The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

1701-1720hit(3183hit)

  • A Reasonable Throughput Analysis of the CSK/SSMA Unslotted ALOHA System with Nonorthogonal Sequences

    Nobuyoshi KOMURO  Hiromasa HABUCHI  

     
    PAPER

      Vol:
    E88-A No:6
      Page(s):
    1462-1468

    In this paper, the throughput performance of the CSK/SSMA ALOHA system with nonorthogonal sequences which combines the ALOHA system with Code Shift Keying using nonorthogonal sequences is analyzed. In this system, the nonorthogonal sequences are constructed by concatenating Mcon orthogonal sequences. The throughput performance of the CSK/SSMA ALOHA system with nonorthogonal sequences is analyzed in consideration that the number of packets changes at intervals of one orthogonal sequence. Moreover, the throughput performance of our system with Channel Load Sensing Protocol (CLSP) is also analyzed. We also examine the influence of unreachable control signal of CLSP. Consequently, it is found that the throughput performance of our system decreases significantly by this analysis. It is also found that the throughput performance of our system improves greatly by using CLSP. However, the unreachable control signal affects the throughput performance of this system, seriously.

  • Extraction of Transformation Rules from UML Diagrams to SpecC

    Tetsuro KATAYAMA  

     
    PAPER

      Vol:
    E88-D No:6
      Page(s):
    1126-1133

    Embedded systems are used in broad fields. They are one of the indispensable and fundamental technologies in a highly informative society in recent years. As embedded systems are large-scale and complicated, it is prosperous to design and develop a system LSI (Large Scale Integration). The structure of the system LSI has been increasing complexity every year. The degree of improvement of its design productivity has not caught up with the degree of its complexity by conventional methods or techniques. Hence, an idea for the design of a system LSI which has the flow of describing specifications of a system in UML (Unified Modeling Language) and then designing the system in a system level language has already proposed. It is important to establish how to convert from UML to a system level language in specification description or design with the idea. This paper proposes, extracts and verifies transformation rules from UML to SpecC which is one of system level languages. SpecC code has been generated actually from elements in diagrams in UML based on the rules. As an example to verify the rules, "headlights control system of a car" is adopted. SpecC code has been generated actually from elements in diagrams in UML based on the rules. It has been confirmed that the example is executed correctly in simulations. By using the transformation rules proposed in this paper, specification and implementation of a system can be connected seamlessly. Hence, it can improve the design productivity of a system LSI and the productivity of embedded systems.

  • Interface for Barge-in Free Spoken Dialogue System Combining Adaptive Sound Field Control and Microphone Array

    Tatsunori ASAI  Hiroshi SARUWATARI  Kiyohiro SHIKANO  

     
    LETTER-Speech and Hearing

      Vol:
    E88-A No:6
      Page(s):
    1613-1618

    This paper describes a new interface for a barge-in free spoken dialogue system combining an adaptive sound field control and a microphone array. In order to actualize robustness against the change of transfer functions due to the various interferences, the barge-in free spoken dialogue system which uses sound field control and a microphone array has been proposed by one of the authors. However, this method cannot follow the change of transfer functions because the method consists of fixed filters. To solve the problem, we introduce a new adaptive sound field control that follows the change of transfer functions.

  • Background-Adjusted Weber-Fechner Fraction Considering Crispening Effect

    Dong-Ha LEE  Chan-Ho HAN  Kyu-Ik SOHNG  

     
    LETTER

      Vol:
    E88-A No:6
      Page(s):
    1529-1532

    The recognition limit of luminance difference in the human visual system (HVS) has not been studied systematically. In this paper, surround adapted Weber-Fechner fraction is calculated based on the crispening effect. It is found that surround adapted fractions have reduced to 1/3 of the traditional Weber-Fechner fractions. As compared with Breitmeyer's experiments, the presented result is a reasonable one. It can be used as some guide to design the digital display system when a designer needs to decide bit count of digital signal in considering of the limit of brightness level, and as the inspection tool of display manufacturing of brightness smear, defect, and so on.

