The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

7721-7740hit(20498hit)

  • Constructing Even-Variable Symmetric Boolean Functions with High Algebraic Immunity

    Yuan LI  Hui WANG  Haibin KAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:1
      Page(s):
    362-366

    In this paper, we explicitly construct a large class of symmetric Boolean functions on 2k variables with algebraic immunity not less than d, where integer k is given arbitrarily and d is a given suffix of k in binary representation. If let d = k, our constructed functions achieve the maximum algebraic immunity. Remarkably, 2⌊ log2k ⌋ + 2 symmetric Boolean functions on 2k variables with maximum algebraic immunity are constructed, which are much more than the previous constructions. Based on our construction, a lower bound of symmetric Boolean functions with algebraic immunity not less than d is derived, which is 2⌊ log2d ⌋ + 2(k-d+1). As far as we know, this is the first lower bound of this kind.

  • An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme

    Seiko ARITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:1
      Page(s):
    367-382

    It is known that composable secure commitments, that is, concurrent non-malleable commitments exist in the plain model, based only on standard assumptions such as the existence of claw-free permutations or even one-way functions. Since being based on the plain model, the deniability of them is trivially satisfied, and especially the latter scheme satisfies also adaptivity, hence it is adaptive-deniable-concurrent non-malleable. However, those schemes cannot be said to be practically efficient. We show a practically efficient (string) adaptive-deniable-concurrent commitment scheme is possible under a global setup model, called the Global CRS-KR model.

  • Generalized Classes of Weak Keys on RC4 Using Predictive State

    Ryoichi TERAMURA  Toshihiro OHIGASHI  Hidenori KUWAKADO  Masakatu MORII  

     
    PAPER-Symmetric Cryptography

      Vol:
    E94-A No:1
      Page(s):
    10-18

    Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using generalized relational equations and special classes of the internal state (called predictive state). We derive the probability that generalized classes of weak keys leak the information of bytes of the secret key. Furthermore, we enumerate the generalized classes of weak keys and show that most of them leak more information of the secret key than Roos' one.

  • A Self-Organizing Pulse-Coupled Network of Sub-Threshold Oscillating Spiking Neurons

    Kai KINOSHITA  Hiroyuki TORIKAI  

     
    PAPER-Nonlinear Problems

      Vol:
    E94-A No:1
      Page(s):
    300-314

    In this paper, an artificial sub-threshold oscillating spiking neuron is presented and its response phenomena to an input spike-train are analyzed. In addition, a dynamic parameter update rule of the neuron for achieving synchronizations to the input spike-train having various spike frequencies is presented. Using an analytical two-dimensional return map, local stability of the parameter update rule is analyzed. Furthermore, a pulse-coupled network of the neurons is presented and its basic self-organizing function is analyzed. Fundamental comparisons are also presented.

  • A Further Improved Technique on the Stochastic Functional Approach for Randomly Rough Surface Scattering -- Analytical-Numerical Wiener Analysis --

    Yasuhiko TAMURA  

     
    PAPER-Random Media and Rough Surfaces

      Vol:
    E94-C No:1
      Page(s):
    39-46

    This paper proposes a further improved technique on the stochastic functional approach for randomly rough surface scattering. The original improved technique has been established in the previous paper [Waves in Random and Complex Media, vol.19, no.2, pp.181-215, 2009] as a novel numerical-analytical method for a Wiener analysis. By deriving modified hierarchy equations based on the diagonal approximation solution of random wavefields for a TM plane wave incidence or even for a TE plane wave incidence under large roughness, large slope or low grazing incidence, such a further improved technique can provide a large reduction of required computational resources, in comparison with the original improved technique. This paper shows that numerical solutions satisfy the optical theorem with very good accuracy, by using small computational resources.

  • F-Scan: A DFT Method for Functional Scan at RTL

    Marie Engelene J. OBIEN  Satoshi OHTAKE  Hideo FUJIWARA  

     
    PAPER-Information Network

      Vol:
    E94-D No:1
      Page(s):
    104-113

    Due to the difficulty of test pattern generation for sequential circuits, several design-for-testability (DFT) approaches have been proposed. An improvement to these current approaches is needed to cater to the requirements of today's more complicated chips. This paper introduces a new DFT method applicable to high-level description of circuits, which optimally utilizes existing functional elements and paths for test. This technique, called F-scan, effectively reduces the hardware overhead due to test without compromising fault coverage. Test application time is also kept at the minimum. The comparison of F-scan with the performance of gate-level full scan design is shown through the experimental results.

