The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

5201-5220hit(18690hit)

  • The Degree of Two Classes of 3rd Order Correlation Immune Symmetric Boolean Functions

    Jie PENG  Haibin KAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:1
      Page(s):
    365-370

    Two classes of 3rd order correlation immune symmetric Boolean functions have been constructed respectively in [1] and [2], in which some interesting phenomena of the algebraic degree have been observed as well. However, a good explanation has not been given. In this paper, we obtain the formulas for the degree of these functions, which can well explain the behavior of their degree.

  • Packetization and Unequal Erasure Protection for Transmission of SPIHT-Encoded Images

    Kuen-Tsair LAY  Lee-Jyi WANG  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E97-B No:1
      Page(s):
    226-237

    Coupled with the discrete wavelet transform, SPIHT (set partitioning in hierarchical trees) is a highly efficient image compression technique that allows for progressive transmission. One problem, however, is that its decoding can be extremely sensitive to bit errors in the code sequence. In this paper, we address the issue of transmitting SPIHT-encoded images via noisy channels, wherein errors are inevitable. The communication scenario assumed in this paper is that the transmitter cannot get any acknowledgement from the receiver. In our scheme, the original SPIHT code sequence is first segmented into packets. Each packet is classified as either a CP (critical packet) or an RP (refinement packet). For error control, cyclic redundancy check (CRC) is incorporated into each packet. By checking the CRC check sum, the receiver is able to tell whether a packet is correctly received or not. In this way, the noisy channel can be effectively modeled as an erasure channel. For unequal error protection (UEP), each of those packets are repeatedly transmitted for a few times, as determined by a process called diversity allocation (DA). Two DA algorithms are proposed. The first algorithm produces a nearly optimal decoded image (as measured in the expected signal-to-noise ratio). However, its computation cost is extremely high. The second algorithm works in a progressive fashion and is naturally compatible with progressive transmission. Its computation complexity is extremely low. Nonetheless, its decoded image is nearly as good. Experimental results show that the proposed scheme significantly improves the decoded images. They also show that making distinction between CP and RP results in wiser diversity allocation to packets and thus produces higher quality in the decoded images.

  • An Efficient Algorithm for Weighted Sum-Rate Maximization in Multicell OFDMA Downlink

    Mirza Golam KIBRIA  Hidekazu MURATA  Susumu YOSHIDA  

     
    PAPER-Resource Allocation

      Vol:
    E97-A No:1
      Page(s):
    69-77

    This paper considers coordinated linear precoding for rate optimization in downlink multicell, multiuser orthogonal frequency-division multiple access networks. We focus on two different design criteria. In the first, the weighted sum-rate is maximized under transmit power constraints per base station. In the second, we minimize the total transmit power satisfying the signal-to-interference-plus-noise-ratio constraints of the subcarriers per cell. Both problems are solved using standard conic optimization packages. A less complex, fast, and provably convergent algorithm that maximizes the weighted sum-rate with per-cell transmit power constraints is formulated. We approximate the non-convex weighted sum-rate maximization (WSRM) problem with a solvable convex form by means of a sequential parametric convex approximation approach. The second-order cone formulations of an objective function and the constraints of the optimization problem are derived through a proper change of variables, first-order linear approximation, and hyperbolic constraints transformation. This algorithm converges to the suboptimal solution while taking fewer iterations in comparison to other known iterative WSRM algorithms. Numerical results are presented to demonstrate the effectiveness and superiority of the proposed algorithm.

  • Methods of Estimating Return-Path Capacitance in Electric-Field Intrabody Communication

    Tadashi MINOTANI  Mitsuru SHINAGAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:1
      Page(s):
    114-121

    This paper describes a very accurate method of estimating the return-path-capacitance and validates the estimation based on low-error measurements for electric-field intrabody communication. The return-path capacitance, Cg, of a mobile transceiver is estimated in two ways. One uses the attenuation factor in transmission and capacitance, Cb, between a human body and the earth ground. The other uses the attenuation factor in reception. To avoid the influence of the lead wire in the estimation of Cb, Cb is estimated from the attenuation factor measured with an amplifier with a low input capacitance. The attenuation factor in reception is derived by using the applied-voltage dependence of the reception rate. This way avoids the influence of any additional instruments on the return-path capacitance and allows that capacitance to be estimated under the same condition as actual intrabody communication. The estimates obtained by the two methods agree well with each other, which means that the estimation of Cb is valid. The results demonstrate the usefulness of the methods.

