The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
14xx-nm pump lasers with double fiber Bragg gratings (FBGs) for Raman amplifiers show superior stable characteristics such as the lasing wavelength and power fluctuation in time domain comparing with 14xx-nm pump lasers with single FBG.
This paper presents a novel disturb mitigation technique which achieves low-power and low-voltage SRAM. Our proposed technique consists of a floating bitline technique and a low-swing bitline driver (LSBD). We fabricated a 512-Kb 8T SRAM test chip that operates at a single 0.5-V supply voltage. The proposed technique achieves 1.52-pJ/access active energy in a write cycle and 72.8-µW leakage power,...
This paper introduces a novel half-select resilient dual write wordline 8T (DW8T) SRAM with a sequential writing technique. The process scaling increases random variation that degrades SRAM operating margins, for which the proposed DW8T cell presents two features: half-VDD precharging write bitlines and dual write wordlines. The dual write wordlines are sequentially activated in a write cycle, and...
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels...
This paper presents a novel disturb mitigation scheme which achieves low-power and low-voltage operation for a deep sub-micron SRAM macro. The classic write-back scheme overcame a half-select problem and improved a yield; however, the conventional scheme consumed more power due to charging and discharging all write bitlines (WBLs) in a sub block. Our proposed scheme consists of a floating bitline...
One of the problems affecting sensor networks for natural environments is the attenuation of radio waves due to high humidity, and the attenuation is worst in the case of a 2.4 GHz radio wave. We are developing a transmission control method that estimates communication environment fluctuations caused by changes in the natural environment. This paper discusses a transmission performance in wireless...
A generalized variable time-gap spacing policy for circular highways is developed. The proposed approach is based on the results that uses the density information of the segment on which each vehicle is traveling and more information is taken into account in the new framework. A numerical example is provided to demonstrate the efficacy of the proposed approach.
This paper aims to find interested association rules, known as data mining technique, out of the dataset of downloading logs by focusing on the coordinated activity among downloading servers. The result of the analysis shows the association rules of the downloading servers and that of the malwares.
This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting behavior of downloads and the port-scans. The analyses show that some new features of the coordinated attacks performed by Botnet, e.g., some particular strings contained in packets in downloading malwares, and the common patterns...
Electron microscope tomography has been proven as an essential technique for imaging the structure of cells beyond the range of the light microscope down to the molecular level. However, because of the extreme difference in spatial scales, there is a large gap to be bridged between light and electron microscopy. Various techniques have been developed, including increasing size of the sensor arrays,...
Observation of port-scan packets performed over the Internet is involved with so many parameters including time, port numbers, source and destination addresses. There are some common port numbers to which many malicious codes likely use to scan, but a relationship between port numbers and the malicious codes are not clearly identified. In this paper, we propose a new attempt to figure characteristics...
High quality tomographic reconstruction from electron microscope images requires precise alignment of the images. This cannot be accomplished by simple 2D image transformations because the electron trajectories through the object are curvilinear. Accordingly, the alignment process requires an inferred object position and, in addition, nonlinear projection maps for each image. This may be accomplished...
This paper proposes a high-speed reverse geocoding method for location-based service. In geocoding, the longitude and latitude become mutually convertible with the ldquoarea name.rdquo The ldquoarea namerdquo is an address and landmark name such as ldquoKoganei Cityrdquo and ldquoTokyo Towerrdquo that are easy for the user to understand. In traditional reverse geocoding methods, long conversion time...
Services on peer-to-peer (P2P) networks tend to be spread throughout the world. However, there are several problems with peer-to-peer networks, such as illegal file sharing or information leaks. These problems are caused by the ability to freely connect many anonymous nodes. The present paper proposes a method of access control applying a social network to a P2P network. We can achieve access control...
This paper discusses the implementation using the Java programming language of the computer code WebPRAC (Parabolic Reflector Analysis Code for the Web), introduced in (Rabelo et al., 2007), the internet version of PRAC for DOS (Terada and Stutzman, 1995) and PRAC for Windows (Terada, 2005). PRAC is a user-friendly code designed for analyzing offset parabolic reflector antennas with high precision...
A high-throughput and high-reliable physical-layer architecture for very-short-reach (VSR) and backplane Ethernet applications was developed. VSR and backplane networks provide 100-Gb/s data transmission between blade servers and LAN switches. This architecture supports 100-Gb/s-throughput, high-reliability, and low-latency data transmission, making it well suited to VSR and backplane applications...
Computer worms randomly perform port-scans to find vulnerable hosts to intrude over the Internet. Malicious software varies its port-scan strategy, e.g., some hosts intensively perform scans on a particular target and some hosts scan uniformly over IP address blocks. In this paper, we propose a new automated worm classification scheme from distributed observations. Our proposed scheme can detect some...
We study an estimation of average duration of malicious port-scanning attempts, which would help for an analysis the statistical survey of malicious behaviors and an application to estimate activity of worms spread. This paper reports an average duration of worm activity estimated from random sampling of statistical data actually observed by the Internet Scan Data System, ISDAS.
With advent of ubiquitous age, the high quality dielectric materials have been required for the wireless communications available to the millimeterwave as well as microwave frequencies. These high frequencies would be expected for ultra high speed LAN, ETS and car anti-collision system on the intelligent transport system (ITS) and so on. Silicates are good candidate for microwave/millimeterwave dielectrics,...
A reconfigurable ultra wideband log-periodic dipole array (LPDA) antenna is herein introduced. Built utilizing low cost and/or recyclable materials it can cover frequencies from 74 MHz to 2 Ghz, through the discrete adjustment of its elements. The antenna's gain in a given frequency band of operation can also be changed by the reconfiguration of its elements. The design, construction and testing processes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.