The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

7641-7660hit(42807hit)

  • The Efficient Algorithms for Constructing Enhanced Quadtrees Using MapReduce

    Hongyeon KIM  Sungmin KANG  Seokjoo LEE  Jun-Ki MIN  

     
    PAPER

      Pubricized:
    2016/01/14
      Vol:
    E99-D No:4
      Page(s):
    918-926

    MapReduce is considered as the de facto framework for storing and processing massive data due to its fascinating features: simplicity, flexibility, fault tolerance and scalability. However, since the MapReduce framework does not provide an efficient access method to data (i.e., an index), whole data should be retrieved even though a user wants to access a small portion of data. Thus, in this paper, we devise an efficient algorithm constructing quadtrees with MapReduce. Our proposed algorithms reduce the index construction time by utilizing a sampling technique to partition a data set. To improve the query performance, we extend the quadtree construction algorithm in which the adjacent nodes of a quadtree are integrated when the number of points located in the nodes is less than the predefined threshold. Furthermore, we present an effective algorithm for incremental update. Our experimental results show the efficiency of our proposed algorithms in diverse environments.

  • FOREWORD Open Access

    Minoru FUJISHIMA  

     
    FOREWORD

      Vol:
    E99-C No:4
      Page(s):
    430-430
  • Named Entity Oriented Difference Analysis of News Articles and Its Application

    Keisuke KIRITOSHI  Qiang MA  

     
    PAPER

      Pubricized:
    2016/01/14
      Vol:
    E99-D No:4
      Page(s):
    906-917

    To support the efficient gathering of diverse information about a news event, we focus on descriptions of named entities (persons, organizations, locations) in news articles. We extend the stakeholder mining proposed by Ogawa et al. and extract descriptions of named entities in articles. We propose three measures (difference in opinion, difference in details, and difference in factor coverage) to rank news articles on the basis of analyzing differences in descriptions of named entities. On the basis of these three measurements, we develop a news app on mobile devices to help users to acquire diverse reports for improving their understanding of the news. For the current article a user is reading, the proposed news app will rank and provide its related articles from different perspectives by the three ranking measurements. One of the notable features of our system is to consider the access history to provide the related news articles. In other words, we propose a context-aware re-ranking method for enhancing the diversity of news reports presented to users. We evaluate our three measurements and the re-ranking method with a crowdsourcing experiment and a user study, respectively.

  • Dense Light Transport for Relighting Computation Using Orthogonal Illumination Based on Walsh-Hadamard Matrix

    Isao MIYAGAWA  Yukinobu TANIGUCHI  

     
    PAPER

      Pubricized:
    2016/01/28
      Vol:
    E99-D No:4
      Page(s):
    1038-1051

    We propose a practical method that acquires dense light transports from unknown 3D objects by employing orthogonal illumination based on a Walsh-Hadamard matrix for relighting computation. We assume the presence of color crosstalk, which represents color mixing between projector pixels and camera pixels, and then describe the light transport matrix by using sets of the orthogonal illumination and the corresponding camera response. Our method handles not only direct reflection light but also global light radiated from the entire environment. Tests of the proposed method using real images show that orthogonal illumination is an effective way of acquiring accurate light transports from various 3D objects. We demonstrate a relighting test based on acquired light transports and confirm that our method outputs excellent relighting images that compare favorably with the actual images observed by the system.

  • The Existence of a Class of Mixed Orthogonal Arrays

    Shanqi PANG  Yajuan WANG  Guangzhou CHEN  Jiao DU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:4
      Page(s):
    863-868

    The orthogonal array is an important object in combinatorial design theory, and it is applied to many fields, such as computer science, coding theory and cryptography etc. This paper mainly studies the existence of the mixed orthogonal arrays of strength two with seven factors and presents some new constructions. Consequently, a few new mixed orthogonal arrays are obtained.

