The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Cu(4258hit)

301-320hit(4258hit)

  • High-Speed-Operation of All-Silicon Lumped-Electrode Modulator Integrated with Passive Equalizer Open Access

    Yohei SOBU  Shinsuke TANAKA  Yu TANAKA  

     
    INVITED PAPER

      Pubricized:
    2020/05/15
      Vol:
    E103-C No:11
      Page(s):
    619-626

    Silicon photonics technology is a promising candidate for small form factor transceivers that can be used in data-center applications. This technology has a small footprint, a low fabrication cost, and good temperature immunity. However, its main challenge is due to the high baud rate operation for optical modulators with a low power consumption. This paper investigates an all-Silicon Mach-Zehnder modulator based on the lumped-electrode optical phase shifters. These phase shifters are driven by a complementary metal oxide semiconductor (CMOS) inverter driver to achieve a low power optical transmitter. This architecture improves the power efficiency because an electrical digital-to-analog converter (DAC) and a linear driver are not required. In addition, the current only flows at the time of data transition. For this purpose, we use a PIN-diode phase shifter. These phase shifters have a large capacitance so the driving voltage can be reduced while maintaining an optical phase shift. On the other hand, this study integrates a passive resistance-capacitance (RC) equalizer with a PIN-phase shifter to expand the electro-optic (EO) bandwidth of a modulator. Therefore, the modulation efficiency and the EO bandwidth can be optimized by designing the capacitor of the RC equalizer. This paper reviews the recent progress for the high-speed operation of an all-Si PIN-RC modulator. This study introduces a metal-insulator-metal (MIM) structure for a capacitor with a passive RC equalizer to obtain a wider EO bandwidth. As a result, this investigation achieves an EO bandwidth of 35.7-37 GHz and a 70 Gbaud NRZ operation is confirmed.

  • Strictly Non-Blocking Silicon Photonics Switches Open Access

    Keijiro SUZUKI  Ryotaro KONOIKE  Satoshi SUDA  Hiroyuki MATSUURA  Shu NAMIKI  Hitoshi KAWASHIMA  Kazuhiro IKEDA  

     
    INVITED PAPER

      Pubricized:
    2020/04/17
      Vol:
    E103-C No:11
      Page(s):
    627-634

    We review our research progress of multi-port optical switches based on the silicon photonics platform. Up to now, the maximum port-count is 32 input ports×32 output ports, in which transmissions of all paths were demonstrated. The switch topology is path-independent insertion-loss (PILOSS) which consists of an array of 2×2 element switches and intersections. The switch presented an average fiber-to-fiber insertion loss of 10.8 dB. Moreover, -20-dB crosstalk bandwidth of 14.2 nm was achieved with output-port-exchanged element switches, and an average polarization-dependent loss (PDL) of 3.2 dB was achieved with a non-duplicated polarization-diversity structure enabled by SiN overpass waveguides. In the 8×8 switch, we demonstrated wider than 100-nm bandwidth for less than -30-dB crosstalk with double Mach-Zehnder element switches, and less than 0.5 dB PDL with polarization diversity scheme which consisted of two switch matrices and fiber-type polarization beam splitters. Based on the switch performances described above, we discuss further improvement of switching performances.

  • Surface Mount Technology for Silica-Based Planar Lightwave Circuit and Its Application to Compact 16×16 Multicast Switch

    Ai YANAGIHARA  Keita YAMAGUCHI  Takashi GOH  Kenya SUZUKI  

     
    PAPER

      Pubricized:
    2020/06/05
      Vol:
    E103-C No:11
      Page(s):
    679-684

    We demonstrated a compact 16×16 multicast switch (MCS) made from a silica-based planar lightwave circuit (PLC). The switch utilizes a new electrical connection method based on surface mount technology (SMT). Five electrical connectors are soldered directly to the PLC by using the standard reflow process used for electrical devices. We reduced the chip size to half of one made with conventional wire bonding technology. We obtained satisfactory solder contacts and excellent switching properties. These results indicate that the proposed method is suitable for large-scale optical switches including MCSs, variable optical attenuators, dispersion compensators, and so on.

