The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

2741-2760hit(18690hit)

  • Radio Wave Shadowing by Two-Dimensional Human BodyModel

    Mitsuhiro YOKOTA  Yoshichika OHTA  Teruya FUJII  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/07/06
      Vol:
    E101-B No:1
      Page(s):
    195-202

    The radio wave shadowing by a two-dimensional human body is examined numerically as the scattering problem by using the Method of Moments (MoM) in order to verify the equivalent human body diameter. Three human body models are examined: (1) a circular cylinder, (2) an elliptical cylinder, and (3) an elliptical cylinder with two circular cylinders are examined. The scattered fields yields by the circular cylinder are compared with measured data. Since the angle of the model to an incident wave affects scattered fields in models other than a circular cylinder, the models of an elliptical cylinder and an elliptical cylinder with two circular cylinders are converted into a circular cylinder of equivalent diameter. The frequency characteristics for the models are calculated by using the equivalent diameter.

  • BiometricJammer: Method to Prevent Acquisition of Biometric Information by Surreptitious Photography on Fingerprints Open Access

    Isao ECHIZEN  Tateo OGANE  

     
    INVITED PAPER

      Pubricized:
    2017/10/16
      Vol:
    E101-D No:1
      Page(s):
    2-12

    Advances in fingerprint authentication technology have led to it being used in a growing range of personal devices such as PCs and smartphones. However, they have also made it possible to capture fingerprints remotely with a digital camera, putting the target person at risk of illegal log-ins and identity theft. This article shows how fingerprint captured in this manner can be authenticated and how people can protect their fingerprints against surreptitious photography. First we show that photographed fingerprints have enough information to spoof fingerprint authentication systems by demonstrating with “fake fingers” made from such photographs. Then we present a method that defeats the use of surreptitious photography without preventing the use of legitimate fingerprint authentication devices. Finally, we demonstrate that an implementation of the proposed method called “BiometricJammer,” a wearable device put on a fingertip, can effectively prevent the illegal acquisition of fingerprints by surreptitious photography while still enabling contact-based fingerprint sensors to respond normally.

  • Pivot Generation Algorithm with a Complete Binary Tree for Efficient Exact Similarity Search

    Yuki YAMAGISHI  Kazuo AOYAMA  Kazumi SAITO  Tetsuo IKEDA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2017/10/20
      Vol:
    E101-D No:1
      Page(s):
    142-151

    This paper presents a pivot-set generation algorithm for accelerating exact similarity search in a large-scale data set. To deal with the large-scale data set, it is important to efficiently construct a search index offline as well as to perform fast exact similarity search online. Our proposed algorithm efficiently generates competent pivots with two novel techniques: hierarchical data partitioning and fast pivot optimization techniques. To make effective use of a small number of pivots, the former recursively partitions a data set into two subsets with the same size depending on the rank order from each of two assigned pivots, resulting in a complete binary tree. The latter calculates a defined objective function for pivot optimization with a low computational cost by skillfully operating data objects mapped into a pivot space. Since the generated pivots provide the tight lower bounds on distances between a query object and the data objects, an exact similarity search algorithm effectively avoids unnecessary distance calculations. We demonstrate that the search algorithm using the pivots generated by the proposed algorithm reduces distance calculations with an extremely high rate regarding a range query problem for real large-scale image data sets.

  • Wideband Rectangular Antenna Fed Sideways from a Ground Plate

    Kyoichi IIGUSA  Hirokazu SAWADA  Fumihide KOJIMA  Hiroshi HARADA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/07/10
      Vol:
    E101-B No:1
      Page(s):
    176-184

    We propose a wideband antenna that has both vertical and horizontal polarization to create access points with enhanced connectivity. The antenna is composed of a rectangular plate and a ground plate, and the rectangular plate is fed sideways from the ground plate. Its -10dB fractional bandwidth is approximately 162%. It is shown that the offset feed of the rectangular plate is important to attain wideband impedance matching and vertical polarized wave. The results of a parametric study to characterize the first- and second-lowest resonant frequencies are presented. Moreover, the behavior of the impedance matching and polarization is interpreted by dividing the current distribution around the feed port on the rectangular plate into the same direction current mode and the opposite direction current mode. The measured results for the return loss and the radiation pattern of a prototype antenna agree well with the simulation results, therefore the wideband property was experimentally confirmed.

