The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

601-620hit(2923hit)

  • D-MENTOR Algorithm for OSPF Protocol under Delay Constrain Supporting Unicast and Multicast Traffic

    Annop MONSAKUL  

     
    PAPER

      Vol:
    E99-B No:6
      Page(s):
    1275-1281

    Designing a backbone IP network, especially to support both unicast and multicast traffic under delay constraints, is a difficult problem. Real network design must consider cost, performance and reliability. Therefore, a simulator can help a network designer to test the functionality of the network before the implementation. This paper proposes a heuristic design algorithm called D-MENTOR, and the algorithm was developed by programming based on Mesh Network Topological Optimization and Routing Version 2 (MENTOR-II) to integrate as a new module of DElite tool. The simulation results show that, in almost all test cases, the proposed algorithm yields lower installation cost.

  • Generation of Oil-Film-Like Images by Bilateral Infra-Envelope Filter

    Toru HIRAOKA  Kiichi URAHAMA  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/03/11
      Vol:
    E99-D No:6
      Page(s):
    1724-1728

    A non-photorealistic rendering method creates oil-film-like images, expressed with colorful, smooth curves similar to the oil films generated on the surface of glass or water, from color photo images. The proposed method generates oil-film-like images through iterative processing between a bilateral infra-envelope filter and an unsharp mask. In order to verify the effectiveness of the proposed method, tests using a Lena image were performed, and visual assessment of oil-film-like images was conducted for changes in appearance as the parameter values of the proposed method were varied. As a result of tests, the optimal value of parameters was found for generating oil-film patterns.

  • Sentence Similarity Computational Model Based on Information Content

    Hao WU  Heyan HUANG  

     
    PAPER-Natural Language Processing

      Pubricized:
    2016/03/14
      Vol:
    E99-D No:6
      Page(s):
    1645-1652

    Sentence similarity computation is an increasingly important task in applications of natural language processing such as information retrieval, machine translation, text summarization and so on. From the viewpoint of information theory, the essential attribute of natural language is that the carrier of information and the capacity of information can be measured by information content which is already successfully used for word similarity computation in simple ways. Existing sentence similarity methods don't emphasize the information contained by the sentence, and the complicated models they employ often need using empirical parameters or training parameters. This paper presents a fully unsupervised computational model of sentence semantic similarity. It is also a simply and straightforward model that neither needs any empirical parameter nor rely on other NLP tools. The method can obtain state-of-the-art experimental results which show that sentence similarity evaluated by the model is closer to human judgment than multiple competing baselines. The paper also tests the proposed model on the influence of external corpus, the performance of various sizes of the semantic net, and the relationship between efficiency and accuracy.

  • Hierarchical-IMM Based Maneuvering Target Tracking in LOS/NLOS Hybrid Environments

    Yan ZHOU  Lan HU  Dongli WANG  

     
    PAPER-Systems and Control

      Vol:
    E99-A No:5
      Page(s):
    900-907

    Maneuvering target tracking under mixed line-of-sight/non-line-of-sight (LOS/NLOS) conditions has received considerable interest in the last decades. In this paper, a hierarchical interacting multiple model (HIMM) method is proposed for estimating target position under mixed LOS/NLOS conditions. The proposed HIMM is composed of two layers with Markov switching model. The purpose of the upper layer, which is composed of two interacting multiple model (IMM) filters in parallel, is to handle the switching between the LOS and the NLOS environments. To estimate the target kinetic variables (position, speed and acceleration), the unscented Kalman filter (UKF) with the current statistical (CS) model is used in the lower-layer. Simulation results demonstrate the effectiveness and superiority of the proposed method, which obtains better tracking accuracy than the traditional IMM.