  • D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability

    Kazumasa OMOTE  Phuong-Thao TRAN  

     
    PAPER-Cryptography and cryptographic protocols

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    816-829

    Proof of Retrievability (POR) is a protocol by which a client can distribute his/her data to cloud servers and can check if the data stored in the servers is available and intact. After that, network coding-based POR has been applied to improve network throughput. Although many network coding-based PORs have been proposed, most of them have not achieved the following practical features: direct repair and dynamic operations. In this paper, we propose the D2-POR scheme (Direct repair and Dynamic operations in network coding-based POR) to address these shortcomings. When a server is corrupted, the D2-POR can support the direct repair in which the data stored in the corrupted server can be repaired using the data directly provided by healthy servers. The client is thus free from the burden of data repair. Furthermore, the D2-POR allows the client to efficiently perform dynamic operations, i.e., modification, insertion and deletion.

  • Actuator-Control Circuit Based on OTFTs and Flow-Rate Estimation for an All-Organic Fluid Pump

    Lei CHEN  Tapas Kumar MAITI  Hidenori MIYAMOTO  Mitiko MIURA-MATTAUSCH  Hans Jürgen MATTAUSCH  

     
    PAPER-Systems and Control

      Vol:
    E99-A No:4
      Page(s):
    798-805

    In this paper, we report the design of an organic thin-film transistor (OTFT) driver circuit for the actuator of an organic fluid pump, which can be integrated in a portable-size fully-organic artificial lung. Compared to traditional pump designs, lightness, compactness and scalability are achieved by adopting a creative pumping mechanism with a completely organic-material-based system concept. The transportable fluid volume is verified to be flexibly adjustable, enabling on-demand controllability and scalability of the pump's fluid-flow rate. The simulations, based on an accurate surface-potential OTFT compact model, demonstrate that the necessary driving waveforms can be efficiently generated and adjusted to the actuator requirements. At the actuator-driving-circuit frequency of 0.98Hz, an all-organic fluid pump with 40cm length and 0.2cm height is able to achieve a flow rate of 0.847L/min, which satisfies the requirements for artificial-lung assist systems to a weakened normal lung.

  • A Construction of Optimal 16-QAM+ Sequence Sets with Zero Correlation Zone

    Yubo LI  Kai LIU  Chengqian XU  

     
    PAPER-Information Theory

      Vol:
    E99-A No:4
      Page(s):
    819-825

    In this correspondence, a method of constructing optimal zero correlation zone (ZCZ) sequence sets over the 16-QAM+ constellation is presented. Based on 16-QAM orthogonal matrices and perfect ternary sequences, 16-QAM+ ZCZ sequence sets are obtained. The resulting ZCZ sequence sets are optimal with respect to the Tang-Fan-Matsufuji bound. Moreover, methods for transforming binary or quaternary orthogonal matrices into 16-QAM orthogonal matrices are proposed. The proposed 16-QAM+ ZCZ sequence sets can be potentially applied to communication systems using a 16-QAM constellation to remove the multiple access interference (MAI) and multi-path interference (MPI).

  • Multirate Coprime Sampling of Sparse Multiband Signals

    Weijun ZENG  Huali WANG  Hui TIAN  

     
    LETTER-Digital Signal Processing

      Vol:
    E99-A No:4
      Page(s):
    839-842

    In this letter, a new scheme for multirate coprime sampling and reconstructing of sparse multiband signals with very high carrier frequencies is proposed, where the locations of the signal bands are not known a priori. Simulation results show that the new scheme can simultaneously reduce both the number of sampling channels and the sampling rate for perfect reconstruction, compared to the existing schemes requiring high number of sampling channels or high sampling rate.

  • Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity

    Shaojing FU  Jiao DU  Longjiang QU  Chao LI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E99-A No:4
      Page(s):
    853-855

    Rotation symmetric Boolean functions (RSBFs) that are invariant under circular translation of indices have been used as components of different cryptosystems. In this paper, odd-variable balanced RSBFs with maximum algebraic immunity (AI) are investigated. We provide a construction of n-variable (n=2k+1 odd and n ≥ 13) RSBFs with maximum AI and nonlinearity ≥ 2n-1-¥binom{n-1}{k}+2k+2k-2-k, which have nonlinearities significantly higher than the previous nonlinearity of RSBFs with maximum AI.

