The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] sign(2667hit)

1441-1460hit(2667hit)

  • An Improved Nominative Proxy Signature for Mobile Communication

    Jianhong ZHANG  Qianhong WU  

     
    PAPER-Application Information Security

      Vol:
    E88-D No:7
      Page(s):
    1697-1699

    As a specific signature, the nominative proxy signature scheme is a method in which the designated proxy signer generates a nominative signature and transmits it to a verifier, instead of the original signer. Recently, Seo et al. proposed a nominative proxy signature scheme for mobile communication and claimed that the scheme hash non-repudiation. However, after analyzing the scheme, we show that the scheme is insecure and cannot provide non-repudiation, note that a malicious original signer can forge the proxy signer to sign on any message. Finally, we also present a modification version of the scheme to repair the security flaw.

  • Noise Reduction for NMR FID Signals via Oversampled Real-Valued Discrete Gabor Transform

    Liang TAO  Hon Keung KWAN  

     
    PAPER-Adaptive Signal Processing

      Vol:
    E88-D No:7
      Page(s):
    1511-1518

    An efficient algorithm to reduce the noise from the Nuclear Magnetic Resonance Free Induction Decay (NMR FID) signals is presented, in this paper, via the oversampled real-valued discrete Gabor transform using the Gaussian synthesis window. An NMR FID signal in the Gabor transform domain (i.e., a joint time-frequency domain) is concentrated in a few number of Gabor transform coefficients while the noise is fairly distributed among all the coefficients. Therefore, the NMR FID signal can be significantly enhanced by performing a thresholding technique on the coefficients in the transform domain. Theoretical and simulation experimental analyses in this paper show that the oversampled Gabor transform using the Gaussian synthesis window is more suitable for the NMR FID signal enhancement than the critically-sampled one using the exponential synthesis window, because both the Gaussian synthesis window and its corresponding analysis window in the oversampling case can have better localization in the frequency domain than the exponential synthesis window and its corresponding analysis window in the critically-sampling case. Moreover, to speed up the transform, instead of the commonly-used complex-valued discrete Gabor transform, the real-valued discrete Gabor transform presented in our previous work is adopted in the proposed algorithm.

  • Separation of Sound Sources Propagated in the Same Direction

    Akio ANDO  Masakazu IWAKI  Kazuho ONO  Koichi KUROZUMI  

     
    PAPER-Blind Source Separation

      Vol:
    E88-A No:7
      Page(s):
    1665-1672

    This paper describes a method for separating a target sound from other noise arriving in a single direction when the target cannot, therefore, be separated by directivity control. Microphones are arranged in a line toward the sources to form null sensitivity points at given distances from the microphones. The null points exclude non-target sound sources on the basis of weighting coefficients for microphone outputs determined by blind source separation. The separation problem is thereby simplified to instantaneous separation by adjustment of the time-delays for microphone outputs. The system uses a direct (i.e. non-iterative) algorithm for blind separation based on second-order statistics, assuming that all sources are non-stationary signals. Simulations show that the 2-microphone system can separate a target sound with separability of more than 40 dB for the 2-source problem, and 25 dB for the 3-source problem when the other sources are adjacent.

  • Blind Estimation of the PN Sequence in Lower SNR DS/SS Signals

    Tianqi ZHANG  Xiaokang LIN  Zhengzhong ZHOU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:7
      Page(s):
    3087-3089

    An approach based on signal subspace analysis is proposed to blind estimation of the PN (Pseudo Noise) sequence from lower SNR (Signal to Noise Ratios) DS/SS (Direct Sequence Spread Spectrum) signals. The received signal is divided into vectors according to a temporal window, from which an autocorrelation matrix is computed and accumulated. The PN sequence can be reconstructed from principal eigenvectors of the matrix.

  • A Millimeter Wave Filter Using the Whispering-Gallery Mode Dielectric Resonators Coupled Laterally

    Yosuke SATO  Yoshinori KOGAMI  

     
    PAPER-Resonators & Filters

      Vol:
    E88-C No:7
      Page(s):
    1440-1447

    A millimeter wave BPF constructed from the WG mode dielectric disk resonators is presented. The design chart for the high Q WG mode resonator is obtained from Qu calculation of some WG modes. By using the design chart, high Q WG mode resonator having no influence of unwanted higher order resonances is designed. Designed resonators have different diameter and various Resonance Frequency Separation respectively. A 3 stage maximally flat BPF is constructed so that each resonator may be coupled laterally on the edge of the disk. Designed center frequency is 62.47 GHz and 3 dB bandwidth is 100 MHz. As a result, this BPF has insertion loss of 1.5 dB and some spurious responses which were existed conventional WG mode BPF are reduced considerably.

