The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] tin(3578hit)

1261-1280hit(3578hit)

  • Narrow Fingerprint Sensor Verification with Template Updating Technique

    SangWoo SIN  Ru ZHOU  Dongju LI  Tsuyoshi ISSHIKI  Hiroaki KUNIEDA  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E95-A No:1
      Page(s):
    346-353

    A novel Template Updating system for fingerprint verification systems used in mobile applications is introduced in the paper. Based on the proposed method, the system performance is improved much more than the original one. Not only the FRR (False Reject Rate) but also the small overlap problem caused by the very narrow sensor on the mobile phone are solved. Based on the template updating system, templates are replaced with matched inputs towards a target structure which can expand the coverage of templates with large displacement and rotation. By using the test database, the system performance shows the FRR can be reduced by 79% in comparison with the one without template updating procedure. This system was adopted in practical mobile phones in the commercial market in 2009.

  • Sampling and Reconstruction of Periodic Piecewise Polynomials Using Sinc Kernel

    Akira HIRABAYASHI  

     
    PAPER-Digital Signal Processing

      Vol:
    E95-A No:1
      Page(s):
    322-329

    We address a problem of sampling and reconstructing periodic piecewise polynomials based on the theory for signals with a finite rate of innovation (FRI signals) from samples acquired by a sinc kernel. This problem was discussed in a previous paper. There was, however, an error in a condition about the sinc kernel. Further, even though the signal is represented by parameters, these explicit values are not obtained. Hence, in this paper, we provide a correct condition for the sinc kernel and show the procedure. The point is that, though a periodic piecewise polynomial of degree R is defined as a signal mapped to a periodic stream of differentiated Diracs by R + 1 time differentiation, the mapping is not one-to-one. Therefore, to recover the stream is not sufficient to reconstruct the original signal. To solve this problem, we use the average of the target signal, which is available because of the sinc sampling. Simulation results show the correctness of our reconstruction procedure. We also show a sampling theorem for FRI signals with derivatives of a generic known function.

  • A Method for Reducing Perimeter Transitions in Beacon-Less Geographic Routing for Wireless Sensor Networks

    Takayuki FUJINO  Hiromi NISHIJIMA  

     
    LETTER-Network

      Vol:
    E95-B No:1
      Page(s):
    283-288

    This paper proposes a method for reducing redundant greedy-perimeter transitions in beacon-less geographic routing for wireless sensor networks (WSNs). Our method can be added to existing routing methods. Using a bloom filter, each node can detect a routing loop, and then the node stores the information as “failure history”. In the next forwarding the node can avoid such bad neighbors based on the failure history. Simulation results demonstrate the benefit of our method.

  • A Method for Detecting Determiner Errors Designed for the Writing of Non-native Speakers of English

    Ryo NAGATA  Atsuo KAWAI  

     
    PAPER-Educational Technology

      Vol:
    E95-D No:1
      Page(s):
    230-238

    This paper proposes a method for detecting determiner errors, which are highly frequent in learner English. To augment conventional methods, the proposed method exploits a strong tendency displayed by learners in determiner usage, i.e., mistakenly omitting determiners most of the time. Its basic idea is simple and applicable to almost any conventional method. This paper also proposes combining the method with countability prediction, which results in further improvement. Experiments show that the proposed method achieves an F-measure of 0.684 and significantly outperforms conventional methods.

  • Numerical Methods of Multilayered Dielectric Gratings by Application of Shadow Theory to Middle Regions

    Hideaki WAKABAYASHI  Keiji MATSUMOTO  Masamitsu ASAI  Jiro YAMAKITA  

     
    PAPER-Periodic Structures

      Vol:
    E95-C No:1
      Page(s):
    44-52

    In the scattering problem of periodic gratings, at a low grazing limit of incidence, the incident plane wave is completely cancelled by the reflected wave, and the total wave field vanishes and physically becomes a dark shadow. This problem has received much interest recently. Nakayama et al. have proposed “the shadow theory”. The theory was first applied to the diffraction by perfectly conductive gratings as an example, where a new description and a physical mean at a low grazing limit of incidence for the gratings have been discussed. In this paper, the shadow theory is applied to the analyses of multilayered dielectric periodic gratings, and is shown to be valid on the basis of the behavior of electromagnetic waves through the matrix eigenvalue problem. Then, the representation of field distributions is demonstrated for the cases that the eigenvalues degenerate in the middle regions of multilayered gratings in addition to at a low grazing limit of incidence and some numerical examples are given.

