The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] POS(1110hit)

301-320hit(1110hit)

  • Dosimetry and Verification for 6-GHz Whole-Body Non-Constraint Exposure of Rats Using Reverberation Chamber

    Jingjing SHI  Jerdvisanop CHAKAROTHAI  Jianqing WANG  Kanako WAKE  Soichi WATANABE  Osamu FUJIWARA  

     
    PAPER

      Vol:
    E98-B No:7
      Page(s):
    1164-1172

    With the rapid increase of various uses of wireless communications in modern life, the high microwave and millimeter wave frequency bands are attracting much attention. However, the existing databases on above 6GHz radio-frequency (RF) electromagnetic (EM) field exposure of biological bodies are obviously insufficient. An in-vivo research project on local and whole-body exposure of rats to RF-EM fields above 6GHz was started in Japan in 2013. This study aims to perform a dosimetric design for the whole-body-average specific absorption rates (WBA-SARs) of unconstrained rats exposed to 6GHz RF-EM fields in a reverberation chamber (RC). The required input power into the RC is clarified using a two-step evaluation method in order to achieve a target exposure level in rats. The two-step method, which incorporates the finite-difference time-domain (FDTD) numerical solutions with electric field measurements in an RC exposure system, is used as an evaluation method to determine the whole-body exposure level in the rats. In order to verify the validity of the two-step method, we use S-parameter measurements inside the RC to experimentally derive the WBA-SARs with rat-equivalent phantoms and then compare those with the FDTD-calculated ones. It was shown that the difference between the two-step method and the S-parameter measurements is within 1.63dB, which reveals the validity and usefulness of the two-step technique.

  • Quasistatic Approximation for Exposure Assessment of Wireless Power Transfer Open Access

    Ilkka LAAKSO  Takuya SHIMAMOTO  Akimasa HIRATA  Mauro FELIZIANI  

     
    INVITED PAPER

      Vol:
    E98-B No:7
      Page(s):
    1156-1163

    Magnetic resonant coupling between two coils allows effective wireless transfer of power over distances in the range of tens of centimeters to a few meters. The strong resonant magnetic field also extends to the immediate surroundings of the power transfer system. When a user or bystander is exposed to this magnetic field, electric fields are induced in the body. For the purposes of human and product safety, it is necessary to evaluate whether these fields satisfy the human exposure limits specified in international guidelines and standards. This work investigates the effectiveness of the quasistatic approximation for computational modeling human exposure to the magnetic fields of wireless power transfer systems. It is shown that, when valid, this approximation can greatly reduce the computational requirements of the assessment of human exposure. Using the quasistatic modeling approach, we present an example of the assessment of human exposure to the non-uniform magnetic field of a realistic WPT system for wireless charging of an electric vehicle battery, and propose a coupling factor for practical determination of compliance with the international exposure standards.

  • Accurate Coherent Change Detection Method Based on Pauli Decomposition for Fully Polarimetric SAR Imagery

    Ryo OYAMA  Shouhei KIDERA  Tetsuo KIRIMOTO  

     
    PAPER-Sensing

      Vol:
    E98-B No:7
      Page(s):
    1390-1395

    Microwave imaging techniques, particularly for synthetic aperture radar (SAR), produce high-resolution terrain surface images regardless of the weather conditions. Focusing on a feature of complex SAR images, coherent change detection (CCD) approaches have been developed in recent decades that can detect invisible changes in the same regions by applying phase interferometry to pairs of complex SAR images. On the other hand, various techniques of polarimetric SAR (PolSAR) image analysis have been developed, since fully polarimetric data often include valuable information that cannot be obtained from single polarimetric observations. According to this background, various coherent change detection methods based on fully polarimetric data have been proposed. However, the detection accuracies of these methods often degrade in low signal-to-noise ratio (SNR) situations due to the lower signal levels of cross-polarized components compared with those of co-polarized ones. To overcome the problem mentioned above, this paper proposes a novel CCD method by introducing the Pauli decomposition and the weighting of component with their respective SNR. The experimental data obtained in anechoic chamber show that the proposed method significantly enhances the performance of the receiver operation characteristic (ROC) compared with that obtained by a conventional approach.

