The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

9881-9900hit(42807hit)

  • Multicast Congestion Control with Quantized Congestion Notification in Data Center Networks

    Yuki TANISAWA  Miki YAMAMOTO  

     
    PAPER-Network Management/Operation

      Vol:
    E97-B No:6
      Page(s):
    1121-1129

    In data center networks, group communication is currently playing an important role and multicast communications is an effective way to support group communication for large numbers of virtual machines. Layer-2 congestion control named QCN (Quantized Congestion Notification) has been proposed to realize the high reliability required by LAN/SAN integration in data center networking. Our preliminary evaluation in this paper shows that a multicast flow suffers lower throughput than unicast flows when conventional QCN is applied in a naive manner. This is because a sending device receives congestion feedback from multiple locations on a multicast tree and decreases transmission rate accordingly. To counter this throughput degradation of multicast flows, we propose a new Layer 2 congestion control algorithm in multicast environment, Quantized Congestion Notification with Bottleneck Selection (QCN/BS). In QCN/BS, the switch in the worst congestion level is selected and the transmission rate of the sending device is calculated exclusively according to feedback from the selected switch. Simulation results show that when conventional QCN is used, a multicast flow experiences lower and more severely unfair throughput than a unicast flow. The proposed QCN/BS resolves this problem.

  • Twin Domination Problems in Round Digraphs

    Tamaki NAKAJIMA  Yuuki TANAKA  Toru ARAKI  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1192-1199

    A twin dominating set of a digraph D is a subset S of vertices if, for every vertex u ∉ S, there are vertices x,y ∈ S such that ux and yu are arcs of D. A digraph D is round if the vertices can be labeled as v0,v1,...,vn-1 so that, for each vertex vi, the out-neighbors of vi appear consecutively following vi and the in-neighbors of vi appear consecutively preceding vi. In this paper, we give polynomial time algorithms for finding a minimum weight twin dominating set and a minimum weight total twin dominating set for a weighted round digraph. Then we show that there is a polynomial time algorithm for deciding whether a locally semicomplete digraph has an independent twin dominating set. The class of locally semicomplete digraphs contains round digraphs as a special case.

  • A Note on Cooperating Systems of One-Way Alternating Finite Automata with Only Universal States

    Tatsuya FUJIMOTO  Tsunehiro YOSHINAGA  Makoto SAKAMOTO  

     
    LETTER

      Vol:
    E97-A No:6
      Page(s):
    1375-1377

    A cooperating system of finite automata (CS-FA) has more than one finite automata (FA's) and an input tape. These FA's operate independently on the input tape and can communicate with each other on the same cell of the input tape. For each k ≥ 1, let L[CS-1DFA(k)] (L[CS-1UFA(k)]) be the class of sets accepted by CS-FA's with k one-way deterministic finite automata (alternating finite automata with only universal states). We show that L[CS-1DFA(k+1)] - L[CS-1UFA(k)] ≠ ∅ and L[CS-1UFA(2)] - ∪1≤k<∞L[CS-1DFA(k)] ≠ ∅.

  • Efficient Parallel Interference Cancellation MIMO Detector for Software Defined Radio on GPUs

    Rongchun LI  Yong DOU  Jie ZHOU  Chen CHEN  

     
    PAPER-Digital Signal Processing

      Vol:
    E97-A No:6
      Page(s):
    1388-1395

    The parallel interference cancellation (PIC) multiple input multiple output (MIMO) detection algorithm has bit error ratio (BER) performance comparable to the maximum likelihood (ML) algorithm but with complexity close to the simple linear detection algorithm such as zero forcing (ZF), minimum mean squared error (MMSE), and successive interference cancellation (SIC), etc. However, the throughput of PIC MIMO detector on central processing unit (CPU) cannot meet the requirement of wireless protocols. In order to reach the throughput required by the standards, the graphics processing unit (GPU) is exploited in this paper as the modem processor to accelerate the processing procedure of PIC MIMO detector. The parallelism of PIC algorithm is analyzed and the two-stage PIC detection is carefully developed to efficiently match the multi-core architecture. Several optimization methods are employed to enhance the throughput, such as the memory optimization and asynchronous data transfer. The experiment shows that our MIMO detector has excellent BER performance and the peak throughput is 337.84 Mega bits per second (Mbps), about 7x to 16x faster than that of CPU implementation with SSE2 optimization methods. The implemented MIMO detector has better computing throughput than recent GPU-based implementations.

