The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

4241-4260hit(20498hit)

  • Small Antennas Used in the Vicinity of Human Body Open Access

    Koichi ITO  Masaharu TAKAHASHI  Kazuyuki SAITO  

     
    INVITED PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    9-18

    Recently, wearable wireless devices or terminals have become hot a topic not only in research but also in business. Implantable wireless devices can temporarily be utilized to monitor a patient's condition in an emergency situation or to identify people in highly secured places. Unlike conventional wireless devices, wearable or implantable devices are used on or in the human body. In this sense, body-centric wireless communications (BCWCs) have become a very active area of research. Radio-frequency or microwave medical devices used for cancer treatment systems and surgical operation have completely different functions, but they are used on or in the human body. In terms of research techniques, such medical devices have a lot of similarities to BCWCs. The antennas to be used in the vicinity of the human body should be safe, small and robust. Also, their interaction with the human body should be well considered. This review paper describes some of the wearable antennas as well as implantable antennas that have been studied in our laboratory.

  • Weighted-Polarization Wearable MIMO Antenna with Three Orthogonally Arranged Dipoles Based on RF Signal Processing

    Kazuhiro HONDA  Kun LI  Koichi OGAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    58-68

    In this paper, we present a weighted-polarization wearable multiple-input multiple-output (MIMO) antenna that is based on radio-frequency (RF) signal processing to realize ultra-high-speed and high-capacity mobile communications. The proposed antenna is comprised of three orthogonal dipoles, two of which can be selected according to a weight function in different usage scenarios. The weight function is determined by considering the variation in the cross-polarization power ratio (XPR) and the antenna inclination angle which depend on the radio-propagation environment and human motion. To confirm the suitability of the proposed antenna, we perform preliminary experiments to evaluate the channel capacity of a weighted-polarization wearable MIMO antenna with an arm-swinging dynamic phantom. The measured and analytical results are in good agreement, which verifies the effectiveness of the proposed antenna. We demonstrate that the proposed antenna is suitable for realizing gigabit mobile communications in future wearable MIMO applications.

  • Optimal Spectrum Allocation in the Dynamic Heterogeneous Cellular Network

    Xiong ZHOU  Suili FENG  Yuehua DING  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:1
      Page(s):
    240-248

    In the dynamic heterogeneous cellular network, spectrum allocation deeply impacts the quality of service and performance of network. In this paper, spectrum allocation is formulated as a dynamic programming problem. A two-level framework is proposed by jointly considering users' dynamic service selection and provider's spectrum allocation. In the first level, the users' service selection is modeled as an evolutionary game, and an evolutionary equilibrium is obtained. In the second level, the service provider allocates the spectral resources to macrocells and femtocells according to the users' strategies, so as to maximize its profits. By jointly considering the service selection and spectrum allocation, the equilibriums of the dynamic network are found. The stability of the equilibriums is analyzed and proven. The proposed two-level framework is validated by the numerical simulation.

  • Efficient Weak Signals Acquisition Strategy for GNSS Receivers

    Weijun LU  Yanbin ZHANG  Dengyun LEI  Dunshan YU  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E99-B No:1
      Page(s):
    288-295

    The key factors in overcoming for weak global navigation satellite systems (GNSS) signal acquisition are sensitivity and dwell time. In the conventional MAX/TC criteria, a preset threshold value is used to determine whether the signal exists. Thus the threshold is calculated carefully to balance the sensitivity and the dwell time. Affected by various environment noise and interference, the acquisition circuit will enter verifying mode frequently to eliminate false alarms, which will extend the mean acquisition time (MAT). Based on the periodicity of spread spectrum code in GNSS, this paper presents an improved double-dwell scheme that uses no threshold in detecting weak GNSS signals. By adopting this method, the acquisition performance of weak signal is significantly improved. Theoretical analysis and numerical simulation are presented detailed. Compared with the conventional MAX/TC criteria, the proposed method achieves improved performance in terms of detection probability and false alarm rate. Furthermore, the MAT decreases 15s when C/N0 is above 20dB-Hz. This can enhance the receiver sensitivity and shorten the time to first fix (TTFF).