  • New Encoding /Converting Methods of Binary GA/Real-Coded GA

    Jong-Wook KIM  Sang Woo KIM  

     
    PAPER-Systems and Control

      Vol:
    E88-A No:6
      Page(s):
    1554-1564

    This paper presents new encoding methods for the binary genetic algorithm (BGA) and new converting methods for the real-coded genetic algorithm (RCGA). These methods are developed for the specific case in which some parameters have to be searched in wide ranges since their actual values are not known. The oversampling effect which occurs at large values in the wide range search are reduced by adjustment of resolutions in mantissa and exponent of real numbers mapped by BGA. Owing to an intrinsic similarity in chromosomal operations, the proposed encoding methods are also applied to RCGA with remapping (converting as named above) from real numbers generated in RCGA. A simple probabilistic analysis and benchmark with two ill-scaled test functions are carried out. System identification of a simple electrical circuit is also undertaken to testify effectiveness of the proposed methods to real world problems. All the optimization results show that the proposed encoding/converting methods are more suitable for problems with ill-scaled parameters or wide parameter ranges for searching.

  • Fast Implementation of Extension Fields with TypeII ONB and Cyclic Vector Multiplication Algorithm

    Yasuyuki NOGAMI  Shigeru SHINONAGA  Yoshitaka MORIKAWA  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1200-1208

    This paper proposes an extension field named TypeII AOPF. This extension field adopts TypeII optimal normal basis, cyclic vector multiplication algorithm, and Itoh-Tsujii inversion algorithm. The calculation costs for a multiplication and inversion in this field is clearly given with the extension degree. For example, the arithmetic operations in TypeII AOPF Fp5 is about 20% faster than those in OEF Fp5. Then, since CVMA is suitable for parallel processing, we show that TypeII AOPF is superior to AOPF as to parallel processing and then show that a multiplication in TypeII AOPF becomes about twice faster by parallelizing the CVMA computation in TypeII AOPF.

  • A Blind Anti-Jammer Pre-Processor for GPS Receiver

    Tsui-Tsai LIN  

     
    LETTER-Antennas and Propagation

      Vol:
    E88-B No:5
      Page(s):
    2215-2219

    In this letter, a new blind anti-jammer pre-processor is proposed for GPS receivers to alleviate performance degradation due to strong jammers. Since strong jammers have been successfully removed before despreading, the proposed scheme can effectively extract the signals-of-interest, leading to significant performance enhancement as compared with conventional methods.

  • Hybrid Pattern BIST for Low-Cost Core Testing Using Embedded FPGA Core

    Gang ZENG  Hideo ITO  

     
    PAPER-Dependable Computing

      Vol:
    E88-D No:5
      Page(s):
    984-992

    In the Reconfigurable System-On-a-Chip (RSOC), an FPGA core is embedded to improve the design flexibility of SOC. In this paper, we demonstrate that the embedded FPGA core is also feasible for use in implementing the proposed hybrid pattern Built-In Self-Test (BIST) in order to reduce the test cost of SOC. The hybrid pattern BIST, which combines Linear Feedback Shift Register (LFSR) with the proposed on-chip Deterministic Test Pattern Generator (DTPG), can achieve not only complete Fault Coverage (FC) but also minimum test sequence by applying a selective number of pseudorandom patterns. Furthermore, the hybrid pattern BIST is designed under the resource constraint of target FPGA core so that it can be implemented on any size of FPGA core and take full advantage of the target FPGA resource to reduce test cost. Moreover, the reconfigurable core-based approach has minimum hardware overhead since the FPGA core can be reconfigured as normal mission logic after testing such that it eliminates the hardware overhead of BIST logic. Experimental results for ISCAS 89 benchmarks and a platform FPGA chip have proven the efficiency of the proposed approach.