  • A Novel UWB SRR for Target Velocity Measurement in Gaussian Noise Environment for Automobile Applications

    Purushothaman SURENDRAN  Jong-Hun LEE  Seok-Jun KO  

     
    PAPER-Sensing

      Vol:
    E97-B No:1
      Page(s):
    210-217

    In this paper, we propose a time and memory efficient Ultra Wide Band Short Range Radar (UWB SRR) system for measuring relative target velocities of up to 150km/hr. First, for the proposed detector, we select the required design parameters for good performance. The parameters are the number of coherent integrations, non-coherent integrations, and FFT points. The conventional detector uses a Fast Fourier Transform (FFT) to extract the range and velocity of the target simultaneously. Therefore, it requires high computation effort, high FFT processing time, and a huge amount of memory. However, the proposed pulse radar detector first decides the target range and then computes the target velocity using FFT sequentially for the decided range index. According to our theoretical and simulation analyses, the FFT processing time and the memory requirement are reduced compared to those of the conventional method. Finally, we show that the detection performance of the proposed detector is superior to that of the conventional detector in a background of Additive White Gaussian Noise (AWGN).

  • Design of Miniature Implantable Tag Antenna for Radio-Frequency Identification System at 2.45GHz and Received Power Analysis

    HoYu LIN  Masaharu TAKAHASHI  Kazuyuki SAITO  Koichi ITO  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:1
      Page(s):
    129-136

    In recent years, there has been rapid developments in radio-frequency identification (RFID) systems, and their industrial applications include logistics management, automatic object identification, access and parking management, etc. Moreover, RFID systems have also been introduced for the management of medical instruments in medical applications to improve the quality of medical services. In recent years, the combination of such a system with a biological monitoring system through permanent implantation in the human body has been suggested to reduce malpractice events and ameliorate the patient suffering. This paper presents an implantable RFID tag antenna design that can match the conjugate impedance of most integrated circuit (IC) chips (9.3-j55.2Ω at 2.45GHz. The proposed antenna can be injected into the human body through a biological syringe, owing to its compact size of 9.3mm × 1.0mm × 1.0mm. The input impedance, transmission coefficient, and received power are simulated by a finite element method (FEM). A three-layered phantom is used to confirm antenna performance.

  • Fast Implementation of KCipher-2 for Software and Hardware

    Yuto NAKANO  Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Tsukasa ISHIGURO  Yutaka MIYAKE  Toshiaki TANAKA  Kouichi SAKURAI  

     
    PAPER-Information Network

      Vol:
    E97-D No:1
      Page(s):
    43-52

    KCipher-2 is a word-oriented stream cipher and an ISO/IEC 18033 standard. It is listed as a CRYPTREC cryptographic algorithm for Japanese governmental use. It consists of two feedback shift registers and a non-linear function. The size of each register in KCipher-2 is 32 bits and the non-linear function mainly applies 32-bit operations. Therefore, it can be efficiently implemented as software. SNOW-family stream ciphers are also word-oriented stream ciphers, and their high performance has already been demonstrated.We propose optimised implementations of KCipher-2 and compare their performance to that of the SNOW-family and other eSTREAM portfolios. The fastest algorithm is SNOW 2.0 and KCipher-2 is the second fastest despite the complicated irregular clocking mechanism. However, KCipher-2 is the fastest of the feasible algorithms, as SNOW 2.0 has been shown to have a security flaw. We also optimise the hardware implementation for the Virtex-5 field-programmable gate array (FPGA) and show two implementations. The first implementation is a rather straightforward optimisation and achieves 16,153 Mbps with 732 slices. In the second implementation, we duplicate the non-linear function using the structural advantage of KCipher-2 and we achieve 17,354 Mbps with 813 slices. Our implementation of KCipher-2 is around three times faster than those of the SNOW-family and efficiency, which is evaluated by “Throughput/Area (Mbps/slice)”, is 3.6-times better than that of SNOW 2.0 and 8.5-times better than that of SNOW 3G. These syntheses are performed using Xilinx ISE version 12.4.

