The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

8041-8060hit(42807hit)

  • Broadband Circularly Polarized Stacked Patch Antenna for Universal UHF RFID Applications Open Access

    Chih-Chiang CHEN  Bo-Shau CHEN  Chow-Yen-Desmond SIM  

     
    INVITED PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    2-8

    A double layer stacked patch antenna with a size of 200×200×48mm3 is proposed in this investigation. To achieve a broad CP bandwidth that can cover universal UHF RFID applications (840-960MHz), a slot loaded circular patch antenna fed by an L-shaped probe is designed as the lower layer (main patch), while the top layer (parasitic patch) is a simple circular patch loaded with a cross-slot of dissimilar arm lengths. Besides demonstrating a broad 10-dB return loss bandwidth of 16% (823-966MHz) and a CP bandwidth (3-dB axial ratio) of 14.0% (837-963MHz), the proposed antenna also yields maximum gain and minimum radiation efficiency of 8.8dBic and 85%, respectively, across the universal UHF RFID bands.

  • In-Vehicle Network Security Using Secure Element

    Keisuke TAKEMORI  Seiichiro MIZOGUCHI  Hideaki KAWABATA  Ayumu KUBOTA  

     
    INVITED PAPER

      Vol:
    E99-A No:1
      Page(s):
    208-216

    As there are no security mechanisms in the vehicle controller area network (CAN) protocol, it is easy to inject fake packets, codes and electric control units (ECUs) in the CAN to hijack vehicle control. Security countermeasures for both the CAN and the ECU are urgently required to improve driving safety. In this paper, we propose in-vehicle network securities using the hardware secure elements as follows: (i) secure boot of ECU, (ii) authentication of an ECU, (iii) authentication of a CAN packet, and (iv) cipher key exchange procedures from a master ECU to slave ECUs. The security algorithms are implemented in a subscriber identity module card (SIM) embedded in the master ECU's board and in a hardware security module (HSM) embedded in a slave ECU. The SIM generates and distributes cipher keys to the authenticated HSM. Then, the HSM generates a media authentication code (MAC) for the CAN packet by using the cipher keys.

  • RCS Measurements for Vehicles and Pedestrian at 26 and 79GHz

    Isamu MATSUNAMI  Ryohei NAKAMURA  Akihiro KAJIWARA  

     
    LETTER

      Vol:
    E99-A No:1
      Page(s):
    204-206

    The RCS of a radar target is an important factor related with the radar performance such as detection, tracking and classification. When dealing with the design of 26/79GHz automotive surveillance radar system, it is essential to know individual RCS of typical vehicles and pedestrian. However, there are few papers related to the RCS measurement at 26 and 79GHz. In this letter, the RCS measurements of typical vehicles and pedestrian were performed in a large-scale anechoic chamber room and the characteristics are discussed.

  • Practical Forgeries and Distinguishers against PAES

    Jérémy JEAN  Ivica NIKOLIC  Yu SASAKI  Lei WANG  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    39-48

    We present two practical attacks on the CAESAR candidate PAES. The first attack is a universal forgery for any plaintext with at least 240 bytes. It works for the nonce-repeating variant of PAES and in a nutshell it is a state recovery based on solving differential equations for the S-Box leaked through the ciphertext that arise when the plaintext has a certain difference. We show that to produce the forgery based on this method the attacker needs only 211 time and data. The second attack is a distinguisher for 264 out of 2128 keys that requires negligible complexity and only one pair of known plaintext-ciphertext. The attack is based on the lack of constants in the initialization of the PAES which allows to exploit the symmetric properties of the keyless AES round. Both of our attacks contradict the security goals of PAES.

