The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] APS(165hit)

81-100hit(165hit)

  • Olfaction Presentation System Using Odor Scanner and Odor-Emitting Apparatus Coupled with Chemical Capsules of Alginic Acid Polymer

    Minoru SAKAIRI  Ayako NISHIMURA  Daisuke SUZUKI  

     
    PAPER-General Fundamentals and Boundaries

      Vol:
    E92-A No:2
      Page(s):
    618-629

    For the purpose of the application of odor to information technology, we have developed an odor-emitting apparatus coupled with chemical capsules made of alginic acid polymer. This apparatus consists of a chemical capsule cartridge including chemical capsules of odor ingredients, valves to control odor emission, and a temperature control unit. Different odors can be easily emitted by using the apparatus. We have developed an integrated system of vision, audio and olfactory information in which odor strength can be controlled coinciding with on-screen moving images based on analytical results from the odor scanner.

  • Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism

    Jong Hwan PARK  Dong Hoon LEE  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:1
      Page(s):
    329-331

    In INDOCRYPT 2006, Chatterjee and Sarkar suggested a multi-receiver identity-based key encapsulation mechanism that is secure in the full model without random oracles. Until now, it has been believed that their scheme is the only one to provide such a security feature, while achieving sub-linear size ciphertext. In this letter, we show that their scheme is insecure in the sense that any revoked user can retrieve a message encryption key, even without colluding with other revoked users. Our attack comes from an analysis of a publicly computable surjective function used in the scheme.

  • Novel Topic Maps to RDF/RDF Schema Translation Method

    Shinae SHIN  Dongwon JEONG  Doo-Kwon BAIK  

     
    PAPER-Knowledge Representation

      Vol:
    E91-D No:11
      Page(s):
    2626-2637

    We propose an enhanced method for translating Topic Maps to RDF/RDF Schema, to realize the Semantic Web. A critical issue for the Semantic Web is to efficiently and precisely describe Web information resources, i.e., Web metadata. Two representative standards, Topic Maps and RDF have been used for Web metadata. RDF-based standardization and implementation of the Semantic Web have been actively performed. Since the Semantic Web must accept and understand all Web information resources that are represented with the other methods, Topic Maps-to-RDF translation has become an issue. Even though many Topic Maps to RDF translation methods have been devised, they still have several problems (e.g. semantic loss, complex expression, etc.). Our translation method provides an improved solution to these problems. This method shows lower semantic loss than the previous methods due to extract both explicit semantics and implicit semantics. Compared to the previous methods, our method reduces the encoding complexity of resulting RDF. In addition, in terms of reversibility, the proposed method regenerates all Topic Maps constructs in an original source when is reverse translated.

  • Security of a Class of Knapsack Public-Key Cryptosystems against Low-Density Attack

    Takeshi NASAKO  Yasuyuki MURAKAMI  Masao KASAHARA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    2889-2892

    In 2003, Kobayashi et al. proposed a new class of knapsack public-key cryptosystems over Gaussian integer ring. This scheme using two-sequences as the public key. In 2005, Sakamoto and Hayashi proposed an improved version of Kobayashi's scheme. In this paper, we propose the knapsack PKC using l-sequences as the public key and present the low-density attack on it. We have described Schemes R and G for l=2, in which the public keys are constructed over rational integer ring and over Gaussian integer ring, respectively. We discusses on the difference of the security against the low-density attack. We show that the security levels of Schemes R and G differ only slightly.

  • A Simple Mechanism for Collapsing Instructions under Timing Speculation

    Toshinori SATO  

     
    PAPER

      Vol:
    E91-C No:9
      Page(s):
    1394-1401

    The deep submicron semiconductor technologies will make the worst-case design impossible, since they can not provide design margins that it requires. We are investigating a typical-case design methodology, which we call the Constructive Timing Violation (CTV). This paper extends the CTV concept to collapse dependent instructions, resulting in performance improvement. Based on detailed simulations, we find the proposed mechanism effectively collapses dependent instructions.

