The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

3521-3540hit(8214hit)

  • Probabilistic BPRRC: Robust Change Detection against Illumination Changes and Background Movements

    Kentaro YOKOI  

     
    PAPER

      Vol:
    E93-D No:7
      Page(s):
    1700-1707

    This paper presents Probabilistic Bi-polar Radial Reach Correlation (PrBPRRC), a change detection method that is robust against illumination changes and background movements. Most of the traditional change detection methods are robust against either illumination changes or background movements; BPRRC is one of the illumination-robust change detection methods. We introduce a probabilistic background texture model into BPRRC and add the robustness against background movements including foreground invasions such as moving cars, walking people, swaying trees, and falling snow. We show the superiority of PrBPRRC in the environment with illumination changes and background movements by using three public datasets and one private dataset: ATON Highway data, Karlsruhe traffic sequence data, PETS 2007 data, and Walking-in-a-room data.

  • Construction of Multi-Dimensional Periodic Complementary Array Sets

    Fanxin ZENG  Zhenyu ZHANG  

     
    LETTER-Information Theory

      Vol:
    E93-A No:7
      Page(s):
    1392-1395

    Multi-dimensional (MD) periodic complementary array sets (CASs) with impulse-like MD periodic autocorrelation function are naturally generalized to (one dimensional) periodic complementary sequence sets, and such array sets are widely applied to communication, radar, sonar, coded aperture imaging, and so forth. In this letter, based on multi-dimensional perfect arrays (MD PAs), a method for constructing MD periodic CASs is presented, which is carried out by sampling MD PAs. It is particularly worth mentioning that the numbers and sizes of sub-arrays in the proposed MD periodic CASs can be freely changed within the range of possibilities. In particular, for arbitrarily given positive integers M and L, two-dimensional periodic polyphase CASs with the number M2 and size L L of sub-arrays can be produced by the proposed method. And analogously, pseudo-random MD periodic CASs can be given when pseudo-random MD arrays are sampled. Finally, the proposed method's validity is made sure by a given example.

  • Influence of Adjacent Metal Cover Planes on EMC Filter Structures

    Thomas FISCHER  Goeran SCHUBERT  Manfred ALBACH  

     
    PAPER-PCB and Circuit Design for EMI Control

      Vol:
    E93-B No:7
      Page(s):
    1768-1775

    This paper deals with the influence of metal cover planes close to SMD filter structures. The low-pass structures are used for EMC purpose and work in a frequency range of 100 kHz to 4 GHz. It will be shown by both measurement and simulation that a close cover plane changes the filter behavior significantly in dependency of the filter component used. For low and high impedance filter structures different influences are obtained; a parameter study was carried out in order to derive design rules.

  • Robust Detection of Underwater Transient Signals Using EVRC Noise Suppression Module

    Taehwan KIM  Keunsung BAE  

     
    LETTER-Engineering Acoustics

      Vol:
    E93-A No:7
      Page(s):
    1371-1374

    Detection of transient signals is generally done by examining power and spectral variation of the received signal, but it becomes a difficult task when the background noise gets large. In this paper, we propose a robust transient detection algorithm using the EVRC noise suppression module. We define new parameters from the outputs of the EVRC noise suppression module for transient detection. Experimental results with various types of underwater transients have shown that the proposed method outperforms the conventional energy-based method and achieved performance improvement of detection rate by 7% to 15% for various types of background noise.

  • Visualization of Intersecting Groups Based on Hypergraphs

    Rodrigo SANTAMARIA  Roberto THERON  

     
    PAPER-Computer Graphics

      Vol:
    E93-D No:7
      Page(s):
    1957-1964

    Hypergraphs drawn in the subset standard are useful to represent group relationships using topographic characteristics such as intersection, exclusion and enclosing. However, they present cluttering when dealing with a moderately high number of nodes (more than 20) and large hyperedges (connecting more than 10 nodes, with three or more overlapping nodes). At this complexity level, a study of the visual encoding of hypergraphs is required in order to reduce cluttering and increase the understanding of larger sets. Here we present a graph model and a visual design that help in the visualization of group relationships represented by hypergraphs. This is done by the use of superimposed visualization layers with different abstraction levels and the help of interaction and navigation through the display.

  • An Evaluation Method for Anisotropic Absorber Panels Using a Diagonalization Method

    Shinichiro YAMAMOTO  Tohru IWAI  Kenichi HATAKEYAMA  

     
    LETTER

      Vol:
    E93-B No:7
      Page(s):
    1851-1854

    In this paper, an evaluation method for electromagnetic wave absorber with anisotropic reflection properties is discussed. Anisotropic absorber panels have an axis of anisotropy (principal axis). In order to specify the principal axis, the evaluation method based on the diagonalization of reflection coefficient matrix is used. Also, the permittivity of absorber materials is considered.