  • PtHf Silicide Formation Utilizing PtHf-Alloy Target for Low Contact Resistivity

    Shun-ichiro OHMI  Mengyi CHEN  Xiaopeng WU  Yasushi MASAHIRO  

     
    PAPER

      Vol:
    E99-C No:5
      Page(s):
    510-515

    We have investigated PtHf silicide formation utilizing a developed PtHf-alloy target to realize low contact resistivity for the first time. A 20 nm-thick PtHf-alloy thin film was deposited on the n-Si(100) by RF magnetron sputtering at room temperature. Then, silicidation was carried out by rapid thermal annealing (RTA) system at 450-600°C/5 min in N2/4.9%H2 ambient. The PtHf-alloy silcide, PtHfSi, layers were successfully formed, and the Schottky barrier height (SBH) for electron of 0.45 eV was obtained by 450°C silicidation. Furthermore, low contact resistivity was achieved for fabricated PtHSi such as 8.4x10-8 Ωcm2 evaluated by cross-bridge Kelvin resistor (CBKR) method.

  • A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission

    Shoichiro YAMASAKI  Tomoko K. MATSUSHIMA  

     
    PAPER-Network security

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    830-838

    Secret sharing is a method of information protection for security. The information is divided into n shares and reconstructed from any k shares, but no knowledge of the information is revealed from k-1 shares. Physical layer security is a method of achieving favorable reception conditions at the destination terminal in wireless communications. In this study, we propose a security enhancement technique for wireless packet communications. The technique uses secret sharing and physical layer security to exchange a secret encryption key. The encryption key for packet information is set as the secret information in secret sharing, and the secret information is divided into n shares. Each share is located in the packet header. The base station transmits the packets to the destination terminal by using physical layer security based on precoded multi-antenna transmission. With this transmission scheme, the destination terminal can receive more than k shares without error and perfectly recover the secret information. In addition, an eavesdropper terminal can receive less than k-1 shares without error and recover no secret information. In this paper, we propose a protection technique using secret sharing based on systematic Reed-Solomon codes. The technique establishes an advantageous condition for the destination terminal to recover the secret information. The evaluation results by numerical analysis and computer simulation show the validity of the proposed technique.

  • A Study on Dynamic Clustering for Large-Scale Multi-User MIMO Distributed Antenna Systems with Spatial Correlation

    Ou ZHAO  Hidekazu MURATA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:4
      Page(s):
    928-938

    Distributed antenna systems (DASs) combined with multi-user multiple-input multiple-output (MU-MIMO) transmission techniques have recently attracted significant attention. To establish MU-MIMO DASs that have wide service areas, the use of a dynamic clustering scheme (CS) is necessary to reduce computation in precoding. In the present study, we propose a simple method for dynamic clustering to establish a single cell large-scale MU-MIMO DAS and investigate its performance. We also compare the characteristics of the proposal to those of other schemes such as exhaustive search, traditional location-based adaptive CS, and improved norm-based CS in terms of sum rate improvement. Additionally, to make our results more universal, we further introduce spatial correlation to the considered system. Computer simulation results indicate that the proposed CS for the considered system provides better performance than the existing schemes and can achieve a sum rate close to that of exhaustive search but at a lower computational cost.

  • Dependency-Based Extraction of Conditional Statements for Understanding Business Rules

    Tomomi HATANO  Takashi ISHIO  Joji OKADA  Yuji SAKATA  Katsuro INOUE  

     
    PAPER-Software Engineering

      Pubricized:
    2016/01/08
      Vol:
    E99-D No:4
      Page(s):
    1117-1126

    For the maintenance of a business system, developers must understand the business rules implemented in the system. One type of business rules defines computational business rules; they represent how an output value of a feature is computed from the valid inputs. Unfortunately, understanding business rules is a tedious and error-prone activity. We propose a program-dependence analysis technique tailored to understanding computational business rules. Given a variable representing an output, the proposed technique extracts the conditional statements that may affect the computation of the output. To evaluate the usefulness of the technique, we conducted an experiment with eight developers in one company. The results confirm that the proposed technique enables developers to accurately identify conditional statements corresponding to computational business rules. Furthermore, we compare the number of conditional statements extracted by the proposed technique and program slicing. We conclude that the proposed technique, in general, is more effective than program slicing.