  • Effects of a Thermal CVD SiN Passivation Film on AlGaN/GaN HEMTs

    Toshiharu MARUI  Shinich HOSHI  Masanori ITOH  Isao TAMAI  Fumihiko TODA  Hideyuki OKITA  Yoshiaki SANO  Shohei SEKI  

     
    PAPER-GaN Process Technology

      Vol:
    E91-C No:7
      Page(s):
    1009-1014

    In AlGaN/GaN high electron mobility transistors (HEMTs), drain current reduction by current collapse phenomenon is a big obstacle for a high efficient operation of power amplifier application. In this study, we investigated the effects of SiN passivation film quality on the electrical characteristics of AlGaN/GaN HEMTs. First, we conducted some experiments to investigate the relationship between electrical characteristics of AlGaN/GaN HEMTs and various conditions of SiN passivation film by plasma enhanced chemical vapor deposition (PE-CVD). We found that both gate current leakage and current collapse were improved simultaneously by SiN passivation film deposited by optimized condition of NH3 and SiH4 gas flow. It is found that the critical parameter in the optimization is a IN-H/ ISi-H ratio measured by Fourier transforms infrared spectroscopy (FT-IR) spectra. Next, a thermal CVD SiN was applied to the passivation film to be investigated from the same point of view, because a thermal CVD SiN is well known to have good quality with low hydrogen content and high IN-H/ISi-H ratio. We confirmed that the thermal CVD SiN passivation could improve much further both of the gate leakage current and the current collapse in AlGaN/GaN-HEMTs. Furthermore, we tried to apply the thermal CVD SiN to the gate insulator in MIS (Metal Insulator Semiconductor) structure of AlGaN/GaN HEMTs. The thermal CVD SiN passivation was more suitable for the gate insulator than PE-CVD SiN passivation in a view of reducing current collapse phenomena. It could be believed that the thermal CVD SiN film is superior to the PE-CVD SiN film to achieve good passivation and gate insulator film for AlGaN/GaN HEMTs due to the low hydrogen content and the high IN-H/ISi-H ratio.

  • Skew-Frobenius Maps on Hyperelliptic Curves

    Shunji KOZAKI  Kazuto MATSUO  Yasutomo SHIMBARA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:7
      Page(s):
    1839-1843

    Scalar multiplication methods using the Frobenius maps are known for efficient methods to speed up (hyper)elliptic curve cryptosystems. However, those methods are not efficient for the cryptosystems constructed on fields of small extension degrees due to costs of the field operations. Iijima et al. showed that one can use certain automorphisms on the quadratic twists of elliptic curves for fast scalar multiplications without the drawback of the Frobenius maps. This paper shows an extension of the automorphisms on the Jacobians of hyperelliptic curves of arbitrary genus.

  • Investigation on Current Collapse of AlGaN/GaN HFET by Gate Bias Stress

    Jin-Ping AO  Yuya YAMAOKA  Masaya OKADA  Cheng-Yu HU  Yasuo OHNO  

     
    PAPER-Nitride-based Devices

      Vol:
    E91-C No:7
      Page(s):
    1004-1008

    The mechanism of current collapse of AlGaN/GaN heterojunction field-effect transistors (HFETs) was investigated by gate bias stress with and without illumination. It is clarified that there are two positions where negative charges accumulate, at the gate edge and in the bulk epi-layer. In the gate-edge mode, the charge comes either through the passivation film or the AlGaN layer, depending on the resistance of the films. Reduction of leakage current in the passivation film will be important to suppress the surface-related collapse.

  • Self-Organizing Map with False-Neighbor Degree between Neurons for Effective Self-Organization

    Haruna MATSUSHITA  Yoshifumi NISHIO  

     
    PAPER-Nonlinear Problems

      Vol:
    E91-A No:6
      Page(s):
    1463-1469

    In the real world, it is not always true that neighboring houses are physically adjacent or close to each other. in other words, "neighbors" are not always "true neighbors." In this study, we propose a new Self-Organizing Map (SOM) algorithm, SOM with False-Neighbor degree between neurons (called FN-SOM). The behavior of FN-SOM is investigated with learning for various input data. We confirm that FN-SOM can obtain a more effective map reflecting the distribution state of input data than the conventional SOM and Growing Grid.

  • A Real-Time Decision Support System for Voltage Collapse Avoidance in Power Supply Networks

    Chen-Sung CHANG  

     
    PAPER-Artificial Intelligence and Cognitive Science

      Vol:
    E91-D No:6
      Page(s):
    1740-1747

    This paper presents a real-time decision support system (RDSS) based on artificial intelligence (AI) for voltage collapse avoidance (VCA) in power supply networks. The RDSS scheme employs a fuzzy hyperrectangular composite neural network (FHRCNN) to carry out voltage risk identification (VRI). In the event that a threat to the security of the power supply network is detected, an evolutionary programming (EP)-based algorithm is triggered to determine the operational settings required to restore the power supply network to a secure condition. The effectiveness of the RDSS methodology is demonstrated through its application to the American Electric Power Provider System (AEP, 30-bus system) under various heavy load conditions and contingency scenarios. In general, the numerical results confirm the ability of the RDSS scheme to minimize the risk of voltage collapse in power supply networks. In other words, RDSS provides Power Provider Enterprises (PPEs) with a viable tool for performing on-line voltage risk assessment and power system security enhancement functions.