  • A Design of Incremental Granular Model Using Context-Based Interval Type-2 Fuzzy C-Means Clustering Algorithm

    Keun-Chang KWAK  

     
    LETTER-Biocybernetics, Neurocomputing

      Pubricized:
    2015/10/20
      Vol:
    E99-D No:1
      Page(s):
    309-312

    In this paper, a method for designing of Incremental Granular Model (IGM) based on integration of Linear Regression (LR) and Linguistic Model (LM) with the aid of fuzzy granulation is proposed. Here, IGM is designed by the use of information granulation realized via Context-based Interval Type-2 Fuzzy C-Means (CIT2FCM) clustering. This clustering approach are used not only to estimate the cluster centers by preserving the homogeneity between the clustered patterns from linguistic contexts produced in the output space, but also deal with the uncertainty associated with fuzzification factor. Furthermore, IGM is developed by construction of a LR as a global model, refine it through the local fuzzy if-then rules that capture more localized nonlinearities of the system by LM. The experimental results on two examples reveal that the proposed method shows a good performance in comparison with the previous works.

  • Analysis of Elderly Drivers' Performance Using Large-Scale Test Data

    Yasuhiko NAKANO  Haruki KAWANAKA  Koji OGURI  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    243-251

    This study explored the question of how to minimize older drivers' accidents and to identify at-risk drivers by analyzing their driving performance. Previous traffic research reported that there were two factors involved in risky driving, namely driving risk perception and risky driving attitude. We investigated these two factors as indicators of an at-risk driver by using large-scale test data from license renewal tests that are obligatory for Japanese drivers who are 70 years of age or older. The tests include a driving simulator test, an on-road test, and a cognitive screening test. By using these assessments and predictions made with renewal driving tests, we were able to indicate the possibility of identifying at-risk drivers.

  • An Effective Acoustic Feedback Cancellation Algorithm Based on the Normalized Sub-Band Adaptive Filter

    Xia WANG  Ruiyu LIANG  Qingyun WANG  Li ZHAO  Cairong ZOU  

     
    LETTER-Speech and Hearing

      Pubricized:
    2015/10/20
      Vol:
    E99-D No:1
      Page(s):
    288-291

    In this letter, an effective acoustic feedback cancellation algorithm is proposed based on the normalized sub-band adaptive filter (NSAF). To improve the confliction between fast convergence rate and low misalignment in the NSAF algorithm, a variable step size is designed to automatically vary according to the update state of the filter. The update state of the filter is adaptively detected via the normalized distance between the long term average and the short term average of the tap-weight vector. Simulation results demonstrate that the proposed algorithm has superior performance in terms of convergence rate and misalignment.

  • Compact Tri-Band MIMO Antenna for LTE/GSM Mobile Handset Application

    Lingsheng YANG  Tao LI  Feng WANG  Kuniaki YOSHITOMI  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    177-185

    A tri-band Multiple-input-multiple-output (MIMO) antenna system for LTE 700, LTE2500 and GSM 1800/1900 mobile handset application is presented. The whole system consists of four identical 3-D IFAs (inverted F antenna) folded on FR4 cuboids. Without any special designed decoupling structures, the measured isolation among antenna elements is higher than 20dB in the low and upper bands, even in the middle band, the isolation is higher than 13.7dB. Reflection coefficient, correlation coefficient, gain and radiation pattern are also presented. Acceptable agreement between the antenna models with and without plastic housing, battery and LCD screen demonstrate that the proposed antenna is a competitive candidate for mobile handsets.

  • Character-Level Dependency Model for Joint Word Segmentation, POS Tagging, and Dependency Parsing in Chinese

    Zhen GUO  Yujie ZHANG  Chen SU  Jinan XU  Hitoshi ISAHARA  

     
    PAPER-Natural Language Processing

      Pubricized:
    2015/10/06
      Vol:
    E99-D No:1
      Page(s):
    257-264

    Recent work on joint word segmentation, POS (Part Of Speech) tagging, and dependency parsing in Chinese has two key problems: the first is that word segmentation based on character and dependency parsing based on word were not combined well in the transition-based framework, and the second is that the joint model suffers from the insufficiency of annotated corpus. In order to resolve the first problem, we propose to transform the traditional word-based dependency tree into character-based dependency tree by using the internal structure of words and then propose a novel character-level joint model for the three tasks. In order to resolve the second problem, we propose a novel semi-supervised joint model for exploiting n-gram feature and dependency subtree feature from partially-annotated corpus. Experimental results on the Chinese Treebank show that our joint model achieved 98.31%, 94.84% and 81.71% for Chinese word segmentation, POS tagging, and dependency parsing, respectively. Our model outperforms the pipeline model of the three tasks by 0.92%, 1.77% and 3.95%, respectively. Particularly, the F1 value of word segmentation and POS tagging achieved the best result compared with those reported until now.