  • Side Channel Cryptanalysis on XTR Public Key Cryptosystem

    Dong-Guk HAN  Tetsuya IZU  Jongin LIM  Kouichi SAKURAI  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1214-1223

    The XTR public key cryptosystem was introduced in 2000. XTR is suitable for a variety of environments including low-end smart cards, and is regarded as an excellent alternative to RSA and ECC. Moreover, it is remarked that XTR single exponentiation (XTR-SE) is less susceptible than usual exponentiation routines to environmental attacks such as the timing attack and the differential power analysis (DPA). This paper investigates the security of side channel attack (SCA) on XTR. In this paper, we show the immunity of XTR-SE against the simple power analysis if the order of the computation of XTR-SE is carefully considered. In addition, we show that XTR-SE is vulnerable to the data-bit DPA, the address-bit DPA, the doubling attack, the modified refined power analysis, and the modified zero-value attack. Moreover, we propose some countermeasures against these attacks. We also show experimental results of the efficiency of the countermeasures. From our implementation results, if we compare XTR with ECC with countermeasures against "SCAs," we think XTR is as suitable to smart cards as ECC.

  • Automatic Repair Mechanism of Secret Sharing Storage System

    Daisuke HAYASHI  Toshiyuki MIYAMOTO  Shinji DOI  Sadatoshi KUMAGAI  

     
    PAPER-Database

      Vol:
    E88-D No:5
      Page(s):
    971-975

    For mission-critical and safety-critical systems such as medical, financial, or administrative information systems, a secure and reliable storage system is indispensable. The main purpose of our research is to develop a highly secure and highly reliable storage system. We have proposed a storage system that utilizes a secret sharing scheme. The storage system is called the Secret Sharing Storage System. So far, we have developed a prototype of the storage system. In this paper, we propose an automatic repair mechanism, and an interval decision method for this system.

  • Visual-Dimension Interact System (VIS)

    Atsushi ONDA  Tomoyuki OKU  Eddie YU  Yoshie LEE  Ikuro CHOH  Pei-Yi CHIU  Jun OHYA  

     
    PAPER

      Vol:
    E88-D No:5
      Page(s):
    947-953

    In this paper we describe a mixed reality-supported interactive viewing enhancement museum display system: Visual-dimension Interact System (VIS). With a transparent interactive interface, the museum visitor is able to see, manipulate, and interact with the physical exhibit and its virtual information, which are overlapped on one other. Furthermore, this system provides the possibility for visitor to experience the creation process in an environment as close as possible to the real process. This has the function of assisting the viewer in understanding the exhibit and most importantly, gaining a so-to-speak hands-on experience of the creation process itself leading to a deeper understanding of it.

  • Design of Realtime 3-D Sound Processing System

    Kosuke TSUJINO  Kazuhiko FURUYA  Wataru KOBAYASHI  Tomonori IZUMI  Takao ONOYE  Yukihiro NAKAMURA  

     
    PAPER

      Vol:
    E88-D No:5
      Page(s):
    954-962

    An interactive 3-D sound processing system and its implementation is described, which is to provide virtual auditory environments to listeners. While conventional 3-D sound processing systems require high performance workstations or large DSP arrays, the proposed system is reduced in hardware size for practical applications. The proposed system is implemented using a prevailing IBM-compatible PC and a single DSP. Since the organization of the proposed system is independent of implementation details such as operation precision and number of audio tracks, the proposed system can be ported to various hardware entities. In addition, an easy-to-use user interface is also implemented on PC software for realtime input of 3-D sound movement. Owing to these features, the presented system is valuable as a prototype for various implementation of 3-D sound processing systems, while the current implementation is useful as a 3-D sound content production system.

  • Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem

    Chao-Liang LIU  Gwoboa HORNG  Hsin-Yu LIU  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:5
      Page(s):
    2171-2172

    In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.

