The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PLA(1376hit)

341-360hit(1376hit)

  • Key De-Synchronization Attack against Yüksel-Nielson's Key Distribution Protocol for ZigBee Wireless Sensor Networks

    Chang-Seop PARK  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:3
      Page(s):
    877-880

    Security plays an important role in several ZigBee applications such as Smart Energy and medical sensor applications. For a secure communication among ZigBee devices, a secret key should be shared among any two ZigBee devices using the Key Distribution protocol. Recently, Yüksel and Nielson proposed a new Key Distribution protocol for ZigBee addressing the security weaknesses of the original ZigBee Key Distribution protocol. In this letter, it is shown that their protocol is not secure against a key de-synchronization attack, and a security-enhanced Key Distribution protocol is newly proposed and analyzed in terms of security.

  • Convex Grid Drawings of Plane Graphs with Pentagonal Contours

    Kazuyuki MIURA  

     
    PAPER-Graph Algorithms

      Vol:
    E97-D No:3
      Page(s):
    413-420

    In a convex drawing of a plane graph, all edges are drawn as straight-line segments without any edge-intersection and all facial cycles are drawn as convex polygons. In a convex grid drawing, all vertices are put on grid points. A plane graph G has a convex drawing if and only if G is internally triconnected, and an internally triconnected plane graph G has a convex grid drawing on an (n-1)×(n-1) grid if either G is triconnected or the triconnected component decomposition tree T(G) of G has two or three leaves, where n is the number of vertices in G. An internally triconnected plane graph G has a convex grid drawing on a 2n×2n grid if T(G) has exactly four leaves. In this paper, we show that an internally triconnected plane graph G has a convex grid drawing on a 6n×n2 grid if T(G) has exactly five leaves. We also present an algorithm to find such a drawing in linear time. This is the first algorithm that finds a convex grid drawing of such a plane graph G in a grid of polynomial size.

  • Nb 9-Layer Fabrication Process for Superconducting Large-Scale SFQ Circuits and Its Process Evaluation Open Access

    Shuichi NAGASAWA  Kenji HINODE  Tetsuro SATOH  Mutsuo HIDAKA  Hiroyuki AKAIKE  Akira FUJIMAKI  Nobuyuki YOSHIKAWA  Kazuyoshi TAKAGI  Naofumi TAKAGI  

     
    INVITED PAPER

      Vol:
    E97-C No:3
      Page(s):
    132-140

    We describe the recent progress on a Nb nine-layer fabrication process for large-scale single flux quantum (SFQ) circuits. A device fabricated in this process is composed of an active layer including Josephson junctions (JJ) at the top, passive transmission line (PTL) layers in the middle, and a DC power layer at the bottom. We describe the process conditions and the fabrication equipment. We use both diagnostic chips and shift register (SR) chips to improve the fabrication process. The diagnostic chip was designed to evaluate the characteristics of basic elements such as junctions, contacts, resisters, and wiring, in addition to their defect evaluations. The SR chip was designed to evaluate defects depending on the size of the SFQ circuits. The results of a long-term evaluation of the diagnostic and SR chips showed that there was fairly good correlation between the defects of the diagnostic chips and yields of the SRs. We could obtain a yield of 100% for SRs including 70,000JJs. These results show that considerable progress has been made in reducing the number of defects and improving reliability.

  • Performance Evaluation on RSSI-Based Wireless Capsule Endoscope Location Tracking with Particle Filter