  • Rejection of the Position Dependent Disturbance Torque of Motor System with Slowly Varying Parameters and Time Delays

    Daesung JUNG  Youngjun YOO  Sangchul WON  

     
    PAPER-Systems and Control

      Vol:
    E98-A No:7
      Page(s):
    1494-1503

    This paper proposes an updating state dependent disturbance observer (USDDOB) to reject position dependent disturbances when parameters vary slowly, and input and output are time-delayed. To reject the effects of resultant slowly-varying position dependent disturbances, the USDDOB uses the control method of the state dependent disturbance observer (SDDOB) and time-invariance approximation. The USDDOB and a main proportional integral (PI) controller constitute a robust controller. Simulations and experiments using a 1-degree-of-freedom (1-DOF) tilted planar robot show the effectiveness of the proposed method.

  • Improved Detection Scheme Based on Lattice-Reduction and Threshold Algorithm in MIMO-OFDM Systems

    Jae-Jeong KIM  Hyoung-Kyu SONG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E98-A No:6
      Page(s):
    1343-1345

    In this letter, an enhanced detection scheme using threshold and lattice-reduction algorithm is proposed. The first step of the proposed detection scheme finds another basis channel matrix H' which has good properties from the channel matrix H by using lattice-reduction algorithm. And QRD-M detection scheme using threshold algorithm is executed in the next step. Simulation results show that the proposed method has better performance than the conventional QRD-M detection scheme at high SNR. Also, it reduces candidate symbols because of the threshold algorithm.

  • Optimal Reporting Order for Superposition Cooperative Spectrum Sensing in Cognitive Radio Networks

    Hiep VU-VAN  Insoo KOO  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E98-A No:6
      Page(s):
    1346-1350

    In cognitive radio (CR), superposition cooperative spectrum sensing (SPCSS) is able to offer a much improved sensing reliability compared to individual sensing. Because of the differences in sensing channel condition, the reporting order for each cognitive radio user (CU) will highly affect the sensing performance of the network. In this paper, we propose an algorithm to assign the best reporting order to each CU in order to maximize sensing performance under SPCSS. The numerical results show that the proposed scheme can obtain the same performance as the optimal scheme.

  • Blind Interference Suppression Scheme by Eigenvector Beamspace CMA Adaptive Array with Subcarrier Transmission Power Assignment for Spectrum Superposing

    Kazuki MARUTA  Jun MASHINO  Takatoshi SUGIYAMA  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:6
      Page(s):
    1050-1057

    This paper proposes a novel blind adaptive array scheme with subcarrier transmission power assignment (STPA) for spectrum superposing in cognitive radio networks. The Eigenvector Beamspace Adaptive Array (EBAA) is known to be one of the blind adaptive array algorithms that can suppress inter-system interference without any channel state information (CSI). However, EBAA has difficulty in suppressing interference signals whose Signal to Interference power Ratio (SIR) values at the receiver are around 0dB. With the proposed scheme, the ST intentionally provides a level difference between subcarriers. At the receiver side, the 1st eigenvector of EBAA is applied to the received signals of the subcarrier assigned higher power and the 2nd eigenvector is applied to those assigned lower power. In order to improve interference suppression performance, we incorporate Beamspace Constant Modulus Algorithm (BSCMA) into EBAA (E-BSCMA). Additionally, STPA is effective in reducing the interference experienced by the primary system. Computer simulation results show that the proposed scheme can suppress interference signals received with SIR values of around 0dB while improving operational SIR for the primary system. It can enhance the co-existing region of 2 systems that share a spectrum.

  • Power-Absorption-Based Model for Power Compensation in WLAN Positioning Using Smartphone

    Masaaki YAMAMOTO  Tomoaki OHTSUKI  

     
    PAPER-Sensing

      Vol:
    E98-B No:6
      Page(s):
    1125-1132

    To achieve accurate wireless-local-area-network (WLAN) positioning, the directivity and influence of multipath fading on the power absorption by the user are clarified experimentally. Based on the results, a general model of the power absorption by the user is devised. The parameters of the model are estimated using maximum-likelihood estimation (MLE) and the magnetic sensor built into modern smartphones. The proposed method compensates the power absorption and the influence of multipath fading. According to experimental evaluations, the root-mean-square error (RMSE) of the proposed method is 34% lower than that of the conventional one. Namely, RMSE of the proposed method is 1.94m in a room.