  • Discriminative Metric Learning on Extended Grassmann Manifold for Classification of Brain Signals

    Yoshikazu WASHIZAWA  

     
    LETTER-Neural Networks and Bioengineering

      Vol:
    E99-A No:4
      Page(s):
    880-883

    Electroencephalography (EEG) and magnetoencephalography (MEG) measure the brain signal from spatially-distributed electrodes. In order to detect event-related synchronization and desynchronization (ERS/ERD), which are utilized for brain-computer/machine interfaces (BCI/BMI), spatial filtering techniques are often used. Common spatial potential (CSP) filtering and its extensions which are the spatial filtering methods have been widely used for BCIs. CSP transforms brain signals that have a spatial and temporal index into vectors via a covariance representation. However, the variance-covariance structure is essentially different from the vector space, and not all the information can be transformed into an element of the vector structure. Grassmannian embedding methods, therefore, have been proposed to utilize the variance-covariance structure of variational patterns. In this paper, we propose a metric learning method to classify the brain signal utilizing the covariance structure. We embed the brain signal in the extended Grassmann manifold, and classify it on the manifold using the proposed metric. Due to this embedding, the pattern structure is fully utilized for the classification. We conducted an experiment using an open benchmark dataset and found that the proposed method exhibited a better performance than CSP and its extensions.

  • Max-Min-Degree Neural Network for Centralized-Decentralized Collaborative Computing

    Yiqiang SHENG  Jinlin WANG  Chaopeng LI  Weining QI  

     
    PAPER

      Vol:
    E99-B No:4
      Page(s):
    841-848

    In this paper, we propose an undirected model of learning systems, named max-min-degree neural network, to realize centralized-decentralized collaborative computing. The basic idea of the proposal is a max-min-degree constraint which extends a k-degree constraint to improve the communication cost, where k is a user-defined degree of neurons. The max-min-degree constraint is defined such that the degree of each neuron lies between kmin and kmax. Accordingly, the Boltzmann machine is a special case of the proposal with kmin=kmax=n, where n is the full-connected degree of neurons. Evaluations show that the proposal is much better than a state-of-the-art model of deep learning systems with respect to the communication cost. The cost of the above improvement is slower convergent speed with respect to data size, but it does not matter in the case of big data processing.

  • Autonomous Decentralized Authorization and Authentication Management for Hierarchical Multi-Tenancy Open Access

    Qiong ZUO  Meiyi XIE  Wei-Tek TSAI  

     
    INVITED PAPER

      Vol:
    E99-B No:4
      Page(s):
    786-793

    Hierarchical multi-tenancy, which enables tenants to be divided into subtenants, is a flexible and scalable architecture for representing subsets of users and application resources in the real world. However, the resource isolation and sharing relations for tenants with hierarchies are more complicated than those between tenants in the flat Multi-Tenancy Architecture. In this paper, a hierarchical tenant-based access control model based on Administrative Role-Based Access Control in Software-as-a-Service is proposed. Autonomous Areas and AA-tree are used to describe the autonomy and hierarchy of tenants, including their isolation and sharing relationships. AA is also used as an autonomous unit to create and deploy the access permissions for tenants. Autonomous decentralized authorization and authentication schemes for hierarchical multi-tenancy are given out to help different level tenants to customize efficient authority and authorization in large-scale SaaS systems.