  • A High-Speed Digital True Random Number Generator Based on Cross Ring Oscillator

    Yuanhao WANG  Shuguo LI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E99-A No:4
      Page(s):
    806-818

    In this paper, we propose a true random number generator (TRNG) exploiting jitter and the chaotic behavior in cross ring oscillators (CROs). We make a further study of the feedback ring architecture and cross-connect the XOR gates and inverters to form an oscillator. The CRO utilizes totally digital logic circuits, and gains a high and robust entropy rate, as the jitter in the CRO can accumulate locally between adjacent stages. Two specific working modes of CRO in which the CRO can work in a consistent state and a free-running state respectively are introduced and analyzed both theoretically and experimentally. Finally, different stage lengths of cross ring true random number generators (CRTRNGs) are tested in different Field Programmable Gate Arrays (FPGAs) and test results are analyzed and compared. Especially, random data achieved from a design of 63-stage CRTRNG in Altera Cyclone IV passes both the NIST and Diehard test suites at a rate as high as 240Mbit/s.

  • Application of Feature Engineering for Phishing Detection

    Wei ZHANG  Huan REN  Qingshan JIANG  

     
    PAPER

      Pubricized:
    2016/01/28
      Vol:
    E99-D No:4
      Page(s):
    1062-1070

    Phishing attacks target financial returns by luring Internet users to exposure their sensitive information. Phishing originates from e-mail fraud, and recently it is also spread by social networks and short message service (SMS), which makes phishing become more widespread. Phishing attacks have drawn great attention due to their high volume and causing heavy losses, and many methods have been developed to fight against them. However, most of researches suffered low detection accuracy or high false positive (FP) rate, and phishing attacks are facing the Internet users continuously. In this paper, we are concerned about feature engineering for improving the classification performance on phishing web pages detection. We propose a novel anti-phishing framework that employs feature engineering including feature selection and feature extraction. First, we perform feature selection based on genetic algorithm (GA) to divide features into critical features and non-critical features. Then, the non-critical features are projected to a new feature by implementing feature extraction based on a two-stage projection pursuit (PP) algorithm. Finally, we take the critical features and the new feature as input data to construct the detection model. Our anti-phishing framework does not simply eliminate the non-critical features, but considers utilizing their projection in the process of classification, which is different from literatures. Experimental results show that the proposed framework is effective in detecting phishing web pages.

  • FPGA Implementation of Various Elliptic Curve Pairings over Odd Characteristic Field with Non Supersingular Curves

    Yasuyuki NOGAMI  Hiroto KAGOTANI  Kengo IOKIBE  Hiroyuki MIYATAKE  Takashi NARITA  

     
    PAPER-Cryptography and cryptographic protocols

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    805-815

    Pairing-based cryptography has realized a lot of innovative cryptographic applications such as attribute-based cryptography and semi homomorphic encryption. Pairing is a bilinear map constructed on a torsion group structure that is defined on a special class of elliptic curves, namely pairing-friendly curve. Pairing-friendly curves are roughly classified into supersingular and non supersingular curves. In these years, non supersingular pairing-friendly curves have been focused on from a security reason. Although non supersingular pairing-friendly curves have an ability to bridge various security levels with various parameter settings, most of software and hardware implementations tightly restrict them to achieve calculation efficiencies and avoid implementation difficulties. This paper shows an FPGA implementation that supports various parameter settings of pairings on non supersingular pairing-friendly curves for which Montgomery reduction, cyclic vector multiplication algorithm, projective coordinates, and Tate pairing have been combinatorially applied. Then, some experimental results with resource usages are shown.

  • Probabilistic Secret Sharing Schemes for Multipartite Access Structures

    Xianfang WANG  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E99-A No:4
      Page(s):
    856-862

    In this paper, we construct ideal and probabilistic secret sharing schemes for some multipartite access structures, including the General Hierarchical Access Structure and Compartmented Access Structures. We devise an ideal scheme which implements the general hierarchical access structure. For the compartmented access structures, we consider three special access structures. We propose ideal and probabilistic schemes for these three compartmented access structures by bivariate interpolation.