  • Analysis of Low Grazing Scattering by Dielectric Gratings in Conical Mounting Using Scattering Factors

    Hideaki WAKABAYASHI  Masamitsu ASAI  Keiji MATSUMOTO  Jiro YAMAKITA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E97-C No:1
      Page(s):
    50-57

    In the shadow theory, a new description and a physical mean at a low grazing limit of incidence on gratings in the two dimensional scattering problem have been discussed. In this paper, by applying the shadow theory to the three dimensional problem of multilayered dielectric periodic gratings, we formulate the oblique primary excitation and introduce the scattering factors through our analytical method, by use of the matrix eigenvalues. In terms of the scattering factors, the diffraction efficiencies are defined for propagating and evanescent waves with linearly and circularly polarized incident waves. Numerical examples show that when an incident angle becomes low grazing, only specular reflection occurs with the reflection coefficient -1, regardless of the incident polarization. It is newly found that in a circularly polarized incidence case, the same circularly polarized wave as the incident wave is specularly reflected at a low grazing limit.

  • A Sparse Modeling Method Based on Reduction of Cost Function in Regularized Forward Selection

    Katsuyuki HAGIWARA  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E97-D No:1
      Page(s):
    98-106

    Regularized forward selection is viewed as a method for obtaining a sparse representation in a nonparametric regression problem. In regularized forward selection, regression output is represented by a weighted sum of several significant basis functions that are selected from among a large number of candidates by using a greedy training procedure in terms of a regularized cost function and applying an appropriate model selection method. In this paper, we propose a model selection method in regularized forward selection. For the purpose, we focus on the reduction of a cost function, which is brought by appending a new basis function in a greedy training procedure. We first clarify a bias and variance decomposition of the cost reduction and then derive a probabilistic upper bound for the variance of the cost reduction under some conditions. The derived upper bound reflects an essential feature of the greedy training procedure; i.e., it selects a basis function which maximally reduces the cost function. We then propose a thresholding method for determining significant basis functions by applying the derived upper bound as a threshold level and effectively combining it with the leave-one-out cross validation method. Several numerical experiments show that generalization performance of the proposed method is comparable to that of the other methods while the number of basis functions selected by the proposed method is greatly smaller than by the other methods. We can therefore say that the proposed method is able to yield a sparse representation while keeping a relatively good generalization performance. Moreover, our method has an advantage that it is free from a selection of a regularization parameter.

  • Comprehensive Study of Integral Analysis on LBlock

    Yu SASAKI  Lei WANG  

     
    PAPER-Symmetric Key Based Cryptography

      Vol:
    E97-A No:1
      Page(s):
    127-138

    The current paper presents an integral cryptanalysis in the single-key setting against light-weight block-cipher LBlock reduced to 22 rounds. Our attack uses the same 15-round integral distinguisher as the previous attacks, but many techniques are taken into consideration in order to achieve comprehensive understanding of the attack; choosing the best balanced-byte position, meet-in-the-middle technique to identify right key candidates, partial-sum technique, relations among subkeys, and combination of the exhaustive search with the integral analysis. Our results indicate that the integral cryptanalysis is particularly useful for LBlock like structures. At the end of this paper, which factor makes the LBlock structure weak against the integral cryptanalysis is discussed. Because designing light-weight cryptographic primitives is an actively discussed topic, we believe that this paper returns some useful feedback to future designs.

  • An Inconsistency Management Support System for Collaborative Software Development

    Phan Thi Thanh HUYEN  Koichiro OCHIMIZU  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:1
      Page(s):
    22-33

    In collaborative software developments, many change processes implementing change requests are executed concurrently by different workers. The fact that the workers do not have sufficient information about the others' work and complicated dependencies among artifacts can lead to unexpected inconsistencies among the artifacts impacted by the changes. Most previous studies concentrated only on concurrent changes and considered them separately. However, even when the changes are not concurrent, inconsistencies may still happen if a worker does not recognize the impact of the changes made by other workers on his changes or the impact of his changes on other workers' changes. In addition, the changes in a change process are related to each other through their common target of realizing the change request and the dependencies among the changed artifacts. Therefore, to handle inconsistencies more effectively, we concentrate on both concurrent and non-concurrent changes, and the context of a change, i.e. the change process containing the change, rather than the ongoing changes only. In this paper, we present an inconsistency awareness mechanism and a Change Support Workflow Management System (CSWMS) that realizes this mechanism. By monitoring the progress of the change processes and the ongoing changes in the client workspaces, CSWMS can notify the workers of a (potential) inconsistency in advance along with the context of the inconsistency, that is, the changes causing the inconsistency and the change processes containing these changes. Based on the information provided by CSWMS, the workers can detect and resolve inconsistencies more easily and quickly. Therefore, our research can contribute to building a safer and more efficient collaborative software development environment.