  • Multiple Signal Classification by Aggregated Microphones

    Mitsuharu MATSUMOTO  Shuji HASHIMOTO  

     
    PAPER-Microphone Array

      Vol:
    E88-A No:7
      Page(s):
    1701-1707

    This paper introduces the multiple signal classification (MUSIC) method that utilizes the transfer characteristics of microphones located at the same place, namely aggregated microphones. The conventional microphone array realizes a sound localization system according to the differences in the arrival time, phase shift, and the level of the sound wave among each microphone. Therefore, it is difficult to miniaturize the microphone array. The objective of our research is to build a reliable miniaturized sound localization system using aggregated microphones. In this paper, we describe a sound system with N microphones. We then show that the microphone array system and the proposed aggregated microphone system can be described in the same framework. We apply the multiple signal classification to the method that utilizes the transfer characteristics of the microphones placed at a same location and compare the proposed method with the microphone array. In the proposed method, all microphones are placed at the same place. Hence, it is easy to miniaturize the system. This feature is considered to be useful for practical applications. The experimental results obtained in an ordinary room are shown to verify the validity of the measurement.

  • Phase Compensation Technique for a Low-Power Transconductor

    Rui ITO  Tetsuro ITAKURA  Tadashi ARAI  

     
    LETTER-Building Block

      Vol:
    E88-C No:6
      Page(s):
    1263-1266

    In a direct conversion receiver for mobile communication, it is important to reduce power dissipation. Because a low pass filter in a direct conversion receiver must suppress adjacent channel signals, a high order and high power dissipation is often required in the low pass filter. We propose a new phase compensation technique suitable for a low power transconductor used in a GmC filter as a low pass filter. The new phase compensation technique reduces 10% of power dissipation.

  • Crosstalk and Congestion Driven Layer Assignment Algorithm

    Bin LIU  Yici CAI  Qiang ZHOU  Xianlong HONG  

     
    PAPER-Circuit Theory

      Vol:
    E88-A No:6
      Page(s):
    1565-1572

    In VDSM era, crosstalk is becoming a more and more vital factor in high performance VLSI designs, making noise mitigation in early design stages necessary. In this paper, we propose an effective algorithm optimizing crosstalk under congestion constraint in the layer assignment stage. A new model for noise severity measurement is developed where wire length is used as a scale for the noise immunity, and both capacitive and inductive coupling between sensitive nets are considered. We also take shield insertion into account for further crosstalk mitigation. Experimental results show that our approach could efficiently reduce crosstalk noise without compromising congestion compared to the algorithm proposed in [1].

  • A Realization of Low-Frequency Active RC Second-Order Band-Pass Circuit with Stable High Q

    Nobuyuki MASUMI  Masataka NAKAMURA  

     
    PAPER-Active Filter

      Vol:
    E88-C No:6
      Page(s):
    1172-1179

    In this paper, we propose a circuit configuration for the low-frequency second-order active RC BPF (band pass filter) which has stable high Q. This proposed circuit is a high Q low-frequency one with a small capacitance, which is realized by applying an output capacitance multiplier to the circuit. Then a detailed circuit analysis is performed for the proposed circuit. From the simulation results of fo and Q for various combinations of circuit element values, we can confirm that the circuit realization of a center frequency of several Hz is possible by employing chip condensers of dozens of nF. The bread-board circuit of this configuration is confirmed to have small temperature dependences of fo and Q by the experiment. It is also clarified from detailed noise analysis and noise measurement that the circuit noise is sufficiently maintained at a low level.

  • A Distributed Task Assignment Algorithm with the FCFS Policy in a Logical Ring

    Atsushi SASAKI  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E88-A No:6
      Page(s):
    1573-1582

    This paper presents a distributed task assignment algorithm in a logical unidirectional ring, which guarantees that almost all tasks are assigned to servers with the first come first served (FCFS) policy without a global clock. A task assignment for a process is obtained in the time period needed for a message to circle the ring. This time period is almost optimal for a unidirectional ring. The FCFS policy is very important in terms of task fairness and can also avoid starvation and provide an efficient response time. Simulation results show that the algorithm generally works better than conventional task assignment or load balancing schemes with respect to both mean response time and task fairness.

  • Fuzzy Training Algorithm for Wavelet Codebook Based Text-Independent Speaker Identification

    Shung-Yung LUNG  

     
    LETTER-Speech and Hearing

      Vol:
    E88-A No:6
      Page(s):
    1619-1621

    A speaker identification system based on wavelet transform (WT) derived from codebook design using fuzzy c-mean algorithm (FCM) is proposed. We have combined FCM and the vector quantization (VQ) algorithm to avoid typical local minima for speaker data compression. Identification accuracies of 94% were achieved for 100 Mandarin speakers.

