The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Takashi KITA(9hit)

1-9hit
  • An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation

    Koji NUIDA  Satoshi FUJITSU  Manabu HAGIWARA  Hideki IMAI  Takashi KITAGAWA  Kazuto OGAWA  Hajime WATANABE  

     
    PAPER-Application

      Vol:
    E92-A No:1
      Page(s):
    197-206

    The code length of Tardos's collusion-secure fingerprint code is of theoretically minimal order with respect to the number of adversarial users (pirates). However, the constant factor should be further reduced for practical implementation. In this article, we improve the tracing algorithm of Tardos's code and propose a 2-secure and short random fingerprint code, which is secure against collusion attacks by two pirates. Our code length is significantly shorter than that of Tardos's code and its tracing error probability is practically small.

  • Experimental Performance Results of Coherent Wideband DS-CDMA with TDD Scheme

    Osamu KATO  Kazuyuki MIYA  Koichi HOMMA  Takashi KITADE  Masaki HAYASHI  Masatoshi WATANABE  

     
    PAPER

      Vol:
    E81-B No:7
      Page(s):
    1337-1344

    We previously proposed a next generation cellular system for IMT-2000 based on the Wideband DS-CDMA with TDD scheme (W-CDMA/TDD) and have evaluated its performance by computer simulation, laboratory and field experiment. With the W-CDMA/TDD, because of its correlation between the downlink and the uplink, transmission and reception space diversity (SD) at a base station and open-loop transmit power control (TPC) can be simply realized. This paper reports performance of laboratory and field experiments using a developed testbed. The results shows it has been confirmed that transmission and reception SD and open-loop TPC have sufficient performance under a field environment as well as laboratory environment.

  • Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6

    Manabu HAGIWARA  Marc P.C. FOSSORIER  Takashi KITAGAWA  Hideki IMAI  

     
    PAPER-Coding Theory

      Vol:
    E92-A No:11
      Page(s):
    2891-2894

    In this paper, we investigate the smallest value of p for which a (J,L,p)-QC LDPC code with girth 6 exists for J=3 and J=4. For J=3, we determine the smallest value of p for any L. For J=4, we determine the smallest value of p for L ≤ 301. Furthermore we provide examples of specific constructions meeting these smallest values of p.

  • Highly Reliable and Compact InP-Based In-Phase and Quadrature Modulators for Over 400 Gbit/s Coherent Transmission Systems

    Hajime TANAKA  Tsutomu ISHIKAWA  Takashi KITAMURA  Masataka WATANABE  Ryuji YAMABI  Ryo YAMAGUCHI  Naoya KONO  Takehiko KIKUCHI  Morihiro SEKI  Tomokazu KATSUYAMA  Mitsuru EKAWA  Hajime SHOJI  

     
    PAPER

      Pubricized:
    2020/07/10
      Vol:
    E103-C No:11
      Page(s):
    661-668

    We fabricated an InP-based dual-polarization In-phase and Quadrature (DP-IQ) modulator consisting of a Mach-Zehnder (MZ) modulator array integrated with RF termination resistors and backside via holes for high-bandwidth coherent driver modulators and revealed its high reliability. These integrations allowed the chip size (Chip size: 4.4mm×3mm) to be reduced by 59% compared with the previous chip without these integrations, that is, the previous chip needed 8 chip-resistors for terminating RF signals and 12 RF electrode pads for the electrical connection with these resistors in a Signal-Ground-Signal configuration. This MZ modulator exhibited a 3-dB bandwidth of around 40 GHz as its electrical/optical response, which is sufficient for over 400 Gbit/s coherent transmission systems using 16-ary quadrature amplitude modulation (QAM) and 64QAM signals. Also, we investigated a rapid degradation which affects the reliability of InP-based DP-IQ modulators. This rapid degradation we called optical damage is caused by strong incident light power and a high reverse bias voltage condition at the entrance of an electrode in each arm of the MZ modulators. This rapid degradation makes it difficult to estimate the lifetime of the chip using an accelerated aging test, because the value of the breakdown voltage which induces optical damage varies considerably depending on conditions, such as light power, operation wavelength, and chip temperature. Therefore, we opted for the step stress test method to investigate the lifetime of the chip. As a result, we confirmed that optical damage occurred when photo-current density at the entrance of an electrode exceeded threshold current density and demonstrated that InP-based modulators did not degrade unless operation conditions reached threshold current density. This threshold current density was independent of incident light power, operation wavelength and chip temperature.

