The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RP(993hit)

101-120hit(993hit)

  • Amplification Characteristics of a Phase-Sensitive Amplifier of a Chirped Optical Pulse

    Kyo INOUE  

     
    PAPER-Lasers, Quantum Electronics

      Pubricized:
    2019/06/07
      Vol:
    E102-C No:11
      Page(s):
    818-824

    Phase-sensitive amplification (PSA) has unique properties, such as the quantum-limited noise figure of 0 dB and the phase clamping effect. This study investigates PSA characteristics when a chirped pulse is incident. The signal gain, the output waveform, and the noise figure for an optical pulse having been chirped through chromatic dispersion or self-phase modulation before amplification are analyzed. The results indicate that the amplification properties for a chirped pulse are different from those of a non-chirped pulse, such that the signal gain is small, the waveform is distorted, and the noise figure is degraded.

  • Vision Based Nighttime Vehicle Detection Using Adaptive Threshold and Multi-Class Classification

    Yuta SAKAGAWA  Kosuke NAKAJIMA  Gosuke OHASHI  

     
    PAPER

      Vol:
    E102-A No:9
      Page(s):
    1235-1245

    We propose a method that detects vehicles from in-vehicle monocular camera images captured during nighttime driving. Detecting vehicles from their shape is difficult at night; however, many vehicle detection methods focusing on light have been proposed. We detect bright spots by appropriate binarization based on the characteristics of vehicle lights such as brightness and color. Also, as the detected bright spots include lights other than vehicles, we need to distinguish the vehicle lights from other bright spots. Therefore, the bright spots were distinguished using Random Forest, a multiclass classification machine-learning algorithm. The features of bright spots not associated with vehicles were effectively utilized in the vehicle detection in our proposed method. More precisely vehicle detection is performed by giving weights to the results of the Random Forest based on the features of vehicle bright spots and the features of bright spots not related to the vehicle. Our proposed method was applied to nighttime images and confirmed effectiveness.

  • A Fast Cross-Validation Algorithm for Kernel Ridge Regression by Eigenvalue Decomposition

    Akira TANAKA  Hideyuki IMAI  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E102-A No:9
      Page(s):
    1317-1320

    A fast cross-validation algorithm for model selection in kernel ridge regression problems is proposed, which is aiming to further reduce the computational cost of the algorithm proposed by An et al. by eigenvalue decomposition of a Gram matrix.

  • A Wideband 16×16-Slot array antenna With Low Side-lobe Design in W-band

    Hao LUO  Wenhao TAN  Luoning GAN  Houjun SUN  

    This paper has been cancelled due to violation of duplicate submission policy on IEICE Transactions on Communications
     
    PAPER-Antennas and Propagation

      Vol:
    E102-B No:8
      Page(s):
    1689-1694

    A W-band corporate-feed 16×16-slot array antenna with low sidelobe level is designed and fabricated. The basic unit of the array is a 2×2-circular-slot subarray with step square cavities and uses an E-plane waveguide as the feeding line. An efficient method to design an unequal power-splitting ratio but equal phase (UPEP) E-plane waveguide T-junction (E-T) is proposed for constructing a 1-to-64 power-tapering feed network, which is the critical part to realize low sidelobe level. The whole array is fabricated with aluminum by milling and bonded by the vacuum brazing process. The measured results demonstrate that the array can achieve a 7.2% bandwidth with VSWR<1.5 and holistic sidelobe levels lower than -23.5dB in E-plane and H-plane from 89GHz ∼ 95.8GHz. The measured gain is higher than 31.7dBi over the working band with the antenna efficiency better than 67.5%.

  • Weber Centralized Binary Fusion Descriptor for Fingerprint Liveness Detection

    Asera WAYNE ASERA  Masayoshi ARITSUGI  

     
    LETTER-Pattern Recognition

      Pubricized:
    2019/04/17
      Vol:
    E102-D No:7
      Page(s):
    1422-1425

    In this research, we propose a novel method to determine fingerprint liveness to improve the discriminative behavior and classification accuracy of the combined features. This approach detects if a fingerprint is from a live or fake source. In this approach, fingerprint images are analyzed in the differential excitation (DE) component and the centralized binary pattern (CBP) component, which yield the DE image and CBP image, respectively. The images obtained are used to generate a two-dimensional histogram that is subsequently used as a feature vector. To decide if a fingerprint image is from a live or fake source, the feature vector is processed using support vector machine (SVM) classifiers. To evaluate the performance of the proposed method and compare it to existing approaches, we conducted experiments using the datasets from the 2011 and 2015 Liveness Detection Competition (LivDet), collected from four sensors. The results show that the proposed method gave comparable or even better results and further prove that methods derived from combination of features provide a better performance than existing methods.