    Takahiro ITO  Daisuke ANZAI  Jianqing WANG  

     
    PAPER

      Vol:
    E97-B No:3
      Page(s):
    579-586

    Tracking capsule endoscope location is one of the promising applications offered by implant body area networks (BANs). When tracking the capsule endoscope location, i.e., continuously localize it, it is effective to take the weighted sum of its past locations to its present location, in other words, to low-pass filter its past locations. Furthermore, creating an exact mathematical model of location transition will improve tracking performance. Therefore, in this paper, we investigate two tracking methods with received signal strength indicator (RSSI)-based localization in order to solve the capsule endoscope location tracking problem. One of the two tracking methods is finite impulse response (FIR) filter-based tracking, which tracks the capsule endoscope location by averaging its past locations. The other one is particle filter-based tracking in order to deal with a nonlinear transition model on the capsule endoscope. However, the particle filter requires that the particle weight is calculated according to its condition (namely, its likelihood value), while the transition model on capsule endoscope location has some model parameters which cannot be estimated from the received wireless signal. Therefore, for the purpose of applying the particle filter to capsule endoscope tracking, this paper makes some modifications in the resampling step of the particle filter algorithm. Our computer simulation results demonstrate that the two tracking methods can improve the performance as compared with the conventional maximum likelihood (ML) localization. Furthermore, we confirm that the particle filter-based tracking outperforms the conventional FIR filter-based tracking by taking the realistic capsule endoscope transition model into consideration.

  • Performance Optimization for Sparse AtAx in Parallel on Multicore CPU

    Yuan TAO  Yangdong DENG  Shuai MU  Zhenzhong ZHANG  Mingfa ZHU  Limin XIAO  Li RUAN  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E97-D No:2
      Page(s):
    315-318

    The sparse matrix operation, y ← y+AtAx, where A is a sparse matrix and x and y are dense vectors, is a widely used computing pattern in High Performance Computing (HPC) applications. The pattern poses challenge to efficient solutions because both a matrix and its transposed version are involved. An efficient sparse matrix format, Compressed Sparse Blocks (CSB), has been proposed to provide nearly the same performance for both Ax and Atx. We develop a multithreaded implementation for the CSB format and apply it to solve y ← y+AtAx. Experiments show that our technique outperforms the Compressed Sparse Row (CSR) based solution in POSKI by up to 2.5 fold on over 70% of benchmarking matrices.

  • Parallel-Snake with Balloon Force for Lane Detection

    Xiangyang LI  Xiangzhong FANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E97-D No:2
      Page(s):
    349-352

    Lane detection plays an important role in Driver Assistance Systems and Autonomous Vehicle System. In this paper, we propose a parallel-snake model combined with balloon force for lane detection. Parallel-snake is defined as two open active contours with parallel constrain. The lane boundaries on the left and right sides are assumed as parallel curves, parallel-snake is deformed to estimate these two boundaries. As lane regions between left and right boundaries usually have low gradient, snake will lose external force on these regions. Furthermore, inspired by balloon active contour model, the balloon force is introduced into parallel-snake to expand two parallel curves from center of road to the left and right lane boundaries. Different from closed active contour, stretching force is adopted to prevent the head and tail of snake from converging together. The experimental results on three different datasets show that parallel-snake model can work well on images with shadows and handle the lane with broken boundaries as the parallel property.

  • A New Preprocessing Method for Efficient Construction of Decision Diagrams

    S. R. MALATHI  P. SAKTHIVEL  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E97-A No:2
      Page(s):
    624-631

    Many discrete functions are often compactly represented by Decision Diagrams (DD). The main problem in the construction of decision diagrams is the space and time requirements. While constructing a decision diagram the memory requirement may grow exponentially with the function. Also, large numbers of temporary nodes are created while constructing the decision diagram for a function. Here the problem of reducing the number of temporary nodes is addressed with respect to the PLA specification format of a function, where the function is represented using a set of cubes. Usually a DD is constructed by recursively processing the input cubes in the PLA specification. The DD, representing a sub function, is specified by a single cube. This DD is merged with a master DD, which represents the entire previously processed cubes. Thus the master DD is constructed recursively, until all the cubes in the input cube set are processed. In this paper, an efficient method is proposed, which reorders and also partitions the cube set into unequal number of cubes per subset, in such a way that, the number of temporary nodes created and the number of logical operations done, during the merging of cubes with the master DD are reduced. This results in the reduction of space and time required for the construction of DDs to a remarkable extent.

  • Ideas, Inspirations and Hints Those I Met in the Research of Electromagnetic Theory Open Access

    Kazuo TANAKA  

     
    INVITED PAPER

      Vol:
    E97-C No:1
      Page(s):
    3-10

    “How to get the original ideas” is the fundamental and critical issue for the researchers in science and technology. In this paper, the author writes his experiences concerning how he could encounter the interesting and original ideas of three research subjects, i.e., the accelerating medium effect, the guided-mode extracted integral equation and the surface plasmon gap waveguide.