  • Three-Dimensional Over-The-Air Assessment for Vertically Arranged MIMO Array Antennas

    Kun LI  Kazuhiro HONDA  Koichi OGAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    167-176

    This paper presents a new methodology of the over-the-air (OTA) assessment for vertically arranged multiple-input multiple-output (MIMO) array antennas. Particular emphasis is placed on how well handset MIMO antennas with a vertically arranged structure are characterized using the limited number of scatterers implemented in a fading emulator. First we studied the mechanism of the arrangement of scatterers on the variation of channel responses using a proposed three-dimensional analytical model. It is shown that the condition of a 3D-OTA with the prescribed parameters allows the correlation to be reduced, which permits the channel capacity to increase in the same manner that sufficient scatterers are distributed over the entire solid angle. Then the appropriate scatterers arrangement for a 3D-OTA instrument considering the number of DUT antenna elements and multipath characteristics is investigated. The analytical results show that a suitable scatterers arrangement can be determined for various conditions of multipath environments and numbers of array elements, and that the arrangement can be employed for designing an actual 3D-OTA apparatus.

  • Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X

    Sho SAKIKOYAMA  Yosuke TODO  Kazumaro AOKI  Masakatu MORII  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    31-38

    Linear cryptanalysis proposed by Matsui is one of the most effective attacks on block ciphers. Some attempts to improve linear cryptanalysis have been made since Matsui introduced. We focus on how to optimize linear cryptanalysis with such techniques, and we apply the optimized linear cryptanalysis on FEAL-8X. First, we evaluate two existing implementation methods so as to optimize the computation time of linear cryptanalysis. Method 1 removes redundant round function computations and optimizes the other computation of linear cryptanalysis by transforming it into bitwise operations. Method 2 transforms the computation of linear cryptanalysis into a matrix multiplication and reduces the time complexity of the multiplication using the fast Fourier transform (FFT). We implement both methods optimized for modern microprocessors and compare their computation time to clarify the appropriate method for practical cryptanalysis. From the result, we show that the superior implementation depends on the number of given known plaintexts (KPs) and that of guessed key bits. Furthermore, we show that these results enable us to select the superior method to implement linear cryptanalysis without another comparative experiment. By using the superior method, we implement the multiple linear cryptanalysis (MLC) on FEAL-8X. Our implementation can recover the secret key of FEAL-8X with 210KPs in practical computation time with non-negligible probability, and it is the best attack on FEAL-8X in data complexity.

  • Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks

    Naoya TORII  Dai YAMAMOTO  Masahiko TAKENAKA  Tsutomu MATSUMOTO  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    118-129

    PUF (Physically Unclonable Function) technologies attract attention as a candidate to prevent counterfeit chips. A latch PUF is known as a high performance PUF among various types of proposed PUFs. In this paper we describe an experiment on a invasive attack to a latch PUF consisting of RS latches, such as measuring the latch output by a probe contact after a FIB (Focused Ion Beam) processing. As a result, we confirmed that the latch PUF has a tolerance for the dynamic analysis, because the RS latch output was influenced and changed after the FIB processing in our experiments.

  • Wavelet Pyramid Based Multi-Resolution Bilateral Motion Estimation for Frame Rate Up-Conversion

    Ran LI  Hongbing LIU  Jie CHEN  Zongliang GAN  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2015/06/03
      Vol:
    E99-D No:1
      Page(s):
    208-218

