The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] APS(165hit)

61-80hit(165hit)

  • Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function

    Eun-Jun YOON  Kee-Young YOO  

     
    LETTER

      Vol:
    E94-D No:11
      Page(s):
    2167-2170

    In 2010, Guo and Zhang proposed a group key agreement protocol based on the chaotic hash function. This letter points out that Guo-Zhang's protocol is still vulnerable to off-line password guessing attacks, stolen-verifier attacks and reflection attacks.

  • Rounding Logistic Maps over Integers and the Properties of the Generated Sequences

    Takeru MIYAZAKI  Shunsuke ARAKI  Yasuyuki NOGAMI  Satoshi UEHARA  

     
    PAPER-Information Theory

      Vol:
    E94-A No:9
      Page(s):
    1817-1825

    Because of its simple structure, many reports on the logistic map have been presented. To implement this map on computers, finite precision is usually used, and therefore rounding is required. There are five major methods to implement rounding, but, to date, no study of rounding applied to the logistic map has been reported. In the present paper, we present experimental results showing that the properties of sequences generated by the logistic map are heavily dependent on the rounding method used and give a theoretical analysis of each method. Then, we describe why using the map with a floor function for rounding generates long aperiodic subsequences.

  • Performance Evaluation of Wireless Communications for Capsule Endoscopy

    Kenichi TAKIZAWA  Takahiro AOYAGI  Kiyoshi HAMAGUCHI  

     
    LETTER

      Vol:
    E94-B No:9
      Page(s):
    2488-2491

    This letter presents a performance evaluation of wireless communications applicable into a capsule endoscope. A numerical model to describe the received signal strength (RSS) radiated from a capsule-sized signal generator is derived through measurements in which a liquid phantom is used that has electrical constants equivalent to human tissue specified by IEC 62209-1. By introducing this model and taking into account the characteristics of its direction pattern of the capsule and propagation distance between the implanted capsule and on-body antenna, a cumulative distribution function (CDF) of the received SNR is evaluated. Then, simulation results related to the error ratio in the wireless channel are obtained. These results show that the frequencies of 611 MHz or lesser would be useful for the capsule endoscope applications from the view point of error rate performance. Further, we show that the use of antenna diversity brings additional gain to this application.

  • Performance Evaluation of TCP/IP over SCTP/IP Parallel Networking with Parallel Route Transmission

    Shota YAMADA  Daisuke ISHII  Satoru OKAMOTO  Naoaki YAMANAKA  

     
    LETTER-Network

      Vol:
    E94-B No:8
      Page(s):
    2394-2396

    In this paper, Transmission Control Protocol/Internet Protocol (TCP/IP) over Stream Control Transmission Protocol (SCTP)/IP parallel transmission system is proposed to realize large TCP/IP throughput. The proposed system enables SCTP/IP connection between switches by protocol stacking. The proposed system is implemented on a software switch to evaluate its performance. The evaluation result indicates that proposed system can achieve 90% throughput compared with serial transmission when the delay difference among parallel routes is 20 msec.

  • LILES System: Guiding and Analyzing Cognitive Visualization in Beginning and Intermediate Kanji Learners

    Luis INOSTROZA CUEVA  Masao MUROTA  

     
    PAPER-Educational Technology

      Vol:
    E94-D No:7
      Page(s):
    1449-1458

    This paper provides conceptual and experimental analysis of a new approach in the study of kanji, our “Learner's Visualization (LV) Approach”. In a previous study we found that the LV Approach assists beginning learners in significantly updating their personal kanji deconstruction visualization. Additionally, in another study our findings provided evidence that beginning learners also receive a significant impact in the ability to acquire vocabulary. In this study, our research problem examines how beginning and intermediate students use visualization to cognitively deconstruct (divide) kanji in different ways, and how this affects their learning progress. We analyze the cognitive differences in how kanji learners explore and deconstruct novel kanji while using the LV Approach and how these differences affect their learning process while using the LV Approach. During the learning experience, our LILES System (Learner's Introspective Latent Envisionment System), based on the LV Approach, guides learners to choose from a set of possible “kanji deconstruction layouts” (layouts showing different ways in which a given kanji can be divided). The system then assists learners in updating their “kanji deconstruction level” (the average number of parts they visualize within kanji according to their current abilities). Statistical analysis based on achieved performance was conducted. The analysis of our results proves that there are cognitive differences: beginners deconstruct kanji into more parts (“blocks”) than intermediate learners do, and while both improve their kanji deconstruction scores, there is a more significant change in “kanji deconstruction level” in beginners. However, it was also found that intermediate learners benefit more in “kanji retention score” compared with beginners. Suggestions for further research are provided.

