The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ASE(2849hit)

141-160hit(2849hit)

  • Multi-Input Functional Encryption with Controlled Decryption

    Nuttapong ATTRAPADUNG  Goichiro HANAOKA  Takato HIRANO  Yutaka KAWAI  Yoshihiro KOSEKI  Jacob C. N. SCHULDT  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/01/12
      Vol:
    E104-A No:7
      Page(s):
    968-978

    In this paper, we put forward the notion of a token-based multi-input functional encryption (token-based MIFE) scheme - a notion intended to give encryptors a mechanism to control the decryption of encrypted messages, by extending the encryption and decryption algorithms to additionally use tokens. The basic idea is that a decryptor must hold an appropriate decryption token in addition to his secrete key, to be able to decrypt. This type of scheme can address security concerns potentially arising in applications of functional encryption aimed at addressing the problem of privacy preserving data analysis. We firstly formalize token-based MIFE, and then provide two basic schemes; both are based on an ordinary MIFE scheme, but the first additionally makes use of a public key encryption scheme, whereas the second makes use of a pseudorandom function (PRF). Lastly, we extend the latter construction to allow decryption tokens to be restricted to specified set of encryptions, even if all encryptions have been done using the same encryption token. This is achieved by using a constrained PRF.

  • Derivation Procedure of Coefficients of Metadata-Based Model for Adaptive Bitrate Streaming Services Open Access

    Kazuhisa YAMAGISHI  Noritsugu EGI  Noriko YOSHIMURA  Pierre LEBRETON  

     
    PAPER

      Pubricized:
    2021/01/08
      Vol:
    E104-B No:7
      Page(s):
    725-737

    Since the quality of video streaming services is degraded due to the encoding, network congestion, and lack of a playout buffer, the normality of services needs to be monitored by gathering the quality measured at the end clients. When measuring quality at the end clients, the computational power should be sufficiently low, the bitstream information cannot be accessed for the quality estimation due to the encryption, and reference video cannot be used at the end clients. Therefore, metadata-based models have been developed and standardized that take metadata such as the resolution, framerate, and bitrate, and stalling information as input and calculate the quality. However, calculated quality for linear TV and video on demand (VoD) services cannot be compared because metadata-based models cannot calculate the impacts of codec strategies (e.g., H.264/AVC, H.265/HEVC, and AV1) and configurations (e.g., 1-pass encoding for linear TV or 2-pass encoding for VoD) on the quality. To take into account the impact of codec strategies and configurations, coefficients of metadata-based model need to be optimized per codec strategy and configuration using subjective quality. However, extensive subjective assessment tests are difficult to frequently conduct because they are expensive and time consuming and need to be conducted by video quality experts. Therefore, to monitor the quality of several types of video streaming services (e.g., linear TV and VoD) and to compare these qualities, a derivation procedure is proposed for obtaining coefficients of metadata-based models using a full-reference model. To validate the procedure, extensive subjective assessment tests were conducted. Finally, it is shown that three metadata-based models (i.e., the P.1203.1 mode 0 model, extended P.1203.1 mode 0 model, and model proposed by Yamagishi et al.) based on the proposed procedure using the video multimethod assessment fusion (VMAF) algorithm estimate quality accurately in terms of root mean squared error.

  • An Intent-Based System Configuration Design for IT/NW Services with Functional and Quantitative Constraints Open Access

    Takuya KUWAHARA  Takayuki KURODA  Takao OSAKI  Kozo SATODA  

     
    PAPER

      Pubricized:
    2021/02/04
      Vol:
    E104-B No:7
      Page(s):
    791-804

    Network service providers need to appropriately design systems and carefully configuring the settings and parameters to ensure that the systems keep running consistently and deliver the desired services. This can be a heavy and error-prone task. Intent-based system design methods have been developed to help with such tasks. These methods receive service-level requirements and generate service configurations to fulfill the given requirements. One such method is search-based system design, which can flexibly generate systems of various architectures. However, it has difficulty dealing with constraints on the quantitative parameters of systems, e.g., disk volume, RAM size, and QoS. To deal with practical cases, intent-based system design engines need to be able to handle quantitative parameters and constraints. In this work, we propose a new intent-based system design method based on search-based design that augments search states with quantitative constraints. Our method can generate a system that meets both functional and quantitative service requirements by combining a search-based design method with constraint checking. Experimental results show that our method can automatically generate a system that fulfills all given requirements within a reasonable computation time.