  • A Method of Analog IC Placement with Common Centroid Constraints

    Keitaro UE  Kunihiro FUJIYOSHI  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E97-A No:1
      Page(s):
    339-346

    To improve immunity against process gradients, a common centroid constraint, in which every pair of capacitors should be placed symmetrically with respect to a common center point, is widely used. The pair of capacitors are derived by dividing some original capacitors into two halves. Xiao et al. proposed a method to obtain a placement which satisfies the common centroid constraints, but this method has a defect. In this paper, we propose a decoding algorithm to obtain a placement which satisfies common centroid constraints.

  • Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage

    Shaojing FU  Dongsheng WANG  Ming XU  Jiangchun REN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:1
      Page(s):
    418-420

    Remote data possession checking for cloud storage is very important, since data owners can check the integrity of outsourced data without downloading a copy to their local computers. In a previous work, Chen proposed a remote data possession checking protocol using algebraic signature and showed that it can resist against various known attacks. In this paper, we find serious security flaws in Chen's protocol, and shows that it is vulnerable to replay attack by a malicious cloud server. Finally, we propose an improved version of the protocol to guarantee secure data storage for data owners.

  • Comprehensive Analysis of Initial Keystream Biases of RC4

    Takanori ISOBE  Toshihiro OHIGASHI  Yuhei WATANABE  Masakatu MORII  

     
    PAPER-Symmetric Key Based Cryptography

      Vol:
    E97-A No:1
      Page(s):
    139-151

    After the disclosure of the RC4 algorithm in 1994, a number of keystream biases of RC4 were reported, e.g., Mantin and Shamir showed that the second byte of the keystream is biased to 0, Sepehrdad et al. found that the l-th byte of the keystream is biased to -l, and Maitra et al. showed that 3rd to 255th bytes of the keystream are also biased to 0, where l is the keylength in byte. However, it is unknown that which bias is strongest in each byte of initial bytes. This paper comprehensively analyzes initial keystream biases of RC4. In particular, we introduce several new biases in the initial (1st to 257th) bytes of the RC4 keystream, which are substantially stronger than known biases. Combining the new biases with the known ones, a complete list of strongest single-byte biases in the first 257bytes of the RC4 keystream is constructed for the first time. Then, we show that our set of these biases are applicable to plaintext recovery attacks, key recovery attacks and distinguishing attacks.

  • Design of Miniature Implantable Tag Antenna for Radio-Frequency Identification System at 2.45GHz and Received Power Analysis

    HoYu LIN  Masaharu TAKAHASHI  Kazuyuki SAITO  Koichi ITO  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:1
      Page(s):
    129-136

    In recent years, there has been rapid developments in radio-frequency identification (RFID) systems, and their industrial applications include logistics management, automatic object identification, access and parking management, etc. Moreover, RFID systems have also been introduced for the management of medical instruments in medical applications to improve the quality of medical services. In recent years, the combination of such a system with a biological monitoring system through permanent implantation in the human body has been suggested to reduce malpractice events and ameliorate the patient suffering. This paper presents an implantable RFID tag antenna design that can match the conjugate impedance of most integrated circuit (IC) chips (9.3-j55.2Ω at 2.45GHz. The proposed antenna can be injected into the human body through a biological syringe, owing to its compact size of 9.3mm × 1.0mm × 1.0mm. The input impedance, transmission coefficient, and received power are simulated by a finite element method (FEM). A three-layered phantom is used to confirm antenna performance.