  • An Enhanced Affinity Graph for Image Segmentation

    Guodong SUN  Kai LIN  Junhao WANG  Yang ZHANG  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2019/02/04
      Vol:
    E102-D No:5
      Page(s):
    1073-1080

    This paper proposes an enhanced affinity graph (EA-graph) for image segmentation. Firstly, the original image is over-segmented to obtain several sets of superpixels with different scales, and the color and texture features of the superpixels are extracted. Then, the similarity relationship between neighborhood superpixels is used to construct the local affinity graph. Meanwhile, the global affinity graph is obtained by sparse reconstruction among all superpixels. The local affinity graph and global affinity graph are superimposed to obtain an enhanced affinity graph for eliminating the influences of noise and isolated regions in the image. Finally, a bipartite graph is introduced to express the affiliation between pixels and superpixels, and segmentation is performed using a spectral clustering algorithm. Experimental results on the Berkeley segmentation database demonstrate that our method achieves significantly better performance compared to state-of-the-art algorithms.

  • Fast Superpixel Segmentation via Boundary Sampling and Interpolation

    Li XU  Bing LUO  Mingming KONG  Bo LI  Zheng PEI  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2019/01/22
      Vol:
    E102-D No:4
      Page(s):
    871-874

    This letter proposes a fast superpixel segmentation method based on boundary sampling and interpolation. The basic idea is as follow: instead of labeling local region pixels, we estimate superpixel boundary by interpolating candidate boundary pixel from a down-sampling image segmentation. On the one hand, there exists high spatial redundancy within each local region, which could be discarded. On the other hand, we estimate the labels of candidate boundary pixels via sampling superpixel boundary within corresponding neighbour. Benefiting from the reduction of candidate pixel distance calculation, the proposed method significantly accelerates superpixel segmentation. Experiments on BSD500 benchmark demonstrate that our method needs half the time compared with the state-of-the-arts while almost no accuracy reduction.

  • Automatic and Accurate 3D Measurement Based on RGBD Saliency Detection

    Yibo JIANG  Hui BI  Hui LI  Zhihao XU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2018/12/21
      Vol:
    E102-D No:3
      Page(s):
    688-689

    The 3D measurement is widely required in modern industries. In this letter, a method based on the RGBD saliency detection with depth range adjusting (RGBD-DRA) is proposed for 3D measurement. By using superpixels and prior maps, RGBD saliency detection is utilized to detect and measure the target object automatically Meanwhile, the proposed depth range adjusting is processing while measuring to prompt the measuring accuracy further. The experimental results demonstrate the proposed method automatic and accurate, with 3 mm and 3.77% maximum deviation value and rate, respectively.

  • Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities

    Toshiki SHIBAHARA  Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Kunio HATO  Masayuki MURATA  

     
    PAPER

      Pubricized:
    2018/10/30
      Vol:
    E102-D No:3
      Page(s):
    430-443

    Many users are exposed to threats of drive-by download attacks through the Web. Attackers compromise vulnerable websites discovered by search engines and redirect clients to malicious websites created with exploit kits. Security researchers and vendors have tried to prevent the attacks by detecting malicious data, i.e., malicious URLs, web content, and redirections. However, attackers conceal parts of malicious data with evasion techniques to circumvent detection systems. In this paper, we propose a system for detecting malicious websites without collecting all malicious data. Even if we cannot observe parts of malicious data, we can always observe compromised websites. Since vulnerable websites are discovered by search engines, compromised websites have similar traits. Therefore, we built a classifier by leveraging not only malicious but also compromised websites. More precisely, we convert all websites observed at the time of access into a redirection graph and classify it by integrating similarities between its subgraphs and redirection subgraphs shared across malicious, benign, and compromised websites. As a result of evaluating our system with crawling data of 455,860 websites, we found that the system achieved a 91.7% true positive rate for malicious websites containing exploit URLs at a low false positive rate of 0.1%. Moreover, it detected 143 more evasive malicious websites than the conventional content-based system.