  • Generation of Checkered Pattern Images by Iterative Calculation Using Prewitt Filter with Expanded Window Size

    Toru HIRAOKA  

     
    LETTER-Computer Graphics

      Pubricized:
    2020/07/31
      Vol:
    E103-D No:11
      Page(s):
    2407-2410

    We propose a nonphotorealistic rendering method for generating checkered pattern images from photographic images. The proposed method is executed by iterative calculation using a Prewitt filter with an expanded window size and can automatically generate checkered patterns according to changes in edges and shade of photographic images. To verify the effectiveness of the proposed method, an experiment was conducted using various photographic images. An additional experiment was conducted to visually confirm the checkered pattern images generated by changing the iteration number, window size, and parameter to emphasize the checkered patterns.

  • Magneto-Optical Microring Switch Based on Amorphous Silicon-on-Garnet Platform for Photonic Integrated Circuits Open Access

    Toshiya MURAI  Yuya SHOJI  Nobuhiko NISHIYAMA  Tetsuya MIZUMOTO  

     
    INVITED PAPER

      Pubricized:
    2020/06/05
      Vol:
    E103-C No:11
      Page(s):
    645-652

    Magneto-optical (MO) switches operate with a dynamically applied magnetic field. The MO devices presented in this paper consist of microring resonators (MRRs) fabricated on amorphous silicon-on-garnet platform. Two types of MO switches with MRRs were developed. In the first type, the switching state is controlled by an external magnetic field component included in the device. By combination of MO and thermo-optic effects, wavelength tunable operation is possible without any additional heater, and broadband switching is achievable. The other type of switch is a self-holding optical switch integrated with an FeCoB thin-film magnet. The switching state is driven by the remanence of the integrated thin-film magnet, and the state is maintained without any power supply.

  • A Constant-Time Algorithm of CSIDH Keeping Two Points Open Access

    Hiroshi ONUKI  Yusuke AIKAWA  Tsutomu YAMAZAKI  Tsuyoshi TAKAGI  

     
    PAPER-cryptography

      Vol:
    E103-A No:10
      Page(s):
    1174-1182

    At ASIACRYPT 2018, Castryck, Lange, Martindale, Panny and Renes proposed CSIDH, which is a key-exchange protocol based on isogenies between elliptic curves, and a candidate for post-quantum cryptography. However, the implementation by Castryck et al. is not constant-time. Specifically, a part of the secret key could be recovered by the side-channel attacks. Recently, Meyer, Campos, and Reith proposed a constant-time implementation of CSIDH by introducing dummy isogenies and taking secret exponents only from intervals of non-negative integers. Their non-negative intervals make the calculation cost of their implementation of CSIDH twice that of the worst case of the standard (variable-time) implementation of CSIDH. In this paper, we propose a more efficient constant-time algorithm that takes secret exponents from intervals symmetric with respect to the zero. For using these intervals, we need to keep two torsion points on an elliptic curve and calculation for these points. We evaluate the costs of our implementation and that of Meyer et al. in terms of the number of operations on a finite prime field. Our evaluation shows that our constant-time implementation of CSIDH reduces the calculation cost by 28% compared with the implementation by Mayer et al. We also implemented our algorithm by extending the implementation in C of Meyer et al. (originally from Castryck et al.). Then our implementation achieved 152 million clock cycles, which is about 29% faster than that of Meyer et al. and confirms the above reduction ratio in our cost evaluation.

  • On Dimensionally Orthogonal Diagonal Hypercubes Open Access

    Xiao-Nan LU  Tomoko ADACHI  

     
    PAPER-combinatorics

      Vol:
    E103-A No:10
      Page(s):
    1211-1217

    In this paper, we propose a notion for high-dimensional generalizations of mutually orthogonal Latin squares (MOLS) and mutually orthogonal diagonal Latin squares (MODLS), called mutually dimensionally orthogonal d-cubes (MOC) and mutually dimensionally orthogonal diagonal d-cubes (MODC). Systematic constructions for MOC and MODC by using polynomials over finite fields are investigated. In particular, for 3-dimensional cubes, the results for the maximum possible number of MODC are improved by adopting the proposed construction.

  • Rapid Single-Flux-Quantum NOR Logic Gate Realized through the Use of Toggle Storage Loop

    Yoshinao MIZUGAKI  Koki YAMAZAKI  Hiroshi SHIMADA  

     
    BRIEF PAPER-Superconducting Electronics

      Pubricized:
    2020/04/13
      Vol:
    E103-C No:10
      Page(s):
    547-549

    Recently, we demonstrated a rapid-single-flux-quantum NOT gate comprising a toggle storage loop. In this paper, we present our design and operation of a NOR gate that is a straightforward extension of the NOT gate by attaching a confluence buffer. Parameter margins wider than ±28% were confirmed in simulation. Functional tests using Nb integrated circuits demonstrated correct NOR operation with a bias margin of ±21%.

