The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SAFE(77hit)

41-60hit(77hit)

  • Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation

    Heejin PARK  Dong Kyue KIM  

     
    PAPER-Information Network

      Vol:
    E94-D No:6
      Page(s):
    1210-1215

    A safe prime p is a prime such that (p-1)/2 is also a prime. A primality test or a safe primality test is normally a combination of trial division and a probabilistic primality test. Since the number of small odd primes used in the trial division affects the performance of the combination, researchers have studied how to obtain the optimal number of small odd primes to be used in the trial division and the expected running time of the combination for primality tests. However, in the case of safe primality tests, the analysis of the combination is more difficult, and thus no such results have been given. In this paper, we present the first probabilistic analysis on the expected running time and the optimal number of small odd primes to be used in the trial division for optimizing the tests. Experimental results show that our probabilistic analysis estimates the behavior of the safe primality tests very well.

  • Effects on Productivity and Safety of Map and Augmented Reality Navigation Paradigms

    Kyong-Ho KIM  Kwang-Yun WOHN  

     
    PAPER-Human-computer Interaction

      Vol:
    E94-D No:5
      Page(s):
    1051-1061

    Navigation systems providing route-guidance and traffic information are one of the most widely used driver-support systems these days. Most navigation systems are based on the map paradigm which plots the driving route in an abstracted version of a two-dimensional electronic map. Recently, a new navigation paradigm was introduced that is based on the augmented reality (AR) paradigm which displays the driving route by superimposing virtual objects on the real scene. These two paradigms have their own innate characteristics from the point of human cognition, and so complement each other rather than compete with each other. Regardless of the paradigm, the role of any navigation system is to support the driver in achieving his driving goals. The objective of this work is to investigate how these map and AR navigation paradigms impact the achievement of the driving goals: productivity and safety. We performed comparative experiments using a driving simulator and computers with 38 subjects. For the effects on productivity, driver's performance on three levels (control level, tactical level, and strategic level) of driving tasks was measured for each map and AR navigation condition. For the effects on safety, driver's situation awareness of safety-related events on the road was measured. To find how these navigation paradigms impose visual cognitive workload on driver, we tracked driver's eye movements. As a special factor of driving performance, route decision making at the complex decision points such as junction, overpass, and underpass was investigated additionally. Participant's subjective workload was assessed using the Driving Activity Load Index (DALI). Results indicated that there was little difference between the two navigation paradigms on driving performance. AR navigation attracted driver's visual attention more frequently than map navigation and then reduces awareness of and proper action for the safety-related events. AR navigation was faster and better to support route decision making at the complex decision points. According to the subjective workload assessment, AR navigation was visually and temporally more demanding.

  • Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment

    Jangseong KIM  Taeshik SHON  Kwangjo KIM  

     
    LETTER

      Vol:
    E94-B No:3
      Page(s):
    686-689

    In this paper, we establish our child safety system model related to the addressing contradictory issue of wireless sensor networks caused by the mutual authentication and privacy protection of an end-user. Based on the system model, we propose the novel location-aware and privacy-preserving approach for providing child safety over wireless sensor networks. Although we illustrate our protocol over the sensor networks, the proposed protocol can be operated by various wireless networks (e.g., WiFi and UWB) which can support RSSI (Received Signal Strength Indication). Compared to a few previous works, the proposed approach can show the potential of enhancing accuracy with location information, preserve the privacy of an end-user, and provide the capability of controlling the child safety service to an end-user.

  • RAMC: A RSU-Assisted Multi-Channel Coordination MAC Protocol for VANET

    Kai LIU  Jinhua GUO  Ning LU  Fuqiang LIU  Xinhong WANG  Ping WANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:1
      Page(s):
    203-214

