scispace - formally typeset
Search or ask a question

Showing papers in "Nec Research & Development in 2002"


Journal Article
TL;DR: In this paper, an 8-DFB arrayed monolithic light source realized 40nm operation in the L-band by covering 5nm per DFB-LD with a uniquely designed etalon-based wavelength locker realized very stable operation and uniform locking performance for all channels.
Abstract: A wide-band wavelength-selectable light source module with integrated multi-wavelength-locker has been developed. An 8-DFB arrayed monolithic light source realized 40nm operation in the L-band by covering 5nm per DFB-LD. A uniquely designed etalon-based wavelength locker realized very stable operation and a uniform locking performance for all channels. The locked wavelength stayed within at least a 1GHz range when the case temperature of the module was changed from 25 to 65°C.

23 citations


Journal Article
TL;DR: In this article, a 20-data-channel transceiver with a control channel allows uncoded data transfer with 13ns latency and achieves 10GB/s with 20ps resolution.
Abstract: A 20-data-channel transceiver with a control channel allows uncoded data transfer with 13ns latency. A digital DLL (Delay Locked Loop) with a ring-interpolator tracks phase with 20ps resolution. A pre-emphasis driver enables 2Gbps transmission per channel over a 7m cable at 1.5V supply. The effective full-duplex bandwidth reaches 10GB/s.

15 citations


Journal Article
TL;DR: This work proposes and analyzes two heuristic routing and aggregation algorithms (online and offline) based on ring topology, and introduces a new functional device (non-uniform waveband deaggregator) and demonstrates its advantages.
Abstract: We consider hierarchical optical networks with different granularities of paths and their segments (wavelengths and wavebands). We propose and analyze two heuristic routing and aggregation algorithms (online and offline). The analysis is based on ring topology; its results are supported by simulations of metro (ring) and core (mesh) networks. The simulations demonstrate a significant cost reduction (from 50% in online algorithm to almost 70% in offline one). We introduce a new functional device (non-uniform waveband deaggregator) and demonstrate its advantages. We also describe a prototype hybrid optical cross-connect based on non-uniform wavebands.

10 citations


Journal Article
TL;DR: This method for the prediction of protein function from its sequence information using hidden Markov models and neural networks shows high prediction performance, which implies that the system seems to acquire the biological features hidden in the sequences.
Abstract: We present a method for the prediction of protein function from its sequence information using hidden Markov models and neural networks. The hidden Markov models are used for representing the sequence order information and the neural networks are used for representing the amino acid composition information. For the hidden Markov models, the network topology is automatically designed using the iterative duplication method developed by our group. For the neural networks, 20 input units corresponding to 20 amino acid composition are used. We adopted this method to the problem of subcellular localization prediction. As a result, it shows high prediction performance. This implies that the system seems to acquire the biological features hidden in the sequences.

10 citations


Journal Article
TL;DR: Three kinds of peripheral units, mobile PC-embedded-model, SDK (Software Development Kit) were developed, each unit and model is an intelligent type which has all functions in one hardware module for fingerprint authentication.
Abstract: Highly accurate AFIS(Automated Fingerprint Identification System) of NEC was developed in 1982 and many systems have been installed for law enforcement offices in the world. The fingerprint feature extraction and comparison algorithm used in the AFIS were modified and adjusted so as to permit authentication of individual identity. Three kinds of peripheral units, mobile PC-embedded-model, SDK (Software Development Kit) were developed. As the hardware module in the unit and model employs an MPU (Microprocessor Unit) for authentication (image capturing, feature extraction and comparison), each unit and model is an intelligent type which has all functions in one hardware module for fingerprint authentication. This fingerprint authentication system is called SecureFinger.

5 citations


Journal Article
TL;DR: An object-oriented approach to parallel non-linear Finite Element simulations which is implemented in the HeadFEM code, a SimBio simulation component designed for the pre-operative planning of maxillo-facial surgery.
Abstract: The SimBiot project provides a generic simulation environment for advanced clinical practice and health care. A key feature is the input of individual patient data to the modeling and simulation process. The project evaluation & validation will demonstrate improvements in non-invasive diagnosis, pre-operative planning and design of prostheses. The SimBio environment components are: discrete representation of the physical problem; numerical solution system; inverse problem and optimization; visualization. The environment will be designed for execution on parallel and distributed computing systems. The compute-intensive components of SimBio's numerical solution system will be implemented on High Performance Computing (HPC) platforms. This paper is focused on an object-oriented approach to parallel non-linear Finite Element simulations which is implemented in the HeadFEM code. HeadFEM is a SimBio simulation component designed for the pre-operative planning of maxillo-facial surgery.

