The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] APS(165hit)

21-40hit(165hit)

  • A New Combiner for Key Encapsulation Mechanisms

    Goichiro HANAOKA  Takahiro MATSUDA  Jacob C. N. SCHULDT  

     
    PAPER-Cryptography

      Vol:
    E102-A No:12
      Page(s):
    1668-1675

    Key encapsulation mechanism (KEM) combiners, recently formalized by Giacon, Heuer, and Poettering (PKC'18), enable hedging against insecure KEMs or weak parameter choices by combining ingredient KEMs into a single KEM that remains secure assuming just one of the underlying ingredient KEMs is secure. This seems particularly relevant when considering quantum-resistant KEMs which are often based on arguably less well-understood hardness assumptions and parameter choices. We propose a new simple KEM combiner based on a one-time secure message authentication code (MAC) and two-time correlated input secure hash. Instantiating the correlated input secure hash with a t-wise independent hash for an appropriate value of t, yields a KEM combiner based on a strictly weaker additional primitive than the standard model construction of Giaon et al. and furthermore removes the need to do n full passes over the encapsulation, where n is the number of ingredient KEMs, which Giacon et al. highlight as a disadvantage of their scheme. However, unlike Giacon et al., our construction requires the public key of the combined KEM to include a hash key, and furthermore requires a MAC tag to be added to the encapsulation of the combined KEM.

  • Localization Method Using Received Signal Strength for Wireless Power Transmission of the Capsule Endoscope Open Access

    Daijiro HIYOSHI  Masaharu TAKAHASHI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2019/02/18
      Vol:
    E102-B No:8
      Page(s):
    1660-1667

    In recent years, capsule endoscopy has attracted attention as one of the medical devices that examine internal digestive tracts without burdening patients. Wireless power transmission of the capsule endoscope has been researched now, and the power transmission efficiency can be improved by knowing the capsule location. In this paper, we develop a localization method wireless power transmission. Therefore, a simple algorithm for using received signal strength (RSS) has been developed so that position estimation can be performed in real time, and the performance is evaluated by performing three-dimensional localization with eight receiving antennas.

  • Low Temperature Formation of Pd2Si with TiN Encapsulating Layer and Its Application to Dopant Segregation Process

    Rengie Mark D. MAILIG  Shun-ichiro OHMI  

     
    PAPER

      Vol:
    E102-C No:6
      Page(s):
    447-452

    We investigated the low temperature formation of Pd2Si on Si(100) with TiN encapsulating layer formed at 500°C/1 min. Furthermore, the dopant segregation process was performed with ion dose of 1x1015 cm-2 for B+. The uniform Pd2Si was successfully formed with low sheet resistance of 10.4 Ω/sq. Meanwhile, the PtSi formed on Si(100) showed rough surface morphology if the silicidation temperature was 500°C. The estimated Schottky barrier height to hole of 0.20 eV (qφBp) was realized for n-Si(100).

  • Dependable Wireless Feedback Loop Control Schemes Considering Errors and Delay in Sensing Data and Control Command Packets

    Satoshi SEIMIYA  Takumi KOBAYASHI  Ryuji KOHNO  

     
    PAPER

      Pubricized:
    2018/12/19
      Vol:
    E102-B No:6
      Page(s):
    1113-1120

    In this study, under the assumption that a robot (1) has a remotely controllable yawing camera and (2) moves in a uniform linear motion, we propose and investigate how to improve the target recognition rate with the camera, by using wireless feedback loop control. We derive the allowable data rate theoretically, and, from the viewpoint of error and delay control, we propose and evaluate QoS-Hybrid ARQ schemes under data rate constraints. Specifically, the theoretical analyses derive the maximum data rate for sensing and control based on the channel capacity is derived with the Shannon-Hartley theorem and the path-loss channel model inside the human body, i.e. CM2 in IEEE 802.15.6 standard. Then, the adaptive error and delay control schemes, i.e. QoS-HARQ, are proposed considering the two constraints: the maximum data rate and the velocity of the camera's movement. For the performance evaluations, with the 3D robot simulator GAZEBO, we evaluated our proposed schemes in the two scenarios: the static environment and the dynamic environment. The results yield insights into how to improve the recognition rate considerably in each situation.