  • Highly Nonlinear Resilient Functions without Linear Structures

    Jian LIU  Lusheng CHEN  Xuan GUANG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:6
      Page(s):
    1405-1417

    In this paper, we provide several methods to construct nonlinear resilient functions with multiple good cryptographic properties, including high nonlinearity, high algebraic degree, and non-existence of linear structures. Firstly, we present an improvement on a known construction of resilient S-boxes such that the nonlinearity and the algebraic degree will become higher in some cases. Then a construction of highly nonlinear t-resilient Boolean functions without linear structures is given, whose algebraic degree achieves n-t-1, which is optimal for n-variable t-resilient Boolean functions. Furthermore, we construct a class of resilient S-boxes without linear structures, which possesses the highest nonlinearity and algebraic degree among all currently known constructions.

  • Improvement of Semi-Random Measurement Matrix for Compressed Sensing

    Wentao LV  Junfeng WANG  Wenxian YU  Zhen TAN  

     
    LETTER-Digital Signal Processing

      Vol:
    E97-A No:6
      Page(s):
    1426-1429

    In compressed sensing, the design of the measurement matrix is a key work. In order to achieve a more precise reconstruction result, the columns of the measurement matrix should have better orthogonality or linear incoherence. A random matrix, like a Gaussian random matrix (GRM), is commonly adopted as the measurement matrix currently. However, the columns of the random matrix are only statistically-orthogonal. By substituting an orthogonal basis into the random matrix to construct a semi-random measurement matrix and by optimizing the mutual coherence between dictionary columns to approach a theoretical lower bound, the linear incoherence of the measurement matrix can be greatly improved. With this optimization measurement matrix, the signal can be reconstructed from its measures more precisely.

  • Backhaul Assignment Design for MISO Downlinks with Multi-Cell Cooperation

    Fengfeng SHI  Wei XU  Jiaheng WANG  Chunming ZHAO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:6
      Page(s):
    1166-1174

    Multi-cell cooperation is a promising technique to mitigate inter-cell interference arising from universal frequency reuse in cellular networks. Sharing channel state information (CSI) in neighboring cells can help enhance the overall system capacity at the cost of high feedback burden. In this paper, an asymmetric CSI feedback strategy is proposed for multi-cell cooperation beamforming. In order to improve the overall system performance, we optimize the limited feedback bandwidth based on the average received power from both serving and neighboring cells. Simulation results show that the proposed strategy utilizes the limited feedback bandwidth more efficiently, thereby achieving a higher sum rate.

  • A Unified Framework for Small Secret Exponent Attack on RSA

    Noboru KUNIHIRO  Naoyuki SHINOHARA  Tetsuya IZU  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1285-1295

    In this paper, we present a lattice based method on small secret exponent attack on the RSA scheme. Boneh and Durfee reduced the attack to finding the small roots of the bivariate modular equation: x(N+1+y)+1 ≡ 0 (mod e), where N is an RSA modulus and e is the RSA public key and proposed a lattice based algorithm for solving the problem. When the secret exponent d is less than N0.292, their method breaks the RSA scheme. Since the lattice used in the analysis is not full-rank, the analysis is not easy. Blömer and May proposed an alternative algorithm that uses a full-rank lattice, even though it gives a bound (d≤N0.290) that is worse than Boneh-Durfee. However, the proof for their bound is still complicated. Herrmann and May, however, have given an elementary proof for the Boneh-Durfee's bound: d≤N0.292. In this paper, we first give an elementary proof for achieving Blömer-May's bound: d≤N0.290. Our proof employs the unravelled linearization technique introduced by Herrmann and May and is rather simpler than that of Blömer-May's proof. We then provide a unified framework — which subsumes the two previous methods, the Herrmann-May and the Blömer-May methods, as a special case — for constructing a lattice that can be are used to solve the problem. In addition, we prove that Boneh-Durfee's bound: d≤N0.292 is still optimal in our unified framework.