  • Efficient Data Possession Auditing for Real-World Cloud Storage Environments

    Da XIAO  Lvyin YANG  Chuanyi LIU  Bin SUN  Shihui ZHENG  

     
    PAPER-Cloud Security

      Pubricized:
    2014/12/04
      Vol:
    E98-D No:4
      Page(s):
    796-806

    Provable Data Possession (PDP) schemes enable users to efficiently check the integrity of their data in the cloud. Support for massive and dynamic sets of data and adaptability to third-party auditing are two key factors that affect the practicality of existing PDP schemes. We propose a secure and efficient PDP system called IDPA-MF-PDP, by exploiting the characteristics of real-world cloud storage environments. The cost of auditing massive and dynamic sets of data is dramatically reduced by utilizing a multiple-file PDP scheme (MF-PDP), based on the data update patterns of cloud storage. Deployment and operational costs of third-party auditing and information leakage risks are reduced by an auditing framework based on integrated data possession auditors (DPAs), instantiated by trusted hardware and tamper-evident audit logs. The interaction protocols between the user, the cloud server, and the DPA integrate MF-PDP with the auditing framework. Analytical and experimental results demonstrate that IDPA-MF-PDP provides the same level of security as the original PDP scheme while reducing computation and communication overhead on the DPA, from linear the size of data to near constant. The performance of the system is bounded by disk I/O capacity.

  • Split-Jaccard Distance of Hierarchical Decompositions for Software Architecture

    Ki-Seong LEE  Byung-Woo HONG  Youngmin KIM  Jaeyeop AHN  Chan-Gun LEE  

     
    LETTER-Software Engineering

      Pubricized:
    2014/11/20
      Vol:
    E98-D No:3
      Page(s):
    712-716

    Most previous approaches on comparing the results for software architecture recovery are designed to handle only flat decompositions. In this paper, we propose a novel distance called Split-Jaccard Distance of Hierarchical Decompositions. It extends the Jaccard coefficient and incorporates the concept of the splits of leaves in a hierarchical decomposition. We analyze the proposed distance and derive its properties, including the lower-bound and the metric space.

  • Multiple Impossible Differential Cryptanalysis on Reduced FOX

    Xinran LI  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:3
      Page(s):
    906-911

    FOX is a family of block ciphers published in 2004 and is famous for its provable security to cryptanalysis. In this paper, we present multiple 4-round impossible differentials and several new results of impossible differential attacks on 5,6,7-round FOX64 and 5-round FOX128 with the multiple differentials and the new early abort technique which shall reduce the data complexity and the time complexity respectively. In terms of the data complexity and the time complexity, our results are better than any of the previously known attacks.

  • Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model

    Eiichiro FUJISAKI  Akinori KAWACHI  Ryo NISHIMAKI  Keisuke TANAKA  Kenji YASUNAGA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:3
      Page(s):
    853-862

    Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f(x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient PKE scheme exists if the adversary may have access to the secret-key leakage oracle to receive only one bit after it was given the challenge ciphertext. Similarly, there exists no sender-randomness leakage resilient PKE scheme if one-bit leakage occurs after the target public key was given to the adversary. At TCC 2011, Halevi and Lin have broken the barrier of after-the-fact leakage, by proposing the so-called split state model, where a secret key of a party is explicitly divided into at least two pieces, and the adversary may have not access to the entire secret at once, but each divided pieces, one by one. In the split-state model, they have constructed post-challenge secret-key leakage resilient CPA secure PKEs from hash proof systems, but the construction of CCA secure post-challenge secret-key leakage PKE has remained open. They have also remained open to construct sender-randomness leakage PKE in the split state model. This paper provides a solution to the open issues. We also note that the proposal of Halevi and Lin is post-challenge secret-key leakage CPA secure against a single challenge ciphertext; not against multiple challenges. We present an efficient generic construction that converts any CCA secure PKE scheme into a multiple-challenge CCA secure PKE that simultaneously tolerates post-challenge secret-key and sender-randomness leakage in the split state model, without any additional assumption. In addition, our leakage amount of the resulting schemes is the same as that of Halevi and Lin CPA PKE, i.e., (1/2+γ)l/2 where l denotes the length of the entire secret (key or randomness) and γ denotes a universal (possitive) constant less than 1/2. Our conversion is generic and available for many other public-key primitives. For instance, it can convert any identity-based encryption (IBE) scheme to a post-challenge master-key leakage and sender-randomness leakage secure IBE.