  • A 24-Gsps 3-Bit Nyquist ADC Using InP HBTs for DSP-Based Electronic Dispersion Compensation

    Hideyuki NOSAKA  Makoto NAKAMURA  Kimikazu SANO  Minoru IDA  Kenji KURISHIMA  Tsugumichi SHIBATA  Masami TOKUMITSU  Masahiro MURAGUCHI  

     
    PAPER-Optical

      Vol:
    E88-C No:6
      Page(s):
    1225-1232

    A 3-bit flash analog-to-digital converter (ADC) for electronic dispersion compensation (EDC) was developed using InP HBTs. Nyquist operation was confirmed up to 24 Gsps, which enables oversampling acquisition for 10 Gbit/s non-return-to-zero (NRZ) signals. The ADC can also be operated at up to 37 Gsps for low input frequencies. To reduce aperture jitter and achieve a wide band of over 7 GHz, an analog input signal for all pre-amplifiers and a clock signal for all latched comparators are provided as traveling waves through coplanar transmission lines. EDC was demonstrated by capturing a 10-Gbit/s pseudo-random bit stream (PRBS) with the waveform degraded by polarization-mode dispersion (PMD). By using the captured data, we confirmed that a calculation of a transversal filter mitigates PMD.

  • 64-Bit High-Performance Power-Aware Conditional Carry Adder Design

    Kuo-Hsing CHENG  Shun-Wen CHENG  

     
    PAPER-Integrated Electronics

      Vol:
    E88-C No:6
      Page(s):
    1322-1331

    The conditional sum adder (CSA) has been shown to outperform other adders applied in high-speed applications. This investigation proposes a modified CSA called the conditional carry adder (CCA). Based on the proposed adder architecture, six 64-bit hybrid dual-threshold CCAs for power-aware applications were discussed. Architectural modification of the CCA raises the operation speed, decreases the power dissipation, and lowers the hardware overhead. The proposed 64-bit CCA can decrease the number of multiplexers and internal nodes in the adder design by around 27% compared to the 64-bit CSA. Furthermore, components on critical paths use a low threshold voltage to accelerate the speed of operation, and other components use the normal threshold voltage to save power. This feature is very useful in implementing power-aware arithmetic systems. One of the proposed circuits has the lowest power-delay product and energy-delay product. The hybrid circuit represents a fine compromise between power and performance. Its power efficiency is better than that of the single threshold voltage circuit designs.

  • ISMANET: A Secure Routing Protocol Using Identity-Based Signcryption Scheme for Mobile Ad-Hoc Networks

    Bok-Nyong PARK  Wonjun LEE  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E88-B No:6
      Page(s):
    2548-2556

    Mobile ad-hoc networks consist of mobile nodes interconnected by multihop path that has no fixed network infrastructure support. Due to the limited bandwidth and resource, and also the frequent changes in topologies, ad-hoc network should consider these features for the provision of security. We present a secure routing protocol based on identity-based signcryption scheme. Since the proposed protocol uses an identity-based cryptosystem, it does not need to maintain a public key directory and to exchange any certificate. In addition, the signcyption scheme simultaneously fulfills both the functions of digital signature and encryption. Therefore, our protocol can give savings in computation cost and have less amount of overhead than the other protocols based on RSA because it uses identity-based signcryption with pairing on elliptic curve. The effectiveness of our protocol is illustrated by simulations conducted using ns-2.

  • Frequency Correlation Characteristics Due to Antenna Configurations in Broadband MIMO Transmission

    Kentaro NISHIMORI  Nobuhiko TACHIKAWA  Yasushi TAKATORI  Riichi KUDO  Koichi TSUNEKAWA  

     
    PAPER

      Vol:
    E88-B No:6
      Page(s):
    2438-2445

    Recently, Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) has attracted much attention as a technology achieving high-speed wireless transmission with a limited bandwidth. However, since bit loading and adaptive modulation per sub-carrier should be employed according to the transmission quality of each sub-carrier in MIMO-OFDM, it is very important to understand the frequency correlation characteristics in broadband MIMO channels. This paper investigates the frequency correlation characteristics based on the antenna configuration for actual indoor MIMO channels. The results show that the frequency correlation of the channel capacity for the array antenna configured in the horizontal plane is significantly different compared to that configured in the vertical plane. Moreover, we propose a new cluster model that considers the antenna configuration in both the horizontal and vertical planes to estimate the frequency correlation in broadband MIMO channels.