  • An Advanced Cooperative Scheme in the Broadcasting and Cellular System

    Hyun-Jun SHIN  Hyun-Woo JANG  Hyoung-Kyu SONG  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E97-D No:6
      Page(s):
    1634-1638

    In this letter, a cooperative scheme is proposed for the broadcasting and cellular communication system. The proposed scheme improves bit error rate (BER) performance and throughput on the edge of a cellular base station (CBS) cooperating with another CBS in the same broadcasting coverage. The proposed scheme for the enhancement of BER performance employs two schemes by a channel quality information (CQI) between a broadcasting base station (BBS) and users. In a physical area, the edge of a CBS is concatenated with the edge of another CBS. When users are on the edge of a CBS, they transmit simultaneously the CQI to CBSs, and then a BBS and CBSs transmit signals by the proposed algorithm. The two schemes apply space-time cyclic delay diversity (CDD) and a combination of space-time block code (STBC) with vertical Bell Laboratories Layered Space-Time (V-BLAST) to a signal from a BBS and CBSs. The resulting performance indicates that the proposed scheme is effective for users on the edges of CBSs.

  • Dynamic Check Message Majority-Logic Decoding Algorithm for Non-binary LDPC Codes

    Yichao LU  Xiao PENG  Guifen TIAN  Satoshi GOTO  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1356-1364

    Majority-logic algorithms are devised for decoding non-binary LDPC codes in order to reduce computational complexity. However, compared with conventional belief propagation algorithms, majority-logic algorithms suffer from severe bit error performance degradation. This paper presents a low-complexity reliability-based algorithm aiming at improving error correcting ability of majority-logic algorithms. Reliability measures for check nodes are novelly introduced to realize mutual update between variable message and check message, and hence more efficient reliability propagation can be achieved, similar to belief-propagation algorithm. Simulation results on NB-LDPC codes with different characteristics demonstrate that our algorithm can reduce the bit error ratio by more than one order of magnitude and the coding gain enhancement over ISRB-MLGD can reach 0.2-2.0dB, compared with both the ISRB-MLGD and IISRB-MLGD algorithms. Moreover, simulations on typical LDPC codes show that the computational complexity of the proposed algorithm is closely equivalent to ISRB-MLGD algorithm, and is less than 10% of Min-max algorithm. As a result, the proposed algorithm achieves a more efficient trade-off between decoding computational complexity and error performance.

  • A Novel Adaptive Unambiguous Acquisition Scheme for CBOC Signal Based on Galileo

    Ce LIANG  Xiyan SUN  Yuanfa JI  Qinghua LIU  Guisheng LIAO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:6
      Page(s):
    1157-1165

    The composite binary offset carrier (CBOC) modulated signal contains multi-peaks in its auto-correlation function, which brings ambiguity to the signal acquisition process of a GNSS receiver. Currently, most traditional ambiguity-removing schemes for CBOC signal acquisition approximate CBOC signal as a BOC signal, which may incur performance degradation. Based on Galileo E1 CBOC signal, this paper proposes a novel adaptive ambiguity-removing acquisition scheme which doesn't adopt the approximation used in traditional schemes. According to the energy ratio of each sub-code of CBOC signal, the proposed scheme can self-adjust its local reference code to achieve unambiguous and precise signal synchronization. Monte Carlo simulation is conducted in this paper to analyze the performance of the proposed scheme and three traditional schemes. Simulation results show that the proposed scheme has higher detection probability and less mean acquisition time than the other three schemes, which verify the superiority of the proposed scheme.

  • Voice Timbre Control Based on Perceived Age in Singing Voice Conversion

    Kazuhiro KOBAYASHI  Tomoki TODA  Hironori DOI  Tomoyasu NAKANO  Masataka GOTO  Graham NEUBIG  Sakriani SAKTI  Satoshi NAKAMURA  

     
    PAPER-Voice Conversion and Speech Enhancement

      Vol:
    E97-D No:6
      Page(s):
    1419-1428

    The perceived age of a singing voice is the age of the singer as perceived by the listener, and is one of the notable characteristics that determines perceptions of a song. In this paper, we describe an investigation of acoustic features that have an effect on the perceived age, and a novel voice timbre control technique based on the perceived age for singing voice conversion (SVC). Singers can sing expressively by controlling prosody and voice timbre, but the varieties of voices that singers can produce are limited by physical constraints. Previous work has attempted to overcome this limitation through the use of statistical voice conversion. This technique makes it possible to convert singing voice timbre of an arbitrary source singer into those of an arbitrary target singer. However, it is still difficult to intuitively control singing voice characteristics by manipulating parameters corresponding to specific physical traits, such as gender and age. In this paper, we first perform an investigation of the factors that play a part in the listener's perception of the singer's age at first. Then, we applied a multiple-regression Gaussian mixture models (MR-GMM) to SVC for the purpose of controlling voice timbre based on the perceived age and we propose SVC based on the modified MR-GMM for manipulating the perceived age while maintaining singer's individuality. The experimental results show that 1) the perceived age of singing voices corresponds relatively well to the actual age of the singer, 2) prosodic features have a larger effect on the perceived age than spectral features, 3) the individuality of a singer is influenced more heavily by segmental features than prosodic features 4) the proposed voice timbre control method makes it possible to change the singer's perceived age while not having an adverse effect on the perceived individuality.

  • Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors

    Noboru KUNIHIRO  Naoyuki SHINOHARA  Tetsuya IZU  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1273-1284

    We discuss how to recover RSA secret keys from noisy key bits with erasures and errors. There are two known algorithms recovering original secret keys from noisy keys. At Crypto 2009, Heninger and Shacham proposed a method for the case where an erroneous version of secret keys contains only erasures. Subsequently, Henecka et al. proposed a method for an erroneous version containing only errors at Crypto 2010. For physical attacks such as side-channel and cold boot attacks, we need to study key recovery from a noisy secret key containing both erasures and errors. In this paper, we propose a method to recover a secret key from such an erroneous version and analyze the condition for error and erasure rates so that our algorithm succeeds in finding the correct secret key in polynomial time. We also evaluate a theoretical bound to recover the secret key and discuss to what extent our algorithm achieves this bound.

  • Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles

    Kazuki YONEYAMA  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1335-1344

    ID-based authenticated key exchange (ID-AKE) is a cryptographic tool to establish a common session key between parties with authentication based on their IDs. If IDs contain some hierarchical structure such as an e-mail address, hierarchical ID-AKE (HID-AKE) is especially suitable because of scalability. However, most of existing HID-AKE schemes do not satisfy advanced security properties such as forward secrecy, and the only known strongly secure HID-AKE scheme is inefficient. In this paper, we propose a new HID-AKE scheme which achieves both strong security and efficiency. We prove that our scheme is eCK-secure (which ensures maximal-exposure-resilience including forward secrecy) without random oracles, while existing schemes is proved in the random oracle model. Moreover, the number of messages and pairing operations are independent of the hierarchy depth; that is, really scalable and practical for a large-system.

  • Initial Assessment of Medium-Baseline Single-Epoch RTK Using GPS/BeiDou/QZSS

    Nobuaki KUBO  Hideki YAMADA  Tomoji TAKASU  

     
    PAPER-Sensing

      Vol:
    E97-B No:6
      Page(s):
    1195-1204

    Instantaneous ambiguity resolution techniques are methods employed to achieve real-time high-accuracy positioning. The advent of the Chinese BeiDou system enables us to evaluate the performance of the combined GPS/BeiDou/QZSS dual-frequency ambiguity resolution and BeiDou three-frequency ambiguity resolution. It is known that the increasing number of satellites used can increase the reliability as well as the availability of single-epoch real-time kinematic (RTK) information. Therefore, performance improvement of single-epoch RTK by adding BeiDou satellites is strongly expected because many BeiDou satellites are operated in Asian regions. The first objective of this study is to conduct an initial assessment of the single-epoch RTK performance, as well as standalone positioning/code relative positioning using GPS/BeiDou/QZSS. The second objective of this study is to evaluate the performance of the longer-baseline single-epoch ambiguity resolution using the three-frequency observation data. Furthermore, the possibility of future single-epoch RTK service is discussed in this paper.

  • Effects of Voluntary Movements on Audio-Tactile Temporal Order Judgment

    Atsuhiro NISHI  Masanori YOKOYAMA  Ken-ichiro OGAWA  Taiki OGATA  Takayuki NOZAWA  Yoshihiro MIYAKE  

     
    PAPER-Office Information Systems, e-Business Modeling

      Vol:
    E97-D No:6
      Page(s):
    1567-1573

    The present study aims to investigate the effect of voluntary movements on human temporal perception in multisensory integration. We therefore performed temporal order judgment (TOJ) tasks in audio-tactile integration under three conditions: no movement, involuntary movement, and voluntary movement. It is known that the point of subjective simultaneity (PSS) under the no movement condition, that is, normal TOJ tasks, appears when a tactile stimulus is presented before an auditory stimulus. Our experiment showed that involuntary and voluntary movements shift the PSS to a value that reduces the interval between the presentations of auditory and tactile stimuli. Here, the shift of the PSS under the voluntary movement condition was greater than that under the involuntary movement condition. Remarkably, the PSS under the voluntary movement condition appears when an auditory stimulus slightly precedes a tactile stimulus. In addition, a just noticeable difference (JND) under the voluntary movement condition was smaller than those under the other two conditions. These results reveal that voluntary movements alternate the temporal integration of audio-tactile stimuli. In particular, our results suggest that voluntary movements reverse the temporal perception order of auditory and tactile stimuli and improve the temporal resolution of temporal perception. We discuss the functional mechanism of shifting the PSS under the no movement condition with voluntary movements in audio-tactile integration.