  • Properties and Judgment of Determiner Sets

    Takafumi GOTO  Koki TANAKA  Mitsuru NAKATA  Qi-Wei GE  

     
    PAPER

      Vol:
    E102-A No:2
      Page(s):
    365-371

    An automorphism of a graph G=(V, E) is such a one-to-one correspondence from vertex set V to itself that all the adjacencies of the vertices are maintained. Given a subset S of V whose one-to-one correspondence is decided, if the vertices of V-S possess unique correspondence in all the automorphisms that satisfy the decided correspondence for S, S is called determiner set of G. Further, S is called minimal determiner set if no proper subset of S is a determiner set and called kernel set if determiner set S with the smallest number of elements. Moreover, a problem to judge whether or not S is a determiner set is called determiner set decision problem. The purpose of this research is to deal with determiner set decision problem. In this paper, we firstly give the definitions and properties related to determiner sets and then propose an algorithm JDS that judges whether a given S is a determiner set of G in polynomial computation time. Finally, we evaluate the proposed algorithm JDS by applying it to possibly find minimal determiner sets for 100 randomly generated graphs. As the result, all the obtained determiner sets are minimal, which implies JDS is a reasonably effective algorithm for the judgement of determiner sets.

  • Hardware-Accelerated Secured Naïve Bayesian Filter Based on Partially Homomorphic Encryption

    Song BIAN  Masayuki HIROMOTO  Takashi SATO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:2
      Page(s):
    430-439

    In this work, we provide the first practical secure email filtering scheme based on homomorphic encryption. Specifically, we construct a secure naïve Bayesian filter (SNBF) using the Paillier scheme, a partially homomorphic encryption (PHE) scheme. We first show that SNBF can be implemented with only the additive homomorphism, thus eliminating the need to employ expensive fully homomorphic schemes. In addition, the design space for specialized hardware architecture realizing SNBF is explored. We utilize a recursive Karatsuba Montgomery structure to accelerate the homomorphic operations, where multiplication of 2048-bit integers are carried out. Through the experiment, both software and hardware versions of the SNBF are implemented. On software, 104-105x runtime and 103x storage reduction are achieved by SNBF, when compared to existing fully homomorphic approaches. By instantiating the designed hardware for SNBF, a further 33x runtime and 1919x power reduction are achieved. The proposed hardware implementation classifies an average-length email in under 0.5s, which is much more practical than existing solutions.

  • Electromagnetic Absorber Made by Natural Rubber Open Access

    Kiadtisak SALAYONG  Titipong LERTWIRIYAPRAPA  Kittisak PHAEBUA  Prayoot AKKARAEKTHALIN  Hsi-Tseng CHOU  

     
    INVITED PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2018/08/21
      Vol:
    E102-B No:2
      Page(s):
    189-196

    This paper proposes fabrication process of a pyramidal electromagnetic (EM) absorber made by natural rubber. The advantage of this research is to generate value-added latex from Thai rubber and to reduce number of chemical absorber by using natural rubber based absorber. The proposed absorber in the research is mainly made from latex with carbon black filler. The proposed absorber is in the form of rubber foam which provides suitable characteristics to serve as an EM absorber. The results of this research are chemical formulas for fabrication of pyramidal rubber foam with carbon black filler. The fabrication cost is very low when compared to an available commercial absorber. The electrical properties of the proposed EM absorber are measured. Also the reflectivity is measured and compared well with a commercial EM absorber.

  • Moving Target Detection and Two-Receiver Setup Using Optical-Fiber-Connected Passive Primary Surveillance Radar

    Masato WATANABE  Junichi HONDA  Takuya OTSUYAMA  

     
    PAPER-Sensing

      Pubricized:
    2018/08/21
      Vol:
    E102-B No:2
      Page(s):
    241-246

    Multi-static Primary Surveillance Radar (MSPSR) has recently attracted attention as a new surveillance technology for civil aviation. Using multiple receivers, Primary Surveillance Radar (PSR) detection performance can be improved by synthesizing the reflection characteristics which change due to the aircraft's position. In this paper, we report experimental results from our proposed optical-fiber-connected passive PSR system with transmit signal installed at the Sendai Airport in Japan. The signal-to noise ratio of experimental data is evaluated to verify moving target detection. In addition, we confirm the operation of the proposed system using a two-receiver setup, to resemble a conventional multi-static radar. Finally, after applying time correction, the delay of the reflected signal from a stationary target remains within the expected range.

  • Organic Thin Film-Assisted Copper Electroless Plating on Flat/Microstructured Silicone Substrates

    Tomoya SATO  Narendra SINGH  Roland HÖNES  Chihiro URATA  Yasutaka MATSUO  Atsushi HOZUMI  

     
    BRIEF PAPER

      Vol:
    E102-C No:2
      Page(s):
    147-150

    Copper (Cu) electroless plating was conducted on planar and microstructured polydimethylsiloxane (PDMS) substrates. In this study, organic thin films terminated with nitrogen (N)-containing groups, e.g. poly (dimethylaminoethyl methacrylate) brush (PDMAEMA), aminopropyl trimethoxysilane monolayer (APTES), and polydopamine (PDA) were used to anchor palladium (Pd) catalyst. While electroless plating was successfully promoted on all sample surfaces, PDMAEMA was found to achieve the best adhesion strength to the PDMS surfaces, compared to APTES- and PDA-covered PDMS substrates, due to covalent bonding, anchoring effects of polymer chains as well as high affinity of N atoms to Pd species. Our process was also successfully applied to the electroless plating of microstructured PDMS substrates.