  • Real-Time Full-Band Voice Conversion with Sub-Band Modeling and Data-Driven Phase Estimation of Spectral Differentials Open Access

    Takaaki SAEKI  Yuki SAITO  Shinnosuke TAKAMICHI  Hiroshi SARUWATARI  

     
    PAPER-Speech and Hearing

      Pubricized:
    2021/04/16
      Vol:
    E104-D No:7
      Page(s):
    1002-1016

    This paper proposes two high-fidelity and computationally efficient neural voice conversion (VC) methods based on a direct waveform modification using spectral differentials. The conventional spectral-differential VC method with a minimum-phase filter achieves high-quality conversion for narrow-band (16 kHz-sampled) VC but requires heavy computational cost in filtering. This is because the minimum phase obtained using a fixed lifter of the Hilbert transform often results in a long-tap filter. Furthermore, when we extend the method to full-band (48 kHz-sampled) VC, the computational cost is heavy due to increased sampling points, and the converted-speech quality degrades due to large fluctuations in the high-frequency band. To construct a short-tap filter, we propose a lifter-training method for data-driven phase reconstruction that trains a lifter of the Hilbert transform by taking into account filter truncation. We also propose a frequency-band-wise modeling method based on sub-band multi-rate signal processing (sub-band modeling method) for full-band VC. It enhances the computational efficiency by reducing sampling points of signals converted with filtering and improves converted-speech quality by modeling only the low-frequency band. We conducted several objective and subjective evaluations to investigate the effectiveness of the proposed methods through implementation of the real-time, online, full-band VC system we developed, which is based on the proposed methods. The results indicate that 1) the proposed lifter-training method for narrow-band VC can shorten the tap length to 1/16 without degrading the converted-speech quality, and 2) the proposed sub-band modeling method for full-band VC can improve the converted-speech quality while reducing the computational cost, and 3) our real-time, online, full-band VC system can convert 48 kHz-sampled speech in real time attaining the converted speech with a 3.6 out of 5.0 mean opinion score of naturalness.

  • Sensor Gain-Phase Error and Position Perturbation Estimation Using an Auxiliary Source in an Unknown Direction

    Zheng DAI  Weimin SU  Hong GU  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/12/03
      Vol:
    E104-B No:6
      Page(s):
    639-646

    In this paper, we propose an active calibration algorithm to tackle both gain-phase errors and position perturbations. Unlike many other active calibration methods, which fix the array while changing the location of the source, our approach rotates the array but does not change the location of the source, and knowledge of the direction-of-arrival (DOA) of the far-field calibration source is not required. The superiority of the proposed method lies in the fact that measurement of the direction of a far-field calibration source is not easy to carry out, while measurement of the rotation angle via the proposed calibration strategy is convenient and accurate. To obtain the receiving data from different directions, the sensor array is rotated to three different positions with known rotation angles. Based on the eigen-decomposition of the data covariance matrices, we can use the direction of the auxiliary source to represent the gain-phase errors and position perturbations. After that, we estimate the DOA of the calibration source by a one-dimensional search. Finally, the sensor gain-phase errors and position perturbations are calculated by using the estimated direction of the calibration source. Simulations verify the effectiveness and performance of the algorithm.

  • Two-Sided LPC-Based Speckle Noise Removal for Laser Speech Detection Systems

    Yahui WANG  Wenxi ZHANG  Xinxin KONG  Yongbiao WANG  Hongxin ZHANG  

     
    PAPER-Speech and Hearing

      Pubricized:
    2021/03/17
      Vol:
    E104-D No:6
      Page(s):
    850-862

    Laser speech detection uses a non-contact Laser Doppler Vibrometry (LDV)-based acoustic sensor to obtain speech signals by precisely measuring voice-generated surface vibrations. Over long distances, however, the detected signal is very weak and full of speckle noise. To enhance the quality and intelligibility of the detected signal, we designed a two-sided Linear Prediction Coding (LPC)-based locator and interpolator to detect and replace speckle noise. We first studied the characteristics of speckle noise in detected signals and developed a binary-state statistical model for speckle noise generation. A two-sided LPC-based locator was then designed to locate the polluted samples, composed of an inverse decorrelator, nonlinear filter and threshold estimator. This greatly improves the detectability of speckle noise and avoids false/missed detection by improving the noise-to-signal-ratio (NSR). Finally, samples from both sides of the speckle noise were used to estimate the parameters of the interpolator and to code samples for replacing the polluted samples. Real-world speckle noise removal experiments and simulation-based comparative experiments were conducted and the results show that the proposed method is better able to locate speckle noise in laser detected speech and highly effective at replacing it.