  • A 60GHz-Band High-Efficiency Antenna with a Thick Resin Layer and Differentially Fed through a Hole in a Silicon Chip

    Naoya OIKAWA  Jiro HIROKAWA  Hiroshi NAKANO  Yasutake HIRACHI  Hiroshi ISONO  Atsushi ISHII  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    27-32

    For the realization of a high-efficiency antenna for 60GHz-band wireless personal area network, we propose placing a CMOS RF circuit and an antenna on opposing sides of a silicon chip. They are connected with low loss by a coaxial-line structure using a hole opening in the chip. Since the CMOS circuit is driven differentially, a differential-feed antenna is used. In this paper, we design and measure a differential-feed square patch antenna on a silicon chip. To enhance the radiation efficiency, it is placed on a 200µm thick resin layer. The calculated radiation efficiency of 79% includes the connection loss. A prototype antenna is measured in a reverberation chamber, and its radiation efficiency is estimated to be about 81±3%.

  • Sea Clutter Suppression and Weak Target Signal Enhancement Using an Optimal Filter

    Jinfeng HU  Huanrui ZHU  Huiyong LI  Julan XIE  Jun LI  Sen ZHONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E99-A No:1
      Page(s):
    433-436

    Recently, many neural networks have been proposed for radar sea clutter suppression. However, they have poor performance under the condition of low signal to interference plus noise ratio (SINR). In this letter, we put forward a novel method to detect a small target embedded in sea clutter based on an optimal filter. The proposed method keeps the energy in the frequency cell under test (FCUT) invariant, at the same time, it minimizes other frequency signals. Finally, detect target by judging the output SINR of every frequency cell. Compared with the neural networks, the algorithm proposed can detect under lower SINR. Using real-life radar data, we show that our method can detect the target effectively when the SINR is higher than -39dB which is 23dB lower than that needed by the neural networks.

  • Autonomous Peer Discovery Scheme for D2D Communications Based on Spatial Correlation of Wireless Channel

    Woongsup LEE  Juyeop KIM  Dong-Ho CHO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:1
      Page(s):
    224-231

    We herein describe an autonomous peer discovery scheme for Device-to-Device (D2D) communications. With the increasing popularity of D2D communications, an efficient means of finding the neighboring node, i.e., peer discovery, is required. To this end, we propose a new autonomous peer discovery scheme that uses azimuth spread (AS), delay spread (DS), and shadow fading of the uplink pilot from each mobile station (MS). Given that AS, DS, and shadow fading are spatially correlated, nodes that have similar values must be neighbors. The proposed scheme filters out the MSs that are unlikely to be neighbors and uses the Kolmogorov-Smirnov (K-S) test to improve the accuracy of neighbor discovery. Unlike previous peer discovery schemes that incur additional signaling overheads, our proposal finds neighboring nodes by using the existing uplink pilot transmission from MSs such that neighboring peers can be found autonomously. Through analysis and simulation, we show that neighboring MSs can be found accurately with low latency.

  • Differentially Private Real-Time Data Publishing over Infinite Trajectory Streams

    Yang CAO  Masatoshi YOSHIKAWA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2015/10/06
      Vol:
    E99-D No:1
      Page(s):
    163-175

    Recent emerging mobile and wearable technologies make it easy to collect personal spatiotemporal data such as activity trajectories in daily life. Publishing real-time statistics over trajectory streams produced by crowds of people is expected to be valuable for both academia and business, answering questions such as “How many people are in Kyoto Station now?” However, analyzing these raw data will entail risks of compromising individual privacy. ε-Differential Privacy has emerged as a well-known standard for private statistics publishing because of its guarantee of being rigorous and mathematically provable. However, since user trajectories will be generated infinitely, it is difficult to protect every trajectory under ε-differential privacy. On the other hand, in real life, not all users require the same level of privacy. To this end, we propose a flexible privacy model of l-trajectory privacy to ensure every desired length of trajectory under protection of ε-differential privacy. We also design an algorithmic framework to publish l-trajectory private data in real time. Experiments using four real-life datasets show that our proposed algorithms are effective and efficient.