  • Statistical Property Guided Feature Extraction for Volume Data

    Li WANG  Xiaoan TANG  Junda ZHANG  Dongdong GUAN  

     
    LETTER-Pattern Recognition

      Pubricized:
    2017/10/13
      Vol:
    E101-D No:1
      Page(s):
    261-264

    Feature visualization is of great significances in volume visualization, and feature extraction has been becoming extremely popular in feature visualization. While precise definition of features is usually absent which makes the extraction difficult. This paper employs probability density function (PDF) as statistical property, and proposes a statistical property guided approach to extract features for volume data. Basing on feature matching, it combines simple liner iterative cluster (SLIC) with Gaussian mixture model (GMM), and could do extraction without accurate feature definition. Further, GMM is paired with a normality test to reduce time cost and storage requirement. We demonstrate its applicability and superiority by successfully applying it on homogeneous and non-homogeneous features.

  • Current Trends in Space Optical Communication Around the World and Its R&D Activities in JAXA

    Tomohiro ARAKI  

     
    INVITED PAPER

      Vol:
    E101-A No:1
      Page(s):
    161-166

    Space optical communication has been considered one of the major candidates for high-rate data transmission and it reaches the practical stage to operate as a high-rate data transmission system. In this paper, the author reports the latest situation of space optical communication around the world, flight demonstrations, technological research and standardization. Research and development activities at Japan aerospace exploration agency (JAXA) are also presented.

  • Flow-Based Routing for Flow Entry Aggregation in Software-Defined Networking

    Koichi YOSHIOKA  Kouji HIRATA  Miki YAMAMOTO  

     
    PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    49-57

    In recent years, software-defined networking (SDN), which performs centralized network management with software, has attracted much attention. Although packets are transmitted based on flow entries in SDN switches, the number of flow entries that the SDN switches can handle is limited. To overcome this difficulty, this paper proposes a flow-based routing method that performs flexible routing control with a small number of flow entries. The proposed method provides mixed integer programming. It assigns common paths to flows that can be aggregated at intermediate switches, while considering the utilization of network links. Because it is difficult for mixed integer programming to compute large-scale problems, the proposed method also provides a heuristic algorithm for them. Through numerical experiments, this paper shows that the proposed method efficiently reduces both the number of flow entries and the loads of congested links.

  • A Stackelberg Game Based Pricing and User Association for Spectrum Splitting Macro-Femto HetNets

    Bo GU  Zhi LIU  Cheng ZHANG  Kyoko YAMORI  Osamu MIZUNO  Yoshiaki TANAKA  

     
    PAPER-Network

      Pubricized:
    2017/07/10
      Vol:
    E101-B No:1
      Page(s):
    154-162

    The demand for wireless traffic is increasing rapidly, which has posed huge challenges to mobile network operators (MNOs). A heterogeneous network (HetNet) framework, composed of a marcocell and femtocells, has been proved to be an effective way to cope with the fast-growing traffic demand. In this paper, we assume that both the macrocell and femtocells are owned by the same MNO, with revenue optimization as its ultimate goal. We aim to propose a pricing strategy for macro-femto HetNets with a user centric vision, namely, mobile users would have their own interest to make rational decisions on selecting between the macrocell and femtocells to maximize their individual benefit. We formulate a Stackelberg game to analyze the interactions between the MNO and users, and obtain the equilibrium solution for the Stackelberg game. Via extensive simulations, we evaluate the proposed pricing strategy in terms of its efficiency with respect to the revenue optimization.