  • Maximum Positioning Error Estimation Method for Detecting User Positions with Unmanned Aerial Vehicle based on Doppler Shifts Open Access

    Hiroyasu ISHIKAWA  Yuki HORIKAWA  Hideyuki SHINONAGA  

     
    PAPER

      Pubricized:
    2020/05/08
      Vol:
    E103-B No:10
      Page(s):
    1069-1077

    In the typical unmanned aircraft system (UAS), several unmanned aerial vehicles (UAVs) traveling at a velocity of 40-100km/h and with altitudes of 150-1,000m will be used to cover a wide service area. Therefore, Doppler shifts occur in the carrier frequencies of the transmitted and received signals due to changes in the line-of-sight velocity between the UAVs and the terrestrial terminal. By observing multiple Doppler shift values for different UAVs or observing a single UAV at different local times, it is possible to detect the user position on the ground. We conducted computer simulations for evaluating user position detection accuracy and Doppler shift distribution in several flight models. Further, a positioning accuracy index (PAI), which can be used as an index for position detection accuracy, was proposed as the absolute value of cosine of the inner product between two gradient vectors formed by Doppler shifts to evaluate the relationship between the location of UAVs and the position of the user. In this study, a maximum positioning error estimation method related to the PAI is proposed to approximate the position detection accuracy. Further, computer simulations assuming a single UAV flying on the curved routes such as sinusoidal routes with different cycles are conducted to clarify the effectiveness of the flight route in the aspects of positioning accuracy and latency by comparing with the conventional straight line fight model using the PAI and the proposed maximum positioning error estimation method.

  • An Approach to Identify Circulating Tumor Cell Using Ring Resonator Type of Electrode Using Oscillation Technique at Centimeter Frequency Bands Open Access

    Futoshi KUROKI  Shouta SORA  Kousei KUMAHARA  

     
    INVITED PAPER-Microwaves, Millimeter-Waves

      Pubricized:
    2020/04/09
      Vol:
    E103-C No:10
      Page(s):
    411-416

    A ring-resonator type of electrode (RRTE) has been proposed to detect the circulating tumor cell (CTC) for evaluation of the current cancer progression and malignancy in clinical applications. Main emphasis is placed on the identification sensitivity for the lossy materials that can be found in biomedical fields. At first, the possibility of the CTC detection was numerically considered to calculate the resonant frequency of the RRTE catching the CTC, and it was evident that the RRTE with the cell has the resonant frequency inherent in the cell featured by its complex permittivity. To confirm the numerical consideration, the BaTiO3 particle, whose size was similar to that of the CTC, was inserted in the RRTE instead of the CTC as a preliminary experiment. Next, the resonant frequencies of the RRTE with internal organs of the beef cattle such as liver, lung, and kidney were measured for evaluation of the lossy materials such as the CTC, and degraded Q curves were observed because the Q-factors inherent in the internal organs were usually low due to the poor loss tangents. To overcome such difficulty, the RRTE, the oscillator circuit consisting of the FET being added, was proposed to improve the identification sensitivity. Comparing the identification sensitivity of the conventional RRTE, it has been improved because the oscillation frequency spectrum inherent in an internal organ could be easily observed thanks to the oscillation condition with negative resistance. Thus, the validity of the proposed technique has been confirmed.

  • A Visual Inspection System for Accurate Positioning of Railway Fastener

    Jianwei LIU  Hongli LIU  Xuefeng NI  Ziji MA  Chao WANG  Xun SHAO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2020/07/17
      Vol:
    E103-D No:10
      Page(s):
    2208-2215

    Automatic disassembly of railway fasteners is of great significance for improving the efficiency of replacing rails. The accurate positioning of fastener is the key factor to realize automatic disassembling. However, most of the existing literature mainly focuses on fastener region positioning and the literature on accurate positioning of fasteners is scarce. Therefore, this paper constructed a visual inspection system for accurate positioning of fastener (VISP). At first, VISP acquires railway image by image acquisition subsystem, and then the subimage of fastener can be obtained by coarse-to-fine method. Subsequently, the accurate positioning of fasteners can be completed by three steps, including contrast enhancement, binarization and spike region extraction. The validity and robustness of the VISP were verified by vast experiments. The results show that VISP has competitive performance for accurate positioning of fasteners. The single positioning time is about 260ms, and the average positioning accuracy is above 90%. Thus, it is with theoretical interest and potential industrial application.