  • IMM Algorithm Using Intelligent Input Estimation for Maneuvering Target Tracking

    Bum-Jik LEE  Jin-Bae PARK  Young-Hoon JOO  

     
    PAPER-Systems and Control

      Vol:
    E88-A No:5
      Page(s):
    1320-1327

    A new interacting multiple model (IMM) algorithm using intelligent input estimation (IIE) is proposed for maneuvering target tracking. In the proposed method, the acceleration level for each sub-model is determined by IIE-the estimation of the unknown target acceleration by a fuzzy system using the relation between the residuals of the maneuvering filter and the non-maneuvering filter. The genetic algorithm (GA) is utilized to optimize a fuzzy system for a sub-model within a fixed range of target acceleration. Then, multiple models are represented as the acceleration levels estimated by these fuzzy systems, which are optimized for different ranges of target acceleration. In computer simulation for an incoming anti-ship missile, it is shown that the proposed method has better tracking performance compared with the adaptive interacting multiple model (AIMM) algorithm.

  • Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication

    Katsuyuki OKEYA  Dong-Guk HAN  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1140-1147

    Side channel attacks (SCA) are serious attacks on mobile devices. In SCA, the attacker can observe the side channel information while the device performs the cryptographic operations, and he/she can detect the secret stored in the device using such side channel information. Ha-Moon proposed a novel countermeasure against side channel attacks in elliptic curve cryptosystems (ECC). The countermeasure is based on the signed scalar multiplication with randomized concept, and does not pay the penalty of speed. Ha-Moon proved that the countermeasure is secure against side channel attack theoretically, and confirmed its immunity experimentally. Thus Ha-Moon's countermeasure seems to be very attractive. In this paper we propose a novel attack against Ha-Moon's countermeasure, and show that the countermeasure is vulnerable to the proposed attack. The proposed attack utilizes a Markov chain for detecting the secret. The attacker determines the transitions in the Markov chain using side channel information, then detects the relation between consecutive two bits of the secret key, instead of bits of the secret key as they are. The use of such relations drastically reduces the search space for the secret key, and the attacker can easily reveal the secret. In fact, around twenty observations of execution of the countermeasure are sufficient to detect the secret in the case of the standard sizes of ECC. Therefore, the single use of Ha-Moon's countermeasure is not recommended for cryptographic use.

  • Design Guidelines and Process Quality Improvement for Treatment of Device Variations in an LSI Chip

    Masakazu AOKI  Shin-ichi OHKAWA  Hiroo MASUDA  

     
    PAPER

      Vol:
    E88-C No:5
      Page(s):
    788-795

    We propose guidelines for LSI-chip design, taking the within-die variations into consideration, and for process quality improvement to suppress the variations. The auto-correlation length, λ, of device variation is shown to be a useful measure to treat the systematic variations in a chip. We may neglect the systematic variation in chips within the range of λ, while σ2 of the systematic variation must be added to σ2 of the random variation outside the λ. The random variations, on the other hand, exhibit complete randomness even in the closest pair transistors. The mismatch variations in transistor pairs were enhanced by 1.41(=) compared with the random variations in single transistors. This requires careful choice of gate size in designing a transistor pair with a minimum size, such as transfer gates in an SRAM cell. Poly-Si gate formation is estimated to be the most important process to ensure the spatial uniformity in transistor current and to enhance circuit performance. Large relative variations are observed for the contact to p+ diffusion, via1 (M1-M2), and via2 (M2-M3) among parameter variations in passive elements. The standard deviations for random variations in via1 and via2 are noticeably widespread, indicating the importance of the via resistance control in BEOL. The spatial frequency power spectrum for within-die random variations is confirmed experimentally, as uniform ('white') with respect to the spatial frequency. To treat the large 'white random noise,' the least-square method with a 4th-order polynomial exhibits a best efficiency as a fitting function for decomposing the raw variation data into systematic part and random part.

