The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SC(4570hit)

3481-3500hit(4570hit)

  • Fast Computation over Elliptic Curves E(Fqn) Based on Optimal Addition Sequences

    Yukio TSURUOKA  Kenji KOYAMA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    114-119

    A fast method for computing a multiple mP for a point P on elliptic curves is proposed. This new method is based on optimal addition sequences and the Frobenius map. The new method can be effectively applied to elliptic curves E(Fqn), where q is a prime power of medium size (e.g., q 128). When we compute mP over curves E(Fqn) with qn of nearly 160-bits and 11 q 128, the new method requires less elliptic curve additions than previously proposed methods. In this case, the average number of elliptic curve additions ranges from 40 to 50.

  • Discovering Knowledge from Graph Structured Data by Using Refutably Inductive Inference of Formal Graph Systems

    Tetsuhiro MIYAHARA  Tomoyuki UCHIDA  Takayoshi SHOUDAI  Tetsuji KUBOYAMA  Kenichi TAKAHASHI  Hiroaki UEDA  

     
    PAPER

      Vol:
    E84-D No:1
      Page(s):
    48-56

    We present a new method for discovering knowledge from structured data which are represented by graphs in the framework of Inductive Logic Programming. A graph, or network, is widely used for representing relations between various data and expressing a small and easily understandable hypothesis. The analyzing system directly manipulating graphs is useful for knowledge discovery. Our method uses Formal Graph System (FGS) as a knowledge representation language for graph structured data. FGS is a kind of logic programming system which directly deals with graphs just like first order terms. And our method employs a refutably inductive inference algorithm as a learning algorithm. A refutably inductive inference algorithm is a special type of inductive inference algorithm with refutability of hypothesis spaces, and is suitable for knowledge discovery. We give a sufficiently large hypothesis space, the set of weakly reducing FGS programs. And we show that this hypothesis space is refutably inferable from complete data. We have designed and implemented a prototype of a knowledge discovery system KD-FGS, which is based on our method and acquires knowledge directly from graph structured data. Finally we discuss the applicability of our method for graph structured data with experimental results on some graph theoretical notions.

  • A Subscriber-Excluding and Traitor-Tracing Broadcast Distribution System

    Maki YOSHIDA  Toru FUJIWARA  

     
    PAPER

      Vol:
    E84-A No:1
      Page(s):
    247-255

    A broadcast distribution system (BDS) is a system for the distribution of digital contents over broadcast channel where the data supplier broadcasts the contents in encrypted form and gives each subscriber a decoder containing a secret decryption key. A traitor is a subscriber who offers the information which allows to decrypt the broadcast. When a pirate decoder is captured, if at least one traitor can be identified from it, a BDS is said to be traitor-tracing. If the data supplier can prevent subscribers from obtaining the contents without recalling their decoders, a BDS is said to be subscriber-excluding. In this paper, we propose an efficient BDS which is both subscriber-excluding and traitor-tracing. We use similar mathematics to a threshold cryptosystem. In the proposed BDS, the maximum number of excluded subscribers reaches the maximum number of traitors in a coalition for which at least one traitor can be identified. We prove that the proposed BDS is secure against ciphertext-only attack if and only if ElGamal cryptosystem is secure against the attack and the discrete logarithm problem is hard. The proposed BDS is the first one which satisfies all the following features: Both subscriber-excluding and traitor-tracing, identifying all the traitors, black box tracing and public key system.

  • Compound Scattering Matrix of Targets Aligned in the Range Direction

    Kenji KITAYAMA  Yoshio YAMAGUCHI  Jian YANG  Hiroyoshi YAMADA  

     
    PAPER-Antenna and Propagation

      Vol:
    E84-B No:1
      Page(s):
    81-88

    The Sinclair scattering matrix is defined in a fixed radar range. If a radar target extends in the range direction, the reflected signal or the compound scattering matrix will undergo interaction of multiple reflections. Since scattering matrix is subject to target parameters such as shape, size, orientation, material, and radar parameters as frequency, polarization, and incidence angle, it is difficult to specify a representative scattering matrix of a general target. Therefore we choose the simplest target, wire, and its scattering matrix to examine the effect of targets aligned in the range direction with respect to the compound scattering matrix. First, we present a simple formula for the compound scattering matrix of wires with the phase difference due to spacing. Then, we employed the FDTD method to examine the scattering phenomena, changing the spacing in the range direction. The FDTD result reveals that two wires can become sphere (plate) and dihedral corner reflector (diplane) component generators; and that four wires can become a good helix component generator. These phenomena are verified with a laboratory measurement. From the result, the target decomposition should be carefully carried out in terms of range. If a range resolution of a radar is not high enough, the scattering matrix of the desired target may be affected by the targets behind.

