK quadrature squeezing. Its stable operation is exploited to realize phase de-multiplexing of QPSK signals into BPSK tributaries. The phase de-multiplexed signals are evaluated through measurement of constellation diagrams, eye diagrams and more importantly, BER curves. The de-multiplexed BPSK signals exhibited an OSNR penalty of less than 1dB compared to the back-to-back BPSK signals.
Kazuma OUCHIDA Naoki HONMA Yoshitaka TSUNEKAWA
This paper proposes a new method that combines signal modulation and FDTD (Finite-Difference Time-Domain) simulations to reduce the computation time in multiple-antenna analysis. In this method, signals are modulated so as to maintain orthogonality among the excited signals; multiple antennas are excited at the same time. This means just one FDTD simulation is needed whereas the conventional method demands as many simulations as there are transmitting antennas. The simulation of a 2×2 multi-antenna system shows that the proposed method matches the performance of the conventional method even though its computation time is much shorter.
Hideo FUJIWARA Katsuya FUJIWARA
In our previous work [12], [13], we introduced generalized feed-forward shift registers (GF2SR, for short) to apply them to secure and testable scan design, where we considered the security problem from the viewpoint of the complexity of identifying the structure of GF2SRs. Although the proposed scan design is secure in the sense that the structure of a GF2SR cannot be identified only from the primary input/output relation, it may not be secure if part of the contents of the circuit leak out. In this paper, we introduce a more secure concept called strong security such that no internal state of strongly secure circuits leaks out, and present how to design such strongly secure GF2SRs.
Jinli CHEN Jiaqiang LI Lingsheng YANG Peng LI
Instrumental variable (IV) filters designed for range sidelobe suppression in multiple-input multiple-output (MIMO) radar suffer from Doppler mismatch. This mismatch causes losses in peak response and increases sidelobe levels, which affect the performance of MIMO radar. In this paper, a novel method using the component-code processing prior to the IV filter design for MIMO radar is proposed. It not only compensates for the Doppler effects in the design of IV filter, but also offers more virtual sensors resulting in narrower beams with lower sidelobes. Simulation results are presented to verify the effectiveness of the method.
In this paper, we consider a distributed power control scheme that can maximize overall capacity of an interference-limited wireless system in which the same radio resource is spatially reused among different transmitter-receiver pairs. This power control scheme employs a gradient-descent method in each transmitter, which adapts its own transmit power to co-channel interference dynamically to maximize the total weighted sum rate (WSR) of the system over a given interval. The key contribution in this paper is to propose a common feedback channel, over which a backward physical signal is accumulated for computing the gradient of the transmit power in each transmitter, thereby significantly reducing signaling overhead for the distributed power control. We show that the proposed power control scheme can achieve almost 95% of its theoretical upper WSR bound, while outperforming the non-power-controlled system by roughly 63% on average.
Chung-Chien HSU Kah-Meng CHEONG Tai-Shih CHI Yu TSAO
This paper proposes a voice activity detection (VAD) algorithm based on an energy related feature of the frequency modulation of harmonics. A multi-resolution spectro-temporal analysis framework, which was developed to extract texture features of the audio signal from its Fourier spectrogram, is used to extract frequency modulation features of the speech signal. The proposed algorithm labels the voice active segments of the speech signal by comparing the energy related feature of the frequency modulation of harmonics with a threshold. Then, the proposed VAD is implemented on one of Texas Instruments (TI) digital signal processor (DSP) platforms for real-time operation. Simulations conducted on the DSP platform demonstrate the proposed VAD performs significantly better than three standard VADs, ITU-T G.729B, ETSI AMR1 and AMR2, in non-stationary noise in terms of the receiver operating characteristic (ROC) curves and the recognition rates from a practical distributed speech recognition (DSR) system.
Zhu TANG Zhenqian FENG Wei HAN Wanrong YU Baokang ZHAO Chunqing WU Yuanan LIU
This paper presents an inter-satellite link (ISL) reassignment method to optimize the snapshot routing performance for polar-orbit LEO satellite networks. When the snapshot routing tables are switching simultaneously in all satellites, we propose to reassign the inter-plane ISLs with regularity to improve the quality of the next snapshot, such as snapshot duration, on-board transceiver utilization ratio and end to end delay. Evaluations indicate that our method can attain equal-length snapshots regardless of the latitude of the polar area border, and so is superior to the natural partition method. Meanwhile, compared with the equal partition method which is used in the Iridium system, our method can prolong 82.87% snapshot duration, increase 8.68% on-board transceiver utilization ratio and reduce 5.30% average end to end delay of the whole network. Therefore, we believe that the ISL reassignment method can be efficiently applied in all practical polar-orbit LEO satellite networks.
Akira HIRABAYASHI Norihito INAMURO Aiko NISHIYAMA Kazushi MIMURA
We propose a novel algorithm for the recovery of non-sparse, but compressible signals from linear undersampled measurements. The algorithm proposed in this paper consists of two steps. The first step recovers the signal by the l1-norm minimization. Then, the second step decomposes the l1 reconstruction into major and minor components. By using the major components, measurements for the minor components of the target signal are estimated. The minor components are further estimated using the estimated measurements exploiting a maximum a posterior (MAP) estimation, which leads to a ridge regression with the regularization parameter determined using the error bound for the estimated measurements. After a slight modification to the major components, the final estimate is obtained by combining the two estimates. Computational cost of the proposed algorithm is mostly the same as the l1-nom minimization. Simulation results for one-dimensional computer generated signals show that the proposed algorithm gives 11.8% better results on average than the l1-norm minimization and the lasso estimator. Simulations using standard images also show that the proposed algorithm outperforms those conventional methods.