  • A Timed-Based Approach for Genetic Algorithm: Theory and Applications

    Amir MEHRAFSA  Alireza SOKHANDAN  Ghader KARIMIAN  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E94-D No:6
      Page(s):
    1306-1320

    In this paper, a new algorithm called TGA is introduced which defines the concept of time more naturally for the first time. A parameter called TimeToLive is considered for each chromosome, which is a time duration in which it could participate in the process of the algorithm. This will lead to keeping the dynamism of algorithm in addition to maintaining its convergence sufficiently and stably. Thus, the TGA guarantees not to result in premature convergence or stagnation providing necessary convergence to achieve optimal answer. Moreover, the mutation operator is used more meaningfully in the TGA. Mutation probability has direct relation with parent similarity. This kind of mutation will decrease ineffective mating percent which does not make any improvement in offspring individuals and also it is more natural. Simulation results show that one run of the TGA is enough to reach the optimum answer and the TGA outperforms the standard genetic algorithm.

  • How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model

    Yusuke SAKAI  Goichiro HANAOKA  Kaoru KUROSAWA  Kazuo OHTA  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1293-1305

    This paper shows a simple methodology for shortening a ciphertext of reproducible key encapsulation mechanisms. Specifically, it transforms a key encapsulation mechanism having OW-CCCA security and reproducibility into that of IND-CCA secure in the random oracle model whose ciphertext is shorter. Various existing chosen-ciphertext secure key encapsulation mechanisms (in the standard model) are reproducible, and thus their ciphertext can be shortened by the proposed transformation. The transformed scheme requires only one additional hashing for encryption. This property enables us to implement both the original scheme and the transformed scheme into a single chip simultaneously with small gate-size overhead. Using this chip, a sender can flexibly switch schemes to encrypt a message in a message-by-message manner. Such a use of schemes is also analyzed.

  • A Novel BICM-ID System Approaching Shannon-Limit at High Spectrum Efficiency

    Zhixing YANG  Qiuliang XIE  Kewu PENG  Zhaocheng WANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:3
      Page(s):
    793-795

    A method to construct bit-interleaved coded modulation with iterative demapping and decoding (BICM-ID) is developed that approaches the Shannon limit very closely at high spectrum efficiency, where amplitude-phase shift keying (APSK) constellations are designed and chosen. For 1/2-rate 64APSK, the Es/N0 threshold derived through extrinsic information transfer (EXIT) charts is less than 0.55 dB away from the Shannon limit of the continuous-input additive white Gaussian noise (AWGN) channel, and exceeds the theoretical limit constrained by standard 64QAM-input.

  • Secure and Efficient IBE-PKE Proxy Re-Encryption

    Takeo MIZUNO  Hiroshi DOI  

     
    PAPER-Public Key Cryptography

      Vol:
    E94-A No:1
      Page(s):
    36-44

    In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.

  • Learning Rule for Time Delay in Fuzzy Cognitive Maps

    In Keun LEE  Soon Hak KWON  

     
    LETTER-Biocybernetics, Neurocomputing

      Vol:
    E93-D No:11
      Page(s):
    3153-3157

    Time is considered as an important factor in modeling and operation of dynamic systems. However, few studies have considered time factor in modeling and inference of fuzzy cognitive maps (FCMs), besides, no studies have dealt with time delay in learning of FCMs. Therefore, we propose a learning rule for temporal FCMs involving post- and pre-delay time by extending Oja's learning rule. We show the effectiveness of the proposed rule through simulations which solve a time-delayed chemical plant control problem.

  • A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations

    Jong Hwan PARK  Dong Hoon LEE  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:9
      Page(s):
    1620-1631

    The Hidden Vector Encryption scheme is one of the searchable public key encryption schemes that allow for searching encrypted data. The Hidden Vector Encryption scheme supports conjunctive equality, comparison, and subset queries, as well as arbitrary conjunctive combinations of these queries. In a Hidden Vector Encryption scheme, a receiver generates a token for a vector of searchable components and sends the token to a query server which has the capability to evaluate it on encrypted data. All of the existing Hidden Vector Encryption schemes, which are all pairing-based, require token elements and pairing computations proportional to the number of searchable components in the token. In this paper, we suggest an improved paring-based Hidden Vector Encryption scheme where the token elements and pairing computations are independent of the number of searchable components. Namely, for an arbitrary conjunctive search query, the token is of size O(1) and the query server only needs O(1) pairing computations. The latter improvement in particular might be very attractive to a query server in a larger search system with many users. To achieve our goal, we introduce a novel technique to generate a token, which may be of independent interest.