  • Singular Candidate Method: Improvement of Extended Relational Graph Method for Reliable Detection of Fingerprint Singularity

    Tomohiko OHTSUKA  Daisuke WATANABE  

     
    PAPER

      Vol:
    E93-D No:7
      Page(s):
    1788-1797

    The singular points of fingerprints, viz. core and delta, are important referential points for the classification of fingerprints. Several conventional approaches such as the Poincare index method have been proposed; however, these approaches are not reliable with poor-quality fingerprints. This paper proposes a new core and delta detection employing singular candidate analysis and an extended relational graph. Singular candidate analysis allows the use both the local and global features of ridge direction patterns and realizes high tolerance to local image noise; this involves the extraction of locations where there is high probability of the existence of a singular point. Experimental results using the fingerprint image databases FVC2000 and FVC2002, which include several poor-quality images, show that the success rate of the proposed approach is 10% higher than that of the Poincare index method for singularity detection, although the average computation time is 15%-30% greater.

  • A Novel Design Approach for Contourlet Filter Banks

    Guoan YANG  Huub VAN DE WETERING  Ming HOU  Chihiro IKUTA  Yuehu LIU  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E93-D No:7
      Page(s):
    2009-2011

    This letter proposes a novel design approach for optimal contourlet filter banks based on the parametric 9/7 filter family. The Laplacian pyramid decomposition is replaced by optimal 9/7 filter banks with rational coefficients, and directional filter banks are activated using a pkva 12 filter in the contourlets. Moreover, based on this optimal 9/7 filter, we present an image denoising approach using a contourlet domain hidden Markov tree model. Finally, experimental results show that our approach in denoising images with texture detail is only 0.20 dB less compared to the method of Po and Do, and the visual quality is as good as for their method. Compared with the method of Po and Do, our approach has lower computational complexity and is more suitable for VLSI hardware implementation.

  • DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks

    Gicheol WANG  Kang-Suk SONG  Gihwan CHO  

     
    PAPER-Information Network

      Vol:
    E93-D No:6
      Page(s):
    1560-1571

    In modern sensor networks, key management is essential to transmit data from sensors to the sink securely. That is, sensors are likely to be compromised by attackers, and a key management scheme should renew the keys for communication as frequently as possible. In clustered sensor networks, CHs (Cluster Heads) tend to become targets of compromise attack because they collect data from sensors and deliver the aggregated data to the sink. However, existing key renewal schemes do not change the CH role nodes, and thus they are vulnerable to the compromise of CHs. Our scheme is called DIRECT (DynamIc key REnewal using Cluster head elecTion) because it materializes the dynamic key renewals through secure CH elections. In the scheme, the network is divided into sectors to separate CH elections in each sector from other sectors. Then, sensors establish pairwise keys with other sensors in their sector for intra-sector communication. Every CH election round, all sensors securely elect a CH in their sector by defeating the malicious actions of attackers. Therefore, the probability that a compromised node is elected as a CH decreases significantly. The simulation results show that our approach significantly improves the integrity of data, energy efficiency, and network longevity.

  • Spectral Methods for Thesaurus Construction

    Nobuyuki SHIMIZU  Masashi SUGIYAMA  Hiroshi NAKAGAWA  

     
    PAPER-Natural Language Processing

      Vol:
    E93-D No:6
      Page(s):
    1378-1385

    Traditionally, popular synonym acquisition methods are based on the distributional hypothesis, and a metric such as Jaccard coefficients is used to evaluate the similarity between the contexts of words to obtain synonyms for a query. On the other hand, when one tries to compile and clean a thesaurus, one often already has a modest number of synonym relations at hand. Could something be done with a half-built thesaurus alone? We propose the use of spectral methods and discuss their relation to other network-based algorithms in natural language processing (NLP), such as PageRank and Bootstrapping. Since compiling a thesaurus is very laborious, we believe that adding the proposed method to the toolkit of thesaurus constructors would significantly ease the pain in accomplishing this task.

  • Efficient Provider Authentication for Bidirectional Broadcasting Service

    Go OHTAKE  Goichiro HANAOKA  Kazuto OGAWA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:6
      Page(s):
    1039-1051

    Provider authentication is necessary in bidirectional broadcasting services, and a digital signature scheme is often used to prevent an adversary from attempting impersonation. The cost of secure signing key management is extremely high. In addition, the key has to be updated very often, since it is frequently used. The result is that the verification key also has to be updated very often, and its redistribution cost is huge. These costs are real and substantive problems, especially when the number of users is large. In this paper, we propose a system that dramatically reduces these costs. In the system, the signing key is updated, but the corresponding verification key does not have to be updated. This means that the signing key can be updated without any cost for redistributing the verification key and that the system is secure against the threat of signing key leakage, since the key can be frequently updated. Moreover, we propose a new key management method that divides a conventional key management server's role into two. The use of a key-insulated signature (KIS) scheme enables low-cost and more secure key management with two servers. Finally, to make a bidirectional broadcasting service more secure even if the signing key is leaked, we developed a new strong KIS scheme. We performed an experiment that assessed the cost of our strong KIS scheme and found that it is sufficiently low. Accordingly, a provider authentication system employing this scheme would be more efficient and would have lower key redistribution and network costs in comparison with conventional authentication systems.