  • Perpendicular-Corporate Feed in a Four-Layer Circularly-Polarized Parallel-Plate Slot Array

    Hisanori IRIE  Takashi TOMURA  Jiro HIROKAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/07/10
      Vol:
    E102-B No:1
      Page(s):
    137-146

    This paper presents a design for the perpendicular-corporate feed in a four-layer circularly-polarized parallel-plate slot array antenna. We place a dielectric layer with adequate permittivity in the region between the coupling-aperture and the radiating-slot layers to remove x-shaped cavity walls completely in the radiating part of a conventional planar corporate-feed waveguide slot array antenna. To address fabrication constraints, the dielectric layer consists of PTFE and air. It excites a strong standing wave in the region and so provides 2×2-element subarrays with uniform excitation. None of the slot layers are in electrical contact due to air gaps between the slot layers. The four-layer structure with apertures for circular polarization contributes to wideband design for axial ratios because of the eigenmodes in the desired band. We realize an 11.9% bandwidth for axial ratios of less than 3.0dB as confirmed by measurements in the 60GHz band. At the design frequency, the measured realized gain is 32.7dBi with an antenna efficiency of 75.5%.

  • Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts

    Yutaka KAWAI  Takahiro MATSUDA  Takato HIRANO  Yoshihiro KOSEKI  Goichiro HANAOKA  

     
    PAPER

      Vol:
    E102-A No:1
      Page(s):
    81-98

    Homomorphic encryption (HE) is useful to analyze encrypted data without decrypting it. However, by using ordinary HE, a user who can decrypt a ciphertext that is generated by executing homomorphic operations, can also decrypt ciphertexts on which homomorphic evaluations have not been performed, since homomorphic operations cannot be executed among ciphertexts which are encrypted under different public keys. To resolve the above problem, we introduce a new cryptographic primitive called Homomorphic Proxy Re-Encryption (HPRE) combining the “key-switching” property of Proxy Re-Encryption (PRE) and the homomorphic property of HE. In our HPRE, original ciphertexts (which have not been re-encrypted) guarantee CCA2 security (and in particular satisfy non-malleability). On the other hand, re-encrypted ciphertexts only guarantee CPA security, so that homomorphic operations can be performed on them. We define the functional/security requirements of HPRE, and then propose a specific construction supporting the group operation (over the target group in bilinear groups) based on the PRE scheme by Libert and Vergnaud (PKC 2008) and the CCA secure public key encryption scheme by Lai et al. (CT-RSA 2010), and prove its security in the standard model. Additionally, we show two extensions of our HPRE scheme for the group operation: an HPRE scheme for addition and an HPRE scheme for degree-2 polynomials (in which the number of degree-2 terms is constant), by using the technique of the recent work by Catalano and Fiore (ACMCCS 2015).

  • On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers

    Akinori HOSOYAMADA  Kazumaro AOKI  

     
    PAPER

      Vol:
    E102-A No:1
      Page(s):
    27-34

    It has been said that security of symmetric key schemes is not so much affected by quantum computers, compared to public key schemes. However, recent works revealed that, in some specific situations, symmetric key schemes are also broken in polynomial time by adversaries with quantum computers. These works contain a quantum distinguishing attack on 3-round Feistel ciphers and a quantum key recovery attack on the Even-Mansour cipher by Kuwakado and Morii, in addition to the quantum forgery attack on CBC-MAC which is proposed independently by Kaplan et al., and by Santoli and Schaffner. Iterated Even-Mansour cipher is a simple but important block cipher, which can be regarded as an idealization of AES. Whether there exists an efficient quantum algorithm that can break iterated Even-Mansour cipher with independent subkeys is an important problem from the viewpoint of analyzing post-quantum security of block ciphers. Actually there is an efficient quantum attack on iterated Even-Mansour cipher by Kaplan et al., but their attack can only be applied in the case that all subkeys are the same. This paper shows that there is a polynomial time quantum algorithm that recovers partial keys of the iterated Even-Mansour cipher with independent subkeys, in a related-key setting. The related-key condition is somewhat strong, but our algorithm can recover subkeys with two related oracles. In addition, we also show that our algorithm can recover all keys of the i-round iterated Even-Mansour cipher, if we are allowed to access i related quantum oracles. To realize quantum related-key attacks, we extend Simon's quantum algorithm so that we can recover the hidden period of a function that is periodic only up to constant. Our technique is to take differential of the target function to make a double periodic function, and then apply Simon's algorithm.