  • A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information Open Access

    Peidong ZHU  Huayang CAO  Wenping DENG  Kan CHEN  Xiaoqiang WANG  

     
    INVITED PAPER

      Vol:
    E95-D No:1
      Page(s):
    20-28

    Various incidents expose the vulnerability and fragility of the Internet inter-domain routing, and highlight the need for further efforts in developing new approaches to evaluating the trustworthiness of routing information. Based on collections of BGP routing information, we disclose a variety of anomalies and malicious attacks and demonstrate their potential impacts on the Internet security. This paper proposes a systematic approach to detecting the anomalies in inter-domain routing, combining effectively spatial-temporal multiple-view method, knowledge-based method, and cooperative verification method, and illustrates how it helps in alleviating the routing threats by taking advantage of various measures. The main contribution of our approach lies on critical techniques including the construction of routing information sets, the design of detection engines, the anomaly verification and the encouragement mechanism for collaboration among ASs. Our approach has been well verified by our Internet Service Provider (ISP) partners and has been shown to be effective in detecting anomalies and attacks in inter-domain routing.

  • Non-coherent Power Decomposition-Based Energy Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Bingxuan ZHAO  Shigeru SHIMAMOTO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:1
      Page(s):
    234-242

    As the fundamental component of dynamic spectrum access, implementing spectrum sensing is one of the most important goals in cognitive radio networks due to its key functions of protecting licensed primary users from harmful interference and identifying spectrum holes for the improvement of spectrum utilization. However, its performance is generally compromised by the interference from adjacent primary channels. To cope with such interference and improve detection performance, this paper proposes a non-coherent power decomposition-based energy detection method for cooperative spectrum sensing. Due to its use of power decomposition, interference cancellation can be applied in energy detection. The proposed power decomposition does not require any prior knowledge of the primary signals. The power detection with its interference cancellation can be implemented indirectly by solving a non-homogeneous linear equation set with a coefficient matrix that involves only the distances between primary transmitters and cognitive secondary users (SUs). The optimal number of SUs for sensing a single channel and the number of channels that can be sensed simultaneously are also derived. The simulation results show that the proposed method is able to cope with the expected interference variation and achieve higher probability of detection and lower probability of false alarm than the conventional method in both hard combining and soft combining scenarios.

  • A Fault-Tolerant Architecture with Error Correcting Code for the Instruction-Level Temporal Redundancy

    Chao YAN  Hongjun DAI  Tianzhou CHEN  

     
    PAPER-Trust

      Vol:
    E95-D No:1
      Page(s):
    38-45

    Soft error has become an increasingly significant concern in modern micro-processor design, it is reported that the instruction-level temporal redundancy in out-of-order cores suffers an performance degradation up to 45%. In this work, we propose a fault tolerant architecture with fast error correcting codes (such as the two-dimensional code) based on double execution. Experimental results show that our scheme can gain back IPC loss between 9.1% and 10.2%, with an average around 9.2% compared with the conventional double execution architecture.

  • DOA Estimation in Unknown Noise Fields Based on Noise Subspace Extraction Technique

    Ann-Chen CHANG  Jhih-Chung CHANG  Yu-Chen HUANG  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:1
      Page(s):
    300-303

    This letter realizes direction of arrival (DOA) estimation by exploiting the noise subspace based estimator. Since single subspace feature extraction fails to achieve satisfactory results under unknown noise fields, we propose a two-step subspace feature extraction technique that is effective even in these fields. When a new noise subspace is attained, the proposed estimator without prewhitening can form the maximizing orthogonality especially for unknown noise fields. Simulation results confirm the effectiveness of the proposed technique.

  • Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing

    Bin DAI  Feng WANG  Baokang ZHAO  Jinshu SU  

     
    PAPER-Security

      Vol:
    E95-D No:1
      Page(s):
    94-107

    Multipath routing has been extended to Border Gateway Protocol (BGP), the current de facto inter-domain routing protocol, to address the reliability and performance issues of the current Internet. However, inter-domain multipath routing introduces a significant challenge for scalability due to the large scale of the inter-domain routing system. At the same time it also introduces new challenges in terms of security and security related overhead. In this paper, we propose a regional multipath approach, Regional Multipath Inter-domain Routing (RMI), where multiple paths are only allowed to be propagated within a well-defined range. With multipath routing in a region, we enable inter-domain routing with rich path diversity and improved security, and no longer have to sacrifice scalability. We show how to propagate multiple paths based on the region by theoretical analysis and by extensive simulations. Our simulations show that the number of messages generated using this approach and the convergence delay are much less than those of BGP and BGP with full multipath advertisement.

  • Passive Coding-Based Epidemic Routing in Sparsely Populated Mobile Ad hoc Networks

    Yasushi YAMAWAKI  Takahiro MATSUDA  Tetsuya TAKINE  

     
    PAPER-Network

      Vol:
    E95-B No:1
      Page(s):
    169-177

    Epidemic Routing is a data delivery scheme based on the store-carry-forward routing paradigm for sparsely populated mobile ad hoc networks. In Epidemic Routing, each node copies packets in its buffer into any other node that comes within its communication range. Although Epidemic Routing has short delay performance, it causes excessive buffer space utilization at nodes because many packet copies are disseminated over the network. In this paper, aiming at efficient buffer usage, we propose an XOR-based delivery scheme for Epidemic Routing, where nodes encode packets by XORing them when their buffers are full. Note that existing delivery schemes with coding are active coding, where source nodes always encode packets before transmitting them. On the other hand, the proposed scheme is passive coding, where source nodes encode packets only when buffer overflow would occur. Therefore, the behavior of the proposed scheme depends on the buffer utilization. More specifically, if sufficient buffer space is available, the proposed scheme delivers packets by the same operation as Epidemic Routing. Otherwise, it avoids buffer overflow by encoding packets. Simulation experiments show that the proposed scheme improves the packet delivery ratio.

  • Investigation on Data Signal Muting to Improve Channel Estimation Accuracy in Downlink Coordinated Multiple-Point Transmission in LTE-Advanced

    Yusuke OHWATARI  Nobuhiko MIKI  Tetsushi ABE  Satoshi NAGATA  Yukihiko OKUMURA  

     
    PAPER

      Vol:
    E94-B No:12
      Page(s):
    3321-3334

    Accurate channel estimation for multiple cells is essential in downlink coordinated multi-point (CoMP) transmission/reception. Therefore, this paper investigates a technique to improve the channel estimation for downlink CoMP in Long-Term Evolution (LTE)-Advanced. In particular, the performance of data signal muting, i.e., muting data signals that collide with the channel state information reference signal (CSI-RS) of a neighboring cell, is evaluated considering various CoMP schemes and intra-eNodeB and inter-eNodeB CoMP scenarios. In a multi-cell link level simulation, coordinated scheduling and coordinated beamforming (CS/CB) CoMP is employed. The simulation results show that data signal muting is effective in improving the channel estimation accuracy, which is confirmed by numerical analysis. Simulation results also show that it is effective in improving the throughput performance, especially for sets of user equipment at the cell boundary. Furthermore, the tradeoff relationship between accurate channel estimation by muting larger numbers of data signals and a high peak data rate, i.e., low overhead, is investigated. It is shown that when the number of coordinated cells is set to three, the CSI-RS reuse factor is set to three, and the well-planned CSI-RS pattern allocation is employed, the improvement in performance is almost saturated in a synchronized network.

  • A Graph Rewriting Approach for Converting Asynchronous ROMs into Synchronous Ones

    Md. Nazrul Islam MONDAL  Koji NAKANO  Yasuaki ITO  

     
    PAPER

      Vol:
    E94-D No:12
      Page(s):
    2378-2388

    Most of FPGAs have Configurable Logic Blocks (CLBs) to implement combinational and sequential circuits and block RAMs to implement Random Access Memories (RAMs) and Read Only Memories (ROMs). Circuit design that minimizes the number of clock cycles is easy if we use asynchronous read operations. However, most of FPGAs support synchronous read operations, but do not support asynchronous read operations. The main contribution of this paper is to provide one of the potent approaches to resolve this problem. We assume that a circuit using asynchronous ROMs designed by a non-expert or quickly designed by an expert is given. Our goal is to convert this circuit with asynchronous ROMs into an equivalent circuit with synchronous ones. The resulting circuit with synchronous ROMs can be embedded into FPGAs. We also discuss several techniques to decrease the latency and increase the clock frequency of the resulting circuits.