  • A Novel Approach for Parameter Determination of HBT Small-Signal Equivalent Circuit

    Han-Yu CHEN  Kun-Ming CHEN  Guo-Wei HUANG  Chun-Yen CHANG  

     
    PAPER-Model

      Vol:
    E88-C No:6
      Page(s):
    1133-1141

    Direct parameter extraction is believed to be the most accurate method for equivalent-circuits modeling of heterojunction bipolar transistors (HBT's). Using this method, the parasitic elements, followed by the intrinsic elements, are determined analytically. Therefore, the quality of the extrinsic elements extraction plays an important role in the accuracy and robustness of the entire extraction algorithm. This study proposes a novel extraction method for the extrinsic elements, which have been proven to be strongly correlated with the intrinsic elements. By utilizing the specific correlation, the equivalent circuit modeling is reduced to an optimization problem of determining six specific extrinsic elements. Converting the intrinsic equivalent circuit into its common-collector configuration, all intrinsic circuit elements are extracted using exact closed-form equations for both the hybrid-π and the T-topology equivalent circuits. Additionally, a general explicit equation on the total extrinsic elements is derived, subsequently reducing the number of optimization variables. The modeling results are presented, showing that the proposed method can yield a good fit between the measured and calculated S parameters.

  • A CAM-Based Signature-Matching Co-processor with Application-Driven Power-Reduction Features

    Kazunari INOUE  Hideyuki NODA  Kazutami ARIMOTO  Hans Jurgen MATTAUSCH  Tetsushi KOIDE  

     
    PAPER-Integrated Electronics

      Vol:
    E88-C No:6
      Page(s):
    1332-1342

    A signature-matching co-processor in 130 nm CMOS technology for application in the network-security field is presented. Two key search technologies, implemented with fully-parallel CAM-based search cores, enable the removal of misused packets from Giga-bit-per-second (G-bps) networks in real-time without disturbing the normal network traffic. The first technology is a thorough search through packet header as well as payload in byte-shifting manner and is capable of detecting viruses, even if they are hidden at an arbitrary position within the packet. A 1.125 Mbit ternary CAM, operated at the speed of 125 Mega-searches per second (M-sps), integrates the primary lookup table for thorough packet search. The second technology applies an additional relational search with programmable logical operations to detect recently appearing more complicated misused packets. A small 192-bit binary CAM operated at 31.25 M-sps is also included for this purpose. Power dissipation, being a major concern of CAM-based application-specific LSIs, is addressed in the light of the signature-matching application, which has a high probability of multiple matches and which doesn't require to mask individual bits of the search word. Consequently, two application-driven power-reduction methods are implemented, namely an improved pipelined search for efficiently reducing power even in the case of a large number of multiple matches, and a search-line encoding for cutting search-line related power dissipation. As a result the signature-matching co-processor features low power dissipation between 0.4 W and 1.1 W for the best case and the worst case search configurations, respectively.

  • A Subsampling UWB Impulse Radio Architecture Utilizing Analytic Signaling

    Mike Shuo-Wei CHEN  Robert W. BRODERSEN  

     
    INVITED PAPER

      Vol:
    E88-C No:6
      Page(s):
    1114-1121

    This paper describes a system architecture along with signal processing technique which allows a reduction in the complexity of a 3.1-10.6 GHz Ultra-Wideband radio. The proposed system transmits passband pulses using a pulser and antenna, and the receiver front-end down-converts the signal frequency by subsampling, thus, requiring substantially less hardware than a traditional narrowband approach. However, the simplified receiver front end shows a high sensitivity to timing offset. By proposing an analytic signal processing technique, the vulnerability of timing offset is mitigated; furthermore, a time resolution finer than the sampling period is achieved, which is useful for locationing or ranging applications. Analysis and simulations of system specifications are also provided in this paper.

  • Distributed Dynamic Channel Assignment for Multi-Hop DS-CDMA Virtual Cellular Network

    Eisuke KUDOH  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:6
      Page(s):
    2525-2531

    In this paper, the channel segregation dynamic channel allocation (CS-DCA) scheme is applied to a multi-hop DS-CDMA virtual cellular network (VCN). After all multi-hop routes are constructed over distributed wireless ports in a virtual cell, the CS-DCA is carried out to allocate the channels to multi-hop up and down links. Each wireless port is equipped with a channel priority table. The transmit wireless port of each link initiates the CS-DCA procedure and selects a channel among available ones using its channel priority table to check. In this paper, the channel allocation failure rate is evaluated by computer simulation. It is shown that CS-DCA reduces remarkably the failure rate compared to FCA. The impact of propagation parameters on the failure rate is discussed.

  • Design of Active Shield Circuit with Automatic Tuning Scheme

    Retdian Agung NICODIMUS  Shigetaka TAKAGI  

     
    PAPER-Mixed Signal

      Vol:
    E88-C No:6
      Page(s):
    1196-1202

    A feedforward-based active shielding technique for digital noise suppression is more preferred for its capability of reducing the noise on the entire area inside the guard ring. In order to compensate for the variation of substrate parameters, an automatic control scheme to tune the gain of the active shield circuit is proposed. Simulation results show the effectiveness of the proposed system in reducing the digital noise regardless of circuit layout. Simulation results also show that noise suppression improvement from passive guard ring to active shield with tuning is 20 dB or one tenth while that from active shield without tuning to active shield with tuning is 12 dB.

1441-1460hit(2667hit)