  • Online Learned Player Recognition Model Based Soccer Player Tracking and Labeling for Long-Shot Scenes

    Weicun XU  Qingjie ZHAO  Yuxia WANG  Xuanya LI  

     
    PAPER-Pattern Recognition

      Vol:
    E97-D No:1
      Page(s):
    119-129

    Soccer player tracking and labeling suffer from the similar appearance of the players in the same team, especially in long-shot scenes where the faces and the numbers of the players are too blurry to identify. In this paper, we propose an efficient multi-player tracking system. The tracking system takes the detection responses of a human detector as inputs. To realize real-time player detection, we generate a spatial proposal to minimize the scanning scope of the detector. The tracking system utilizes the discriminative appearance models trained using the online Boosting method to reduce data-association ambiguity caused by the appearance similarity of the players. We also propose to build an online learned player recognition model which can be embedded in the tracking system to approach online player recognition and labeling in tracking applications for long-shot scenes by two stages. At the first stage, to build the model, we utilize the fast k-means clustering method instead of classic k-means clustering to build and update a visual word vocabulary in an efficient online manner, using the informative descriptors extracted from the training samples drawn at each time step of multi-player tracking. The first stage finishes when the vocabulary is ready. At the second stage, given the obtained visual word vocabulary, an incremental vector quantization strategy is used to recognize and label each tracked player. We also perform importance recognition validation to avoid mistakenly recognizing an outlier, namely, people we do not need to recognize, as a player. Both quantitative and qualitative experimental results on the long-shot video clips of a real soccer game video demonstrate that, the proposed player recognition model performs much better than some state-of-the-art online learned models, and our tracking system also performs quite effectively even under very complicated situations.

  • Problem Analyzing by Distributed, History and Trend Templates with Integrated Supporting of DCMS

    Zhiming CAI  Zhe YANG  Menghan WANG  

     
    LETTER-Software Engineering

      Vol:
    E97-D No:1
      Page(s):
    146-150

    In analysis of general-purpose problems which involves many factors from different viewpoints, an important challenge is to acquire different opinions and distributed modeling templates from multiple remote experts, and to aggregate these templates. In order to deal with this problem, we developed the Distributed Cooperative Modeling System (DCMS) by integrating our achievements [1]-[5]. The paper introduces how to analyze a complex problem using DCMS, with distributed templates from multiple experts, historical templates based on statistical data, and trend templates deduced from historical data, with the example of analyzing “diversification of Macao industries”

  • Double-Layer Plate-Laminated Waveguide Slot Array Antennas for a 39GHz Band Fixed Wireless Access System

    Miao ZHANG  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:1
      Page(s):
    122-128

    A point-to-point fixed wireless access (FWA) system with a maximum throughput of 1Gbps has been developed in the 39GHz band. A double-layer plate-laminated waveguide slot array antenna is successfully realized with specific considerations of practical application. The antenna is designed so as to hold the VSWR under 1.5. The antenna input as well as feeding network is configured to reduce the antenna profile as well as the antenna weight. In addition, integrating the antenna into a wireless terminal is taken into account. A shielding wall, whose effectiveness is experimentally demonstrated, is set in the middle of the wireless terminal to achieve the spatial isolation of more than 65dB between two antennas on the H-plane. 30 test antennas are fabricated by diffusion bonding of thin metal plates, to investigate the tolerance and mass-productivity of this process. An aluminum antenna, which has the advantages of light weight and anti-aging, is also fabricated and evaluated with an eye to the future.

  • Pixel and Patch Reordering for Fast Patch Selection in Exemplar-Based Image Inpainting

    Baeksop KIM  Jiseong KIM  Jungmin SO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E96-D No:12
      Page(s):
    2892-2895

    This letter presents a scheme to improve the running time of exemplar-based image inpainting, first proposed by Criminisi et al. In the exemplar-based image inpainting, a patch that contains unknown pixels is compared to all the patches in the known region in order to find the best match. This is very time-consuming and hinders the practicality of Criminisi's method to be used in real time. We show that a simple bounding algorithm can significantly reduce number of distance calculations, and thus the running time. Performance of the bounding algorithm is affected by the order of patches that are compared, as well as the order of pixels in a patch. We present pixel and patch ordering schemes that improve the performance of bounding algorithms. Experiments with well-known images used in inpainting literature show that the proposed reordering scheme can reduce running time of the bounding algorithm up to 50%.