    The conventional bilateral motion estimation (BME) for motion-compensated frame rate up-conversion (MC-FRUC) can avoid the problem of overlapped areas and holes but usually results in lots of inaccurate motion vectors (MVs) since 1) the MV of an object between the previous and following frames is more likely to have no temporal symmetry with respect to the target block of the interpolated frame and 2) the repetitive patterns existing in video frame lead to the problem of mismatch due to the lack of the interpolated block. In this paper, a new BME algorithm with a low computational complexity is proposed to resolve the above problems. The proposed algorithm incorporates multi-resolution search into BME, since it can easily utilize the MV consistency between two adjacent pyramid levels and spatial neighboring MVs to correct the inaccurate MVs resulting from no temporal symmetry while guaranteeing low computational cost. Besides, the multi-resolution search uses the fast wavelet transform to construct the wavelet pyramid, which not only can guarantee low computational complexity but also can reserve the high-frequency components of image at each level while sub-sampling. The high-frequency components are used to regularize the traditional block matching criterion for reducing the probability of mismatch in BME. Experiments show that the proposed algorithm can significantly improve both the objective and subjective quality of the interpolated frame with low computational complexity, and provide the better performance than the existing BME algorithms.

  • Computationally Efficient Class-Prior Estimation under Class Balance Change Using Energy Distance

    Hideko KAWAKUBO  Marthinus Christoffel DU PLESSIS  Masashi SUGIYAMA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/10/06
      Vol:
    E99-D No:1
      Page(s):
    176-186

    In many real-world classification problems, the class balance often changes between training and test datasets, due to sample selection bias or the non-stationarity of the environment. Naive classifier training under such changes of class balance systematically yields a biased solution. It is known that such a systematic bias can be corrected by weighted training according to the test class balance. However, the test class balance is often unknown in practice. In this paper, we consider a semi-supervised learning setup where labeled training samples and unlabeled test samples are available and propose a class balance estimator based on the energy distance. Through experiments, we demonstrate that the proposed method is computationally much more efficient than existing approaches, with comparable accuracy.

  • The Controllability of Power Grids in Comparison with Classical Complex Network Models

    Yi-Jia ZHANG  Zhong-Jian KANG  Xin-Feng LI  Zhe-Ming LU  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/10/20
      Vol:
    E99-D No:1
      Page(s):
    279-282

    The controllability of complex networks has attracted increasing attention within various scientific fields. Many power grids are complex networks with some common topological characteristics such as small-world and scale-free features. This Letter investigate the controllability of some real power grids in comparison with classical complex network models with the same number of nodes. Several conclusions are drawn after detailed analyses using several real power grids together with Erdös-Rényi (ER) random networks, Wattz-Strogatz (WS) small-world networks, Barabási-Albert (BA) scale-free networks and configuration model (CM) networks. The main conclusion is that most driver nodes of power grids are hub-free nodes with low nodal degree values of 1 or 2. The controllability of power grids is determined by degree distribution and heterogeneity, and power grids are harder to control than WS networks and CM networks while easier than BA networks. Some power grids are relatively difficult to control because they require a far higher ratio of driver nodes than ER networks, while other power grids are easier to control for they require a driver node ratio less than or equal to ER random networks.

  • A Line-Direction-Free and Character-Orientation-Free On-Line Handwritten Japanese Text Recognition System

    Yuechan HAO  Bilan ZHU  Masaki NAKAGAWA  

     
    PAPER-Pattern Recognition

      Pubricized:
    2015/10/01
      Vol:
    E99-D No:1
      Page(s):
    197-207

    This paper describes a significantly improved recognition system for on-line handwritten Japanese text free from line direction and character orientation constraints. The recognition system separates handwritten text of arbitrary character orientation and line direction into text line elements, estimates and normalizes character orientation and line direction, applies two-stage over-segmentation, constructs a segmentation-recognition candidate lattice and evaluates the likelihood of candidate segmentation-recognition paths by combining the scores of character recognition, geometric features and linguistic context. Enhancements over previous systems are made in line segmentation, over-segmentation and context integration model. The results of experiments on text from the HANDS-Kondate_t_bf-2001-11 database demonstrate significant improvements in the character recognition rate compared with the previous systems. Its recognition rate on text of arbitrary character orientation and line direction is now comparable with that possible on horizontal text with normal character orientation. Moreover, its recognition speed and memory requirement do not limit the platforms or applications that employ the recognition system.