  • Classification of Linked Data Sources Using Semantic Scoring

    Semih YUMUSAK  Erdogan DOGDU  Halife KODAZ  

     
    PAPER

      Pubricized:
    2017/09/15
      Vol:
    E101-D No:1
      Page(s):
    99-107

    Linked data sets are created using semantic Web technologies and they are usually big and the number of such datasets is growing. The query execution is therefore costly, and knowing the content of data in such datasets should help in targeted querying. Our aim in this paper is to classify linked data sets by their knowledge content. Earlier projects such as LOD Cloud, LODStats, and SPARQLES analyze linked data sources in terms of content, availability and infrastructure. In these projects, linked data sets are classified and tagged principally using VoID vocabulary and analyzed according to their content, availability and infrastructure. Although all linked data sources listed in these projects appear to be classified or tagged, there are a limited number of studies on automated tagging and classification of newly arriving linked data sets. Here, we focus on automated classification of linked data sets using semantic scoring methods. We have collected the SPARQL endpoints of 1,328 unique linked datasets from Datahub, LOD Cloud, LODStats, SPARQLES, and SpEnD projects. We have then queried textual descriptions of resources in these data sets using their rdfs:comment and rdfs:label property values. We analyzed these texts in a similar manner with document analysis techniques by assuming every SPARQL endpoint as a separate document. In this regard, we have used WordNet semantic relations library combined with an adapted term frequency-inverted document frequency (tfidf) analysis on the words and their semantic neighbours. In WordNet database, we have extracted information about comment/label objects in linked data sources by using hypernym, hyponym, homonym, meronym, region, topic and usage semantic relations. We obtained some significant results on hypernym and topic semantic relations; we can find words that identify data sets and this can be used in automatic classification and tagging of linked data sources. By using these words, we experimented different classifiers with different scoring methods, which results in better classification accuracy results.

  • Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product

    Sun-Mi PARK  Ku-Young CHANG  Dowon HONG  Changho SEO  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E101-A No:1
      Page(s):
    239-248

    In this paper, we present a new three-way split formula for binary polynomial multiplication (PM) with five recursive multiplications. The scheme is based on a recently proposed multievaluation and interpolation approach using field extension. The proposed PM formula achieves the smallest space complexity. Moreover, it has about 40% reduced time complexity compared to best known results. In addition, using developed techniques for PM formulas, we propose a three-way split formula for Toeplitz matrix vector product with five recursive products which has a considerably improved complexity compared to previous known one.

  • Scalable Cache Component in ICN Adaptable to Various Network Traffic Access Patterns

    Atsushi OOKA  Eum SUYONG  Shingo ATA  Masayuki MURATA  

     
    PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    35-48

    Information-centric networking (ICN) has received increasing attention from all over the world. The novel aspects of ICN (e.g., the combination of caching, multicasting, and aggregating requests) is based on names that act as addresses for content. The communication with name has the potential to cope with the growing and complicating Internet technology, for example, Internet of Things, cloud computing, and a smart society. To realize ICN, router hardware must implement an innovative cache replacement algorithm that offers performance far superior to a simple policy-based algorithm while still operating with feasible computational and memory overhead. However, most previous studies on cache replacement policies in ICN have proposed policies that are too blunt to achieve significant performance improvement, such as first-in first-out (popularly, FIFO) and random policies, or impractical policies in a resource-restricted environment, such as least recently used (LRU). Thus, we propose CLOCK-Pro Using Switching Hash-tables (CUSH) as the suitable policy for network caching. CUSH can identify and keep popular content worth caching in a network environment. CUSH also employs CLOCK and hash-tables, which are low-overhead data structure, to satisfy the cost requirement. We numerically evaluate our proposed approach, showing that our proposal can achieve cache hits against the traffic traces that simple conventional algorithms hardly cause any hits.

  • Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock

    So HIGASHIKAWA  Tomoaki KOSUGI  Shogo KITAJIMA  Masahiro MAMBO  

     
    PAPER

      Pubricized:
    2017/10/16
      Vol:
    E101-D No:1
      Page(s):
    45-52

    We study an authentication method using secret figures of Pattern Lock, called pass patterns. In recent years, it is important to prevent the leakage of personal and company information on mobile devices. Android devices adopt a login authentication called Pattern Lock, which achieves both high resistance to Brute Force Attack and usability by virtue of pass pattern. However, Pattern Lock has a problem that pass patterns directly input to the terminal can be easily remembered by shoulder-surfing attack. In this paper, we propose a shoulder-surfing resistant authentication using pass pattern of Pattern Lock, which adopts a challenge & response authentication and also uses users' short-term memory. We implement the proposed method as an Android application and measure success rate, authentication time and the resistance against shoulder surfing. We also evaluate security and usability in comparison with related work.