  • 2D Device Simulation of AlGaN/GaN HFET Current Collapse Caused by Surface Negative Charge Injection

    Yusuke IKAWA  Yorihide YUASA  Cheng-Yu HU  Jin-Ping AO  Yasuo OHNO  

     
    PAPER-GaN-based Devices

      Vol:
    E93-C No:8
      Page(s):
    1218-1224

    Drain collapse in AlGaN/GaN HFET is analyzed using a two-dimensional device simulator. Two-step saturation is obtained, assuming hole-trap type surface states on the AlGaN surface and a short negative-charge-injected region at the drain side of the gate. Due to the surface electric potential pinning by the surface traps, the negative charge injected region forms a constant potential like in a metal gate region and it acts as an FET with a virtual gate. The electron concentration profile reveals that the first saturation occurs by pinch-off in the virtual gate region and the second saturation occurs by the pinch-off in the metal gate region. Due to the short-channel effect of the virtual gate FET, the saturation current increases until it finally reaches the saturation current of the intrinsic metal gate FET. Current collapses with current degradation at the knee voltage in the I-V characteristics can be explained by the formation of the virtual gate.

  • New Conditions for Secure Knapsack Schemes against Lattice Attack

    Noboru KUNIHIRO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:6
      Page(s):
    1058-1065

    Many knapsack cryptosystems have been proposed but almost all the schemes are vulnerable to lattice attack because of their low density. To prevent the lattice attack, Chor and Rivest proposed a low weight knapsack scheme, which made the density higher than critical density. In Asiacrypt2005, Nguyen and Stern introduced pseudo-density and proved that if the pseudo-density is low enough (even if the usual density is not low enough), the knapsack scheme can be broken by a single call to SVP/CVP oracle. However, the usual density and the pseudo-density are not sufficient to measure the resistance to the lattice attack individually. In this paper, we first introduce the new notion of density D, which naturally unifies the previous two density. Next, we derive conditions for our density so that a knapsack scheme is secure against lattice attack. We obtain a critical bound of density which depends only on the rate of the message length and its Hamming weight. Furthermore, we show that if D<0.8677, the knapsack scheme is solved by lattice attack. Next, we show that the critical bound goes to 1 if the Hamming weight decreases, which means that it is (almost) impossible to construct a low weight knapsack scheme which is supported by an argument of density.

  • Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme

    Jong Hwan PARK  Dong Hoon LEE  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:6
      Page(s):
    1269-1273

    Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.

  • Search for Minimal and Semi-Minimal Rule Sets in Incremental Learning of Context-Free and Definite Clause Grammars

    Keita IMADA  Katsuhiko NAKAMURA  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E93-D No:5
      Page(s):
    1197-1204

    This paper describes recent improvements to Synapse system for incremental learning of general context-free grammars (CFGs) and definite clause grammars (DCGs) from positive and negative sample strings. An important feature of our approach is incremental learning, which is realized by a rule generation mechanism called "bridging" based on bottom-up parsing for positive samples and the search for rule sets. The sizes of rule sets and the computation time depend on the search strategies. In addition to the global search for synthesizing minimal rule sets and serial search, another method for synthesizing semi-optimum rule sets, we incorporate beam search to the system for synthesizing semi-minimal rule sets. The paper shows several experimental results on learning CFGs and DCGs, and we analyze the sizes of rule sets and the computation time.

  • Development of an Implantable WBAN Path-Loss Model for Capsule Endoscopy

    Takahiro AOYAGI  Kenichi TAKIZAWA  Takehiko KOBAYASHI  Jun-ichi TAKADA  Kiyoshi HAMAGUCHI  Ryuji KOHNO  

     
    LETTER

      Vol:
    E93-B No:4
      Page(s):
    846-849

    An implantable WBAN path-loss model for a capsule endoscopy which is used for examining digestive organs, is developed by conducting simulations and experiments. First, we performed FDTD simulations on implant WBAN propagation by using a numerical human model. Second, we performed FDTD simulations on a vessel that represents the human body. Third, we performed experiments using a vessel of the same dimensions as that used in the simulations. On the basis of the results of these simulations and experiments, we proposed the gradient and intercept parameters of the simple path-loss in-body propagation model.

  • Increasing the Strength of Odors Produced by an Odor-Emitting Technology Using Odor Capsules

    Ayako NISHIMURA  Minoru SAKAIRI  Daisuke SUZUKI  

     
    PAPER-Multimedia Pattern Processing

      Vol:
    E93-D No:4
      Page(s):
    903-908

    We have developed an odor-emitting apparatus for application of odor to information technology. This apparatus consists of a chemical capsule cartridge including chemical capsules of odor ingredients and valves to control odor emission using an artificial metal muscle. In this method, multiple valves can be opened using the current for a single artificial muscle because the expansion and contraction time constant for the artificial muscles is large. We have developed a new multi-valve sequence mode that uses multiple odor capsules to increase odor strength, and we have been able to increase the strength produced by a factor of two. In addition, we evaluated the change in odor strength using a mock-up of the back seat of an automobile, and all of the ten test subjects reported sensing a stronger odor.