  • A Note on Pcodes of Partial Words

    Tetsuo MORIYA  Itaru KATAOKA  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E97-D No:1
      Page(s):
    139-141

    In this paper, we study partial words in relation with pcodes, compatibility, and containment. First, we introduce C⊂(L), the set of all partial words contained by elements of L, and C⊃(L), the set of all partial words containing elements of L, for a set L of partial words. We discuss the relation between C(L), the set of all partial words compatible with elements of the set L, C⊂(L), and C⊃(L). Next, we consider the condition for C(L), C⊂(L), and C⊃(L) to be a pcode when L is a pcode. Furthermore, we introduce some classes of pcodes. An infix pcode and a comma-free pcode are defined, and the inclusion relation among these classes is established.

  • RONoC: A Reconfigurable Architecture for Application-Specific Optical Network-on-Chip

    Huaxi GU  Zheng CHEN  Yintang YANG  Hui DING  

     
    LETTER-Computer System

      Vol:
    E97-D No:1
      Page(s):
    142-145

    Optical Network-on-Chip (ONoC) is a promising emerging technology, which can solve the bottlenecks faced by electrical on-chip interconnection. However, the existing proposals of ONoC are mostly built on fixed topologies, which are not flexible enough to support various applications. To make full use of the limited resource and provide a more efficient approach for resource allocation, RONoC (Reconfigurable Optical Network-on-Chip) is proposed in this letter. The topology can be reconfigured to meet the requirement of different applications. An 8×8 nonblocking router is also designed, together with the communication mechanism. The simulation results show that the saturation load of RONoC is 2 times better than mesh, and the energy consumption is 25% lower than mesh.

  • Sentence-Level Combination of Machine Translation Outputs with Syntactically Hybridized Translations

    Bo WANG  Yuanyuan ZHANG  Qian XU  

     
    LETTER-Natural Language Processing

      Vol:
    E97-D No:1
      Page(s):
    164-167

    We describe a novel idea to improve machine translation by combining multiple candidate translations and extra translations. Without manual work, extra translations can be generated by identifying and hybridizing the syntactic equivalents in candidate translations. Candidate and extra translations are then combined on sentence level for better general translation performance.

  • Cross-Talk with Fluctuation in Heterogeneous Multicore Fibers

    Takeshi SUGIMORI  Katsunori IMAMURA  Ryuichi SUGIZAKI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E97-B No:1
      Page(s):
    40-48

    Prediction of cross-talk is an important facet of multicore fiber (MCF) design. Several approaches for estimating cross-talk in MCF have been proposed but none are faultless, especially when applied to MCF with heterogeneous cores. We propose a new calculation approach that attempts to solve this problem. In our approach, cross-talk in multicore fibers is estimated by coupled power theory. The coefficients in the coupled power equation are theoretically calculated by the central limit theorem and by quantum mechanical time-dependent perturbations. The results from our calculations agree with those of Monte Carlo simulations of heterogeneous MCFs.

  • Texture Representation via Joint Statistics of Local Quantized Patterns

    Tiecheng SONG  Linfeng XU  Chao HUANG  Bing LUO  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E97-D No:1
      Page(s):
    155-159

    In this paper, a simple yet efficient texture representation is proposed for texture classification by exploring the joint statistics of local quantized patterns (jsLQP). In order to combine information of different domains, the Gaussian derivative filters are first employed to obtain the multi-scale gradient responses. Then, three feature maps are generated by encoding the local quantized binary and ternary patterns in the image space and the gradient space. Finally, these feature maps are hybridly encoded, and their joint histogram is used as the final texture representation. Extensive experiments demonstrate that the proposed method outperforms state-of-the-art LBP based and even learning based methods for texture classification.