  • Autonomous Decentralized Service Oriented Architecture Concept and Application for Mission Critical Information Systems

    Carlos PEREZ-LEGUIZAMO  P. Josue HERNANDEZ-TORRES  J.S. Guadalupe GODINEZ-BORJA  Victor TAPIA-TEC  

     
    PAPER

      Vol:
    E99-B No:4
      Page(s):
    803-811

    Recently, the Services Oriented Architectures (SOA) have been recognized as the key to the integration and interoperability of different applications and systems that coexist in an organization. However, even though the use of SOA has increased, some applications are unable to use it. That is the case of mission critical information applications, whose requirements such as high reliability, non-stop operation, high flexibility and high performance are not satisfied by conventional SOA infrastructures. In this article we present a novel approach of combining SOA with Autonomous Decentralized Systems (ADS) in order to provide an infrastructure that can satisfy those requirements. We have named this infrastructure Autonomous Decentralized Service Oriented Architecture (ADSOA). We present the concept and architecture of ADSOA, as well as the Loosely Couple Delivery Transaction and Synchronization Technology for assuring the data consistency and high reliability of the application. Moreover, a real implementation and evaluation of the proposal in a mission critical information system, the Uniqueness Verifying Public Key Infrastructure (UV-PKI), is shown in order to prove its effectiveness.

  • Impact of Hidden Nodes on On-Demand AP Wake-Up Exploiting WLAN Signals

    Yuma ASADA  Hiroyuki YOMO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:4
      Page(s):
    939-950

    This paper investigates the impact of hidden nodes (HNs) on on-demand access point (AP) wake-up that is employed to realize energy-efficient wireless LANs (WLANs). The considered wake-up signaling exploits IEEE 802.11 signals transmitted by a WLAN station (STA) to remotely activate a sleeping AP: a STA with communication demands transmits a series of WLAN frames with their length corresponding to the wake-up ID. A wake-up receiver attached to each AP detects the length of WLAN frames with the low-power operations of envelope detection and on-off-keying (OOK) demodulation. Since WLAN frames constituting a wake-up signal are transmitted by a STA following carrier sense multiple access (CSMA) protocol, they are vulnerable to the well-known hidden node (HN) problem. The impact of HNs on wake-up signaling is different from that on data communications since the wake-up receiver employs unconventional frame length detection to extract the information on the wake-up ID from the received signal. In this paper, we first investigate the impact of HNs on wake-up failure probability with theoretical and experimental evaluations. If the degradation of wake-up signalling due to HNs is observed for a STA, the corresponding STA may suffer from collisions due to the same HNs for its data communications even if it manages to succeed in the wake-up process. In this case, the wake-up operation itself may not be necessary. Therefore, we also compare the impact of HNs on wake-up signaling and that on data communications after the wake-up process. These results and discussions provide us with an insight on the impact of HNs on on-demand AP wake-up exploiting WLAN signals.

  • SSL Client Authentication with TPM

    Shohei KAKEI  Masami MOHRI  Yoshiaki SHIRAISHI  Masakatu MORII  

     
    PAPER

      Pubricized:
    2016/01/28
      Vol:
    E99-D No:4
      Page(s):
    1052-1061

    TPM-embedded devices can be used as authentication tokens by issuing certificates to signing keys generated by TPM. TPM generates Attestation Identity Key (AIK) and Binding Key (BK) that are RSA keys. AIK is used to identify TPM. BK is used to encrypt data so that specific TPM can decrypt it. TPM can use for device authentication by linking a SSL client certificate to TPM. This paper proposes a method of an AIK certificate issuance with OpenID and a method of the SSL client certificate issuance to specific TPM using AIK and BK. In addition, the paper shows how to implement device authentication system using the SSL client certificate related to TPM.

  • A Varactor-Based All-Digital Multi-Phase PLL with Random-Sampling Spur Suppression Techniques

    Chia-Wen CHANG  Kai-Yu LO  Hossameldin A. IBRAHIM  Ming-Chiuan SU  Yuan-Hua CHU  Shyh-Jye JOU  

     
    PAPER-Integrated Electronics

      Vol:
    E99-C No:4
      Page(s):
    481-490

    This paper presents a varactor-based all-digital phase-locked loop (ADPLL) with a multi-phase digitally controlled oscillator (DCO) for near-threshold voltage operation. In addition, a new all-digital reference spur suppression (RSS) circuit with multiple phases random-sampling techniques to effectively spread the reference clock frequency is proposed to randomize the synchronized DCO register behavior and reduce the reference spur. Because the equivalent reference clock frequency is reserved, the loop behavior is maintained. The area of the proposed spur suppression circuit is only 4.9% of the ADPLL (0.038 mm2). To work reliably at the near-threshold region, a multi-phase DCO with NMOS varactors is presented to acquire precise frequency resolution and high linearity. In the near-threshold region (VDD =0.52 V), the ADPLL only dissipates 269.9 μW at 100 MHz output frequency. It has a reference spur of -52.2 dBc at 100 MHz output clock frequency when the spur suppression circuit is deactivated. When the spur suppression circuit is activated, the ADPLL shows a reference spur of -57.3 dBc with the period jitter of 0.217% UI.

  • MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks

    Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeo HARIU  Shigeki GOTO  

     
    PAPER-Web security

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    860-872

    Drive-by download attacks force users to automatically download and install malware by redirecting them to malicious URLs that exploit vulnerabilities of the user's web browser. In addition, several evasion techniques, such as code obfuscation and environment-dependent redirection, are used in combination with drive-by download attacks to prevent detection. In environment-dependent redirection, attackers profile the information on the user's environment, such as the name and version of the browser and browser plugins, and launch a drive-by download attack on only certain targets by changing the destination URL. When malicious content detection and collection techniques, such as honeyclients, are used that do not match the specific environment of the attack target, they cannot detect the attack because they are not redirected. Therefore, it is necessary to improve analysis coverage while countering these adversarial evasion techniques. We propose a method for exhaustively analyzing JavaScript code relevant to redirections and extracting the destination URLs in the code. Our method facilitates the detection of attacks by extracting a large number of URLs while controlling the analysis overhead by excluding code not relevant to redirections. We implemented our method in a browser emulator called MINESPIDER that automatically extracts potential URLs from websites. We validated it by using communication data with malicious websites captured during a three-year period. The experimental results demonstrated that MINESPIDER extracted 30,000 new URLs from malicious websites in a few seconds that conventional methods missed.

  • FPGA Implementation of Various Elliptic Curve Pairings over Odd Characteristic Field with Non Supersingular Curves

    Yasuyuki NOGAMI  Hiroto KAGOTANI  Kengo IOKIBE  Hiroyuki MIYATAKE  Takashi NARITA  

     
    PAPER-Cryptography and cryptographic protocols

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    805-815

    Pairing-based cryptography has realized a lot of innovative cryptographic applications such as attribute-based cryptography and semi homomorphic encryption. Pairing is a bilinear map constructed on a torsion group structure that is defined on a special class of elliptic curves, namely pairing-friendly curve. Pairing-friendly curves are roughly classified into supersingular and non supersingular curves. In these years, non supersingular pairing-friendly curves have been focused on from a security reason. Although non supersingular pairing-friendly curves have an ability to bridge various security levels with various parameter settings, most of software and hardware implementations tightly restrict them to achieve calculation efficiencies and avoid implementation difficulties. This paper shows an FPGA implementation that supports various parameter settings of pairings on non supersingular pairing-friendly curves for which Montgomery reduction, cyclic vector multiplication algorithm, projective coordinates, and Tate pairing have been combinatorially applied. Then, some experimental results with resource usages are shown.

  • A Perceptually Motivated Approach for Speech Enhancement Based on Deep Neural Network

    Wei HAN  Xiongwei ZHANG  Gang MIN  Meng SUN  

     
    LETTER-Speech and Hearing

      Vol:
    E99-A No:4
      Page(s):
    835-838

    In this letter, a novel perceptually motivated single channel speech enhancement approach based on Deep Neural Network (DNN) is presented. Taking into account the good masking properties of the human auditory system, a new DNN architecture is proposed to reduce the perceptual effect of the residual noise. This new DNN architecture is directly trained to learn a gain function which is used to estimate the power spectrum of clean speech and shape the spectrum of the residual noise at the same time. Experimental results demonstrate that the proposed perceptually motivated speech enhancement approach could achieve better objective speech quality when tested with TIMIT sentences corrupted by various types of noise, no matter whether the noise conditions are included in the training set or not.

7641-7660hit(42807hit)