  • Analysis Method of Ground Wave Propagation over Land-to-Sea Mixed-Path by Using Helmholtz-Kirchhoff Integral Theorem

    Toru KAWANO  Keiji GOTO  Toyohiko ISHIHARA  

     
    PAPER-Radiation and Propagation

      Vol:
    E94-C No:1
      Page(s):
    10-17

    In this paper, we have derived a novel integral representation for the ground wave propagation over land-to-sea mixed-paths by applying the Helmholtz-Kirchhoff integral theorem. By using the method of stationary phase applicable uniformly as the stationary phase point approaches the endpoint of the integral, we have derived the asymptotic solution for the scattered fields consisting of the first-order and the second-order diffraction terms. We show that the asymptotic solution thus derived agrees with the asymptotic solution derived by applying the aperture field method (AFM) and the method of stationary phase. We have confirmed the validity and the utility of the novel integral representation and its asymptotic solution by comparing with the widely used mixed-path theorem and the experimental measurement performed in Kanto area and Tokyo bay.

  • Scattering of a Plane Wave from the End-Face of a Three-Dimensional Waveguide System

    Asami TAKI  Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E94-C No:1
      Page(s):
    63-67

    The scattering of a plane wave from the end-face of a three-dimensional waveguide system composed of a large number of cores is treated by the volume integral equation for the electric field and the first order term of a perturbation solution for TE and TM wave incidence is analytically derived. The far scattered field does not almost depend on the polarization of an incident wave and the angle dependence is described as the Fourier transform of the incident field in the cross section of cores. To clarify the dependence of the scattering pattern on the arrangement of cores some numerical examples are shown.

  • Integrating Algorithms for Integrable Affine Constraints

    Tatsuya KAI  

     
    LETTER-General Fundamentals and Boundaries

      Vol:
    E94-A No:1
      Page(s):
    464-467

    This letter presents integrating algorithms for affine constraints defined on a manifold. We first explain definition and geometric representation of affine constraints. Next, we derive integrating algorithms to calculate independent first integrals of affine constraints for the two cases where the they are completely integrable and partially nonintegrable. Moreover, we prove the existence of inverse functions in the algorithms. Some examples are also shown to verify our results.

  • A 35-GHz, 0.8-A/W and 26-µm Misalignment Tolerance Microlens-Integrated p-i-n Photodiodes

    Yong LEE  Kazuyuki NAGATSUMA  Kazuhiko HOSOMI  Takuma BAN  Kazunori SHINODA  Koichiro ADACHI  Shinji TSUJI  Yasunobu MATSUOKA  Shigehisa TANAKA  Reiko MITA  Toshiki SUGAWARA  Masahiro AOKI  

     
    BRIEF PAPER-Lasers, Quantum Electronics

      Vol:
    E94-C No:1
      Page(s):
    116-119

    We fabricated a p-i-n photodiode (PD) with an integrated microlens, and demonstrated its high performance capabilities including high speed (35 GHz), high responsivity (0.8 A/W), and large misalignment tolerance (26 µm), and an error-free 25-Gbit/s 10-km single-mode fiber transmission by using a 100-Gbit/s Ethernet quadplexer receiver module with the PDs.

  • A Clock Generator with Clock Period, Duty-Ratio and I/Q-Balance Adjustment Capabilities for On-Chip Timing-Margin Tests

    Shunichi KAERIYAMA  Mikihiro KAJITA  Masayuki MIZUNO  

     
    PAPER-Integrated Electronics

      Vol:
    E94-C No:1
      Page(s):
    102-109

    A 4-phase clock generator, which can dynamically change clock frequencies, duty ratios and I/Q balance, is proposed for on-chip timing margin testing. The clock generator macro is integrated into the microprocessor chip of the supercomputer SX-9, which is fabricated with a 65 nm CMOS technology. It demonstrates frequency syntheses of 1.68 GHz to 3 GHz range, an instant frequency change capability for timing margin testing, duty ratio and I/Q balance adjustments of -12.5 ps to 9.4 ps with a 3.125 ps step resolution.

  • Numerical Analysis of Two-Dimensional Photonic Crystal Waveguide Devices Using Periodic Boundary Conditions

    Yoshimasa NAKATAKE  Koki WATANABE  

     
    PAPER-Numerical Techniques

      Vol:
    E94-C No:1
      Page(s):
    32-38

    This paper presents a formulation of two-dimensional photonic crystal waveguide devices formed by circular cylinders. The device structures are considered as cascade connections of straight waveguides. Decomposing the structure into layers of the cylinder arrays, the input/output properties of the devices are obtained using an analysis method of multilayer structure. We introduce periodic boundary conditions in the direction perpendicular to the wave propagation, and the Floquet-modes of each layer are calculated by the Fourier series expansion method with the help of the recursive transition-matrix algorithm. Then, the input/output properties of the devices are obtained by recursive calculation of scattering matrix with each layer. The presented formulation is validated by numerical experiments by comparing with the previous works.