  • Message Extension Attack against Authenticated Encryptions: Application to PANDA

    Yu SASAKI  Lei WANG  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    49-57

    We present a new cryptanalysis approach to analyze the security of a class of authenticated encryption schemes, which shares similarity with the previous length extension attack against hash-function-based MACs. Hence we name our approach by message extension attack. For an authenticated encryption from the target class, it consists of three phases; initialization with nonce and key as input, state update function with associated data and message as input and tag generation with updated state as input. We will show how to mount a forgery attack in the nonce-repeating model under the chosen-plaintext scenario, when both state update function and tag generation is built based on the same function. To demonstrate the effectiveness of our message extension attack approach, we apply it to a dedicated authenticated encryption called PANDA, which is a candidate of the ongoing CAESAR cryptographic competition. We successfully found an existential forgery attack on PANDA with 25 chosen plaintexts, 264 computations, and a negligible memory, and it breaks the claimed 128-bit security for the nonce-repeating model. We note that this is the first result that breaks the security claim of PANDA, which makes it withdrawn from the CAESAR competition by its designer.

  • Rate-Distortion Bounds for ε-Insensitive Distortion Measures

    Kazuho WATANABE  

     
    PAPER-Information Theory

      Vol:
    E99-A No:1
      Page(s):
    370-377

    Explicit evaluation of the rate-distortion function has rarely been achieved when it is strictly greater than its Shannon lower bound since it requires to identify the support of the optimal reconstruction distribution. In this paper, we consider the rate-distortion function for the distortion measure defined by an ε-insensitive loss function. We first present the Shannon lower bound applicable to any source distribution with finite differential entropy. Then, focusing on the Laplacian and Gaussian sources, we prove that the rate-distortion functions of these sources are strictly greater than their Shannon lower bounds and obtain upper bounds for the rate-distortion functions. Small distortion limit and numerical evaluation of the bounds suggest that the Shannon lower bound provides a good approximation to the rate-distortion function for the ε-insensitive distortion measure. By using the derived bounds, we examine the performance of a scalar quantizer. Furthermore, we discuss variants and extensions of the ε-insensitive distortion measure and obtain lower and upper bounds for the rate-distortion function.

  • Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks

    Yu SASAKI  Lei WANG  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    22-30

    HMAC is the most widely used hash based MAC scheme. Recently, several generic attacks have been presented against HMAC with a complexity between 2n/2 and 2n, where n is the output size of an underlying hash function. In this paper, we investigate the security of strengthened HMAC instantiated with a Merkle-Damgård hash function in which the key is used to process underlying compression functions. With such a modification, the attacker is unable to precompute the property of the compression function offline, and thus previous generic attacks are prevented. In this paper, we show that keying the compression function in all blocks is necessary to prevent a generic internal state recovery attack with a complexity less than 2n. In other words, only with a single keyless compression function, the internal state is recovered faster than 2n. To validate the claim, we present a generic attack against the strengthened HMAC instantiated with a Merkle-Damgård hash function in which only one block is keyless, thus pre-computable offline. Our attack uses the previous generic attack by Naito et al. as a base. We improve it so that the attack can be applied only with a single keyless compression function while the attack complexity remains unchanged from the previous work.

  • Power Reduction of Variable Wordlength OFDM Receiver in Time-Varying Fading Channels by Monitoring Subcarrier SNRs

    Shingo YOSHIZAWA  Daichi SASAKI  Hiroshi TANIMOTO  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:1
      Page(s):
    330-337

    Determination of wordlength is essential for designing digital circuits because the wordlength affects system performance, hardware size, and power consumption. Variable wordlength methods that a system dynamically and effectively changes the wordlength depending on surrounding environments have been studied for power reduction in wireless systems. The conventional variable wordlength methods induce communication performance degradation when compared with a floating-point representation in time-varying fading channels. This paper discusses rapid wordlength control on packet basis and proposes a new method based on monitoring subcarrier SNRs in an OFDM receiver. The proposed method can estimate signal quality accurately and can decrease the wordlength decision errors. The simulation results have indicated that the proposed method shows better PER performance compared with the conventional methods.