  • Recent Advances in Practical Secure Multi-Party Computation Open Access

    Satsuya OHATA  

     
    INVITED PAPER-cryptography

      Vol:
    E103-A No:10
      Page(s):
    1134-1141

    Secure multi-party computation (MPC) allows a set of parties to compute a function jointly while keeping their inputs private. MPC has been actively studied, and there are many research results both in the theoretical and practical research fields. In this paper, we introduce the basic matters on MPC and show recent practical advances. We first explain the settings, security notions, and cryptographic building blocks of MPC. Then, we show and discuss current situations on higher-level secure protocols, privacy-preserving data analysis, and frameworks/compilers for implementing MPC applications with low-cost.

  • Password-Based Authenticated Key Exchange without Centralized Trusted Setup

    Kazuki YONEYAMA  

     
    PAPER-cryptography

      Vol:
    E103-A No:10
      Page(s):
    1142-1156

    Almost all existing password-based authenticated key exchange (PAKE) schemes achieve concurrent security in the standard model by relying on the common reference string (CRS) model. A drawback of the CRS model is to require a centralized trusted authority in the setup phase; thus, passwords of parties may be revealed if the authority ill-uses trapdoor information of the CRS. There are a few secure PAKE schemes in the plain model, but, these are not achievable in a constant round (i.e., containing a linear number of rounds). In this paper, we discuss how to relax the setup assumption for (constant round) PAKE schemes. We focus on the multi-string (MS) model that allows a number of authorities (including malicious one) to provide some reference strings independently. The MS model is a more relaxed setup assumption than the CRS model because we do not trust any single authority (i.e., just assuming that a majority of authorities honestly generate their reference strings). Though the MS model is slightly restrictive than the plain model, it is very reasonable assumption because it is very easy to implement. We construct a (concurrently secure) three-move PAKE scheme in the MS model (justly without random oracles) based on the Groce-Katz PAKE scheme. The main ingredient of our scheme is the multi-string simulation-extractable non-interactive zero-knowledge proof that provides both the simulation-extractability and the extraction zero-knowledge property even if minority authorities are malicious. This work can be seen as a milestone toward constant round PAKE schemes in the plain model.

  • Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso

    Chansu HAN  Jumpei SHIMAMURA  Takeshi TAKAHASHI  Daisuke INOUE  Jun'ichi TAKEUCHI  Koji NAKAO  

     
    PAPER-Information Network

      Pubricized:
    2020/06/25
      Vol:
    E103-D No:10
      Page(s):
    2113-2124

    With the rapid evolution and increase of cyberthreats in recent years, it is necessary to detect and understand it promptly and precisely to reduce the impact of cyberthreats. A darknet, which is an unused IP address space, has a high signal-to-noise ratio, so it is easier to understand the global tendency of malicious traffic in cyberspace than other observation networks. In this paper, we aim to capture global cyberthreats in real time. Since multiple hosts infected with similar malware tend to perform similar behavior, we propose a system that estimates a degree of synchronizations from the patterns of packet transmission time among the source hosts observed in unit time of the darknet and detects anomalies in real time. In our evaluation, we perform our proof-of-concept implementation of the proposed engine to demonstrate its feasibility and effectiveness, and we detect cyberthreats with an accuracy of 97.14%. This work is the first practical trial that detects cyberthreats from in-the-wild darknet traffic regardless of new types and variants in real time, and it quantitatively evaluates the result.

  • CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions

    Toi TOMITA  Wakaha OGATA  Kaoru KUROSAWA  Ryo KUWAYAMA  

     
    PAPER-cryptography

      Vol:
    E103-A No:10
      Page(s):
    1157-1166

    In this paper, we propose a new leakage-resilient identity-based encryption (IBE) scheme that is secure against chosen-ciphertext attacks (CCA) in the bounded memory leakage model. The security of our scheme is based on the external k-Linear assumption. It is the first CCA-secure leakage-resilient IBE scheme which does not depend on q-type assumptions. The leakage rate 1/10 is achieved under the XDLIN assumption (k=2).