  • Fresnel Zone Criterion to Implement Locality in the Method of Moments and PO-MoM Hybrid Method for the Reduction of Unknowns

    Keita ITO  Tetsu SHIJO  Makoto ANDO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E94-C No:1
      Page(s):
    72-79

    Locality of high frequency electromagnetic scattering phenomena is embodied and imported to the Method of Moments (MoM) to reduce computational load. The proposed method solves currents on small areas only around inner and edge stationary phase points (SPPs) on the scatterer surfaces. The range of MoM area is explicitly specified in terms of Fresnel zone number as a function of frequency, source and observer positions. Based upon this criterion, scatterer of arbitrary size and shape can be solved with almost frequency independent number of unknowns. In some special cases like focusing systems, locality disappears and the method reduces to the standard MoM. The hybrid method called PO-MoM is complementarily introduced to cope with these cases, where Fresnel zone number with analogous but different definition is used. The selective use of Local-MoM and PO-MoM provides frequency insensitive number of unknowns for general combination of source and observation points. Numerical examples of RCS calculation for two dimensional flat and curved surfaces are presented to demonstrate the accuracy and reduction of unknowns of this method. The Fresnel zone, introduced in the scattering analysis for the first time, is a useful indicator of the locality or the boundary for MoM areas.

  • Resource Reduction Method for the LTE-Advanced Uplink ACK/NACK Signal and SR

    Seigo NAKAO  Kenji TAKAGI  Masaru FUKUOKA  Daichi IMAMURA  Hidekazu MURATA  Koji YAMAMOTO  Susumu YOSHIDA  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:1
      Page(s):
    364-367

    Advanced Evolved Universal Terrestrial Radio Access (Advanced E-UTRA), called LTE-Advanced, has been standardized in the 3rd Generation Partnership Project (3GPP) as a candidate for IMT-Advanced. LTE-Advanced supports spatial orthogonal-resource transmit diversity (SORTD) [1],[2] for ACK/NACK signals and scheduling requests (SRs), which are used to control downlink hybrid automatic repeat requests (HARQs) and manage uplink radio resources based on uplink data traffic, respectively. Both ACK/NACK signals and SRs are carried via a physical uplink control channel (PUCCH) [3], and a common PUCCH format is used for both ACK/NACK signals and SRs. If SORTD is used, the base station assigns mutually orthogonal resources to each antenna included in the user equipment (UE) for ACK/NACK signals and SRs; hence, the number of required resources increases with the number of transmitting antennas in the UE. In this paper, we study the resource reduction method for ACK/NACK signal and SR in case of SORTD using the concept of common resource. In addition, we investigate a phase rotation scheme for common resources to improve the SR detection performance.

  • Reducing the Inaccuracy Caused by Inappropriate Time Window in Probabilistic Fault Localization

    Jianxin LIAO  Cheng ZHANG  Tonghong LI  Xiaomin ZHU  

     
    PAPER-Network Management/Operation

      Vol:
    E94-B No:1
      Page(s):
    128-138

    To reduce the inaccuracy caused by inappropriate time window, we propose two probabilistic fault localization schemes based on the idea of "extending time window." The global window extension algorithm (GWE) uses a window extension strategy for all candidate faults, while the on-demand window extension algorithm (OWE) uses the extended window only for a small set of faults when necessary. Both algorithms can increase the metric values of actual faults and thus improve the accuracy of fault localization. Simulation results show that both schemes perform better than existing algorithms. Furthermore, OWE performs better than GWE at the cost of a bit more computing time.

  • Data Management for Large-Scale Position-Tracking Systems

    Fumiaki INOUE  Yongbing ZHANG  Yusheng JI  

     
    PAPER-Scalability & Timeliness

      Vol:
    E94-B No:1
      Page(s):
    45-54

    We propose a distributed data management approach in this paper for a large-scale position-tracking system composed of multiple small systems based on wireless tag technologies such as RFID and Wi-Fi tags. Each of these small systems is called a domain, and a domain server manages the position data of the users belonging to its managing domain and also to the other domains but temporarily residing in its domain. The domain servers collaborate with each other to globally manage the position data, realizing the global position tracking. Several domains can be further grouped to form a larger domain, called a higher-domain, so that the whole system is constructed in a hierarchical structure. We implemented the proposed approach in an experimental environment, and conducted a performance evaluation on the proposed approach and compared it with an existing approach wherein a central server is used to manage the position data of all the users. The results showed that the position data processing load is distributed among the domain servers and the traffic for position data transmission over the backbone network can be significantly restrained.