  • Variable Regularization Affine Projection Sign Algorithm in Impulsive Noisy Environment

    Ying-Ren CHIEN  

     
    LETTER-Digital Signal Processing

      Vol:
    E102-A No:5
      Page(s):
    725-728

    Affine projection sign algorithm (APSA) is an important adaptive filtering method to combat the impulsive noisy environment. However, the performance of APSA is poor, if its regularization parameter is not well chosen. We propose a variable regularization APSA (VR-APSA) approach, which adopts a gradient-based method to recursively reduce the norm of the a priori error vector. The resulting VR-APSA leverages the time correlation of both the input signal matrix and error vector to adjust the value of the regularization parameter. Simulation results confirm that our algorithm exhibits both fast convergence and small misadjustment properties.

  • Bit Labeling and Code Searches for BICM-ID Using 16-DAPSK

    Chun-Lin LIN  Tzu-Hsiang LIN  Ruey-Yi WEI  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/05/31
      Vol:
    E101-B No:12
      Page(s):
    2380-2387

    Bit-interleaved coded modulation with iterative decoding (BICM-ID) is suitable for correlated Rayleigh fading channels. Additionally, BICM-ID using differential encoding can avoid the pilot overhead. In this paper, we consider BICM-ID using 16-DAPSK (differential amplitude and phase-shift keying). We first derive the probability of receiving signals conditioned on the transmission of input bits for general differential encoding; then we propose two new 16-DAPSK bit labeling methods. In addition, convolutional codes for the new bit labeling are developed. Both the minimum distance and the simulation results show that the proposed labeling has better error performance than that of the original differential encoding, and the searched new codes can further improve the error performance.

  • Delay-Independent Design for Synchronization in Delayed-Coupled One-Dimensional Map Networks

    Yoshiki SUGITANI  Keiji KONISHI  

     
    LETTER-Nonlinear Problems

      Vol:
    E101-A No:10
      Page(s):
    1708-1712

    The present Letter proposes a design procedure for inducing synchronization in delayed-coupled one-dimensional map networks. We assume the practical situation where the connection delay, the detailed information about the network topology, and the number of the maps are unknown in advance. In such a situation, it is difficult to guarantee the stability of synchronization, since the local stability of a synchronized manifold is equivalent to that of a linear time-variant system. A sufficient condition in robust control theory helps us to derive a simple design procedure. The validity of our design procedure is numerically confirmed.

  • RbWL: Recency-Based Static Wear Leveling for Lifetime Extension and Overhead Reduction in NAND Flash Memory Systems

    Sang-Ho HWANG  Jong Wook KWAK  

     
    LETTER-Software System

      Pubricized:
    2018/07/09
      Vol:
    E101-D No:10
      Page(s):
    2518-2522

    In this letter, we propose a static wear leveling technique, called Recency-based Wear Leveling (RbWL). The basic idea of RbWL is to execute static wear leveling at minimum levels, because the frequent migrations of cold data by static wear leveling cause significant overhead in a NAND flash memory system. RbWL adjusts the execution frequency according to a threshold value that reflects the lifetime difference of the hot/cold blocks and the total lifetime of the NAND flash memory system. The evaluation results show that RbWL improves the lifetime of NAND flash memory systems by 52%, and it also reduces the overhead of wear leveling from 8% to 42% and from 13% to 51%, in terms of the number of erase operations and the number of page migrations of valid pages, respectively, compared with other algorithms.

  • Quadruped Locomotion Patterns Generated by Desymmetrization of Symmetric Central Pattern Generator Hardware Network