  • Improving Pointing Direction Estimation by Considering Hand- and Ocular-Dominance

    Tomohiro MASHITA  Koichi SHINTANI  Kiyoshi KIYOKAWA  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2020/07/20
      Vol:
    E103-D No:10
      Page(s):
    2168-2177

    This paper introduces a user study regarding the effects of hand- and ocular-dominances to pointing gestures. The result of this study is applicable for designing new gesture interfaces which are close to a user's cognition, intuitive, and easy to use. The user study investigates the relationship between the participant's dominances and pointing gestures. Four participant groups—right-handed right-eye dominant, right-handed left-eye dominant, left-handed right-eye dominant and left-handed left-eye dominant—were prepared, and participants were asked to point at the targets on a screen by their left and right hands. The pointing errors among the different participant groups are calculated and compared. The result of this user study shows that using dominant eyes produces better results than using non-dominant eyes and the accuracy increases when the targets are located at the same side of dominant eye. Based on these interesting properties, a method to find the dominant eye for pointing gestures is proposed. This method can find the dominant eye of an individual with more than 90% accuracy.

  • Ultra-Low Quiescent Current LDO with FVF-Based Load Transient Enhanced Circuit Open Access

    Kenji MII  Akihito NAGAHAMA  Hirobumi WATANABE  

     
    PAPER-Electronic Circuits

      Pubricized:
    2020/05/28
      Vol:
    E103-C No:10
      Page(s):
    466-471

    This paper proposes an ultra-low quiescent current low-dropout regulator (LDO) with a flipped voltage follower (FVF)-based load transient enhanced circuit for wireless sensor network (WSN). Some characteristics of an FVF are low output impedance, low voltage operation, and simple circuit configuration [1]. In this paper, we focus on the characteristics of low output impedance and low quiescent current. A load transient enhanced circuit based on an FVF circuit configuration for an LDO was designed in this study. The proposed LDO, including the new circuit, was fabricated in a 0.6 µm CMOS process. The designed LDO achieved an undershoot of 75 mV under experimental conditions of a large load transient of 100 µA to 10 mA and a current slew rate (SR) of 1 µs. The quiescent current consumed by the LDO at no load operation was 204 nA.

  • Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems

    Takayuki NAKACHI  Hitoshi KIYA  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2020/06/22
      Vol:
    E103-D No:9
      Page(s):
    1988-1997

    In this paper, we propose a secure computation of sparse coding and its application to Encryption-then-Compression (EtC) systems. The proposed scheme introduces secure sparse coding that allows computation of an Orthogonal Matching Pursuit (OMP) algorithm in an encrypted domain. We prove theoretically that the proposed method estimates exactly the same sparse representations that the OMP algorithm for non-encrypted computation does. This means that there is no degradation of the sparse representation performance. Furthermore, the proposed method can control the sparsity without decoding the encrypted signals. Next, we propose an EtC system based on the secure sparse coding. The proposed secure EtC system can protect the private information of the original image contents while performing image compression. It provides the same rate-distortion performance as that of sparse coding without encryption, as demonstrated on both synthetic data and natural images.

  • Improved Neighborhood Based Switching Filter for Protecting the Thin Curves in Arbitrary Direction in Color Images

    ChangCheng WU  Min WANG  JunJie WANG  WeiMing LUO  JiaFeng HUA  XiTao CHEN  Wei GENG  Yu LU  Wei SUN  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2020/06/03
      Vol:
    E103-D No:9
      Page(s):
    1939-1948

    Although the classical vector median filter (VMF) has been widely used to suppress the impulse noise in the color image, many thin color curve pixels aligned in arbitrary directions are usually removed out as impulse noise. This serious problem can be solved by the proposed method that can protect the thin curves in arbitrary direction in color image and remove out the impulse noise at the same time. Firstly, samples in the 3x3 filter window are considered to preliminarily detect whether the center pixel is corrupted by impulse noise or not. Then, samples outside a 5x5 filter window are conditionally and partly considered to accurately distinguish the impulse noise and the noise-free pixel. At last, based on the previous outputs, samples on the processed positions in a 3x3 filter window are chosen as the samples of VMF operation to suppress the impulse noise. Extensive experimental results indicate that the proposed algorithm can be used to remove the impulse noise of color image while protecting the thin curves in arbitrary directions.

  • A Field Equivalence between Physical Optics and GO-Based Equivalent Current Methods for Scattering from Circular Conducting Cylinders

    Ngoc Quang TA  Hiroshi SHIRAI  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2020/04/08
      Vol:
    E103-C No:9
      Page(s):
    382-387

    Plane wave scattering from a circular conducting cylinder and a circular conducting strip has been formulated by equivalent surface currents which are postulated from the scattering geometrical optics (GO) field. Thus derived radiation far fields are found to be the same as those formulated by a conventional physical optics (PO) approximation for both E and H polarizations.

301-320hit(4258hit)