    Dedicated Short Range Communication (DSRC) employs one control channel for safety-oriented applications and six service channels for non-safety commercial applications. However, most existing multi-channel schemes require all neighboring vehicles periodically (e.g. every 100 milliseconds) tune to the control channel for a full update of safety-oriented data before they can switch to the service channels for non-safety services. The safety exchange interval increases with the increase of traffic density. Consequently, under high traffic densities, the service channels are often completely idle while the control channel is congested. We propose a RSU Assisted Multi-channel Coordination MAC (RAMC) protocol that fully utilizes all channels to provide simultaneous safety and non-safety communications. Within the radio range of a roadside unit (RSU), vehicles are free to tune to any service channel. The RSU monitors all the safety messages being transmitted in both the control and service channels. Periodically, the RSU broadcasts a consolidated traffic view report to all neighboring vehicles in all channels. Therefore, a vehicle can operate in a service channel as long as it needs to achieve high throughput for non-safety applications, while maintaining adequate and timely safety awareness. Our simulation results show that the proposed RAMC protocol consistently achieves very high percentage of non-safety usage, while maintaining high safety message delivery ratios in various traffic density conditions.

  • New Safety Support System for Children on School Routes Using Mobile Ad Hoc Networks

    Atsushi ITO  Yoshiaki KAKUDA  Tomoyuki OHTA  Shinji INOUE  

     
    PAPER-Assurance

      Vol:
    E94-B No:1
      Page(s):
    18-29

    One of the most important duties of government is to maintain safety. In 2007, the Ministry of Internal Affairs and Communications of Japan tested 16 different models of a safety support system for children on school routes. One of the models was constructed and tested at a school in an area of the city of Hiroshima from September to December of 2007. A consortium was established by the city of Hiroshima; Hiroshima City University; Chugoku Electric Power Co., Inc.; and KDDI Corporation to conduct this project. For the model project, we developed a new safety support system for children on school routes by using a mobile ad hoc network constructed from mobile phones with the Bluetooth function. About 500 students and 50 volunteers used this system for four months. The support system provided good performance and accuracy in maintaining the safety of students on the way to school [7]. The basic idea of the safety support system is the grouping of children and volunteers using a mobile ad hoc network. In this paper, we present an outline of this system and evaluate the performance of grouping and the effectiveness of our approach.

  • K-D Decision Tree: An Accelerated and Memory Efficient Nearest Neighbor Classifier

    Tomoyuki SHIBATA  Toshikazu WADA  

     
    PAPER

      Vol:
    E93-D No:7
      Page(s):
    1670-1681

    This paper presents a novel algorithm for Nearest Neighbor (NN) classifier. NN classification is a well-known method of pattern classification having the following properties: * it performs maximum-margin classification and achieves less than twice the ideal Bayesian error, * it does not require knowledge of pattern distributions, kernel functions or base classifiers, and * it can naturally be applied to multiclass classification problems. Among the drawbacks are A) inefficient memory use and B) ineffective pattern classification speed. This paper deals with the problems A and B. In most cases, NN search algorithms, such as k-d tree, are employed as a pattern search engine of the NN classifier. However, NN classification does not always require the NN search. Based on this idea, we propose a novel algorithm named k-d decision tree (KDDT). Since KDDT uses Voronoi-condensed prototypes, it consumes less memory than naive NN classifiers. We have confirmed that KDDT is much faster than NN search-based classifier through a comparative experiment (from 9 to 369 times faster than NN search based classifier). Furthermore, in order to extend applicability of the KDDT algorithm to high-dimensional NN classification, we modified it by incorporating Gabriel editing or RNG editing instead of Voronoi condensing. Through experiments using simulated and real data, we have confirmed the modified KDDT algorithms are superior to the original one.

  • A Study of Capture-Safe Test Generation Flow for At-Speed Testing

    Kohei MIYASE  Xiaoqing WEN  Seiji KAJIHARA  Yuta YAMATO  Atsushi TAKASHIMA  Hiroshi FURUKAWA  Kenji NODA  Hideaki ITO  Kazumi HATAYAMA  Takashi AIKYO  Kewal K. SALUJA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E93-A No:7
      Page(s):
    1309-1318

    Capture-safety, (defined as the avoidance of timing error due to unduly high launch switching activity in capture mode during at-speed scan testing), is critical in avoiding test induced yield loss. Although several sophisticated techniques are available for reducing capture IR-drop, there are few complete capture-safe test generation flows. This paper addresses the problem by proposing a novel and practical capture-safe test generation flow, featuring (1) a complete capture-safe test generation flow; (2) reliable capture-safety checking; and (3) effective capture-safety improvement by combining X-bit identification & X-filling with low launch-switching-activity test generation. The proposed flow minimizes test data inflation and is compatible with existing automatic test pattern generation (ATPG) flow. The techniques proposed in the flow achieve capture-safety without changing the circuit-under-test or the clocking scheme.