  • Effect of Vegetation Growth on Radio Wave Propagation in 920-MHz Band

    Masaki HARA  Hitoshi SHIMASAKI  Yuichi KADO  Masatoshi ICHIDA  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    81-86

    To design a wireless sensor network for farms, it is necessary to understand and predict the effect of vegetation. In this study, the change in the propagation loss characteristics in 920-MHz band is examined during the growth of mulberry bushes. The received signal strength indicator (RSSI) is measured as a function of the distance between the transmitting antenna (Tx) and the receiving antenna (Rx) in a 50×50m mulberry field. The Tx and Rx are placed at a height of 1.5m. Moreover, the horizontal and vertical polarizations are measured and the differences are shown. Three empirical vegetation attenuation models are introduced, and the measured data have been fitted to each model. The results show that the non-zero gradient model is the best model at predicting the vegetation attenuation in a mulberry farm regardless of the polarization or mulberry growth. It is found that the attenuation dependence on the plant height is linear. Furthermore, the results have revealed that the horizontal polarization had about 1.5 times as large an effect on the vegetation attenuation as the vertical polarization.

  • LSA-X: Exploiting Productivity Factors in Linear Size Adaptation for Analogy-Based Software Effort Estimation

    Passakorn PHANNACHITTA  Akito MONDEN  Jacky KEUNG  Kenichi MATSUMOTO  

     
    PAPER-Software Engineering

      Pubricized:
    2015/10/15
      Vol:
    E99-D No:1
      Page(s):
    151-162

    Analogy-based software effort estimation has gained a considerable amount of attention in current research and practice. Its excellent estimation accuracy relies on its solution adaptation stage, where an effort estimate is produced from similar past projects. This study proposes a solution adaptation technique named LSA-X that introduces an approach to exploit the potential of productivity factors, i.e., project variables with a high correlation with software productivity, in the solution adaptation stage. The LSA-X technique tailors the exploitation of the productivity factors with a procedure based on the Linear Size Adaptation (LSA) technique. The results, based on 19 datasets show that in circumstances where a dataset exhibits a high correlation coefficient between productivity and a related factor (r≥0.30), the proposed LSA-X technique statistically outperformed (95% confidence) the other 8 commonly used techniques compared in this study. In other circumstances, our results suggest using any linear adaptation technique based on software size to compensate for the limitations of the LSA-X technique.

  • A Speech Enhancement Algorithm Based on Blind Signal Cancelation in Diffuse Noise Environments

    Jaesik HWANG  Jaepil SEO  Ji-Won CHO  Hyung-Min PARK  

     
    LETTER-Speech and Hearing

      Vol:
    E99-A No:1
      Page(s):
    407-411

    This letter describes a speech enhancement algorithm for stereo signals corrupted by diffuse noise. It estimates the noise signal and also a beamformed target signal based on blind target signal cancelation derived from sparsity minimization. Enhanced target speech is obtained by Wiener filtering using both the signals. Experimental results demonstrate the effectiveness of the proposed method.

  • Indoor Channel Characterization and Performance Evaluation with Directional Antenna and Multiple Beam Combining

    Xiaoya ZUO  Ding WANG  Rugui YAO  Guomei ZHANG  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    104-114

    Ultra-wideband (UWB) beamforming is now attracting significant research attention for attaining spatial gain from array antennas. It is commonly believed that directional antenna based communication could improve the system performance. In order to further make clear the relationship between system performance and the antenna array beamforming, UWB indoor channels are extracted from practical measurements and circular horn antenna is used to characterize the channel properties and to evaluate the system performance. Using a single beam directional antenna with a certain half power beamwidth (HPBW), the channel capacity and the bit-error-rate (BER) performance of a UWB RAKE receiver are evaluated. In the line-of-sight (LOS) environments, the channel capacity and BER performance are improved with the beamwidth becoming smaller. However in the non-line-of-sight (NLOS) environments, the capacity and BER performance are not always better with directional antennas. And the variation trend between the system performance and the antenna beamwidth disappears. This is mainly because that there exist no dominant strong path components like those seen in LOS environments. Then beam combining is introduced to further improve the system performance. Simulation results show that the channel capacity and BER performance cloud be greatly improved by multiple beam combining, especially for the NLOS environments. This reminds us that when antenna beamforming is used to obtain array gain, the beamwidth should be carefully designed and beam combining is necessary to obtain optimal performance, especially in NLOS environments.

8041-8060hit(42807hit)