  • Robust Image Identification without Visible Information for JPEG Images

    Kenta IIDA  Hitoshi KIYA  

     
    PAPER

      Pubricized:
    2017/10/16
      Vol:
    E101-D No:1
      Page(s):
    13-19

    A robust identification scheme for JPEG images is proposed in this paper. The aim is to robustly identify JPEG images that are generated from the same original image, under various compression conditions such as differences in compression ratios and initial quantization matrices. The proposed scheme does not provide any false negative matches in principle. In addition, secure features, which do not have any visual information, are used to achieve not only a robust identification scheme but also secure one. Conventional schemes can not avoid providing false negative matches under some compression conditions, and are required to manage a secret key for secure identification. The proposed scheme is applicable to the uploading process of images on social networks like Twitter for image retrieval and forensics. A number of experiments are carried out to demonstrate that the effectiveness of the proposed method. The proposed method outperforms conventional ones in terms of query performances, while keeping a reasonable security level.

  • Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation

    Ryo KIKUCHI  Koji CHIDA  Dai IKARASHI  Koki HAMADA  

     
    PAPER

      Vol:
    E101-A No:1
      Page(s):
    51-63

    The performance of secret-sharing (SS)-based multiparty computation (MPC) has recently increased greatly, and several efforts to implement and use it have been put into practice. Authentication of clients is one critical mechanism for implementing SS-based MPC successfully in practice. We propose a password-based authentication protocol for SS-based MPC. Our protocol is secure in the presence of secure channels, and it is optimized for practical use with SS-based MPC in the following ways. Threshold security: Our protocol is secure in the honest majority, which is necessary and sufficient since most practical results on SS-based MPC are secure in the same environment. Establishing distinct channels: After our protocol, a client has distinct secure and two-way authenticated channels to each server. Ease of implementation: Our protocol consists of SS, operations involving SS, and secure channels, which can be reused from an implementation of SS-based MPC. Furthermore, we implemented our protocol with an optimization for the realistic network. A client received the result within 2 sec even when the network delay was 200 ms, which is almost the delay that occurs between Japan and Europe.

  • Legitimate Surveillance with a Wireless Powered Monitor in Rayleigh Fading Channels

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:1
      Page(s):
    293-297

    This letter investigates the performance of a legitimate surveillance system, where a wireless powered legitimate monitor aims to eavesdrop a suspicious communication link. Power splitting technique is adopted at the monitor for simultaneous information eavesdropping and energy harvesting. In order to maximize the successful eavesdropping probability, the power splitting ratio is optimized under the minimum harvested energy constraint. Assuming that perfect channel state information (CSI) or only the channel distribution information (CDI) is available, the closed-form maximum successful eavesdropping probability is obtained in Rayleigh fading channels. It is shown that the minimum harvested energy constraint has no impact on the eavesdropping performance if the minimum harvested energy constraint is loose. It is also shown that the eavesdropping performance loss due to partial knowledge of CSI is negligible when the eavesdropping link channel condition is much better than that of the suspicious communication link channel.

  • An Approach to Effective Recommendation Considering User Preference and Diversity Simultaneously

    Sang-Chul LEE  Sang-Wook KIM  Sunju PARK  Dong-Kyu CHAE  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2017/09/28
      Vol:
    E101-D No:1
      Page(s):
    244-248

    This paper addresses recommendation diversification. Existing diversification methods have difficulty in dealing with the tradeoff between accuracy and diversity. We point out the root of the problem in diversification methods and propose a novel method that can avoid the problem. Our method aims to find an optimal solution of the objective function that is carefully designed to consider user preference and the diversity among recommended items simultaneously. In addition, we propose an item clustering and a greedy approximation to achieve efficiency in recommendation.