  • Modeling of Static and Dynamic Guard Channel Schemes for Mobile Transactions

    Guan-Chi CHEN  Suh-Yin LEE  

     
    PAPER-Databases

      Vol:
    E84-D No:1
      Page(s):
    87-99

    There are more and more information services provided on the wireless networks. Due to long network delay of wireless links, transactions will be long-lived transactions. In such a situation, the occurrence of handoff is inevitable, and thus a wireless link held by a mobile unit crossing cell boundaries might be forced to terminate. It is undesirable that an active transaction is forced to terminate. A queueing scheme has been proposed to solve the problem of forced termination of transactions in our previous research. However, when 2PL protocol is employed, suspending an active transaction will elongate the lock holding time and thus degrade the system performance. In this paper, we propose two guard channel schemes (GCS), static and dynamic, to reduce the probability of forced termination of transactions. In dynamic GCS, the number of channels reserved in a base station is dynamically assigned according to the number of transaction calls which may handoff to this cell while the number of guard channels is fixed in static GCS. An analytic model based on Markov chain is derived to evaluate the system performance. The correctness of this model is verified by simulation. The experimental results show that a significant improvement is achieved by using the dynamic GCS.

  • Chinese Dialect Identification Based on Genetic Algorithm for Discriminative Training of Bigram Model

    Wuei-He TSAI  Wen-Whei CHANG  

     
    LETTER-Speech and Hearing

      Vol:
    E83-D No:12
      Page(s):
    2183-2185

    A minimum classification error formulation based on genetic algorithm is proposed for discriminative training of the bigram language model. Results of Chinese dialect identification were reported which demonstrate performance improvement with use of the genetic algorithm over the generalized probabilistic descent algorithm.

  • The Automated Cryptanalysis of DFT-Based Speech Scramblers

    Wen-Whei CHANG  Heng-Iang HSU  

     
    PAPER-Speech and Hearing

      Vol:
    E83-D No:12
      Page(s):
    2107-2112

    An automated method for cryptanalysis of DFT-based analog speech scramblers is presented through statistical estimation treatments. In the proposed system, the ciphertext only attack is formulated as a combinatorial optimization problem leading to a search for the most likely key estimate. For greater efficiency, we also explore the benefits of genetic algorithm to develop an estimation method which takes into account the doubly stochastic characteristics of the underlying keyspace. Simulation results indicate that the global explorative properties of genetic algorithms make them very effective at estimating the most likely permutation and by using this estimate significant amount of the intelligibility can be recovered from the ciphertext following the attack on DFT-based speech scramblers.

  • Connection-Based Packet Discarding Scheme for Best Effort Services and Its Evaluation

    Hideki TODE  Shinpei YOTSUI  Hiromasa IKEDA  

     
    PAPER-Internet

      Vol:
    E83-B No:12
      Page(s):
    2685-2693

    In the future Internet, hierarchically classified Quality of Service (QOS) controls will be effective because various connections requiring different QOS are mixed. However, even in such an environment, among the same class connections, performance protection to harmful impact from the other connections and quality differentiation between connections will be required furthermore. In this paper, from this point of view, we focus on the active connections succession time (age of active connections) as a new dimensional criterion for buffer controls. To be concrete, the packet discarding control of congested router's buffer based on active connections is proposed. Moreover, its performance is evaluated through TCP/IP level simulation from the viewpoint of file transfer time. Conventional Internet can be regarded as the environment where only one class traffic exists (unit class environment). The proposed control scheme can provide powerful differentiation capability to avoid the performance disruption of total connections even in the conventional Internet.

  • Decentralized Supervisory Control of Discrete Event Systems with Model Uncertainty

    Seong-Jin PARK  Jong-Tae LIM  

     
    LETTER-Theory of Automata, Formal Language Theory

      Vol:
    E83-D No:12
      Page(s):
    2174-2177

    This paper deals with the decentralized supervisory control problems of uncertain discrete event systems which are represented as a set of some possible models. For a given global specification, this paper provides the necessary and sufficient conditions for the existence of local supervisors to achieve the specification under model uncertainty.