  • New Impossible Differential Attack on SAFER Block Cipher Family

    Jingyuan ZHAO  Meiqin WANG  Jiazhe CHEN  Yuliang ZHENG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:3
      Page(s):
    843-852

    SAFER block cipher family consists of SAFER K, SAFER SK, SAFER+ and SAFER++. As the first proposed block cipher of them, SAFER K is strengthened by SAFER SK with improved key schedule. SAFER+ is designed as an AES candidate and Bluetooth uses a customized version of it for security. SAFER++, a variant of SAFER+, is among the cryptographic primitives selected for the second phase of the NESSIE project. In this paper, we take advantage of properties of the linear transformation and S-boxes to identify new impossible differentials for SAFER SK, SAFER+, and SAFER++. Moreover, we give the impossible differential attacks on 4-round SAFER SK/128 and 4-round SAFER+/128(256), 5-round SAFER++/128 and 5.5-round SAFER++/256. Our attacks significantly improve previously known impossible differential attacks on them. Specifically, our attacks on SAFER+ are the best attack in terms of number of rounds.

  • Non-orthogonal Multiple Access (NOMA) with Successive Interference Cancellation for Future Radio Access Open Access

    Kenichi HIGUCHI  Anass BENJEBBOUR  

     
    Invited Survey Paper-Wireless Communication Technologies

      Vol:
    E98-B No:3
      Page(s):
    403-414

    This paper presents our investigation of non-orthogonal multiple access (NOMA) as a novel and promising power-domain user multiplexing scheme for future radio access. Based on information theory, we can expect that NOMA with a successive interference canceller (SIC) applied to the receiver side will offer a better tradeoff between system efficiency and user fairness than orthogonal multiple access (OMA), which is widely used in 3.9 and 4G mobile communication systems. This improvement becomes especially significant when the channel conditions among the non-orthogonally multiplexed users are significantly different. Thus, NOMA can be expected to efficiently exploit the near-far effect experienced in cellular environments. In this paper, we describe the basic principle of NOMA in both the downlink and uplink and then present our proposed NOMA scheme for the scenario where the base station is equipped with multiple antennas. Simulation results show the potential system-level throughput gains of NOMA relative to OMA.

  • Surface Potential Measurement of Organic Multi-layered Films on Electrodes by Kelvin Probe Force Microscopy

    Nobuo SATOH  Shigetaka KATORI  Kei KOBAYASHI  Kazumi MATSUSHIGE  Hirofumi YAMADA  

     
    PAPER

      Vol:
    E98-C No:2
      Page(s):
    91-97

    We have investigated both the film thickness and surface potential of organic semiconductors deposited on two kinds of electrodes by the simultaneous observation with the dynamic force microscopy (DFM)/Kelvin-probe force microscope (KFM). To clarify the interfacial properties of organic semiconductor, we fabricated samples that imitated the organic light emitting diode (OLED) structure by depositing bis [$N,N '$-(1-naphthyl)-$N,N '$-phenyl] benzidine ($alpha$-NPD) and tris (8-hydroxyquinolinato) aluminum (Alq$_{3}$), respectively, on indium-tin-oxide (ITO) as anode and aluminum (Al) as cathode by the vacuum evaporation deposition using intersecting metal shadow masks. This deposition technique enables us to fabricate four different areas in the same substrate. The crossover area of the deposited thin films were measured by the DFM/KFM, the energy band diagrams were depicted and we considered that the charge behavior of the organic semiconductor depended on the material and the structure.