  • Downlink Multi-Point Transmission Effect Using Aggregate Base Station Architecture

    Soon-Gi PARK  Dae-Young KIM  

     
    LETTER

      Vol:
    E94-B No:12
      Page(s):
    3374-3377

    Downlink multi-point transmission as a capacity enhancement method for the users at cell edge and the operators is studied in this paper. It is based on the so-called aggregate base station architecture using distributed antennas and cloud computing. Its advantages are analyzed by both its architectural side and simulation. The simulation results show that the capacity may be affected by the number of cell belonging to an aggregate base station and by the parameters related to the operation of it.

  • Telecommunications Network Planning Method Based on Probabilistic Risk Assessment

    Nagao OGINO  Hajime NAKAMURA  

     
    PAPER-Network

      Vol:
    E94-B No:12
      Page(s):
    3459-3470

    Telecommunications networks have become an important social infrastructure, and their robustness is considered to be a matter of social significance. Conventional network planning methods are generally based on the maximum volume of ordinary traffic and only assume explicitly specified failure scenarios. Therefore, present networks have marginal survivability against multiple failures induced by an extraordinarily high volume of traffic generated during times of natural disasters or popular social events. This paper proposes a telecommunications network planning method based on probabilistic risk assessment. In this method, risk criterion reflecting the degree of risk due to extraordinarily large traffic loads is predefined and estimated using probabilistic risk assessment. The probabilistic risk assessment can efficiently calculate the small but non-negligible probability that a series of multiple failures will occur in the considered network. Detailed procedures for the proposed planning method are explained using a district mobile network in terms of the extraordinarily large traffic volume resulting from earthquakes. As an application example of the proposed method, capacity dimensioning for the local session servers within the district mobile network is executed to reduce the risk criterion most effectively. Moreover, the optimum traffic-rerouting scheme that minimizes the estimated risk criterion is ascertained simultaneously. From the application example, the proposed planning method is verified to realize a telecommunications network with sufficient robustness against the extraordinarily high volume of traffic caused by the earthquakes.

  • Sleep Transistor Sizing Method Using Accurate Delay Estimation Considering Input Vector Pattern and Non-linear Current Model

    Seidai TAKEDA  Kyundong KIM  Hiroshi NAKAMURA  Kimiyoshi USAMI  

     
    PAPER-Physical Level Design

      Vol:
    E94-A No:12
      Page(s):
    2499-2509

    Beyond deep sub-micron era, Power Gating (PG) is one of the most effective techniques to reduce leakage power of circuits. The most important issue of PG circuit design is how to decide the width of sleep transistor. Smaller total sleep transistor width provides smaller leakage power in standby mode, however, insufficient sleep transistor insertion suffers from significant performance degradation. In this paper, we present an accurate and fast gate-level delay estimation method for PG circuits and a novel sleep transistor sizing method utilizing our delay estimation for module-based PG circuits. This method achieves high accuracy within acceptable computation time utilizing accurate discharge current estimation based on delayed logic simulations with limited input vector patterns and by realizing precise current characteristics for logic gates and sleep transistors. Experimental results show that our delay estimation successfully achieves high accuracy and avoids overestimation and underestimation seen in conventional method. Also, our sleep transistor sizing method on average successfully reduces the width of sleep transistors by 40% when compared to conventional methods within an acceptable computation time.