  • Consistency Checking of Safety and Availability in Access Control

    Ruixuan LI  Jianfeng LU  Zhengding LU  Xiaopu MA  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    491-502

    The safety and availability policies are very important in an access control system for ensuring security and success when performing a certain task. However, conflicts may arise between safety and availability policies due to their opposite focuses. In this paper, we address the problem of consistency checking for safety and availability policies, especially for the co-existence of static separation-of-duty (SSoD) policies with availability policies, which determines whether there exists an access control state that satisfies all of these policies. We present criteria for determining consistency with a number of special cases, and show that the general case and partial subcases of the problem are intractable (NP-hard) and in the Polynomial Hierarchy NPNP. We design an algorithm to efficiently solve the nontrivial size instances for the intractable cases of the problem. The running example shows the validity of the proposed algorithm. The investigation will help the security officer to specify reasonable access control policies when both safety and availability policies coexist.

  • A Conservative Framework for Safety-Failure Checking

    Frederic BEAL  Tomohiro YONEDA  Chris J. MYERS  

     
    PAPER-Verification and Timing Analysis

      Vol:
    E91-D No:3
      Page(s):
    642-654

    We present a new framework for checking safety failures. The approach is based on the conservative inference of the internal states of a system by the observation of the interaction with its environment. It is based on two similar mechanisms : forward implication, which performs the analysis of the consequences of an input applied to the system, and backward implication, that performs the same task for an output transition. While being a very simple approach, it is general and we believe it can yield efficient algorithms in different safety-failure checking problems. As a case study, we have applied this framework to an existing problem, the hazard checking in (speed-independent) asynchronous circuits. Our new methodology yields an efficient algorithm that performs better or as well as all existing algorithms, while being more general than the fastest one.

  • Support by Warning or by Action: Which is Appropriate under Mismatches between Driver Intent and Traffic Conditions?

    Toshiyuki INAGAKI  Makoto ITOH  Yoshitomo NAGAI  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E90-A No:11
      Page(s):
    2540-2545

    This paper tries to answer the following question: What type of support should be given to an automobile driver when it is determined, via some method to monitor the driver's behavior and the traffic environment, that the driver's intent may not be appropriate to a traffic condition? With a medium fidelity, moving-base driving simulator, three conditions were compared: (a) Warning type support in which an auditory warning is given to the driver to enhance his/her situation recognition, (b) action type support in which an autonomous safety control action is executed to avoid an accident, and (c) the baseline condition in which no driver support is given. Results were as follows: (1) Either type of driver support was effective in accident prevention. (2) Acceptance of driver support functions varied context dependently. (3) Participants accepted a system-initiated automation invocation as long as no automation surprises were possible to occur.

  • A Static Bug Detector for Uninitialized Field References in Java Programs

    Sunae SEO  Youil KIM  Hyun-Goo KANG  Taisook HAN  

     
    PAPER-Software Engineering

      Vol:
    E90-D No:10
      Page(s):
    1663-1671

    Correctness of Java programs is important because they are executed in distributed computing environments. The object initialization scheme in the Java programming language is complicated, and this complexity may lead to undesirable semantic bugs. Various tools have been developed for detecting program patterns that might cause errors during program execution. However, current tools cannot identify code patterns in which an uninitialized field is accessed when an object is initialized. We refer to such erroneous patterns as uninitialized field references. In this paper, we propose a static pattern detection algorithm for identifying uninitialized field references. We design a sound analysis for this problem and implement an analyzer using the Soot framework. In addition, we apply our algorithm to some real Java applications. From the experiments, we identify 12 suspicious field references in the applications, and among those we find two suspected errors by manual inspection.