  • An Adaptive Base Plane Filtering Algorithm for Inter-plane Estimation of RGB Images in HEVC RExt

    Jangwon CHOI  Yoonsik CHOE  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E97-D No:6
      Page(s):
    1686-1689

    This letter proposes an adaptive base plane filtering algorithm for the inter-plane estimation of RGB images in HEVC RExt. Because most high-frequency components of RGB images have low inter-plane correlation, our proposed scheme adaptively removes the high-frequency components of the base plane in order to enhance the inter-plane estimation accuracy. The experimental results show that the proposed scheme provides average BD rate gains of 0.6%, 1.0%, and 1.2% in the G, B, and R planes, respectively, with slightly decreased complexity, as compared to the previous inter-plane filtering method.

  • A 10-bit CMOS Digital-to-Analog Converter with Compact Size for Display Applications

    Mungyu KIM  Hoon-Ju CHUNG  Young-Chan JANG  

     
    PAPER

      Vol:
    E97-C No:6
      Page(s):
    519-525

    A 10-bit digital-to-analog converter (DAC) with a small area is proposed for data-driver integrated circuits of active-matrix liquid crystal display systems. The 10-bit DAC consists of a 7-bit resistor string, a 7-bit two-step decoder, a 2-bit logarithmic time interpolator, and a buffer amplifier. The proposed logarithmic time interpolation is achieved by controlling the charging time of a first-order low-pass filter composed of a resistor and a capacitor. The 7-bit two-step decoder that follows the 7-bit resistor string outputs an analog signal of the stepped wave with two voltage levels using the additional 1-bit digital code for the logarithmic time interpolation. The proposed 10-bit DAC is implemented using a 0.35-µm CMOS process and its supply voltage is scalable from 3.3V to 5.0V. The area of the proposed 10-bit logarithmic time interpolation DAC occupies 57% of that of the conventional 10-bit resistor-string DAC. The DNL and INL of the implemented 10-bit DAC are +0.29/-0.30 and +0.47/-0.36 LSB, respectively.

  • Automatic Vocabulary Adaptation Based on Semantic and Acoustic Similarities

    Shoko YAMAHATA  Yoshikazu YAMAGUCHI  Atsunori OGAWA  Hirokazu MASATAKI  Osamu YOSHIOKA  Satoshi TAKAHASHI  

     
    PAPER-Speech Recognition

      Vol:
    E97-D No:6
      Page(s):
    1488-1496

    Recognition errors caused by out-of-vocabulary (OOV) words lead critical problems when developing spoken language understanding systems based on automatic speech recognition technology. And automatic vocabulary adaptation is an essential technique to solve these problems. In this paper, we propose a novel and effective automatic vocabulary adaptation method. Our method selects OOV words from relevant documents using combined scores of semantic and acoustic similarities. Using this combined score that reflects both semantic and acoustic aspects, only necessary OOV words can be selected without registering redundant words. In addition, our method estimates probabilities of OOV words using semantic similarity and a class-based N-gram language model. These probabilities will be appropriate since they are estimated by considering both frequencies of OOV words in target speech data and the stable class N-gram probabilities. Experimental results show that our method improves OOV selection accuracy and recognition accuracy of newly registered words in comparison with conventional methods.

  • Translation Repair Method for Improving Accuracy of Translated Sentences

    Taku FUKUSHIMA  Takashi YOSHINO  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E97-D No:6
      Page(s):
    1528-1534

    In this study, we have developed a translation repair method to automatically improve the accuracy of translations. Machine translation (MT) supports multilingual communication; however, it cannot achieve high accuracy. MT creates only one translated sentence; therefore, it is difficult to improve the accuracy of translated sentences. Our method creates multiple translations by adding personal pronouns to the source sentence and by using a word dictionary and a parallel corpus. In addition, it selects an accurate translation from among the multiple translations using the results of a Web search. As a result, the translation repair method improved the accuracy of translated sentences, and its accuracy is greater than that of MT.

9881-9900hit(42807hit)