  • Implementation of Scale and Rotation Invariant On-Line Object Tracking Based on CUDA

    Quan MIAO  Guijin WANG  Xinggang LIN  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E94-D No:12
      Page(s):
    2549-2552

    Object tracking is a major technique in image processing and computer vision. Tracking speed will directly determine the quality of applications. This paper presents a parallel implementation for a recently proposed scale- and rotation-invariant on-line object tracking system. The algorithm is based on NVIDIA's Graphics Processing Units (GPU) using Compute Unified Device Architecture (CUDA), following the model of single instruction multiple threads. Specifically, we analyze the original algorithm and propose the GPU-based parallel design. Emphasis is placed on exploiting the data parallelism and memory usage. In addition, we apply optimization technique to maximize the utilization of NVIDIA's GPU and reduce the data transfer time. Experimental results show that our GPGPU-based method running on a GTX480 graphics card could achieve up to 12X speed-up compared with the efficiency equivalence on an Intel E8400 3.0 GHz CPU, including I/O time.

  • Single-Layer Trunk Routing Using Minimal 45-Degree Lines

    Kyosuke SHINODA  Yukihide KOHIRA  Atsushi TAKAHASHI  

     
    PAPER-Physical Level Design

      Vol:
    E94-A No:12
      Page(s):
    2510-2518

    In recent Printed Circuit Boards (PCB), the design size and density have increased, and the improvement of routing tools for PCB is required. There are several routing tools which generate high quality routing patterns when connection requirement can be realized by horizontal and vertical segments only. However, in high density PCB, the connection requirements cannot be realized when only horizontal and vertical segments are used. Up to one third nets can not be realized if no non-orthogonal segments are used. In this paper, a routing method for a single-layer routing area that handles higher density designs in which 45-degree segments are used locally to relax the routing density is introduced. In the proposed method, critical zones in which non-orthogonal segments are required in order to realize the connection requirements are extracted, and 45-degree segments are used only in these zones. By extracting minimal critical zones, the other area that can be used to improve the quality of routing pattern without worry about connectivity issues is maximized. Our proposed method can utilize the routing methods which generate high quality routing pattern even if they only handle horizontal and vertical segments as subroutines. Experiments show that the proposed method analyzes a routing problem properly, and that the routing is realized by using 45-degree segments effectively.

  • Maximal Interconnect Resilient Methodology for Fault Tolerance, Yield, and Reliability Improvement in Network on Chip

    Katherine Shu-Min LI  Chih-Yun PAI  Liang-Bi CHEN  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E94-A No:12
      Page(s):
    2649-2658

    This paper presents an interconnect resilient (IR) methodology with maximal interconnect fault tolerance, yield, and reliability for both single and multiple interconnect faults under stuck-at and open fault models. By exploiting multiple routes inherent in an interconnect structure, this method can tolerate faulty connections by efficiently finding alternative paths. The proposed approach is compatible with previous interconnect detection and diagnosis methods under oscillation ring schemes, and together they can be applied to implement a robust interconnect structure that may still provide correct communication even under multiple link faults in Network-on-Chips (NoCs). With such knowledge, designers can significantly improve interconnect reliability by augmenting vulnerable interconnect structures in NoCs. As a result, the experimental results show that alternative paths in NoCs can be found for almost all paths. Hence, the proposed method provides a good way to achieve fault tolerance and reliability/yield improvement.

  • Hybrid Test Application in Partial Skewed-Load Scan Design

    Yuki YOSHIKAWA  Tomomi NUWA  Hideyuki ICHIHARA  Tomoo INOUE  

     
    PAPER-Logic Synthesis, Test and Verification

      Vol:
    E94-A No:12
      Page(s):
    2571-2578

    In this paper, we propose a hybrid test application in partial skewed-load (PSL) scan design. The PSL scan design in which some flip-flops (FFs) are controlled as skewed-load FFs and the others are controlled as broad-side FFs was proposed in [1]. We notice that the PSL scan design potentially has a capability of two test application modes: one is the broad-side test mode, and the other is the hybrid test mode which corresponds to the test application considered in [1]. According to this observation, we present a hybrid test application of the two test modes in the PSL scan design. In addition, we also address a way of skewed-load FF selection based on propagation dominance of FFs in order to take advantage of the hybrid test application. Experimental results for ITC'99 benchmark circuits show that the hybrid test application in the proposed PSL scan design can achieve higher fault coverage than the design based on the skewed-load FF selection [1] does.

1261-1280hit(3578hit)