  • Simple and Secure Coin (SAS-Coin)--A Practical Micropayment System

    Manjula SANDIRIGAMA  Akihiro SHIMIZU  Matu-Tarow NODA  

     
    PAPER-Information Security

      Vol:
    E83-A No:12
      Page(s):
    2679-2688

    In this paper we propose SAS-Coin, a very practical micro payment scheme based on a hash chain and a simple one time password authentication protocol called SAS. While it has many desirable features of a coin (anonymity etc.), it has no public key operations at any stage and has very little overheads. Moreover authentication is also available and a session key could be generated for encrypted information supply without any additional cost at all. Since there are no public key operations this is extremely useful for mobile telephone applications. This has sufficient security even for larger payments. Comparative analysis with some of the already proposed systems is also done.

  • CAM Processor Synthesis Based on Behavioral Descriptions

    Nozomu TOGAWA  Tatsuhiko WAKUI  Tatsuhiko YODEN  Makoto TERAJIMA  Masao YANAGISAWA  Tatsuo OHTSUKI  

     
    PAPER-Co-design and High-level Synthesis

      Vol:
    E83-A No:12
      Page(s):
    2464-2473

    CAM (Content Addressable Memory) units are generally designed so that they can be applied to variety of application programs. However, if a particular application runs on CAM units, some functions in CAM units may be often used and other functions may never be used. We consider that appropriate design for CAM units is required depending on the requirements for a given application program. This paper proposes a CAM processor synthesis system based on behavioral descriptions. The input of the system is an application program written in C including CAM functions, and its output is hardware descriptions of a synthesized processor and a binary code executed on it. Since the system determines functions in CAM units and synthesizes a CAM processor depending on the requirements of an application program, we expect that a synthesized CAM processor can execute the application program with small processor area and delay. Experimental results demonstrate its efficiency and effectiveness.

  • Clock Schedule Design for Minimum Realization Cost

    Tomoyuki YODA  Atsushi TAKAHASHI  

     
    PAPER-Performance Optimization

      Vol:
    E83-A No:12
      Page(s):
    2552-2557

    A semi-synchronous circuit is a circuit in which the clock is assumed to be distributed periodically to each individual register, though not necessarily to all registers simultaneously. In this paper, we propose an algorithm to achieve the target clock period by modifying a given target clock schedule as small as possible, where the realization cost of the target clock schedule is assumed to be minimum. The proposed algorithm iteratively improves a feasible clock schedule. The algorithm finds a set of registers that can reduce the cost by changing their clock timings with same amount, and changes the clock timing with optimal amount. Experiments show that the algorithm achieves the target clock period with fewer modifications.

  • Bistatic Radar Moving Returns from Sea Surface

    Ali KHENCHAF  Olivier AIRIAU  

     
    PAPER-Rough Surface Scattering

      Vol:
    E83-C No:12
      Page(s):
    1827-1835

    A program is developed to simulate the signal received by a bistatic pulse radar for a defined scenario. The signal collected at the receiving antenna is calculated as a function of time by taking into account the vectorial aspect of the electromagnetic waves and various elements operating in the radar radiolink. The radar radiolink is designed in a modular structure for a general configuration where the transmitter, the target and the receiver are moving. Modules such as elements characterizing the antennas radiation or defining the target scattering can be inserted in accordance with the desired radar scenario. Then the developed model permits to simulate a wide range of radar scenarios where returns from targets and clutter can be individually processed and their characteristics can be investigated in time or frequency. The interest of this model is great because it permits, for a defined scenario, to generate radar data which can be used in signal processing algorithms for target detection, clutter suppression or target classification. This paper shows the implementation of the simulation program considering a concrete radar scenario. The presented scenario deals with the simulation of the sea clutter occurring in a bistatic radar radiolink over the sea surface. In this application where the sea surface is considered as the target, the electric field scattered from the sea surface is calculated by assuming that the surface is described by two independent scales of roughness.

  • Measurement of a Depth Profile in a Random Medium Using Coherent Backscattering of Light

    Yasuyuki OKAMURA  Sadahiko YAMAMOTO  

     
    PAPER-Scattering and Propagation in Random Media

      Vol:
    E83-C No:12
      Page(s):
    1809-1813

    An averaged intensity peak profile of light scattered from a random medium depends on a thickness of a sample as well as parameters such as a volume fraction and a size of particles composing the medium. We used this dependence to measure a depth profile varied in the random medium. We demonstrated the possible simultaneous measurement of a transport mean free path and a depth of an aqueous suspension of titanium particles.