5 citations


Journal Article
TL;DR: In this article, a new epoxy molding resin for L/F that is also Pb free was developed, which is a material that is not only Br/Sb free but does not use any flame retarding additive.
Abstract: A typical need for semiconductor-packaging materials in recent is that it should be environmentally friendly. Most molding compounds include flame-retarding additives such as halogen (Br) compounds and antimony trioxide. However, the use of halogen compounds and antimony trioxide involves environmental issues. Flame-retardant resin compounds containing no flame-retarding additives need to be developed. Environmental friendliness means not only being Br/Sb free but also Pb free. Molding compounds need higher reliability, especially resistance of packages to solder heating, because the melting point of Pb free type solder is higher than that of eutectic solder, so the reflow temperature rises from 240 to 260°C. Molding compounds which satisfy both flame retarding additive free and high reliability need to be developed immediately. We have developed a material that is not only Br/Sb free but which does not use any flame retarding additive. This paper reports the development of a new epoxy molding resin for L/F that is also Pb free.

3 citations


Journal Article
TL;DR: A real-time auto surveillance system with smooth control of an active camera that detects an intruding object with a zoom lens set at a wide angle, and tracks it with zooming up in order to display it in more detail.
Abstract: This paper describes a real-time auto surveillance system with smooth control of an active camera. The system detects an intruding object with a zoom lens set at a wide angle, and tracks it with zooming up in order to display it in more detail. Two object tracking methods are prepared and their adaptive selection method is introduced. The object tracking is normally based on moving object detection through inter-frame subtraction with camera-motion compensation. The template-matching-based object tracking is applied to cover cases where the object stands still. A pan-tilt-zoom feedback control is also implemented between image processing and camera controller to track and keep the object smoothly at the center of the screen with a certain size. The experimental results reveal that its tracking accuracy reaches a practical level even under outdoor conditions.

3 citations


Journal Article
TL;DR: A versatile speech-to-speech translation system for travel abroad is achieved, which is with much larger vocabulary and capable of translating spoken conversations in more situations compared to previous work.
Abstract: We present a speech-to-speech translation system for notebook PC's that helps oral communication between Japanese and English-speaking persons in various situations when traveling abroad. We have especially tried to solve the problem of limitations in the variety of acceptable expressions and situations in conventional approaches to speech-to-speech translation. A solution of this problem is very important since it leads to the realization of a practical speech-to-speech translation system for travelers who encounter various situations during travel abroad, such as hotel and air reservations, ordering in a restaurant and so on. Due to the high accuracy of the compact speech recognition engine and our lexicalized grammar approach to machine translation that utilizes corpus but is oriented to model general linguistic phenomena as well as word-specific ones, a versatile speech-to-speech translation system for travel abroad has been achieved that has a much larger vocabulary and is capable of translating spoken conversations in more situations compared to previous work.

3 citations


Journal Article
TL;DR: It is suggested that it is necessary to consider the cooperative effect of amino acid interactions in order to improve computer-aided protein engineering of protein thermostabilization.
Abstract: We used DNA shuffling to make a mutant lactate oxidase (LOD) that is more thermostable than wild-type LOD. The half-life of E160G/V198I mutant LOD at 70°C was about three times that of E160G LOD, and was about 20 times that of wild-type LOD. In contrast, the thermal stability of the V198I single-mutant LOD made by site-directed mutagenesis was almost identical to that of wild-type LOD. This indicates that the V198I mutation alone does not affect LOD thermostability, but does affect it when combined with the E160G mutation. This unusual data can be explained on the basis of our model structure of LOD as follows. The Glu→Gly mutation at position 160 (E160G) increases the stability of the whole (β/α) 8 barrel. However, this mutation E160G completely eliminates the favorable interaction between the (β/α) 8 barrel structure and a large loop that would otherwise occur through the hydrogen bond network. The second mutation Val→Ile at position 198 (V198I) in this large loop recovers the interaction. These findings suggest that it is necessary to consider the cooperative effect of amino acid interactions in order to improve computer-aided protein engineering of protein thermostabilization.

2 citations


Journal Article
TL;DR: NEC has succeeded in developing a high-strength cipher CIPHERUNICORN-A that has a safety equal to or greater than that of all the AES candidates and Rijndael, a FIPS-approved symmetric encryption algorithm.
Abstract: NEC has succeeded in developing a high-strength cipher CIPHERUNICORN-A. The CIPHERUNICORN-A is a common key cipher system to provide encryption with 128-bit data as one block. The master key length can be selected from 128, 192 and 256 bits. This specification is compatible with the Federal Information Processing Standard (FIPS) for the Advanced Encryption Standard (AES), FIPS-197. This standard specifies Rijndael as a FIPS-approved symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information. In August 2000, fifteen AES candidates proposed in response to a worldwide public call have been narrowed down to five include Rijndael. NEC used the cipher strength evaluation support system to conduct an objective evaluation of the CIPHERUNICORN-A and five finalists. This evaluation has demonstrated that the CIPHERUNICORN-A has a safety equal to or greater than that of all the AES candidates. Furthermore, in July 2000, CIPHERUNICORN-A was submitted to Cryptography Research & Evaluation Committees (CRYPTREC) in order to be nominated for a Japanese governmental standard, because the objectives of the CRYPTREC project are to make lists of cryptographic techniques for a common security basis to the Japanese e-Government of which the infrastructure and primary systems are to be implemented by FY 2003.