  • Efficiently Computing Minimal-Support Nonnegative Integer Invariants of Petri Nets

    Toshimasa WATANABE  Satoshi TAOKA  

     
    INVITED PAPER

      Vol:
    E92-A No:11
      Page(s):
    2707-2716

    Invariants of Petri nets are fundamental algebraic characteristics of Petri nets, and are used in various situations, such as checking (as necessity of) liveness, boundedness, periodicity and so on. Any given Petri net N has two kinds of invariants: a P-invariant is a |P|-dimensional vector Y with Yt A = and a T-invariant is a |T|-dimensional vector X with A X = for the place-transition incidence matrix A of N. T-invariants are nonnegative integer vectors, while this is not always the case with P-invariants. This paper deals only with nonnegative integer invariants (invariants that are nonnegative vectors) and shows results common to the two invariants. For simplicity of discussion, only P-invariants are treated. The Fourier-Motzkin method is well-known for computing all minimal support integer invariants. This method, however, has a critical deficiency such that, even if a given Perti net N has any invariant, it is likely that no invariants are obtained because of an overflow in storing intermediate vectors as candidates for invariants. The subject of the paper is to give an overview and results known to us for efficiently computing minimal-support nonnegative integer invariants of a given Petri net by means of the Fourier-Motzkin method. Also included are algorithms for efficiently extracting siphon-traps of a Petri net.

  • Comparisons of SiN Passivation Film Deposited by PE-CVD and T-CVD Method for AlGaN/GaN HEMTs on SiC Substrate

    Hideyuki OKITA  Toshiharu MARUI  Shinichi HOSHI  Masanori ITOH  Fumihiko TODA  Yoshiaki MORINO  Isao TAMAI  Yoshiaki SANO  Shohei SEKI  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    686-690

    Current collapse phenomenon is a well known obstacle in the AlGaN/GaN HEMTs. In order to improve the surface stability of HEMTs, we have investigated the SiN passivation film deposited by T-CVD, and we found that it improves both gate leakage current and current collapse phenomenon [1]. Moreover, we compared the T-CVD and PE-CVD passivation films, on high electric field DC and RF characteristics. We found that T-CVD SiN passivation film improves BVds-off by 30% because of the reduction of gate leakage current. It also improved ηd in the output power characteristics by load-pull measurement, which indicates the decrease of the current collapse phenomenon. Also we fabricated a multi-fingered 50 W-class AlGaN/GaN HEMT with T-CVD SiN passivation film and achieved 61.2% of high drain efficiency at frequency of 2.14 GHz, which was 3.6 points higher than that with PE-CVD SiN passivation film.

  • Controlling the Display of Capsule Endoscopy Video for Diagnostic Assistance

    Hai VU  Tomio ECHIGO  Ryusuke SAGAWA  Keiko YAGI  Masatsugu SHIBA  Kazuhide HIGUCHI  Tetsuo ARAKAWA  Yasushi YAGI  

     
    PAPER-Biological Engineering

      Vol:
    E92-D No:3
      Page(s):
    512-528

    Interpretations by physicians of capsule endoscopy image sequences captured over periods of 7-8 hours usually require 45 to 120 minutes of extreme concentration. This paper describes a novel method to reduce diagnostic time by automatically controlling the display frame rate. Unlike existing techniques, this method displays original images with no skipping of frames. The sequence can be played at a high frame rate in stable regions to save time. Then, in regions with rough changes, the speed is decreased to more conveniently ascertain suspicious findings. To realize such a system, cue information about the disparity of consecutive frames, including color similarity and motion displacements is extracted. A decision tree utilizes these features to classify the states of the image acquisitions. For each classified state, the delay time between frames is calculated by parametric functions. A scheme selecting the optimal parameters set determined from assessments by physicians is deployed. Experiments involved clinical evaluations to investigate the effectiveness of this method compared to a standard-view using an existing system. Results from logged action based analysis show that compared with an existing system the proposed method reduced diagnostic time to around 32.5 7 minutes per full sequence while the number of abnormalities found was similar. As well, physicians needed less effort because of the systems efficient operability. The results of the evaluations should convince physicians that they can safely use this method and obtain reduced diagnostic times.

61-80hit(165hit)