  • An On-Chip Monitoring Circuit with 51-Phase PLL-Based Frequency Synthesizer for 8-Gb/s ODR Single-Ended Signaling Integrity Analysis

    Pil-Ho LEE  Yu-Jeong HWANG  Han-Yeol LEE  Hyun-Bae LEE  Young-Chan JANG  

     
    BRIEF PAPER

      Vol:
    E99-C No:4
      Page(s):
    440-443

    An on-chip monitoring circuit using a sub-sampling scheme, which consists of a 6-bit flash analog-to-digital converter (ADC) and a 51-phase phase-locked loop (PLL)-based frequency synthesizer, is proposed to analyze the signal integrity of a single-ended 8-Gb/s octal data rate (ODR) chip-to-chip interface with a source synchronous clocking scheme.

  • The Relevance Dependent Infinite Relational Model for Discovering Co-Cluster Structure from Relationships with Structured Noise

    Iku OHAMA  Hiromi IIDA  Takuya KIDA  Hiroki ARIMURA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    1139-1152

    Latent variable models for relational data enable us to extract the co-cluster structures underlying observed relational data. The Infinite Relational Model (IRM) is a well-known relational model for discovering co-cluster structures with an unknown number of clusters. The IRM assumes that the link probability between two objects (e.g., a customer and an item) depends only on their cluster assignment. However, relational models based on this assumption often lead us to extract many non-informative and unexpected clusters. This is because the underlying co-cluster structures in real-world relationships are often destroyed by structured noise that blurs the cluster structure stochastically depending on the pair of related objects. To overcome this problem, in this paper, we propose an extended IRM that simultaneously estimates denoised clear co-cluster structure and a structured noise component. In other words, our proposed model jointly estimates cluster assignment and noise level for each object. We also present posterior probabilities for running collapsed Gibbs sampling to infer the model. Experiments on real-world datasets show that our model extracts a clear co-cluster structure. Moreover, we confirm that the estimated noise levels enable us to extract representative objects for each cluster.

  • An InP-Based 27-GHz-Bandwidth Limiting TIA IC Designed to Suppress Undershoot and Ringing in Its Output Waveform

    Hiroyuki FUKUYAMA  Michihiro HIRATA  Kenji KURISHIMA  Minoru IDA  Masami TOKUMITSU  Shogo YAMANAKA  Munehiko NAGATANI  Toshihiro ITOH  Kimikazu SANO  Hideyuki NOSAKA  Koichi MURATA  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:3
      Page(s):
    385-396

    A design scheme for a high-speed differential-input limiting transimpedance amplifier (TIA) was developed. The output-stage amplifier of the TIA is investigated in detail in order to suppress undershoot and ringing in the output waveform. The amplifier also includes a peak detector for the received signal strength indicator (RSSI) output, which is used to control the optical demodulator for differential-phase-shift-keying or differential-quadrature-phase-shift-keying formats. The limiting TIA was fabricated on the basis of 1-µm emitter-width InP-based heterojunction-bipolar-transistor (HBT) IC technology. Its differential gain is 39 dB, its 3-dB bandwidth is 27 GHz, and its estimated differential transimpedance gain is 73 dBΩ. The obtained output waveform shows that the developed design scheme is effective for suppressing undershoot and ringing.

  • Structure Transformation of Bended Diamond-Like Carbon Free-Space Nanowiring by Ga Focused-Ion-Beam Irradiation

    Ken-ichiro NAKAMATSU  Shinji MATSUI  

     
    PAPER

      Vol:
    E99-C No:3
      Page(s):
    365-370

    We observed Ga focused-ion-beam (FIB) irradiation effect onto diamond-like carbon (DLC) free-space nanowiring (FSW) fabricated by focused-ion-beam chemical vapor deposition (FIB-CVD). A bended FIB-CVD FSW completely strained after Ga-FIB irradiation with raster scanning. This is probably caused by generation of compression stresses onto the surface of FSW, because the surface state of the nanowire changed with Ga-FIB irradiation. Transmission electron microscope (TEM) study indicates that Ga of FSW core part disappeared after Ga-FIB irradiation and a near-edge X-ray absorption fine structure (NEXAFS) analysis revealed C-Ga bond formation onto the surface. This is attributed to a movement of Ga from the core region to the surface, and/or an adsorption of Ga onto the surface by Ga-FIB scanned irradiation. The transformation of FSW is not only fascinating as physical phenomenon, but also effective for fabricating various 3-dimensional nanodevices equipped with nanowires utilized as electric wiring.