  • Vapor Deposition Polymerization of Polyimide with Naphthalene Unit

    Ryosuke KIKUCHI  Satoshi USUI  Kuniaki TANAKA  Hiroaki USUI  

     
    BRIEF PAPER

      Vol:
    E98-C No:2
      Page(s):
    129-132

    Polyimide thin films were prepared by vapor-deposition polymerization. Naphthalene carboxylic dianhydride (NTCDA) was coevaporated with either diamino naphthalene (DAN) or diamino benzophenone (DAB). Coevaporation of dianhydride and diamines yielded thin films of polyamic acids. A polyimide thin film was obtained by annealing the codeposited film of NTCDA-DAB. On the other hand, the codeposited film of NTCDA-DAN was not imidized by annealing. In both cases, chemical structures of the products were not largely influenced by the molar ratio of depositing monomers if sufficient amount of diamine molecules are supplied in the coevaporation process.

  • On the Impossibility of d-Multiplicative Non-perfect Secret Sharing

    Maki YOSHIDA  Toru FUJIWARA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:2
      Page(s):
    767-770

    A secret sharing scheme is said to be d-multiplicative if the scheme allows the players to multiply shared d secrets by locally converting their shares into an additive sharing of the product. In the previous work, the following negative result for perfect secret sharing has been shown: The d-multiplicative secret sharing for d players is impossible. This paper extends the impossibility result to non-perfect secret sharing. Our main result is a proof that d-multiplicative secret sharing for d players is impossible even if every player has partial information on the secret (e.g., all but one bit). This result means that there is no need to relax the privacy requirement with leakage of partial information only for the purpose of d-multiplication.

  • Evaluation of a PAH/PSS Layer-by-Layer Deposited Film Using a Quartz-Crystal-Microbalance and Surface-Plasmon-Resonance Hybrid Sensor

    Keisuke KAWACHI  Kazunari SHINBO  Yasuo OHDAIRA  Akira BABA  Keizo KATO  Futao KANEKO  

     
    BRIEF PAPER

      Vol:
    E98-C No:2
      Page(s):
    136-138

    A quartz-crystal-microbalance (QCM) and surface-plasmon-resonance (SPR) hybrid sensor was prepared, and the depositions of polymer electrolytes layer-by-layer (LbL) films were observed in situ. The estimated thicknesses obtained from the QCM method were different from those obtained from the SPR method. This was estimated to be caused by film swelling and water contained in the film.

  • EM-Based Recursive Estimation of Spatiotemporal Correlation Statistics for Non-stationary MIMO Channel

    Yousuke NARUSE  Jun-ichi TAKADA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:2
      Page(s):
    324-334

    We introduce a MIMO channel estimation method that exploits the channel's spatiotemporal correlation without the aid of a priori channel statistical information. A simplified Gauss-Markov model that has fewer parameters to be estimated is presented for the Kalman filter. In order to obtain statistical parameters on the time evolution of the channel, considering that the time evolution is a latent statistical variable, the expectation-maximization (EM) algorithm is applied for accurate estimation. Numerical simulations reveal that the proposed method is able to enhance estimation capability by exploiting spatiotemporal correlations, and the method works well even if the forgetting factor is small.

  • Acceleration of the Fast Multipole Method on FPGA Devices

    Hitoshi UKAWA  Tetsu NARUMI  

     
    LETTER-Application

      Pubricized:
    2014/11/19
      Vol:
    E98-D No:2
      Page(s):
    309-312

    The fast multipole method (FMM) for N-body simulations is attracting much attention since it requires minimal communication between computing nodes. We implemented hardware pipelines specialized for the FMM on an FPGA device, the GRAPE-9. An N-body simulation with 1.6×107 particles ran 16 times faster than that on a CPU. Moreover the particle-to-particle stage of the FMM on the GRAPE-9 executed 2.5 times faster than on a GPU in a limited case.

301-320hit(1110hit)