  • Design of ELF/VLF Chirp-BOK Communication Based on Modulated Heating Low Ionosphere

    Kaijie ZHOU  Huali WANG  Peipei CAO  Zhangkai LUO  

     
    PAPER-Communication Theory and Signals

      Vol:
    E101-A No:12
      Page(s):
    2464-2471

    Excitation of Extremely Low Frequency (ELF)/Very Low Frequency (VLF) from ionosphere,which is artificial modulated by High Frequency (HF) waves can provide a way of antenna generation for deep submarine communication. In this paper, based on plasma energy conservation equation, the theoretical model of amplitude modulation HF pump heating low ionosphere for ELF/VLF generation is established. The linear frequency modulation technique of up-chirp and down-chirp have good self-correlation and cross-correlation, by which information can be transmitted by up-chirp and down-chirp. Thus, the linear frequency modulation technique can be applied to the ionosphere ELF/VLF communication. Based on this, a Chirp-BOK (Binary Orthogonal Keying) communication scheme is proposed. Indeed the Chirp-BOK amplitude and power modulation function are designed by combining the linear frequency modulation technique with the square wave amplitude modulation technique. The simulation results show in the condition that the ionosphere is heated by the Chirp-BOK power modulation HF waves, the temperature of ionospheric electronic and the variations of conductivity have obvious frequency modulation characteristics which are the same as that of power modulation, so does the variation of ionospheric current. Thus, when the ionosphere is heated by Chirp-BOK power modulation HF waves, the up-chirp (symbol ‘0’) and down-chirp (symbol ‘1’) ELF/VLF signals can be generated.

  • Interference-Aware Dynamic Channel Assignment Scheme for Enterprise Small-Cell Networks

    Se-Jin KIM  Sang-Hyun BAE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/06/04
      Vol:
    E101-B No:12
      Page(s):
    2453-2461

    This paper proposes a novel dynamic channel assignment scheme named interference-aware dynamic channel assignment (IA-DCA) for the downlink of enterprise small-cell networks (ESNs) that employ orthogonal frequency division multiple access (OFDMA) and frequency division duplexing (FDD). In ESNs, a lot of small-cell access points (SAPs) are densely deployed in a building and thus small-cell user equipments (SUEs) have more serious co-tier interference from neighbor SAPs than the conventional small-cell network. Therefore, in the proposed IA-DCA scheme, a local gateway (LGW) dynamically assigns different numbers of subchannel groups to SUEs through their serving SAPs according to the given traffic load and interference information. Through simulation results, we show that the proposed IA-DCA scheme outperforms other dynamic channel assignment schemes based on graph coloring algorithm in terms of the mean SUE capacity, fairness, and mean SAP channel utilization.

  • The Development of a High Accuracy Algorithm Based on Small Sample Size for Fingerprint Location in Indoor Parking Lot

    Weibo WANG  Jinghuan SUN  Ruiying DONG  Yongkang ZHENG  Qing HUA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/06/13
      Vol:
    E101-B No:12
      Page(s):
    2479-2486

    Indoor fingerprint location based on WiFi in large-scale indoor parking lots is more and more widely employed for vehicle lookup. However, the challenge is to ensure the location functionality because of the particularity and complexities of the indoor parking lot environment. To reduce the need to deploy of reference points (RPs) and the offline sampling workload, a partition-fitting fingerprint algorithm (P-FP) is proposed. To improve the location accuracy of the target, the PS-FP algorithm, a sampling importance resampling (SIR) particle filter with threshold based on P-FP, is further proposed. Firstly, the entire indoor parking lot is partitioned and the environmental coefficients of each partitioned section are gained by using the polynomial fitting model. To improve the quality of the offline fingerprint database, an error characteristic matrix is established using the difference between the fitting values and the actual measured values. Thus, the virtual RPs are deployed and C-means clustering is utilized to reduce the amount of online computation. To decrease the fluctuation of location coordinates, the SIR particle filter with a threshold setting is adopted to optimize the location coordinates. Finally, the optimal threshold value is obtained by comparing the mean location error. Test results demonstrated that PS-FP could achieve high location accuracy with few RPs and the mean location error is only about 0.7m. The cumulative distribution function (CDF) show that, using PS-FP, 98% of location errors are within 2m. Compared with the weighted K-nearest neighbors (WKNN) algorithm, the location accuracy by PS-FP exhibit an 84% improvement.

101-120hit(993hit)