    Naruki SASAGAWA  Kentaro TANI  Takashi IMAMURA  Yoshinobu MAEDA  

     
    PAPER-Nonlinear Problems

      Vol:
    E101-A No:10
      Page(s):
    1658-1667

    Reproducing quadruped locomotion from an engineering viewpoint is important not only to control robot locomotion but also to clarify the nonlinear mechanism for switching between locomotion patterns. In this paper, we reproduced a quadruped locomotion pattern, gallop, using a central pattern generator (CPG) hardware network based on the abelian group Z4×Z2, originally proposed by Golubitsky et al. We have already used the network to generate three locomotion patterns, walk, trot, and bound, by controlling the voltage, EMLR, inputted to all CPGs which acts as a signal from the midbrain locomotor region (MLR). In order to generate the gallop and canter patterns, we first analyzed the network symmetry using group theory. Based on the results of the group theory analysis, we desymmetrized the contralateral couplings of the CPG network using a new parameter in addition to EMLR, because, whereas the walk, trot, and bound patterns were able to be generated from the spatio-temporal symmetry of the product group Z4×Z2, the gallop and canter patterns were not. As a result, using a constant element $hat{kappa}$ on Z2, the gallop and canter locomotion patterns were generated by the network on ${f Z}_4+hat{kappa}{f Z}_4$, and actually in this paper, the gallop locomotion pattern was generated on the actual circuit.

  • Fast Enumeration of All Pareto-Optimal Solutions for 0-1 Multi-Objective Knapsack Problems Using ZDDs

    Hirofumi SUZUKI  Shin-ichi MINATO  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1375-1382

    Finding Pareto-optimal solutions is a basic approach in multi-objective combinatorial optimization. In this paper, we focus on the 0-1 multi-objective knapsack problem, and present an algorithm to enumerate all its Pareto-optimal solutions, which improves upon the method proposed by Bazgan et al. Our algorithm is based on dynamic programming techniques using an efficient data structure called zero-suppressed binary decision diagram (ZDD), which handles a set of combinations compactly. In our algorithm, we utilize ZDDs for storing all the feasible solutions compactly, and pruning inessential partial solutions as quickly as possible. As an output of the algorithm, we can obtain a useful ZDD indexing all the Pareto-optimal solutions. The results of our experiments show that our algorithm is faster than the previous method for various types of three- and four-objective instances, which are difficult problems to solve.

  • Two-Input Functional Encryption for Inner Products from Bilinear Maps

    Kwangsu LEE  Dong Hoon LEE  

     
    PAPER-Cryptography and Information Security

      Vol:
    E101-A No:6
      Page(s):
    915-928

    Functional encryption is a new paradigm of public-key encryption that allows a user to compute f(x) on encrypted data CT(x) with a private key SKf to finely control the revealed information. Multi-input functional encryption is an important extension of (single-input) functional encryption that allows the computation f(x1,...,xn) on multiple ciphertexts CT(x1),...,CT(xn) with a private key SKf. Although multi-input functional encryption has many interesting applications like running SQL queries on encrypted database and computation on encrypted stream, current candidates are not yet practical since many of them are built on indistinguishability obfuscation. To solve this unsatisfactory situation, we show that practical two-input functional encryption schemes for inner products can be built based on bilinear maps. In this paper, we first propose a two-input functional encryption scheme for inner products in composite-order bilinear groups and prove its selective IND-security under simple assumptions. Next, we propose a two-client functional encryption scheme for inner products where each ciphertext can be associated with a time period and prove its selective IND-security. Furthermore, we show that our two-input functional encryption schemes in composite-order bilinear groups can be converted into schemes in prime-order asymmetric bilinear groups by using the asymmetric property of asymmetric bilinear groups.

  • Capsule Antenna Design Based on Transmission Factor through the Human Body

    Yang LI  Hiroyasu SATO  Qiang CHEN  

     
    PAPER-Antennas

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    357-363

    To design antennas for ingestible capsule endoscope systems, the transmission factors of dipole and loop antennas placed in the torso-shaped phantom filled with deionized water or human body equivalent liquid (HBEL) are investigated by numerical and experimental study. The S-parameter method is used to evaluate transmission characteristics through a torso-shaped phantom in a broadband frequency range. Good agreement of S-parameters between measured results and numerical analysis is observed and the transmission factors for both cases are obtained. Comparison of the transmission factors between HBEL and deionized water is presented to explain the relation between conductivity and the transmission characteristics. Two types of antennas, dipole antenna and loop antenna are compared. In the case of a dipole antenna placed in deionized water, it is observed that the transmission factor decreases as conductivity increases. On the other hand, there is a local maximum in the transmission factor at 675 MHz in the case of HBEL. This phenomenon is not observed in the case of a loop antenna. The transmission factor of capsule dipole antenna and capsule loop antenna are compared and the guideline in designing capsule antennas by using transmission factor is also proposed.