  • FFT-Based Block Diagonalization at User Terminal for Implicit Beamforming in Multiuser MIMO System

    Hayate KIMOTO  Kentaro NISHIMORI  Takefumi HIRAGURI  Hideo MAKINO  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    115-123

    This paper proposes Fast Fourier Transform (FFT) based orthogonal beam selection method at the user terminals (UTs) to reduce the number of nulls for the other users except an intended user by the Block Diagonalization (BD) algorithm in multiuser MIMO (MU-MIMO) sytems. The BD algorithm has been proposed in order to realize MU-MIMO broadcast transmission with a realistic signal processing burden. The BD algorithm cancels inter-user interference by creating the weights so that the channel matrixes for the other users are set to be zero matrixes. However, when the number of transmit antennas is equals to the total number of received antennas, the transmission rate by the BD algorithm is decreased. The proposed method realizes the performance improvement compared to the conventional BD algorithm without the burden on the UTs. It is verified via bit error rate (BER) evaluation that the proposed method is effective compared to the conventional BD algorithm and antenna selection method. Moreover, the effectiveness of proposed method is verified by the performance evaluation considering medium access control (MAC) layer in a comparison with the conventional BD algorithm which needs the channel state information (CSI) feedback. Because the proposed method can be easily applied to beamforming without the CSI feedback (implicit beamforming), it is shown that the propose method is effective from a point of view on the transmission efficiency in MU-MIMO system.

  • Method of Audio Watermarking Based on Adaptive Phase Modulation

    Nhut Minh NGO  Masashi UNOKI  

     
    PAPER

      Pubricized:
    2015/10/21
      Vol:
    E99-D No:1
      Page(s):
    92-101

    This paper proposes a method of watermarking for digital audio signals based on adaptive phase modulation. Audio signals are usually non-stationary, i.e., their own characteristics are time-variant. The features for watermarking are usually not selected by combining the principle of variability, which affects the performance of the whole watermarking system. The proposed method embeds a watermark into an audio signal by adaptively modulating its phase with the watermark using IIR all-pass filters. The frequency location of the pole-zero of an IIR all-pass filter that characterizes the transfer function of the filter is adapted on the basis of signal power distribution on sub-bands in a magnitude spectrum domain. The pole-zero locations are adapted so that the phase modulation produces slight distortion in watermarked signals to achieve the best sound quality. The experimental results show that the proposed method could embed inaudible watermarks into various kinds of audio signals and correctly detect watermarks without the aid of original signals. A reasonable trade-off between inaudibility and robustness could be obtained by balancing the phase modulation scheme. The proposed method can embed a watermark into audio signals up to 100 bits per second with 99% accuracy and 6 bits per second with 94.3% accuracy in the cases of no attack and attacks, respectively.

  • False Image Suppression in Two-Dimensional Shape Estimates of a Walking Human Using Multiple Ultra-Wideband Doppler Radar Interferometers

    Hiroki YAMAZAKI  Takuya SAKAMOTO  Hirofumi TAKI  Toru SATO  

     
    PAPER-Sensing

      Vol:
    E99-B No:1
      Page(s):
    134-142

    Microwave systems have a number of promising applications in surveillance and monitoring systems. The main advantage of microwave systems is their ability to detect targets at distance under adverse conditions such as dim, smoky, and humid environments. Specifically, the wide bandwidth of ultra-wideband radar enables high range resolution. In a previous study, we proposed an accurate shape estimation algorithm for multiple targets using multiple ultra-wideband Doppler interferometers. However, this algorithm produces false image artifacts under conditions with severe interference. The present paper proposes a technique to suppress such false images by detecting inconsistent combinations of the radial velocity and time derivative of image positions. We study the performance of the proposed method through numerical simulations of a two-dimensional section of a moving human body, and demonstrate the remarkable performance of the proposed method in suppressing false image artifacts in many scenarios.

  • Reversible Audio Data Hiding Based on Variable Error-Expansion of Linear Prediction for Segmental Audio and G.711 Speech

    Akira NISHIMURA  

     
    PAPER

      Pubricized:
    2015/10/21
      Vol:
    E99-D No:1
      Page(s):
    83-91

    Reversible data hiding is a technique in which hidden data are embedded in host data such that the consistency of the host is perfectly preserved and its data are restored during extraction of the hidden data. In this paper, a linear prediction technique for reversible data hiding of audio waveforms is improved. The proposed variable expansion method is able to control the payload size through varying the expansion factor. The proposed technique is combined with the prediction error expansion method. Reversible embedding, perfect payload detection, and perfect recovery of the host signal are achieved for a framed audio signal. A smaller expansion factor results in a smaller payload size and less degradation in the stego audio quality. Computer simulations reveal that embedding a random-bit payload of less than 0.4 bits per sample into CD-format music signals provide stego audio with acceptable objective quality. The method is also applied to G.711 µ-law-coded speech signals. Computer simulations reveal that embedding a random-bit payload of less than 0.1 bits per sample into speech signals provide stego speech with good objective quality.