  • An Improved Neighbor Selection Algorithm in Collaborative Filtering

    Taek-Hun KIM  Sung-Bong YANG  

     
    LETTER-Contents Technology and Web Information Systems

      Vol:
    E88-D No:5
      Page(s):
    1072-1076

    Nowadays, customers spend much time and effort in finding the best suitable goods since more and more information is placed on-line. To save their time and effort in searching the goods they want, a customized recommender system is required. In this paper we present an improved neighbor selection algorithm that exploits a graph approach. The graph approach allows us to exploit the transitivity of similarities. The algorithm searches more efficiently for set of influential customers with respect to a given customer. We compare the proposed recommendation algorithm with other neighbor selection methods. The experimental results show that the proposed algorithm outperforms other methods.

  • Sense of Virtual Reality: Effectiveness of Replacing 3D Imagery with 2D/3D Hybrid Imagery

    Shinji TASAKI  Takehisa MATSUSHITA  Kazuhiro KOSHI  Chikamune WADA  Hiroaki KOGA  

     
    PAPER

      Vol:
    E88-D No:5
      Page(s):
    851-858

    This paper proposed the advantages of using a 2D/3D hybrid imagery system over the use of 3D by itself. A hybrid imagery system was created by projecting a 3D (stereo) image in between and overlapping onto two adjacent 2D images. The negative effect where 2D and 3D images overlap was studied and resolved. Then sensations subject experienced from the visual cues under the different conditions were attained. Participant's sensations while looking at the different forms of imagery on both a flat screen and a flat/inclined screen combination were then attained. The data for the 2D/3D hybrid system were compared with that attained for a 3D image system on its own (without 2D images). Results indicate that there are benefits to using a 2D/3D hybrid system over 3D by itself.

  • Modified Adaptive Fuzzy Sliding Mode Controller for Uncertain Nonlinear Systems

    Chung-Chun KUNG  Ti-Hung CHEN  Lei-Huan KUNG  

     
    PAPER-Systems and Control

      Vol:
    E88-A No:5
      Page(s):
    1328-1334

    In this paper, a modified adaptive fuzzy sliding mode controller for a certain class of uncertain nonlinear systems is presented. We incorporate the fuzzy sliding mode control technique with a modified adaptive fuzzy control technique to design a modified adaptive fuzzy sliding mode controller so that the proposed controller is robust against the unmodeled dynamics and the approximation errors. Firstly, we establish a fuzzy model to describe the dynamic characteristics of the given uncertain nonlinear system. Then, based on the fuzzy model, a fuzzy sliding mode controller is designed. By considering both the information of tracking error and modeling error, the modified adaptive laws for tuning the adjustable parameters of the fuzzy model are derived based on the Lyapunov synthesis approach. Since the modified adaptive laws contain both the tracking error and the modeling error, it implies that the fuzzy model parameters would continuously converge until both the tracking error and modeling error converges to zero. An inverted pendulum control system is simulated to demonstrate the control performance by using the proposed method.

  • A Dialogue-Based Information Retrieval Assistant Using Shallow NLP Techniques in Online Sales Domains

    Harksoo KIM  Choong-Nyoung SEON  Jungyun SEO  

     
    PAPER

      Vol:
    E88-D No:5
      Page(s):
    801-808

    Most of commercial websites provide customers with menu-driven navigation and keyword search. However, these inconvenient interfaces increase the number of mouse clicks and decrease customers' interest in surfing the websites. To resolve the problem, we propose an information retrieval assistant using a natural language interface in online sales domains. The information retrieval assistant has a client-server structure; a system connector and a NLP (natural language processing) server. The NLP server performs a linguistic analysis of users' queries with the help of coordinated NLP agents that are based on shallow NLP techniques. After receiving the results of the linguistic analysis from the NLP server, the system connector interacts with outer information provision systems such as conventional information retrieval systems and relational database management systems according to the analysis results. Owing to the client-server structure, we can easily add other information provision systems to the information retrieval assistant with trivial modifications of the NLP server. In addition, the information retrieval assistant guarantees fast responses because it uses shallow NLP techniques. In the preliminary experiment, as compared to the menu-driven system, we found that the information retrieval assistant could reduce the bothersome tasks such as menu selecting and mouse clicking because it provides a convenient natural language interface.

1701-1720hit(3183hit)