  • Relations among Notions of Privacy for RFID Authentication Protocols

    Daisuke MORIYAMA  Shin'ichiro MATSUO  Miyako OHKUBO  

     
    PAPER-Public Key Based Cryptography

      Vol:
    E97-A No:1
      Page(s):
    225-235

    We present the relationship between privacy definitions for Radio Frequency Identification (RFID) authentication protocols. The security model is necessary for ensuring security or privacy, but many researchers present different privacy concepts for RFID authentication and the technical relationship among them is unclear. We reconsider the zero-knowledge based privacy proposed by Deng et al. at ESORICS 2010 and show that this privacy is equivalent to indistinguishability based privacy proposed by Juels and Weis. We also provide the implication and separation between these privacy definitions and the simulation based privacy proposed by Paise and Vaudenay at AsiaCCS 2008 based on the public verifiability of the communication message.

  • Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments

    Youwen ZHU  Tsuyoshi TAKAGI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:1
      Page(s):
    409-412

    A decentralized secure protocol for casting trust rating in reputation systems (StR protocol) is lately proposed by Dimitriou and Michalas, and the StR protocol is verified to be faster than the previous work providing anonymous feedback. In this letter, we present new enhanced scheme of StR. Compared with StR protocol, our new approach attains the exactly same security, but requires less processing time and about half communication overheads. Therefore, we improve the performance without sacrificing any security, especially the communication delay is dramatically reduced.

  • Automatic Evaluation of Trainee Nurses' Patient Transfer Skills Using Multiple Kinect Sensors

    Zhifeng HUANG  Ayanori NAGATA  Masako KANAI-PAK  Jukai MAEDA  Yasuko KITAJIMA  Mitsuhiro NAKAMURA  Kyoko AIDA  Noriaki KUWAHARA  Taiki OGATA  Jun OTA  

     
    PAPER-Educational Technology

      Vol:
    E97-D No:1
      Page(s):
    107-118

    To help student nurses learn to transfer patients from a bed to a wheelchair, this paper proposes a system for automatic skill evaluation in nurses' training for this task. Multiple Kinect sensors were employed, in conjunction with colored markers attached to the trainee's and patient's clothing and to the wheelchair, in order to measure both participants' postures as they interacted closely during the transfer and to assess the correctness of the trainee's movements and use of equipment. The measurement method involved identifying body joints, and features of the wheelchair, via the colors of the attached markers and calculating their 3D positions by combining color and depth data from two sensors. We first developed an automatic segmentation method to convert a continuous recording of the patient transfer process into discrete steps, by extracting from the raw sensor data the defining features of the movements of both participants during each stage of the transfer. Next, a checklist of 20 evaluation items was defined in order to evaluate the trainee nurses' skills in performing the patient transfer. The items were divided into two types, and two corresponding methods were proposed for classifying trainee performance as correct or incorrect. One method was based on whether the participants' relevant body parts were positioned in a predefined spatial range that was considered ‘correct’ in terms of safety and efficacy (e.g., feet placed appropriately for balance). The second method was based on quantitative indexes and thresholds for parameters describing the participants' postures and movements, as determined by a Bayesian minimum-error method. A prototype system was constructed and experiments were performed to assess the proposed approach. The evaluation of nurses' patient transfer skills was performed successfully and automatically. The automatic evaluation results were compared with evaluation by human teachers and achieved an accuracy exceeding 80%.

  • Second-Order Perturbative Analysis with Approximated Integration for Propagation Mode in Two-Dimensional Two-Slab Waveguides

    Naofumi KITSUNEZAKI  

     
    PAPER-Optical Waveguide Analysis

      Vol:
    E97-C No:1
      Page(s):
    11-16

    We calculated propagation constants of supermodes for two-dimensional two-slab waveguides, with small core gap, using second-order perturbation expansion from gapless slab waveguide system, and compared our results with the existing works. In the perturbation calculation, we used trapezoidal method to calculate the integral over the transverse direction in space and obtained second-order expansion of (core gap)/(core width) for propagation constants. Our result can explain the qualitative relationship between the propagation constants and the gap distance in the neighbor of (core gap)/(core width) being zero.

5201-5220hit(18690hit)