  • On Distorted Constellations of 16-Ary Modulation Schemes

    Sangtae KIM  Wonjin SUNG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1632-1635

    In this letter, the effect of distorted constellation shapes of 16-ary modulation due to the power saturation channel is analyzed. In particular, error bounds for 16-QAM and 16-APSK with distorted constellations are derived, and optimal operating points in terms of Es/N0 are presented. The result can be used to accurately predict the performance of these modulation schemes with a given level of the constellation distortion, as well as to determine the amount of input power to the saturation channel which minimizes the probability of modulation symbol error.

  • Intersystem Interference Reduction for Overlaid HAPS-Terrestrial CDMA System

    Jeng-Ji HUANG  Wei-Ting WANG  Mingfu LI  David SHIUNG  Huei-Wen FERNG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:1
      Page(s):
    334-338

    In this letter, we propose that directional antennas, combined with power management, be incorporated to reduce intersystem interference in a shared band overlaid high altitude platform station (HAPS)-terrestrial code division multiple access (CDMA) system. To eliminate the HAPS to terrestrial interference, the HAPS is accessed only via directional antennas under the proposed scheme. By doing so, the uplink power to the HAPS can accordingly be increased, so that the terrestrial to HAPS interference is also effectively suppressed.

  • Hierarchical Decomposition of Depth Map Sequences for Representation of Three-Dimensional Dynamic Scenes

    Sung-Yeol KIM  Yo-Sung HO  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E90-D No:11
      Page(s):
    1813-1820

    In this paper, we propose a new scheme to represent three-dimensional (3-D) dynamic scenes using a hierarchical decomposition of depth maps. In the hierarchical decomposition, we split a depth map into four types of images: regular mesh, boundary, feature point and number-of-layer (NOL) images. A regular mesh image is obtained by down-sampling a depth map. A boundary image is generated by gathering pixels of the depth map on the region of edges. For generating feature point images, we select pixels of the depth map on the region of no edges according to their influence on the shape of a 3-D surface, and convert the selected pixels into images. A NOL image includes structural information to manage the other three images. In order to render a frame of 3-D dynamic scenes, we first generate an initial surface utilizing the information of regular mesh, boundary and NOL images. Then, we enhance the initial surface by adding the depth information of feature point images. With the proposed scheme, we can represent consecutive 3-D scenes successfully within the framework of a multi-layer structure. Furthermore, we can compress the data of 3-D dynamic scenes represented by a mesh structure by a 2-D video coder.

  • IP Encapsulation Mechanism for Efficient RSVP Tunnel in Next Generation Mobile Networks

    Jeong-Beom KIM  Ki-Sik KONG  Chong-Sun HWANG  

     
    PAPER

      Vol:
    E90-B No:11
      Page(s):
    3052-3060

    This paper describes IP encapsulation technologies for the Mobile RSVP tunnel in next generation networks. Bandwidth is inherently a scarce network resource, and hence signaling overhead should be minimized as much as possible. However, because of duplicate RSVP messages, the existing RSVP tunnel-based mechanism suffers from bandwidth overhead and tunnel problems. The waste of network resources prevents low-cost network construction and the maximization of integrated network utility, which are the goals of next generation networks, and can lower the reliability of networks with the increase of service subscribers and resultant expansion of resource consumption. To solve these problems and to support end-to-end QoS efficiently, RSVP needs to be changed at a minimum degree. In this paper, a new IP encapsulation mechanism for saving of network resources in the Mobile RSVP tunnel (IPEnc-RSVP) is proposed. In order to compare the proposed mechanism and the existing RSVP tunnel-based mechanism in Mobile IP-based networks, we perform a comparative analysis of bandwidth consumption gain, throughput, mean packet delay, etc., and demonstrate the superiority of the proposed mechanism. In addition, we analyze several performance factors of RSVP protocols by applying the existing RSVP tunnel-based mechanism and the proposed mechanism, respectively.