  • Recent Situation of the UV Imprint Lithography and Its Application to the Photonics Devices Open Access

    Masashi NAKAO  

     
    INVITED PAPER

      Vol:
    E99-C No:3
      Page(s):
    333-338

    The individual steps of UV imprint lithography have been explained in detail from the points of manufacturing nano-structures. The applications to photonic devices have been also introduced.

  • Design of Fourth-Order Series Coupled Microring Filter on Chebyshev Filter Condition

    Nobuyuki HAYASAKA  Taro ARAKAWA  Yasuo KOKUBUN  

     
    PAPER

      Vol:
    E99-C No:2
      Page(s):
    235-241

    A new design method for a high-order series-coupled microring filter using Chebyshev filter condition was proposed and its application to the design of a wavelength-selective switch (WSS) was discussed. In the proposed method, the propagation loss in a microring resonator, coupling loss at a coupler, and a free spectral ranges (FSR) in a microring resonator are considered for the first time. It was found that for high-order series coupled microring resonators, the WSS designed using Chebyshev condition has more boxlike filter responses and high extinction ratio, compared with that designed using Butterworth condition, in the case where the round-trip loss in a microring is relatively large. In addition, the fourth-order series-coupled microring WSS with boxlike responses was successfully designed, considering Vernier effect for a larger FSR and shift in resonant wavelength.

  • MTF-Based Kalman Filtering with Linear Prediction for Power Envelope Restoration in Noisy Reverberant Environments

    Yang LIU  Shota MORITA  Masashi UNOKI  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:2
      Page(s):
    560-569

    This paper proposes a method based on modulation transfer function (MTF) to restore the power envelope of noisy reverberant speech by using a Kalman filter with linear prediction (LP). Its advantage is that it can simultaneously suppress the effects of noise and reverberation by restoring the smeared MTF without measuring room impulse responses. This scheme has two processes: power envelope subtraction and power envelope inverse filtering. In the subtraction process, the statistical properties of observation noise and driving noise for power envelope are investigated for the criteria of the Kalman filter which requires noise to be white and Gaussian. Furthermore, LP coefficients drastically affect the Kalman filter performance, and a method is developed for deriving LP coefficients from noisy reverberant speech. In the dereverberation process, an inverse filtering method is applied to remove the effects of reverberation. Objective experiments were conducted under various noisy reverberant conditions to evaluate how well the proposed Kalman filtering method based on MTF improves the signal-to-error ratio (SER) and correlation between restored power envelopes compared with conventional methods. Results showed that the proposed Kalman filtering method based on MTF can improve SER and correlation more than conventional methods.

  • 25-Gbps/ch Error-Free Operation over 300-m MMF of Low-Power-Consumption Silicon-Photonics-Based Chip-Scale Optical I/O Cores Open Access

    Kenichiro YASHIKI  Toshinori UEMURA  Mitsuru KURIHARA  Yasuyuki SUZUKI  Masatoshi TOKUSHIMA  Yasuhiko HAGIHARA  Kazuhiko KURATA  

     
    INVITED PAPER

      Vol:
    E99-C No:2
      Page(s):
    148-156

    Aiming to solve the input/output (I/O) bottleneck concerning next-generation interconnections, 5×5-millimeters-squared silicon-photonics-based chip-scale optical transmitters/receivers (TXs/RXs) — called “optical I/O cores” — were developed. In addition to having a compact footprint, by employing low-power-consumption integrated circuits (ICs), as well as providing multimode-fiber (MMF) transmission in the O band and a user-friendly interface, the developed optical I/O cores allow common ease of use with applications such as multi-chip modules (MCMs) and active optical cables (AOCs). The power consumption of their hybrid-integrated ICs is 5mW/Gbps. Their high-density user-friendly optical interface has a spot-size-converter (SSC) function and permits the physical contact against the outer waveguides. As a result, they provide large enough misalignment tolerance to allow use of passive alignment and visual alignment. In a performance test, they demonstrated 25-Gbps/ch error-free operation over 300-m MMF.

601-620hit(2923hit)