  • Cryptographic Multilinear Maps and Their Cryptanalysis

    Jung HEE CHEON  Changmin LEE  Hansol RYU  

     
    INVITED PAPER

      Vol:
    E101-A No:1
      Page(s):
    12-18

    Multilinear maps have lots of cryptographic applications including multipartite key exchange and indistinguishability obfuscations. Since the concept of multilinear map was suggested, three kinds of candidate multilinear maps are constructed. However, the security of multilinear maps suffers from various attacks. In this paper, we overview suggested multilinear maps and cryptanalysis of them in diverse cases.

  • On Map-Based Analysis of Item Relationships in Specific Health Examination Data for Subjects Possibly Having Diabetes

    Naotake KAMIURA  Shoji KOBASHI  Manabu NII  Takayuki YUMOTO  Ichiro YAMAMOTO  

     
    PAPER-Soft Computing

      Pubricized:
    2017/05/19
      Vol:
    E100-D No:8
      Page(s):
    1625-1633

    In this paper, we present a method of analyzing relationships between items in specific health examination data, as one of the basic researches to address increases of lifestyle-related diseases. We use self-organizing maps, and pick up the data from the examination dataset according to the condition specified by some item values. We then focus on twelve items such as hemoglobin A1c (HbA1c), aspartate transaminase (AST), alanine transaminase (ALT), gamma-glutamyl transpeptidase (γ-GTP), and triglyceride (TG). We generate training data presented to a map by calculating the difference between item values associated with successive two years and normalizing the values of this calculation. We label neurons in the map on condition that one of the item values of training data is employed as a parameter. We finally examine the relationships between items by comparing results of labeling (clusters formed in the map) to each other. From experimental results, we separately reveal the relationships among HbA1c, AST, ALT, γ-GTP and TG in the unfavorable case of HbA1c value increasing and those in the favorable case of HbA1c value decreasing.

  • Geometry Clipmaps Terrain Rendering Using Hardware Tessellation

    Ge SONG  Hongyu YANG  Yulong JI  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/11/09
      Vol:
    E100-D No:2
      Page(s):
    401-404

    Due to heavy rendering load and unstable frame rate when rendering large terrain, this paper proposes a geometry clipmaps based algorithm. Triangle meshes are generated by few tessellation control points in GPU tessellation shader. ‘Cracks’ caused by different resolution between adjacent levels are eliminated by modifying outer tessellation level factor of shared edges between levels. Experimental results show the algorithm is able to improve rendering efficiency and frame rate stability in terrain navigation.

  • Three Gait Oscillations Switchable by a Single Parameter on Hard-Wired Central Pattern Generator Hardware Network

    Akihiro MARUYAMA  Kentaro TANI  Shigehito TANAHASHI  Atsuhiko IIJIMA  Yoshinobu MAEDA  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E99-A No:8
      Page(s):
    1600-1608

    We present a hard-wired central patter generator (CPG) hardware network that reproduces the periodic oscillations of the typical gaits, namely, walk, trot, and bound. Notably, the three gaits are generated by a single parameter, i.e., the battery voltage EMLR, which acts like a signal from the midbrain's locomotor region. One CPG is composed of two types of hardware neuron models, reproducing neuronal bursting and beating (action potentials), and three types of hardware synapse models: a gap junction, excitatory and inhibitory synapses. When four hardware CPG models were coupled into a Z4 symmetry network in a previous study [22], two neuronal oscillation patterns corresponding to four-legged animal gaits (walk and bound) were generated by manipulating a single control parameter. However, no more than two neuronal oscillation patterns have been stably observed on a hard-wired four-CPG hardware network. In the current study, we indicate that three neuronal oscillation patterns (walk, trot, and bound) can be generated by manipulating a single control parameter on a hard-wired eight-CPG (Z4 × Z2 symmetry) hardware network.

