The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SC(4570hit)

1221-1240hit(4570hit)

  • A Study on the Effective Boundary Condition for Periodic Surfaces with Perfect Conductivity

    Yasuhiko TAMURA  

     
    PAPER-Periodic Structures

      Vol:
    E96-C No:1
      Page(s):
    11-18

    This paper deals with a characteristic of the so-called effective boundary condition for a plane wave scattering from periodic surfaces with perfect conductivity. The perturbation solution with all orders is explicitly given under the effective boundary condition. It is newly found that such a perturbation solution satisfies the optical theorem under the exact boundary condition. A comparison between such a perturbation solution and a reference solution for the exact boundary condition by other methods is performed. Then, the validity of such a perturbation solution is concretely discussed.

  • Key Substitution Attacks on Multisignature Schemes

    Bennian DOU  Hong ZHANG  Chun-Hua CHEN  Chungen XU  

     
    LETTER

      Vol:
    E96-A No:1
      Page(s):
    244-245

    In this letter, we point out that key substitution attacks should be taken into account for multisignature schemes, which implies that the existing security notions for multisignature schemes are not sufficient. As an example, we show that the multisignature scheme proposed by Boldyreva at PKC'03 is susceptible to key substitution attacks.

  • Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme

    Bennian DOU  Hong ZHANG  Chun-Hua CHEN  Chungen XU  

     
    LETTER

      Vol:
    E96-A No:1
      Page(s):
    242-243

    At Eurocrypt'2006, Lu et al. proposed a pairing based verifiably encrypted signature scheme (the LOSSW-VES scheme) without random oracles. In this letter, we show that the LOSSW-VES scheme does not have opacity against rogue-key attacks.

  • Facial Micro-Expression Detection in Hi-Speed Video Based on Facial Action Coding System (FACS)

    Senya POLIKOVSKY  Yoshinari KAMEDA  Yuichi OHTA  

     
    PAPER-Pattern Recognition

      Vol:
    E96-D No:1
      Page(s):
    81-92

    Facial micro-expressions are fast and subtle facial motions that are considered as one of the most useful external signs for detecting hidden emotional changes in a person. However, they are not easy to detect and measure as they appear only for a short time, with small muscle contraction in the facial areas where salient features are not available. We propose a new computer vision method for detecting and measuring timing characteristics of facial micro-expressions. The core of this method is based on a descriptor that combines pre-processing masks, histograms and concatenation of spatial-temporal gradient vectors. Presented 3D gradient histogram descriptor is able to detect and measure the timing characteristics of the fast and subtle changes of the facial skin surface. This method is specifically designed for analysis of videos recorded using a hi-speed 200 fps camera. Final classification of micro expressions is done by using a k-mean classifier and a voting procedure. The Facial Action Coding System was utilized to annotate the appearance and dynamics of the expressions in our new hi-speed micro-expressions video database. The efficiency of the proposed approach was validated using our new hi-speed video database.

  • Numerical Methods for Composite Dielectric Gratings Embedded with Conducting Strips Using Scattering Factors

    Hideaki WAKABAYASHI  Masamitsu ASAI  Keiji MATSUMOTO  Jiro YAMAKITA  

     
    PAPER-Periodic Structures

      Vol:
    E96-C No:1
      Page(s):
    19-27

    We propose a new analytical method for a composite dielectric grating embedded with conducting strips using scattering factors in the shadow theory. The scattering factor in the shadow theory plays an important role instead of the conventional diffraction amplitude. By specifying the relation between scattering factors and spectral-domain Green's functions, we derive expressions of the Green's functions directly for unit surface electric and magnetic current densities, and apply the spectral Galerkin method to our formulation. From some numerical results, we show that the expressions of the Green's functions are valid, and analyze scattering characteristics by composite gratings.

  • A Leakage-Aware CS/CB Scheme for Heterogeneous CoMP Networks with Layered Limited Feedback

    Bijun PENG  Wei CHEN  Yu ZHANG  Ming LEI  Zhigang CAO  Sheng ZHOU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    363-366

    A leakage-aware Coordinated Scheduling/Coordinated Beamforming (CS/CB) scheme for heterogeneous networks with layered limited feedback is proposed. In particular, all pico cells cooperatively select an optimal beamforming vector for the macro cell within a CoMP cluster so as to minimizing leakage power from the macro cell. Simulations show that the proposed scheme outperforms the conventional non-CoMP scheme with perfect channel state information at teansmitter (CSIT). Furthermore, the feedback amount and scheduler complexity is decreased greatly.