  • New Parameter Sets for SPHINCS+

    Jinwoo LEE  Tae Gu KANG  Kookrae CHO  Dae Hyun YUM  

     
    LETTER-Information Network

      Pubricized:
    2021/03/02
      Vol:
    E104-D No:6
      Page(s):
    890-892

    SPHINCS+ is a state-of-the-art post-quantum hash-based signature that is a candidate for the NIST post-quantum cryptography standard. For a target bit security, SPHINCS+ supports many different tradeoffs between the signature size and the signing speed. SPHINCS+ provides 6 parameter sets: 3 parameter sets for size optimization and 3 parameter sets for speed optimization. We propose new parameter sets with better performance. Specifically, SPHINCS+ implementations with our parameter sets are up to 26.5% faster with slightly shorter signature sizes.

  • Rapid Recovery by Maximizing Page-Mapping Logs Deactivation

    Jung-Hoon KIM  

     
    LETTER-Software System

      Pubricized:
    2021/02/25
      Vol:
    E104-D No:6
      Page(s):
    885-889

    As NAND flash-based storage has been settled, a flash translation layer (FTL) has been in charge of mapping data addresses on NAND flash memory. Many FTLs implemented various mapping schemes, but the amount of mapping data depends on the mapping level. However, the FTL should contemplate mapping consistency irrespective of how much mapping data dwell in the storage. Furthermore, the recovery cost by the inconsistency needs to be considered for a faster storage reboot time. This letter proposes a novel method that enhances the consistency for a page-mapping level FTL running a legacy logging policy. Moreover, the recovery cost of page mappings also decreases. The novel method is to adopt a virtually-shrunk segment and deactivate page-mapping logs by assembling and storing the segments. This segment scheme already gave embedded NAND flash-based storage enhance its response time in our previous study. In addition to that improved result, this novel plan maximizes the page-mapping consistency, therefore improves the recovery cost compared with the legacy page-mapping FTL.

  • Angle Adjustment for Sampling Frequency Offset Estimation of OFDM-Based WLANs

    Xiaoping ZHOU  Bin WU  Kan ZHENG  Hui ZHAO  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2020/11/12
      Vol:
    E104-A No:5
      Page(s):
    834-837

    In this letter, an angle adjustment method is proposed to improve the accuracy of the sampling frequency offset (SFO) estimation for the very high throughput wireless local area networks (WLANs). This angle adjustment can work together with existing least square (LS) and weighted least square (WLS) to achieve better system performance. Simulation results show that, the angle adjustment can help LS and WLS to get better pocket error rate (PER).

  • An Experimental Study across GPU DBMSes toward Cost-Effective Analytical Processing

    Young-Kyoon SUH  Seounghyeon KIM  Joo-Young LEE  Hawon CHU  Junyoung AN  Kyong-Ha LEE  

     
    LETTER

      Pubricized:
    2020/11/06
      Vol:
    E104-D No:5
      Page(s):
    551-555

    In this letter we analyze the economic worth of GPU on analytical processing of GPU-accelerated database management systems (DBMSes). To this end, we conducted rigorous experiments with TPC-H across three popular GPU DBMSes. Consequently, we show that co-processing with CPU and GPU in the GPU DBMSes was cost-effective despite exposed concerns.

  • An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots

    Akihiro SATOH  Yutaka NAKAMURA  Yutaka FUKUDA  Daiki NOBAYASHI  Takeshi IKENAGA  

     
    LETTER

      Pubricized:
    2021/02/17
      Vol:
    E104-D No:5
      Page(s):
    669-672

    Computer networks are facing serious threats from the emergence of sophisticated new DGA bots. These DGA bots have their own dictionary, from which they concatenate words to dynamically generate domain names that are difficult to distinguish from human-generated domain names. In this letter, we propose an approach for identifying the callback communications of DGA bots based on relations among the words that constitute the character string of each domain name. Our evaluation indicates high performance, with a recall of 0.9977 and a precision of 0.9869.

  • L1 Norm Minimal Mode-Based Methods for Listing Reaction Network Designs for Metabolite Production

    Takeyuki TAMURA  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2021/02/04
      Vol:
    E104-D No:5
      Page(s):
    679-687