  • A MFCC-Based CELP Speech Coder for Server-Based Speech Recognition in Network Environments

    Jae Sam YOON  Gil Ho LEE  Hong Kook KIM  

     
    PAPER-Speech/Audio Processing

      Vol:
    E90-A No:3
      Page(s):
    626-632

    Existing standard speech coders can provide high quality speech communication. However, they tend to degrade the performance of automatic speech recognition (ASR) systems that use the reconstructed speech. The main cause of the degradation is in that the linear predictive coefficients (LPCs), which are typical spectral envelope parameters in speech coding, are optimized to speech quality rather than to the performance of speech recognition. In this paper, we propose a speech coder using mel-frequency cepstral coefficients (MFCCs) instead of LPCs to improve the performance of a server-based speech recognition system in network environments. To develop the proposed speech coder with a low-bit rate, we first explore the interframe correlation of MFCCs, which results in the predictive quantization of MFCC. Second, a safety-net scheme is proposed to make the MFCC-based speech coder robust to channel errors. As a result, we propose an 8.7 kbps MFCC-based CELP coder. It is shown that the proposed speech coder has a comparable speech quality to 8 kbps G.729 and the ASR system using the proposed speech coder gives the relative word error rate reduction by 6.8% as compared to the ASR system using G.729 on a large vocabulary task (AURORA4).

  • Hybrid Analysis of Human Exposure from Base-Station Antennas in Underground Environment

    Jianqing WANG  Masayuki KOMATSU  Osamu FUJIWARA  Shinji UEBAYASHI  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E89-B No:12
      Page(s):
    3411-3416

    In this study we have employed an effective technique for dosimetric analyses of base station antennas in an underground environment. The technique combines a ray-tracing method and the finite-difference time-domain (FDTD) method to calculate the specific absorption rate (SAR) in the human body. The ray-tracing method was applied to evaluate the incident fields in relation to the exposed subject in a three-dimensional space, while the FDTD method was used to calculate the detailed SAR distributions in the human body. A scenario under an underground passage with the installation of a top-loaded monopole antenna was analyzed to investigate the relationship between the actual antenna exposure and a plane-wave exposure. The results show that the plane-wave exposure overestimated the whole-body average SAR in most cases, although this was not always true for peak SAR. The finding implies not only the usefulness of the present uniform-exposure-based reference level for the whole-body average SAR evaluation but also the necessity of modeling actual underground environment for high-precision local peak SAR evaluation.

  • Partial Order Reduction for Detecting Safety and Timing Failures of Timed Circuits

    Denduang PRADUBSUWUN  Tomohiro YONEDA  Chris MYERS  

     
    PAPER-Dependable Computing

      Vol:
    E88-D No:7
      Page(s):
    1646-1661

    This paper proposes a partial order reduction algorithm for timed trace theoretic verification in order to detect both safety failures and timing failures of timed circuits efficiently. This algorithm is based on the framework of timed trace theoretic verification according to the original untimed trace theory. Consequently, its conformance checking supports hierarchical structure when verifying timed circuits. Experimenting with the STARI and DME circuits, the proposed approach shows its effectiveness.

  • High-Tc SQUID Metal Detection System for Food and Pharmaceutical Contaminants

    Saburo TANAKA  Shozen KUDO  Yoshimi HATSUKADE  Tatsuoki NAGAISHI  Kazuaki NISHI  Hajime OTA  Shuichi SUZUKI  

     
    INVITED PAPER

      Vol:
    E88-C No:2
      Page(s):
    175-179

    There is a possibility that individuals ingest contaminants that have been accidentally mixed with food because processed foods have become very common. Therefore a detection method of small contaminants in food and pharmaceuticals is required. High-Tc SQUID detection systems for metallic contaminants in foods and drugs have been developed for safety purposes. We developed two systems; one large system is for meat blocks and the other small system is for powdered drugs or packaged foods. Both systems consist of SQUID magnetometers, a permanent magnet for magnetization and a belt conveyor. All samples were magnetized before measurements and detected by high Tc SQUIDs. As a result, we successfully detected small syringe needles with a length of 2 mm in a meat block and a stainless steel ball as small as 0.3 mm in diameter.