  • A Variant of Park-Lee Identity-Based Encryption System

    Jong Hwan PARK  Dong Hoon LEE  

     
    PAPER-Cryptography and Information Security

      Vol:
    E99-A No:3
      Page(s):
    720-732

    Recently, Park and Lee suggested a new framework for realizing Identity-Based Encryption (IBE) trapdoor called ‘two-equation-revocation’, and proposed a new IBE system that makes use of a Map-To-Point hash function. In this paper, we present a variant of the PL system by giving a simple way to remove the Map-To-Point hash function from the PL system. Our variant is proven to be secure under non-standard security assumptions, which results in the degradation of security. Instead, our variant can have several efficiency advantages over the PL system: (1) it provides receiver's anonymity, (2) it has no correctness error, (3) it has shorter ciphertext, and (4) it has faster encryption. As a result, (when not considering security assumptions and security losses) our variant is as efficient as the Boneh-Boyen and Sakai-Kasahara IBE systems that are considered as being the most practical ones.

  • Performance Evaluation on GA-Based Localization for Wireless Capsule Endoscope Using Scattered Electric Fields

    Taiki IIDA  Daisuke ANZAI  Jianqing WANG  

     
    PAPER

      Vol:
    E99-B No:3
      Page(s):
    578-585

    To improve the performance of capsule endoscope, it is important to add location information to the image data obtained by the capsule endoscope. There is a disadvantage that a lot of existing localization techniques require to measure channel model parameters in advance. To avoid such a troublesome pre-measurement, this paper pays attention to capsule endoscope localization based on an electromagnetic imaging technology which can estimate not only the location but also the internal structure of a human body. However, the electromagnetic imaging with high resolution has huge computational complexity, which should prevent us from carrying out real-time localization. To ensure the accurate real-time localization system without pre-measured model parameters, we apply genetic algorithm (GA) into the electromagnetic imaging-based localization method. Furthermore, we evaluate the proposed GA-based method in terms of the simulation time and the location estimation accuracy compared to the conventional methods. In addition, we show that the proposed GA-based method can perform more accurately than the other conventional methods, and also, much less computational complexity of the proposed method can be accomplished than a greedy algorithm-based method.

  • A Tightly-Secure Multisignature Scheme with Improved Verification

    Jong Hwan PARK  Young-Ho PARK  

     
    PAPER-Cryptography and Information Security

      Vol:
    E99-A No:2
      Page(s):
    579-589

    A multisignature (MS) scheme enables a group of signers to produce a compact signature on a common message. In analyzing security of MS schemes, a key registration protocol with proof-of-possession (POP) is considered to prevent rogue key attacks. In this paper, we refine the POP-based security model by formalizing a new strengthened POP model and showing relations between the previous POP models and the new one. We next suggest a MS scheme that achieves: (1) non-interactive signing process, (2) O(1) pairing computations in verification, (3) tight security reduction under the co-CDH assumption, and (4) security under the new strengthened POP model. Compared to the tightly-secure BNN-MS scheme, the verification in ours can be at least 7 times faster at the 80-bit security level and 10 times faster at the 128-bit security level. To achieve our goal, we introduce a novel and simple POP generation method that can be viewed as a one-time signature without random oracles. Our POP technique can also be applied to the LOSSW-MS scheme (without random oracles), giving the security in the strengthened POP model.

  • ISL Reassignment Based Snapshot Routing Optimization for Polar-Orbit LEO Satellite Networks

    Zhu TANG  Zhenqian FENG  Wei HAN  Wanrong YU  Baokang ZHAO  Chunqing WU  Yuanan LIU  

     
    PAPER-Satellite Communications

      Vol:
    E98-B No:9
      Page(s):
    1896-1905

    This paper presents an inter-satellite link (ISL) reassignment method to optimize the snapshot routing performance for polar-orbit LEO satellite networks. When the snapshot routing tables are switching simultaneously in all satellites, we propose to reassign the inter-plane ISLs with regularity to improve the quality of the next snapshot, such as snapshot duration, on-board transceiver utilization ratio and end to end delay. Evaluations indicate that our method can attain equal-length snapshots regardless of the latitude of the polar area border, and so is superior to the natural partition method. Meanwhile, compared with the equal partition method which is used in the Iridium system, our method can prolong 82.87% snapshot duration, increase 8.68% on-board transceiver utilization ratio and reduce 5.30% average end to end delay of the whole network. Therefore, we believe that the ISL reassignment method can be efficiently applied in all practical polar-orbit LEO satellite networks.

21-40hit(165hit)