    Metabolic networks represent the relationship between chemical reactions and compounds in cells. In useful metabolite production using microorganisms, it is often required to calculate reaction deletion strategies from the original network to result in growth coupling, which means the target metabolite production and cell growth are simultaneously achieved. Although simple elementary flux mode (EFM)-based methods are useful for listing such reaction deletions strategies, the number of cases to be considered is often proportional to the exponential function of the size of the network. Therefore, it is desirable to develop methods of narrowing down the number of reaction deletion strategy candidates. In this study, the author introduces the idea of L1 norm minimal modes to consider metabolic flows whose L1 norms are minimal to satisfy certain criteria on growth and production, and developed a fast metabolic design listing algorithm based on it (minL1-FMDL), which works in polynomial time. Computational experiments were conducted for (1) a relatively small network to compare the performance of minL1-FMDL with that of the simple EFM-based method and (2) a genome-scale network to verify the scalability of minL1-FMDL. In the computational experiments, it was seen that the average value of the target metabolite production rates of minL1-FMDL was higher than that of the simple EFM-based method, and the computation time of minL1-FMDL was fast enough even for genome-scale networks. The developed software, minL1-FMDL, implemented in MATLAB, is available on https://sunflower.kuicr.kyoto-u.ac.jp/~tamura/software, and can be used for genome-scale metabolic network design for metabolite production.

  • MTGAN: Extending Test Case set for Deep Learning Image Classifier

    Erhu LIU  Song HUANG  Cheng ZONG  Changyou ZHENG  Yongming YAO  Jing ZHU  Shiqi TANG  Yanqiu WANG  

     
    PAPER-Software Engineering

      Pubricized:
    2021/02/05
      Vol:
    E104-D No:5
      Page(s):
    709-722

    During the recent several years, deep learning has achieved excellent results in image recognition, voice processing, and other research areas, which has set off a new upsurge of research and application. Internal defects and external malicious attacks may threaten the safe and reliable operation of a deep learning system and even cause unbearable consequences. The technology of testing deep learning systems is still in its infancy. Traditional software testing technology is not applicable to test deep learning systems. In addition, the characteristics of deep learning such as complex application scenarios, the high dimensionality of input data, and poor interpretability of operation logic bring new challenges to the testing work. This paper focuses on the problem of test case generation and points out that adversarial examples can be used as test cases. Then the paper proposes MTGAN which is a framework to generate test cases for deep learning image classifiers based on Generative Adversarial Network. Finally, this paper evaluates the effectiveness of MTGAN.

  • Phase Stabilization by Open Stubs for Via-Less Waveguide to Microstrip Line Transition

    Takashi MARUYAMA  Shigeo UDAGAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/11/05
      Vol:
    E104-B No:5
      Page(s):
    530-538

    We have proposed a waveguide to microstrip line transition, which perpendicularly connects one waveguide into two microstrip lines. It consists of only a waveguide and a dielectric substrate with copper foils. A backshort waveguide for typical transitions is not needed. Additionally, the transition does not require via holes on the substrate. These innovations simplify the structure and the manufacturing process. We assume that our transition and antennas are co-located on the substrate. We reduced the undesirable radiation from the transition so as not to contaminate the desirable radiation pattern. In this paper, we address output phase of our transition. Since the transition has two MSL output ports connecting to different radiation elements, the phase error between two dividing signals leads to beam shift in the radiation pattern. Unfortunately, misalignment of etching pattern between copper layers of the substrate is unavoidable. The structural asymmetry causes the phase error. In order to tolerate the misalignment, we propose to add a pair of open stubs to the transition. We show that the structure drastically stabilizes the output phase. Though the stubs create some extra radiation, we confirm that the impact is not significant. Moreover, we fabricate and measure a prototype antenna that uses the transition. In the case of with stubs, the radiation pattern is unchanged even if the misalignment is severe.

  • Privacy-Preserving System for Enriched-Integrated Service

    Kaisei KAJITA  Go OHTAKE  Kazuto OGAWA  

     
    PAPER

      Pubricized:
    2021/02/24
      Vol:
    E104-D No:5
      Page(s):
    647-658

    In this study, we propose a secure data-providing system by using a verifiable attribute-based keyword search (VABKS), which also has the functions of privacy preservation and feedback to providers with IP anonymous server. We give both theoretic and experimental result, which show that our proposed system is a secure system with real-time property. One potential application of the system is to Integrated Broadcast-Broadband (IBB) services, which acquire information related to broadcast programs via broadband networks. One such service is a recommendation service that delivers recommendations matching user preferences (such as to TV programs) determined from the user's viewing history. We have developed a real-time system outsourcing data to the cloud and performing keyword searches on it by dividing the search process into two stages and performing heavy processing on the cloud side.