  • Safety Verification of Material Handling Systems Driven by Programmable Logic Controller--Consideration of Physical Behavior of Plants--

    Eiji KONAKA  Tatsuya SUZUKI  Shigeru OKUMA  

     
    PAPER

      Vol:
    E87-A No:4
      Page(s):
    843-849

    The PLC (Programmable Logic Controller) has been widely used in the industrial world as a controller for manufacturing systems, as a process controller and so on. The conventional PLC has been designed and verified as a pure Discrete Event System (DES) by using an abstract model of a controlled plant. In verifying the PLC, however, it is also important to take into account the physical behavior (e.g. dynamics, shape of objects) of the controlled plant in order to guarantee such important factors as safety. This paper presents a new verification technique for the PLC-based control system, which takes into account these physical behaviors, based on a Hybrid Dynamical System (HDS) framework. The other key idea described in the paper is the introduction of the concept of signed distance which not only measures the distance between two objects but also checks whether two objects interfere with each other. The developed idea is applied to illustrative material handling problems, and its usefulness is demonstrated.

  • The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem

    Masakazu SOSHI  Mamoru MAEKAWA  Eiji OKAMOTO  

     
    PAPER-Applications

      Vol:
    E87-A No:1
      Page(s):
    190-203

    The safety problem in access matrix models determines whether a given subject can eventually obtain access privilege to a given object. Generally speaking, the safety problem is, unfortunately undecidable. Not much is known about protection systems for which the safety problem is decidable, except for strongly constrained systems (e.g., monotonic systems). Therefore, we propose the Dynamic-Typed Access Matrix (DTAM) Model, which extends the Typed Access Matrix model of Sandhu by allowing the type of an object to change dynamically. The DTAM model has an advantage that it can describe non-monotonic protection systems for which the safety problem is decidable. In particular, with further restrictions, we can show that the problem becomes NP-hard. In this paper, we formally define the DTAM model and then discuss various aspects of it thoroughly.

  • Robust and Fast Stereovision Based Obstacles Detection for Driving Safety Assistance

    Raphael LABAYRADE  Didier AUBERT  

     
    PAPER-ITS

      Vol:
    E87-D No:1
      Page(s):
    80-88

    This paper deals with a first evaluation of the efficiency and the robustness of the real-time "v-disparity" algorithm in stereovision for generic road obstacles detection towards various types of obstacles (vehicle, pedestrian, motorbike, cyclist, boxes) and under adverse conditions (day, night, rain, glowing effect, noise and false matches in the disparity map). The theoretical good properties of the "v-disparity" algorithm--accuracy, robustness, computational speed--are experimentally confirmed. The good results obtained allow us to use this stereo algorithm as the onboard perception process for Driving Safety Assistance: conductor warning and longitudinal control of a low speed automated vehicle (using a second order sliding mode control) in difficult and original situations, at frame rate using no special hardware. Results of experiments--Vehicle following at low speed, Stop'n'Go, Stop on Obstacle (pedestrian, fallen motorbike, load dropping obstacle)--are presented.

  • Analyzing the Impact of Data Errors in Safety-Critical Control Systems

    Orjan ASKERDAL  Magnus GAFVERT  Martin HILLER  Neeraj SURI  

     
    PAPER-Verification and Dependability Analysis

      Vol:
    E86-D No:12
      Page(s):
    2623-2633

    Computers are increasingly used for implementing control algorithms in safety-critical embedded applications, such as engine control, braking control and flight surface control. Consequently, computer errors can have severe impact on the safety of such systems. Addressing the coupling of control performance with computer related errors, this paper develops a methodology for analyzing the impacts data errors have on control system dependability. The impact of a data error is measured as the resulting control error. We use maximum bounds on this measure as the criterion for control system failure (i.e., if the control error exceeds a certain threshold, the system has failed). In this paper we a) develop suitable models of computer faults for analysis of control level effects and related analysis methods, and b) apply traditional control theory analysis methods for understanding the impacts of data errors on system dependability. An automobile slip-control brake-system is used as an example showing the viability of our approach.

  • Railways and Space -- Their Assurance System

    Shuichiro YAMANOUCHI  

     
    INVITED PAPER

      Vol:
    E86-D No:10
      Page(s):
    2063-2069

    Assurance improvement is the most challenging task both in railway and space areas, even though their required technologies are different. It can be said that the railways have been achieving the extremely high assurance level through their long history and experience, while the space area has not accumulated enough experience in addition to their requirement of highly advanced technology. As a result, the latter places more emphasis on theoretical analyses for ensuring the assurance. This paper introduces the two different approaches of railway and space areas toward assurance, and compares the two methods.

41-60hit(77hit)