  • A Pattern Partitioning Algorithm for Memory-Efficient Parallel String Matching in Deep Packet Inspection

    HyunJin KIM  Hyejeong HONG  Dongmyoung BAEK  Sungho KANG  

     
    LETTER-Network Management/Operation

      Vol:
    E93-B No:6
      Page(s):
    1612-1614

    This paper proposes a pattern partitioning algorithm that maps multiple target patterns onto homogeneous memory-based string matchers. The proposed algorithm adopts the greedy search based on lexicographical sorting. By mapping as many target patterns as possible onto each string matcher, the memory requirements are greatly reduced.

  • An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions

    SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:6
      Page(s):
    1086-1101

    Secure channels can be realized by an authenticated key exchange (AKE) protocol that generates authenticated session keys between the involving parties. In, Shin et al., proposed a new kind of AKE (RSA-AKE) protocol whose goal is to provide high efficiency and security against leakage of stored secrets as much as possible. Let us consider more powerful attacks where an adversary completely controls the communications and the stored secrets (the latter is denoted by "replacement" attacks). In this paper, we first show that the RSA-AKE protocol is no longer secure against such an adversary. The main contributions of this paper are as follows: (1) we propose an RSA-based leakage-resilient AKE (RSA-AKE2) protocol that is secure against active attacks as well as replacement attacks; (2) we prove that the RSA-AKE2 protocol is secure against replacement attacks based on the number theory results; (3) we show that it is provably secure in the random oracle model, by showing the reduction to the RSA one-wayness, under an extended model that covers active attacks and replacement attacks; (4) in terms of efficiency, the RSA-AKE2 protocol is comparable to in the sense that the client needs to compute only one modular multiplication with pre-computation; and (5) we also discuss about extensions of the RSA-AKE2 protocol for several security properties (i.e., synchronization of stored secrets, privacy of client and solution to server compromise-impersonation attacks).

  • A 1-GHz Tuning Range DCO with a 3.9 kHz Discrete Tuning Step for UWB Frequency Synthesizer

    Chul NAM  Joon-Sung PARK  Young-Gun PU  Kang-Yoon LEE  

     
    PAPER

      Vol:
    E93-C No:6
      Page(s):
    770-776

    This paper presents a wide range DCO with fine discrete tuning steps using a ΣΔ modulation technique for UWB frequency synthesizer. The proposed discrete tuning scheme provides a low effective frequency resolution without any degradation of the phase noise performance. With its three step discrete tunings, the DCO simultaneously has a wide tuning range and fine tuning steps. The frequency synthesizer was implemented using 0.13 µm CMOS technology. The tuning range of the DCO is 5.8-6.8 GHz with an effective frequency resolution of 3.9 kHz. It achieves a measured phase noise of -108 dBc/Hz at 1 MHz offset and a tuning range of 16.8% with the power consumption of 5.9 mW. The figure of merit with the tuning range is -181.5 dBc/Hz.

  • A New CCM (Carbon Composite Matrix) Material with Improved Shielding Effectiveness for X-Band Application

    Yeong-Chul CHUNG  Kyung-Won LEE  Ic-Pyo HONG  Kyung-Hyun OH  Jong-Gwan YOOK  

     
    LETTER-Electromagnetic Theory

      Vol:
    E93-C No:6
      Page(s):
    929-931

    In this letter, a new CCM material, adding Ni powder to a conventional CCM, for X-band applications is designed and analyzed to improve the SE. To obtain the SE of the fabricated CCM accurately, material constants of the CCM of the permittivity and permeability were extracted using transmission/reflection measurements. Using the material constants derived from the measurement, the SE was calculated and the results were verified using a commercial full-wave three-dimensional electromagnetic wave simulator. The SE of the proposed the CCM was improved by approximately 4 dB in the X band compared to that of a conventional CCM. The CCM proposed in this paper can be applied as a shielding material as well as for housing of various communication systems and electrical instruments.