  • Complexity Reduction of Iterative MMSE-ML Signal Detection for MIMO SC-FDMA Systems

    Jaeyoung PARK  Jaekwon KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    344-347

    In this letter, we reduce the computational complexity of the conventional iterative MMSE-ML signal detection method for multiple input multiple output (MIMO) single carrier FDMA (SC-FDMA) systems, without compromising the error performance. Complexity analysis confirms the efficacy of the proposed modification.

  • Semi-Analytical Method for Scattering by Finite Array of Magnetized Ferrite Circular Cylinders Based on the Model of Cylindrical Structures

    Vakhtang JANDIERI  Kiyotoshi YASUMOTO  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E96-C No:1
      Page(s):
    115-118

    A semi-analytical method for a planar periodic array formed by a finite number of magnetized ferrite circular cylinders is presented using a model of layered cylindrical structures. The method uses the T-matrix approach and the extraction of the reflection and transmission matrices based on the cylindrical harmonic mode expansion. Based on the proposed method, plane wave scattering by the finite number of magnetized ferrite circular cylinders is numerically studied from the viewpoint of realization the electronic switching and electronic scanning effects by varying the applied magnetic field.

  • Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines

    Kuniyasu SUZAKI  Kengo IIJIMA  Toshiki YAGI  Cyrille ARTHO  

     
    PAPER-System Security

      Vol:
    E96-A No:1
      Page(s):
    215-224

    Memory deduplication improves the utilization of physical memory by sharing identical blocks of data. Although memory deduplication is most effective when many virtual machines with same operating systems run on a CPU, cross-user memory deduplication is a covert channel and causes serious memory disclosure attack. It reveals the existence of an application or file on another virtual machine. The covert channel is a difference in write access time on deduplicated memory pages that are re-created by Copy-On-Write, but it has some interferences caused by execution environments. This paper indicates that the attack includes implementation issues caused by memory alignment, self-reflection between page cache and heap, and run-time modification (swap-out, anonymous pages, ASLR, preloading mechanism, and self-modification code). However, these problems are avoidable with some techniques. In our experience on KSM (kernel samepage merging) with the KVM virtual machine, the attack could detect the security level of attacked operating systems, find vulnerable applications, and confirm the status of attacked applications.

  • Computation of Sublanguages for Synthesizing Decentralized Supervisors for Timed Discrete Event Systems

    Masashi NOMURA  Shigemasa TAKAI  

     
    PAPER-Concurrent Systems

      Vol:
    E96-A No:1
      Page(s):
    345-355

    In this paper, we study decentralized supervisory control of timed discrete event systems, where we adopt the OR rule for fusing local enablement decisions and the AND rule for fusing local enforcement decisions. Under these rules, necessary and sufficient conditions for the existence of a decentralized supervisor that achieves a given specification language are easily obtained from the result of literature. If a given specification language does not satisfy these existence conditions, we must compute its sublanguage satisfying them. The main contribution of this paper is proposing a method for computing such a sublanguage.

  • Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments

    Debiao HE  Hao HU  

     
    LETTER-Information Network

      Vol:
    E96-D No:1
      Page(s):
    138-140

    Recently, Shao et al. [M. Shao and Y. Chin, A privacy-preserving dynamic id-based remote user authentication scheme with access control for multi-server environment, IEICE Transactions on Information and Systems, vol.E95-D, no.1, pp.161–168, 2012] proposed a dynamic ID-based remote user authentication scheme with access control for multi-server environments. They claimed that their scheme could withstand various attacks and provide anonymity. However, in this letter, we will point out that Shao et al.'s scheme has practical pitfalls and is not feasible for real-life implementation. We identify that their scheme is vulnerable to two kinds of attacks and cannot provide anonymity.

  • On d-Asymptotics for High-Dimensional Discriminant Analysis with Different Variance-Covariance Matrices

    Takanori AYANO  Joe SUZUKI  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:12
      Page(s):
    3106-3108

    In this paper we consider the two-class classification problem with high-dimensional data. It is important to find a class of distributions such that we cannot expect good performance in classification for any classifier. In this paper, when two population variance-covariance matrices are different, we give a reasonable sufficient condition for distributions such that the misclassification rate converges to the worst value as the dimension of data tends to infinity for any classifier. Our results can give guidelines to decide whether or not an experiment is worth performing in many fields such as bioinformatics.

  • A Push-Pull Chunk Delivery for Mesh-Based P2P Live Streaming

    Chee Yik KEONG  Poo Kuan HOONG  Choo-Yee TING  

     
    LETTER

      Vol:
    E95-D No:12
      Page(s):
    2958-2959

    In this paper, we propose an adaptive chunk scheduling for mesh-based peer-to-peer live streaming system, a hybrid class of push and pull chunk delivery approach. The proposed rule-based push-pull scheduler simultaneously pull video chunk from lower latency peers to fill up missing chunks and push video chunk adaptively for rapid chunk delivery. We performed comparative simulation study against rarest first push-pull and status-wise push-pull to prove the efficiency of our proposed algorithm. Mesh-push is made possible by effectively exploiting the information through buffer map exchange. The findings of performance evaluation have suggested a better video continuity and achieved lower source to end delay.