  • Numerical Analysis of Bistatic Cross-Sections of Conducting Circular Cylinders Embedded in Continuous Random Media

    Zhi Qi MENG  Natsuki YAMASAKI  Mitsuo TATEIBA  

     
    PAPER-Scattering and Propagation in Random Media

      Vol:
    E83-C No:12
      Page(s):
    1814-1819

    To make clear numerically the scattering characteristics for a body embedded in a random medium, we need to analyze the bistatic cross-section (BCS). The scattering problem can be analyzed as a boundary value problem by using current generator method. The fourth moment of Green's functions in the random medium, which is necessary for the analysis, is obtained approximately by two-scale method. We analyze numerically the BCS of conducting circular cylinders in continuous random media, which are assumed to fluctuate about the dielectric constant of free space. The numerical results agree well with the law of energy conservation. The effects of random media on the BCS are also clarified numerically.

  • A Study on the Electromagnetic Backscattering from Wind-Roughened Water Surfaces

    Maurizio MIGLIACCIO  Maurizio SARTI  

     
    INVITED PAPER-Rough Surface Scattering

      Vol:
    E83-C No:12
      Page(s):
    1820-1826

    In this paper we report the results of a study regarding the backscattering from wind-roughened water surfaces. The reference profile data has been deducted by an experiment held at the University of Heidelberg circular wave tank facility. The scattering theory is based on a fractal description of the surface and a combined use of the Kirchhoff approximation and the small perturbation method (SPM). The scattering results are tested versus the ones obtained via the periodic-surface moment method. The study shows the reliability of the novel approach.

  • Comparison of Scattered Power from a Layer with Randomly Distributed Lossy Spheres of High Dielectric Constant by Using Radiative Transfer Theory

    Tsuyoshi MATSUOKA  Mitsuo TATEIBA  

     
    PAPER-Scattering and Propagation in Random Media

      Vol:
    E83-C No:12
      Page(s):
    1803-1808

    This paper deals with the scattering problem of a layer where many spherical lossy particles of high dielectric constant are randomly distributed. A radiative transfer equation is used to calculate the scattering cross section of the layer. Four different multiple scattering methods are applied to determine the coefficients of the equation. The scattering cross sections of the four methods are compared by changing the incident angle and polarization of incident waves and the layer thickness. The comparison shows that the scattering cross section fairly depends on the multiple scattering methods and that we need to use an appropriate multiple scattering method for a scattering problem when using a radiative transfer equation.

  • FVTD Simulation for Random Rough Dielectric Surface Scattering at Low Grazing Angle

    Kwang-Yeol YOON  Mitsuo TATEIBA  Kazunori UCHIDA  

     
    PAPER-Rough Surface Scattering

      Vol:
    E83-C No:12
      Page(s):
    1836-1843

    The finite volume time domain (FVTD) method is applied to electromagnetic wave scattering from random rough dielectric surfaces. In order to gain a better understanding of physics of backscattering of microwave from rough surface, this paper treats both horizontal and vertical polarizations especially at low- grazing angle. The results are compared with those obtained by the Integral equation method and the small perturbation method as well as with the experimental data. We have shown that the present method yields a reasonable solution even at LGA. It should be noted that the number of sampling points per wavelength for a rough surface problem should be increased when more accurate numerical results are required, which fact makes the computer simulation impossible at LGA for a stable result. However, when the extrapolation is used for calculating the scattered field, an accurate result can be estimated. If we want to obtain the ratio of backscattering between the horizontal and vertical polarization, we do not need the large number of sampling points.

  • The Phase Shift at Brewster's Angle on a Slightly Rough Surface

    Tetsuya KAWANISHI  

     
    PAPER-Rough Surface Scattering

      Vol:
    E83-C No:12
      Page(s):
    1844-1848

    The mean reflection and transmission coefficients of electromagnetic waves incident onto a two-dimensional slightly random dielectric surface are investigated by means of the stochastic functional approach. We discuss the shift of Brewster's scattering angle using the Wiener kernels and numerical calculations. It is also shown that the phase shift at the reflection into Brewster's angle for a flat surface does not depend on the rms height of the surface, but does on the correlation length of the surface.

  • Imaging of Strongly Scattering Targets Based on Signal Processing Algorithms

    Markus TESTORF  Andres MORALES-PORRAS  Michael FIDDY  

     
    PAPER-SAR Interferometry and Signal Processing

      Vol:
    E83-C No:12
      Page(s):
    1905-1911

    A signal processing approach is discussed which has the potential for imaging strongly scattering objects from a series of scattering experiments. The method is based on a linear spectral estimation technique to replace the filtered backpropagation for limited discrete data and a subsequent nonlinear signal processing step to remove the contribution of multiple scattering my means of homomorphic filtering. Details of this approach are discussed and illustrated by applying the imaging algorithm to both simulated and real data.

3481-3500hit(4570hit)