  • Non-reference Objective Quality Evaluation for Noise-Reduced Speech Using Overall Quality Estimation Model

    Takeshi YAMADA  Yuki KASUYA  Yuki SHINOHARA  Nobuhiko KITAWAKI  

     
    PAPER

      Vol:
    E93-B No:6
      Page(s):
    1367-1372

    This paper describes non-reference objective quality evaluation for noise-reduced speech. First, a subjective test is conducted in accordance with ITU-T Rec. P.835 to obtain the speech quality, the noise quality, and the overall quality of noise-reduced speech. Based on the results, we then propose an overall quality estimation model. The unique point of the proposed model is that the estimation of the overall quality is done only using the previously estimated speech quality and noise quality, in contrast to conventional models, which utilize the acoustical features extracted. Finally, we propose a non-reference objective quality evaluation method using the proposed model. The results of an experiment with different noise reduction algorithms and noise types confirmed that the proposed method gives more accurate estimates of the overall quality compared with the method described in ITU-T Rec. P.563.

  • Key Generation for Fast Inversion of the Paillier Encryption Function

    Takato HIRANO  Keisuke TANAKA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:6
      Page(s):
    1111-1121

    We study fast inversion of the Paillier encryption function. Especially, we focus only on key generation, and do not modify the Paillier encryption function. We propose three key generation algorithms based on the speeding-up techniques for the RSA encryption function. By using our algorithms, the size of the private CRT exponent is half of that of Paillier-CRT. The first algorithm employs the extended Euclidean algorithm. The second algorithm employs factoring algorithms, and can construct the private CRT exponent with low Hamming weight. The third algorithm is a variant of the second one, and has some advantage such as compression of the private CRT exponent and no requirement for factoring algorithms. We also propose the settings of the parameters for these algorithms and analyze the security of the Paillier encryption function by these algorithms against known attacks. Finally, we give experimental results of our algorithms.

  • A 1.76 mW, 100 Mbps Impulse Radio UWB Receiver with Multiple Sampling Correlators Eliminating Need for Phase Synchronization in 65-nm CMOS

    Lechang LIU  Zhiwei ZHOU  Takayasu SAKURAI  Makoto TAKAMIYA  

     
    PAPER

      Vol:
    E93-C No:6
      Page(s):
    796-802

    A low power impulse radio ultra-wideband (IR-UWB) receiver for DC-960 MHz band is proposed in this paper. The proposed receiver employs multiple DC power-free charge-domain sampling correlators to eliminate the need for phase synchronization. To alleviate BER degradation due to an increased charge injection in a subtraction operation in the sampling correlator than that of an addition operation, a comparator with variable threshold (=offset) voltage is used, which enables an addition-only operation. The developed receiver fabricated in 1.2 V 65 nm CMOS achieves the lowest energy consumption of 17.6 pJ/bit at 100 Mbps in state-of-the-art correlation-based UWB receivers.

  • Improvement on Diversity Gain with Filter Bandwidth Enlargement in Fractional Sampling OFDM Receiver

    Toshiya SHINKAI  Haruki NISHIMURA  Yukitoshi SANADA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1526-1533

    A diversity scheme with Fractional Sampling (FS) in an OFDM receiver has been investigated recently. Through FS, it is possible to separate multipath components and obtain diversity gain in OFDM systems. Enlargement of the bandwidth of the total frequency response between transmit and receive baseband filters allows the FS scheme to achieve path diversity. However, the transmit filter has to be designed according to the spectrum mask of the wireless standards such as IEEE802.11a/g to avoid interference to the other communication systems and the frequency response of the composite channel including the transmit and receive filters has often been set to minimal bandwidth to eliminate adjacent channel signals. In order to achieve the maximum signal-to-noise ratio (SNR), the same filter is commonly used in the transmitter and the receiver. In this paper, the trade-off among the SNR deterioration, adjacent channel interference, and the diversity gain due to the enlargement of the bandwidth of the receive filter is investigated. Numerical results from computer simulations indicate that the BER performance with wider bandwidth in the receiver shows better performance than that with the minimal bandwidth for maximizing the SNR in certain conditions.

  • Numerical Analyses for Contact Resistance due to Constriction Effect of Current Flowing through Multi-Spot Construction

    Shigeru SAWADA  Terutaka TAMAI  Yasuhiro HATTORI  Kazuo IIDA  

     
    PAPER-Electromechanical Devices and Components

      Vol:
    E93-C No:6
      Page(s):
    905-911

    Constriction resistance is calculated by numerical analysis using Laplace's equations for electric potential of steady state in many cases of contact spot dispersion-status. The results show that contact resistance does not increase beyond 1.5 times even if the total real contact area is about 15% of the apparent contact area. When real contact area is at least about 60% of the apparent contact area, the contact resistance is approximately the same as the constriction resistance acquired from the apparent contact area. When the real contact area is about 50% of the apparent contact area, the contact resistance is approximately constant without regard to the contact shape and contact-point dispersion layout. Therefore, it is proved that contact resistance can be practically calculated using apparent contact area instead of real contact area when there are many contact points caused by metal to metal contact.

3521-3540hit(8214hit)