  • A Practical and Optimal Path Planning for Autonomous Parking Using Fast Marching Algorithm and Support Vector Machine

    Quoc Huy DO  Seiichi MITA  Keisuke YONEDA  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E96-D No:12
      Page(s):
    2795-2804

    This paper proposes a novel practical path planning framework for autonomous parking in cluttered environments with narrow passages. The proposed global path planning method is based on an improved Fast Marching algorithm to generate a path while considering the moving forward and backward maneuver. In addition, the Support Vector Machine is utilized to provide the maximum clearance from obstacles considering the vehicle dynamics to provide a safe and feasible path. The algorithm considers the most critical points in the map and the complexity of the algorithm is not affected by the shape of the obstacles. We also propose an autonomous parking scheme for different parking situation. The method is implemented on autonomous vehicle platform and validated in the real environment with narrow passages.

  • A Trusted Network Access Protocol for WLAN Mesh Networks

    Yuelei XIAO  Yumin WANG  Liaojun PANG  Shichong TAN  

     
    LETTER-Information Network

      Vol:
    E96-D No:12
      Page(s):
    2865-2869

    To solve the problems of the existing trusted network access protocols for Wireless Local Area Network (WLAN) mesh networks, we propose a new trusted network access protocol for WLAN mesh networks, which is abbreviated as WMN-TNAP. This protocol implements mutual user authentication and Platform-Authentication between the supplicant and Mesh Authenticator (MA), and between the supplicant and Authentication Server (AS) of a WLAN mesh network, establishes the key management system for the WLAN mesh network, and effectively prevents the platform configuration information of the supplicant, MA and AS from leaking out. Moreover, this protocol is proved secure based on the extended Strand Space Model (SSM) for trusted network access protocols.

  • Amperometric Biosensor with Composites of Carbon Nanotube, Hexaamineruthenium(III)chloride, and Plasma-Polymerized Film

    Tatsuya HOSHINO  Takahiro INOUE  Hitoshi MUGURUMA  

     
    PAPER-Organic Molecular Electronics

      Vol:
    E96-C No:12
      Page(s):
    1536-1540

    A novel fabrication approach for the amperometric biosensor composed of carbon nanotubes (CNT), a plasma-polymerized film (PPF), hexamineruthenium(III)chloride (RU), and enzyme glucose oxidase (GOD) is reported. The configuration of the electrochemical electrode is multilayer films which contain sputtered gold, lower acetonitrile PPF, CNT, RU, GOD, and upper acetonitrile PPF, sequentially. First, PPF deposited on Au acts as a permselective membrane and as a scaffold for CNT layer formation. Second, PPF directly deposited on GOD acts as a matrix for enzyme immobilization. To facilitate the electrochemical communication between the CNT layer and GOD, CNT was treated with nitrogen plasma. The electron transfer mediator RU play a role as the mediator, in which the electron caused by enzymatic reaction transports to the electrode. The synergy between the electron transfer mediator and CNT provides benefits in terms of lowering the operational potential and enhancing the sensitivity (current). The optimized glucose biosensor revealed a sensitivity of 3.4µA mM-1 cm-2 at +0.4V vs. Ag/AgCl, linear dynamic range of 2.5-19mM, and a response time of 6s.

  • Voice Activity Detection Based on Generalized Normal-Laplace Distribution Incorporating Conditional MAP

    Ji-Hyun SONG  Sangmin LEE  

     
    LETTER-Speech and Hearing

      Vol:
    E96-D No:12
      Page(s):
    2888-2891

    In this paper, we propose a novel voice activity detection (VAD) algorithm based on the generalized normal-Laplace (GNL) distribution to provide enhanced performance in adverse noise environments. Specifically, the probability density function (PDF) of a noisy speech signal is represented by the GNL distribution; the variance of the speech and noise of the GNL distribution are estimated using higher-order moments. After in-depth analysis of estimated variances, a feature that is useful for discrimination between speech and noise at low SNRs is derived and compared to a threshold to detect speech activity. To consider the inter-frame correlation of speech activity, the result from the previous frame is employed in the decision rule of the proposed VAD algorithm. The performance of our proposed VAD algorithm is evaluated in terms of receiver operating characteristics (ROC) and detection accuracy. Results show that the proposed method yields better results than conventional VAD algorithms.

341-360hit(1376hit)