  • Autonomous Relay Device Placement Algorithm for Avoiding Cascading Failure in D2D-Based Social Networking Service

    Hanami YOKOI  Takuji TACHIBANA  

     
    PAPER

      Pubricized:
    2021/02/17
      Vol:
    E104-D No:5
      Page(s):
    597-605

    In this paper, in order to avoid the cascading failure by increasing the number of links in the physical network in D2D-based SNS, we propose an autonomous device placement algorithm. In this method, some relay devices are placed so as to increase the number of links in the physical network. Here, relay devices can be used only for relaying data and those are not SNS users. For example, unmanned aerial vehicles (UAV) with D2D communication capability and base stations with D2D communication capability are used as the relay devices. In the proposed method, at first, an optimization problem for minimizing node resilience which is a performance metric in order to place relay devices. Then, we investigate how relay devices should be placed based on some approximate optimal solutions. From this investigation, we propose an autonomous relay device placement in the physical network. In our proposed algorithm, relay devices can be placed without the complete information on network topology. We evaluate the performance of the proposed method with simulation, and investigate the effectiveness of the proposed method. From numerical examples, we show the effectiveness of our proposed algorithm.

  • Statistical Analysis of Phase-Only Correlation Functions under the Phase Fluctuation of Signals due to Additive Gaussian Noise

    Shunsuke YAMAKI  Kazuhiro FUKUI  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2020/09/29
      Vol:
    E104-A No:4
      Page(s):
    671-679

    This paper proposes statistical analysis of phase-only correlation (POC) functions under the phase fluctuation of signals due to additive Gaussian noise. We derive probability density function of phase-spectrum differences between original signal and its noise-corrupted signal with additive Gaussian noise. Furthermore, we evaluate the expectation and variance of the POC functions between these two signals. As the variance of Gaussian noise increases, the expectation of the peak of the POC function monotonically decreases and variance of the POC function monotonically increases. These results mathematically guarantee the validity of the POC functions used for similarity measure in matching techniques.

  • Analysis of BER Degradation Owing to Multiple Crosstalk Channels in Optical QPSK/QAM Signals

    Kyo INOUE  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2020/09/28
      Vol:
    E104-B No:4
      Page(s):
    370-377

    Inter-channel crosstalk is one of the limiting factors in multichannel optical systems. This paper presents a theoretical analysis of the bit-error-rate (BER) performance of quadrature phase shift keying (QPSK) and quadrature amplitude modulation (QAM) signals influenced by multiple crosstalk channels. The field distribution of multiple crosstalk channels in the constellation map is calculated. The BER of the QPSK/QAM signal, onto which the crosstalk light is superimposed, is then evaluated for a varying number of crosstalk channels under the condition that the total crosstalk power is constant. The results quantitatively confirm that as the channel number increases, the BER degradation caused by crosstalk light approaches that caused by Gaussian noise light. It is also confirmed that the degradations caused by crosstalk light and Gaussian light are similar for QAM signals of high-level modulation.

  • Compensator-Free Li-Ion Battery Charger with Current Window Control

    Robert Chen-Hao CHANG  Wei-Chih CHEN  Shao-Che SU  

     
    BRIEF PAPER-Electronic Circuits

      Pubricized:
    2020/09/28
      Vol:
    E104-C No:3
      Page(s):
    128-131

    A switching-based Li-ion battery charger without any additional compensation circuit is proposed. The proposed charger adopts a dual-current sensor and a current window control to ensure system stability in different charge modes: trickle current, constant current, and constant voltage. The proposed Li-ion battery charger has less chip area and a simpler structure to design than a conventional Li-ion battery charger with pulse width modulation. Simulation with a 1000µF capacitor as the battery equivalent, a 5V input, and a 1A charge current resulted in a charging time of 1.47ms and a 91% power efficiency.

  • A Suspended Stripline Fed Dual-Polarized Open-Ended Waveguide Subarray with Metal Posts for Phased Array Antennas

    Narihiro NAKAMOTO  Toru TAKAHASHI  Toru FUKASAWA  Naofumi YONEDA  Hiroaki MIYASHITA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/09/09
      Vol:
    E104-B No:3
      Page(s):
    295-303

    This paper proposes a dual linear-polarized open-ended waveguide subarray designed for use in phased array antennas. The proposed subarray is a one-dimensional linear array that consists of open-ended waveguide antenna elements and suspended stripline feed networks to realize vertical and horizontal polarizations. The antenna includes a novel suspended stripline-to-waveguide transition that combines double- and quad-ridge waveguides to minimize the size of the transition and enhance the port isolation. Metal posts are installed on the waveguide apertures to eliminate scan-blindness. Prototype subarrays are fabricated and tested in an array of 16 subarrays. The experimental tests and numerical simulations indicate that the prototype subarray offers a low reflection coefficient of less than -11.4dB, low cross-polarization of less than -26dB, and antenna efficiency above 69% in the frequency bandwidth of 14%.

141-160hit(2849hit)