  • Efficient Homomorphic Encryption with Key Rotation and Security Update

    Yoshinori AONO  Takuya HAYASHI  Le Trieu PHONG  Lihua WANG  

     
    PAPER

      Vol:
    E101-A No:1
      Page(s):
    39-50

    We present the concept of key-rotatable and security-updatable homomorphic encryption (KR-SU-HE) scheme, which is defined as a class of public-key homomorphic encryption in which the keys and the security of any ciphertext can be rotated and updated while still keeping the underlying plaintext intact and unrevealed. After formalising the syntax and security notions for KR-SU-HE schemes, we build a concrete scheme based on the Learning With Errors assumption. We then perform several careful implementations and optimizations to show that our proposed scheme is efficiently practical.

  • Calibration Method for Multi Static Linear Array Radar with One Dimensional Array Antenna Arranged in Staggered Manner

    Yasunari MORI  Takayoshi YUMII  Yumi ASANO  Kyouji DOI  Christian N. KOYAMA  Yasushi IITSUKA  Kazunori TAKAHASHI  Motoyuki SATO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E101-C No:1
      Page(s):
    26-34

    This paper presents a calibration method for RF switch channels of a near-range multistatic linear array radar. The method allows calibration of the channel transfer functions of the RF switches and antenna transfer functions in frequency domain data, without disconnecting the antennas from the radar system. In addition, the calibration of the channels is independent of the directivities of the transmitting and receiving antennas. We applied the calibration method to a 3D imaging step-frequency radar system at 10-20GHz suitable for the nondestructive inspection of the walls of wooden houses. The measurement range of the radar is limited to 0-240mm, shorter than the antenna array length 480mm. This radar system allows acquiring 3D imaging data with a single scan. Using synthetic aperture radar processing, the structural health of braces inside the walls of wooden houses can be evaluated from the obtained 3D volume images. Based on experiment results, we confirmed that the proposed calibration method significantly improves the subsurface 3D imaging quality. Low intensity ghost images behind the brace target were suppressed, deformations of the target in the volume image were rectified and errors the range distance were corrected.

  • An Efficient Algorithm for Location-Aware Query Autocompletion Open Access

    Sheng HU  Chuan XIAO  Yoshiharu ISHIKAWA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2017/10/05
      Vol:
    E101-D No:1
      Page(s):
    181-192

    Query autocompletion is an important and practical technique when users want to search for desirable information. As mobile devices become more and more popular, one of the main applications is location-aware service, such as Web mapping. In this paper, we propose a new solution to location-aware query autocompletion. We devise a trie-based index structure and integrate spatial information into trie nodes. Our method is able to answer both range and top-k queries. In addition, we discuss the extension of our method to support the error tolerant feature in case user's queries contain typographical errors. Experiments on real datasets show that the proposed method outperforms existing methods in terms of query processing performance.

  • Efficient Sphere Decoding Based on a Regular Detection Tree for Generalized Spatial Modulation MIMO Systems

    Hye-Yeon YOON  Gwang-Ho LEE  Tae-Hwan KIM  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/07/10
      Vol:
    E101-B No:1
      Page(s):
    223-231

    The generalized spatial modulation (GSM) is a new transmission technique that can realize high-performance multiple-input multiple-output (MIMO) communication systems with a low RF complexity. This paper presents an efficient sphere decoding method used to perform the symbol detection for the generalized spatial modulation (GSM) multiple-input multiple-output (MIMO) systems. In the proposed method, the cost metric is modified so that it does not include the cancellation of the nonexistent interference. The modified cost metric can be computed by formulating a detection tree that has a regular structure representing the transmit antenna combinations as well as the symbol vectors, both of which are detected efficiently by finding the shortest path on the basis of an efficient tree search algorithm. As the tree search algorithm is performed for the regular detection tree to compute the modified but mathematically-equivalent cost metric, the efficiency of the sphere decoding is improved while the bit-error rate performance is not degraded. The simulation results show that the proposed method reduces the complexity significantly when compared with the previous method: for the 6×6 64QAM GSM-MIMO system with two active antennas, the average reduction rate of the complexity is as high as 45.8% in the count of the numerical operations.

2741-2760hit(18690hit)