The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For coherent detection using multi-level modulation formats, we demonstrated small responsivity imbalance of the InP-based p-i-n photodiode array monolithically integrated with the 90° hybrid consisting of 2 × 4 and 2 × 2 multimode interference structures and a 45° phase shifter. Responsivity imbalance of the In-phase and Quadrature channels was less than ±0.2 dB over the C-band by the adoption of...
This paper reviews the development of planar antennas to be implemented in millimeter wave systems, which have been conducted in the series of project “the research and development project for expansion of radio spectrum resources” of the Ministry of Internal Affairs and Communications(MIC), Japan.
NAND flash memories are now indispensable for our modern lives. The application range of the storage memory devices began with digital still cameras and has been extended to USB memories, memory cards, MP3 players, cell phones including smart phones, netbooks, and so on. This is because higher storage capacity and lower cost are realized through means of technology scaling every year. Emerging markets,...
Dark net monitoring is an effective method to analyze malicious activities on networks including the Internet. Since there is no legitimate host on darknets, traffic sent to such a space is considered to be malicious. There are two major issues for dark net monitoring: how to prepare unused address space and how to configure network sensors deployed on the network. Preparation of monitoring addresses...
The number of malware is increasing rapidly and a lot of malware use stealth techniques such as encryption to evade pattern matching detection by anti-virus software. To resolve the problem, behavior based detection method which focuses on malicious behaviors of malware have been researched. Although they can detect unknown and encrypted malware, they suffer a serious problem of false positives against...
We aim to create a novel prototype linear actuator with new structure applying an ER (Electro-Rheological) gel, a recent functional material. The actuator will be an all-purpose actuator satisfying characteristics for human-coexistence application. Such actuators for the application need large generative force, high speed response, good controllability, high safety, low friction, backdriveability...
In this paper, we deal with a problem to capture a target by linear multi-agent systems where the agents behave autonomously, whereas the target escapes with a reasonable strategy. We give necessary and sufficient conditions or sufficient conditions for the success of the capturing for several cases. The conditions clarify the performance competition between the target and the agents and we propose...
In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management...
A correlation between “haze” signals from DF (dark field) inspectors and electrical failure rates is reported. We provide experimental data that reflect a direct correlation between haze-signal values and the rate of electrically failing bits in advanced SRAM. This result is considered in the light of experiments including haze signals produced by wafers on which polystyrene latex (PSL) particles...
Cu-via open failures have become a major yield-loss factor for advanced SoCs. In this paper, we propose a new “scribe VC-TEG” for the short-loop monitoring of Cu-via open failures. The VC-TEG is to be embedded in the scribe lines of SoC product wafers. We introduce this TEG and discuss the optimization of its design. Critical area analysis (CAA) is utilized in quantitatively evaluating the TEG pattern...
While gracefully combining FMIPv6 and HMIPv6 together, F-HMIPv6 enables the best performance in terms of handover latency and signaling overhead. Recently, to protect F-HMIPv6, Kang and Park proposed a security scheme. This scheme successfully achieves seamless integration with FHMIPv6 while providing the session key exchange as well as the mobile node authentication. In this paper, Kang-Park's scheme...
Nowadays, certain kinds of robots have been developed to be used in proximity to daily human activities. Backdriveability is important for robots to act according to users' movements. We want to develop a linear actuator of high power and backdriveability. In this study we aim to achieve high generative force and backdriveability with a novel linear actuator, because there are many straight line operations...
Market mechanism is effective to encourage more people to participate in the grid environment. Applying economic principles to grid is deemed promising to improve the overall value provided by such participants. However, resource scheduling algorithms are different depending on different needs. In this paper, we mainly focus on the consumers' own interest. Assuming that the consumers are selfish and...
Reputation systems are very useful in large online communities in which users may frequently have the opportunity to interact with users with whom they have no prior experience. Recently, how to enhance the cooperative behaviors in the reputation system that has became to one of the key open issues. Research in the evolutionary game theory shows that the group selection or multilevel selection can...
In this paper, the pitch angle control design problem of wind turbine generator is considered. Dynamic characteristics of wind turbine system vary according to the wind speed and also the generator speed. But it is required to maintain the generator speed at the optimal one in spite of such variations. For this purpose, the pitch angle control of wind turbine which includes the robust stability performance...
One of the challenges for ubiquitous intelligence computing is how to enable ubiquitous devices (u-devices) certain levels of intelligent/smart/autonomic/ processing capabilities. Due to their limited capacity and processing power, it is difficult to embed such capabilities into u-devices. The idea is to design an intelligence entity sharing pool in which an intelligence entity can be dynamically...
The stream/bounce effect is an example of audio/visual interaction in which two identical luminance-defined targets in a 2-D display move toward one another from opposite sides of a display, coincide, and continue past one another along collinear trajectories. The targets can be perceived to either stream past or bounce off of one another. Streaming is the dominant perception in visual only displays...
X-by-Wire systems are expected to enhance vehicle driving performance and safety. Regarding the dependable and cost-effective electronic platform for X-by-Wire systems, the network centric architecture is proposed based on a concept of autonomous decentralized systems. This architecture enables that, if one node fails, the remaining normal nodes autonomously execute a backup control to maintain the...
We address secure secret key distribution in wireless communication systems. There is the secrecy capacity concept that it can distribute information which the third parties can not eavesdrop because of the noise over the distribution channel. Then, we address secure secret key distribution in wireless communication systems using secrecy capacity concept. Wireless channel is noisier compared with...
Today, with increasing deversity of network technologies, people have been likely to be interested in anonymity. The attacker might threaten anonymity of senders and receivers by confirming linkability between their sessions. Recently, Golle et al. proposed the re-encryption scheme applicable to Mix, called universal re-encryption. In this scheme, a ciphertext is supposed to be re-encrypted without...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.