  • An Efficient Transmit Power and Bit Rate Allocation Algorithm for OFDM Based Cognitive Radio Systems

    Yuehuai MA  Youyun XU  Jin-Long WANG  

     
    LETTER-Network

      Vol:
    E94-B No:1
      Page(s):
    302-306

    We consider the problem of transmit power and bit rate allocation for OFDM based cognitive radio systems. An efficient allocation algorithm which mainly consists of two steps is proposed to maximize the sum rate of secondary users. In the first step of the algorithm, original nonlinear problem is converted to a convex problem which is solved by dual methods, and in the second step the final resource allocation results is obtained via iterative power rescale operation. Numerical results show the effectiveness of the proposed algorithm.

  • Efficient Implementation of Inner-Outer Flexible GMRES for the Method of Moments Based on a Volume-Surface Integral Equation Open Access

    Hidetoshi CHIBA  Toru FUKASAWA  Hiroaki MIYASHITA  Yoshihiko KONISHI  

     
    PAPER-Numerical Techniques

      Vol:
    E94-C No:1
      Page(s):
    24-31

    This paper presents flexible inner-outer Krylov subspace methods, which are implemented using the fast multipole method (FMM) for solving scattering problems with mixed dielectric and conducting object. The flexible Krylov subspace methods refer to a class of methods that accept variable preconditioning. To obtain the maximum efficiency of the inner-outer methods, it is desirable to compute the inner iterations with the least possible effort. Hence, generally, inaccurate matrix-vector multiplication (MVM) is performed in the inner solver within a short computation time. This is realized by using a particular feature of the multipole techniques. The accuracy and computational cost of the FMM can be controlled by appropriately selecting the truncation number, which indicates the number of multipoles used to express far-field interactions. On the basis of the abovementioned fact, we construct a less-accurate but much cheaper version of the FMM by intentionally setting the truncation number to a sufficiently low value, and then use it for the computation of inaccurate MVM in the inner solver. However, there exists no definite rule for determining the suitable level of accuracy for the FMM within the inner solver. The main focus of this study is to clarify the relationship between the overall efficiency of the flexible inner-outer Krylov solver and the accuracy of the FMM within the inner solver. Numerical experiments reveal that there exits an optimal accuracy level for the FMM within the inner solver, and that a moderately accurate FMM operator serves as the optimal preconditioner.

  • How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers

    Daisuke SUZUKI  Minoru SAEKI  Koichi SHIMIZU  Tsutomu MATSUMOTO  

     
    PAPER-Implementation

      Vol:
    E94-A No:1
      Page(s):
    200-210

    In this paper we first demonstrate that effective selection functions in power analysis attacks change depending on circuit architectures of a block cipher. We then conclude that the most resistant architecture on its own, in the case of the loop architecture, has two data registers have separate roles: one for storing the plaintext and ciphertext, and the other for storing intermediate values. There, the pre-whitening operation is placed at the output of the former register. The architecture allows the narrowest range of selection functions and thereby has resistance against ordinary CPA. Thus, we can easily defend against attacks by ordinary CPA at the architectural level, whereas we cannot against DPA. Secondly, we propose a new technique called "self-templates" in order to raise the accuracy of evaluation of DPA-based attacks. Self-templates enable to differentiate meaningful selection functions for DPA-based attacks without any strong assumption as in the template attack. We also present the results of attacks to an AES co-processor on an ASIC and demonstrate the effectiveness of the proposed technique.

  • A Low-Cost Continuous-Flow Parallel Memory-Based FFT Processor for UWB Applications

    Chin-Long WEY  Shin-Yo LIN  Hsu-Sheng WANG  Hung-Lieh CHEN  Chun-Ming HUANG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:1
      Page(s):
    315-323

    In UWB systems, data symbols are transmitted and received continuously. The Fast Fourier Transform (FFT) processor must be able to seamlessly process input/output data. This paper presents the design and implementation of a continuous data flow parallel memory-based FFT (CF-PMBFFT) processor without the use of input buffer for pre-loading the input data. The processor realizes a memory space of two N-words and multiple processing elements (PEs) to achieve the seamless data flow and meet the design requirement. The circuit has been fabricated in TSMC 0.18 µm 1P6M CMOS process with the supply voltage of 1.8 V. Measurement results of the test chip shows that the developed CF-PMBFFT processor takes a core area of 1.97 mm2 with a power consumption of 62.12 mW for a throughput rate of 528 MS/s.

7721-7740hit(20498hit)