Journal Article
TL;DR: An overview of the CX 5220 Core Router is given and its rich set of features are described, which provides non-stop operation and offers carrier-class reliability through a redundant configuration.
Abstract: As the Internet revolution expands worldwide, IP (Internet Protocol) networks will become the mainstream of the communications infrastructure. To keep up with expansion, carriers need a flexible IP system that can offer a wide range of network services, including robust electronic commerce and real time image/video transmission. NEC meets these requirements with the CX 5220, a solution that emphasizes an innovative network node. In the packet network, the IP Switch Core Router CX5220 handles all data traffic with proper QoS and offers carrier-class reliability through a redundant configuration. Offering in service software upgrades, and by instantly switching to standby systems, the CX5220 Core Router provides non-stop operation. This paper gives an overview of the CX 5220 Core Router and describes its rich set of features.

Journal Article
TL;DR: This paper describes some examples of human-voice interface technology recently developed by NEC, including a network speech interface that enables the Internet to be easily accessed via mobile, car, or home terminals and an emotional-spoken-dialogue system aimed at making the human-machine dialogue more pleasant to use.
Abstract: This paper describes some examples of human-voice interface technology recently developed by NEC. The first is a network speech interface that enables the Internet to be easily accessed via mobile, car, or home terminals. This speech interface is composed of a client-type speech interface and a server-type speech interface. The second is a speaker-independent large-vocabulary speech-recognition system and a speech-synthesis system, which are necessary to realize such a network speech interface. The third example is an emotional-spoken-dialogue system aimed at making the human-machine dialogue more pleasant to use.

Journal Article
TL;DR: This paper gives an outline of the APEX Office platform and introduces application software on the platform, such as DialBOX and ScheduleBOX, then E-CallBOX which is situated as middleware of the platform.
Abstract: APEX Office platform helps Private Branch Exchanger (PBX) collaborate with application software to provide ideal communication tools in business office environment and to make customer's business work efficient. APEX Office consists of a series of application software running on a common platform. To improve software usability, they share database among application software and offer consistent user interface. This paper gives an outline of the APEX Office platform and introduces application software on the platform, such as DialBOX and ScheduleBOX, then E-CallBOX which is situated as middleware of the platform.

Journal Article
TL;DR: This paper describes e-Government system architecture proposed by NEC, and examples of systems for electronic authentication, electronic application and electronic procurement with security features in use.
Abstract: The Japanese Government is planning to realize highly intelligent electronic government (e-Government) by the Fiscal Year (FY) 2003. As its concept is based on the Internet, security for e-Government is a critical issue to be considered. This paper describes e-Government system architecture proposed by NEC, and examples of systems for electronic authentication, electronic application and electronic procurement with security features in use.

Journal Article
TL;DR: In this article, a two-stage power amplifier (PA) module for 1.95GHz WCDMA handsets was developed in 6(W) x 6(D) × 1.7(H) mm size.
Abstract: A high efficiency two-stage power amplifier (PA) module for 1.95GHz W-CDMA handsets has been developed in 6(W) x 6(D) ×1.7(H) mm size. The module includes nobel biasing circuits with depletion-mode heterojuntion FETs to compensate temperature dependence of a quiescent drain current (Iq). An excellent power-added efficiency (PAE) of 50.3% was obtained with a gain of 25dB, under 3.5V operation while fulfilling the W-CDMA criteria. In the ambient temperature ranging from -30°C to +85°C, the PA shows little variation on an adjacent channel leakage power ratio, operation drain current and Iq. When the PA was operated at as low as 1V, it also exhibited PEA more than 28% in the ambient temperature ranging from -30°C to +85°C with a low output power of 15dBm.

Journal Article
TL;DR: A general market and a technology trend of the IC Cards are introduced, and a general view of examples of their applications in the security field is given.
Abstract: In recent years, the systems applying Smart Cards or IC Cards are gradually reaching the stage of genuine practical use. In this paper, the expression IC Card is used for Smart Card. An IC Card is, in short, a really portable and safe storehouse for information, and it is also thought to be one of the most important components in security fields. The IC Cards are also starting to be used practically and broadly in other fields than the security field. This paper introduces a general market and a technology trend of the IC Cards, and gives a general view of examples of their applications in the security field.