  • Wideband CDMA Systems in TDD-Mode Operation for IMT-2000

    Kazuyuki MIYA  Osamu KATO  Koichi HOMMA  Takashi KITADE  Masaki HAYASHI  Toyoki UE  

     
    INVITED PAPER

      Vol:
    E81-B No:7
      Page(s):
    1317-1326

    We previously proposed a next generation cellular system for IMT-2000 based on wideband DS-CDMA with TDD scheme and have evaluated its performance by computer simulation, laboratory and field experiments. This paper presents the design concept of TDD-mode operation on wideband DS-CDMA systems. These systems employ almost the same techniques with a little difference as FDD-mode. We also present the schemes of the TDD-mode specific techniques such as fast cell search, transmission diversity and transmitter power control and show the evaluation results of them are effective. Performance can be improved by use of enhanced techniques such as interference cancellation and adaptive antenna array diversity.

  • Application of Microwave Photoconductivity Decay Method to Characterization of Amorphous In-Ga-Zn-O Films Open Access

    Satoshi YASUNO  Takashi KITA  Shinya MORITA  Aya HINO  Kazushi HAYASHI  Toshihiro KUGIMIYA  Shingo SUMIE  

     
    INVITED PAPER

      Vol:
    E95-C No:11
      Page(s):
    1724-1729

    Microwave photoconductivity decay (µ-PCD) method was applied to evaluate the effects of chemical composition and Ar+ plasma induced damage on the bulk and the surface states in amorphous In-Ga-Zn-O (a-IGZO) films. It was found that the peak reflectivity signal in the photoconductivity response increased with decreasing the Ga content, and had a strong correlation with the a-IGZO transistor performances. In addition, the peak reflectivity signals obtained after various Ar+ plasma treatment duration were well correlated with the transistor characteristics. With Ar+ plasma treatment, the peak reflectivity signal decreased in accordance with degradation of transistor characteristics. The µ-PCD method was found to be a very useful tool not only to evaluate the bulk and the surface states, but also to predict the performance of a-IGZO transistors subjected to various plasma processes in the production.

  • A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized c-Secure CRT Code

    Hajime WATANABE  Takashi KITAGAWA  

     
    PAPER-Information Security

      Vol:
    E86-A No:10
      Page(s):
    2589-2595

    In digital content distribution systems, digital watermarking (fingerprinting) technique provides a good solution to avoid illegal copying and has been studied very actively. c-Secure CRT Code is one of the most practical ID coding schemes for such fingerprinting since it is secure against collusion attacks and also secure even though random errors are furthermore added. But its usefulness is decreased in the case that random errors are added because the code length will be longer. In this paper, a new collusion attack with addition of random errors is introduced and show that c-Secure CRT Code is not sufficiently secure against the attack at first. Next, we analyze the problem and propose a new ID coding scheme, Randomized c-Secure CRT Code which overcomes the problem. As a result, this new scheme improves the error tracing probabilities against the proposed attack drastically. This new scheme has the same code length, so this is one of the most responsible fingerprinting codes for content distribution systems.

  • Method for Evaluating Performance of Wipers Based on Visibility Open Access

    Takashi KITAYAMA  Mikiko KAWASUMI  Hatsuo YAMASAKI  Tomoaki NAKANO  Shin YAMAMOTO  Muneo YAMADA  Yuta DOI  

     
    INVITED PAPER

      Vol:
    E95-C No:11
      Page(s):
    1716-1723

    There is no clear criterion yet for evaluating wipers based on performances of wiping raindrops and visibility in forward view. In the visibility evaluation in rainy driving, it is important to examine spatial frequency and contrast of objects in forward view. Spatial frequency and contrast of image which were affected by raindrops are calculated based on them of background board which were printed stripe patterns. Variations with time of power of analysed frequency and decreased contrast are synchronized with motion of the wiper for the all experimental cases. Moreover, we executed questionnaire, and evaluated the view of the background board. These results show that the proposed methods have been validated in evaluation with wiping performance.

  • Automated Route Planning for Milk-Run Transport Logistics with the NuSMV Model Checker

    Takashi KITAMURA  Keishi OKAMOTO  

     
    PAPER

      Vol:
    E96-D No:12
      Page(s):
    2555-2564

    In this paper, we propose and implement an automated route planning framework for milk-run transport logistics by applying model checking techniques. First, we develop a formal specification framework for milk-run transport logistics. The framework adopts LTL (Linear Temporal Logic), a language based on temporal logics, as a specification language for users to be able to flexibly and formally specify complex delivery requirements for trucks. Then by applying the bounded semantics of LTL, the framework then defines the notion of “optimal truck routes”, which mean truck routes on a given route map that satisfy given delivery requirements (specified by LTL) with the minimum cost. We implement the framework as an automated route planner using the NuSMV model checker, a state-of-the-art bounded model checker. The automated route planner, given route map and delivery requirements, automatically finds optimal trucks routes on the route map satisfying the given delivery requirements. The feasibility of the implementation design is investigated by analysing its computational complexity and by showing experimental results.