  • Using Bregmann Divergence Regularized Machine for Comparison of Molecular Local Structures

    Raissa RELATOR  Nozomi NAGANO  Tsuyoshi KATO  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/10/06
      Vol:
    E99-D No:1
      Page(s):
    275-278

    Although many 3D structures have been solved for proteins to date, functions of some proteins remain unknown. To predict protein functions, comparison of local structures of proteins with pre-defined model structures, whose functions have been elucidated, is widely performed. For the comparison, the root mean square deviation (RMSD) has been used as a conventional index. In this work, adaptive deviation was incorporated, along with Bregmann Divergence Regularized Machine, in order to detect analogous local structures with such model structures more effectively than the conventional index.

  • The Impact of Information Richness on Fault Localization

    Yan LEI  Min ZHANG  Bixin LI  Jingan REN  Yinhua JIANG  

     
    LETTER-Software Engineering

      Pubricized:
    2015/10/14
      Vol:
    E99-D No:1
      Page(s):
    265-269

    Many recent studies have focused on leveraging rich information types to increase useful information for improving fault localization effectiveness. However, they rarely investigate the impact of information richness on fault localization to give guidance on how to enrich information for improving localization effectiveness. This paper presents the first systematic study to fill this void. Our study chooses four representative information types and investigates the relationship between their richness and the localization effectiveness. The results show that information richness related to frequency execution count involves a high risk of degrading the localization effectiveness, and backward slice is effective in improving localization effectiveness.

  • Part-Segment Features with Optimized Shape Priors for Articulated Pose Estimation

    Norimichi UKITA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2015/10/14
      Vol:
    E99-D No:1
      Page(s):
    248-256

    We propose part-segment (PS) features for estimating an articulated pose in still images. The PS feature evaluates the image likelihood of each body part (e.g. head, torso, and arms) robustly to background clutter and nuisance textures on the body. While general gradient features (e.g. HOG) might include many nuisance responses, the PS feature represents only the region of the body part by iterative segmentation while updating the shape prior of each part. In contrast to similar segmentation features, part segmentation is improved by part-specific shape priors that are optimized by training images with fully-automatically obtained seeds. The shape priors are modeled efficiently based on clustering for fast extraction of PS features. The PS feature is fused complementarily with gradient features using discriminative training and adaptive weighting for robust and accurate evaluation of part similarity. Comparative experiments with public datasets demonstrate improvement in pose estimation by the PS features.

  • Millimeter-Wave Broadband Mode Transition between Grounded Coplanar Waveguide and Post-Wall Waveguide

    Ryohei HOSONO  Yusuke UEMICHI  Xu HAN  Ning GUAN  Yusuke NAKATANI  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    33-39

    A broadband mode transition between grounded coplanar waveguide (GCPW) and post-wall waveguide (PWW) is proposed. The transition is composed of GCPW, microstrip line (MSL) and PWW, where the GCPW and PWW are connected via the MSL. The transition is fabricated on liquid crystal polymer (LCP) substrate because of its low dielectric loss and cost effectiveness based on a roll-to-roll fabrication process. Center strip of the GCPW is sandwiched by two ground pads in each of which two through-holes and a rectangular slit are structured. Broadband impedance matching is achieved by this structure thanks to an addition of lumped inductance and capacitance to the transition. A part of the MSL is tapered for the broadband operation. A 25% impedance bandwidth for |S11| less than -15dB is achieved in measurement of a fabricated transition. Loss of the GCPW ground-signal-ground (GSG) pad of 0.12dB and that of the MSL-PWW transition of 0.29dB at 60GHz are evaluated from the measurement. Fabrication error and the caused tolerance on performance are also evaluated and small variation in production is confirmed. The mode transition can be used for low loss antenna-in-package in millimeter-wave applications.

4241-4260hit(20498hit)