  • Tentacled Self-Organizing Map for Effective Data Extraction

    Haruna MATSUSHITA  Yoshifumi NISHIO  

     
    PAPER-Neuron and Neural Networks

      Vol:
    E90-A No:10
      Page(s):
    2085-2092

    Since we can accumulate a large amount of data including useless information in recent years, it is important to investigate various extraction method of clusters from data including much noises. The Self-Organizing Map (SOM) has attracted attention for clustering nowadays. In this study, we propose a method of using plural SOMs (TSOM: Tentacled SOM) for effective data extraction. TSOM consists of two kinds of SOM whose features are different, namely, one self-organizes the area where input data are concentrated, and the other self-organizes the whole of the input space. Each SOM of TSOM can catch the information of other SOMs existing in its neighborhood and self-organizes with the competing and accommodating behaviors. We apply TSOM to data extraction from input data including much noise, and can confirm that TSOM successfully extracts only clusters even in the case that we do not know the number of clusters in advance.

  • A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability

    Toru NAKANISHI  Nobuo FUNABIKI  

     
    PAPER

      Vol:
    E90-A No:9
      Page(s):
    1793-1802

    Previously Verifier-Local Revocation (VLR) group signature schemes from bilinear maps were proposed. In VLR schemes, only verifiers are involved in the revocation of a member, while signers are not. Thus, the VLR schemes are suitable for mobile environments. Furthermore, the previously proposed schemes satisfy the important backward unlinkability. This means that even after a member is revoked, signatures produced by the member before the revocation remain anonymous. This property is needed in case of a voluntary leave of a member or in case of a key loss. However, in the previous schemes, signatures become long, due to the adopted assumption, which should be improved in order to apply the schemes to the mobile environments. In this paper an improved VLR scheme is proposed with the shorter group signatures. This is achieved by using a different assumption, DLDH assumption, and improving zero-knowledge proofs in the group signatures. The length of the proposed group signatures is reduced to about 53% of that of the previous ones.

  • An Approach to Collaboration of Growing Self-Organizing Maps and Adaptive Resonance Theory Maps

    Masaru TAKANASHI  Hiroyuki TORIKAI  Toshimichi SAITO  

     
    LETTER-Neural Networks and Bioengineering

      Vol:
    E90-A No:9
      Page(s):
    2047-2050

    Collaboration of growing self-organizing maps (GSOM) and adaptive resonance theory maps (ART) is considered through traveling sales-person problems (TSP).The ART is used to parallelize the GSOM: it divides the input space of city positions into subspaces automatically. One GSOM is allocated to each subspace and grows following the input data. After all the GSOMs grow sufficiently they are connected and we obtain a tour. Basic experimental results suggest that we can find semi-optimal solution much faster than serial methods.

  • Competing Behavior of Two Kinds of Self-Organizing Maps and Its Application to Clustering

    Haruna MATSUSHITA  Yoshifumi NISHIO  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E90-A No:4
      Page(s):
    865-871

    The Self-Organizing Map (SOM) is an unsupervised neural network introduced in the 80's by Teuvo Kohonen. In this paper, we propose a method of simultaneously using two kinds of SOM whose features are different (the nSOM method). Namely, one is distributed in the area at which input data are concentrated, and the other self-organizes the whole of the input space. The competing behavior of the two kinds of SOM for nonuniform input data is investigated. Furthermore, we show its application to clustering and confirm its efficiency by comparing with the k-means method.

  • Performance of an APSK Receiver with Electronic Switches for the Reduction of SPM-Induced Impairments

    Sang-Gyu PARK  Jesoo KO  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E90-B No:3
      Page(s):
    508-515

    The performance of a new APSK receiver is analyzed using numerical simulation. The proposed receiver eliminates the penalty caused by SPM-induced phase-shift of optical pulses by employing three sub-modules and an amplitude-pattern controlled switch for each DPSK tributary. The interplay between SPM, IXPM, and XPM determines the performance of the proposed receiver for single-channel and WDM transmission.

  • CPLD Based Bi-Directional Wireless Capsule Endoscopes

    JyungHyun LEE  YeonKwan MOON  YoungHo YOON  HeeJoon PARK  ChulHo WON  HyunChul CHOI  JinHo CHO  

     
    LETTER-Biological Engineering

      Vol:
    E90-D No:3
      Page(s):
    694-697

    In the case of miniaturized telemetry capsules, such as a capsule endoscope that can acquire and transmit images from the intestines, the size and the power consumption of the module are restricted. In the capsule endoscopes, it is desirable that the control function can capacitate the sampling of digestive fluid and tissue, drug delivery, and locomotion. In this paper, the control function was embodied by bi-directional communication. A CPLD (complex programmable logic device) controller was designed and implemented for the bi-directional communication in capsule endoscope. The diameter of capsule was 12 mm and the length was 30 mm. The performance of implemented capsule was verified by in-vivo animal experiments.

81-100hit(165hit)