  • A 115 mW 1 Gbps Bit-Serial Layered LDPC Decoder for WiMAX

    Xiongxin ZHAO  Xiao PENG  Zhixiang CHEN  Dajiang ZHOU  Satoshi GOTO  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E95-A No:12
      Page(s):
    2384-2391

    Structured quasi-cyclic low-density parity-check (QC-LDPC) codes have been adopted in many wireless communication standards, such as WiMAX, Wi-Fi and WPAN. To completely support the variable code rate (multi-rate) and variable code length (multi-length) implementation for universal applications, the partial-parallel layered LDPC decoder architecture is straightforward and widely used in the decoder design. In this paper, we propose a high parallel LDPC decoder architecture for WiMAX system with dedicated ASIC design. Different from the block by block decoding schedule in most partial-parallel layered architectures, all the messages within each layer are updated simultaneously in the proposed fully-parallel layered decoder architecture. Meanwhile, the message updating is separated into bit-serial style to reduce hardware complexity. A 6-bit implementation is adopted in the decoder chip, since simulations demonstrate that 6-bit quantization is the best trade-off between performance and complexity. Moreover, the two-layer concurrent processing technique is proposed to further increase the parallelism for low code rates. Implementation results show that the decoder chip saves 22.2% storage bits and only takes 2448 clock cycles per iteration for all the code rates defined in WiMAX standard. It occupies 3.36 mm2 in SMIC 65 nm CMOS process, and realizes 1056 Mbps throughput at 1.2 V, 110 MHz and 10 iterations with 115 mW power occupation, which infers a power efficiency of 10.9 pJ/bit/iteration. The power efficiency is improved 63.6% in normalized comparison with the state-of-art WiMAX LDPC decoder.

  • A Spectrum-Overlapped Resource Management for Turbo Equalizer in Uplink Future Multiple Access Channels

    Jungo GOTO  Osamu NAKAMURA  Kazunari YOKOMAKURA  Yasuhiro HAMAGUCHI  Shinsuke IBI  Seiichi SAMPEI  

     
    PAPER

      Vol:
    E95-B No:12
      Page(s):
    3679-3687

    This paper proposes a spectrum-overlapped resource management (SORM) technique where each user equipment (UE) can ideally obtain the frequency selection diversity gain under multi-user environments. In the SORM technique for cellular systems, under assumption of adopting a soft canceller with minimum mean square error (SC/MMSE) turbo equalizer, an evolved node B (eNB) accepts overlapped frequency resource allocation. As a result, each UE can use the frequency bins having the highest channel gain. However, the SORM becomes non-orthogonal access when the frequency bins having high channel gain for UEs are partially identical. In this case, the inter-user interference (IUI) caused by overlapping spectra among UEs is eventually canceled out by using the SC/MMSE turbo equalizer. Therefore, SORM can achieve better performance than orthogonal access e.g. FDMA when the IUI is completely canceled. This paper demonstrates that SORM has the potential to improve transmission performance, by extrinsic information transfer (EXIT) analysis. Moreover, this paper evaluates the block error rate (BLER) performance of the SORM and the FDMA. Consequently, this paper shows that the SORM outperforms the FDMA.

  • Outage Behavior and SCK-Based Approaching Optimum Power Allocation in the Two-Way Channel

    Xuan GENG  Fang CAO  Qi-ming SHI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:12
      Page(s):
    3906-3910

    In this letter, non-orthogonal amplify-and-forward (NAF) is considered in a half-duplex two-way system. We derive the closed-form outage probability in the high signal-to-noise ratio (SNR) region, and approximate it with a simpler version to enable power allocation. Then a closed-form power allocation scheme is proposed to improve the outage performance; it uses only statistical channel knowledge (SCK). It is validated that our analyses agree with simulation results and the proposed power allocation approaches the optimal power allocation.

  • Effect of Discharge Gap Shape on High-Speed Electrostatic Discharge Events

    Masao MASUGI  Norihito HIRASAWA  Yoshiharu AKIYAMA  Kazuo MURAKAWA  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E95-B No:12
      Page(s):
    3898-3901

    To clarify the characteristics of high-speed electrostatic discharge (ESD) events, we use two kinds of discharge electrodes: sphere- and cylinder-shape ones. We measure the energy level of ESD waveforms with charging voltages of 0.25, 0.5, and 1.0 kV. We find that the cylindrical electrode yields higher high-speed ESD energies, especially when the charging voltage is high; this indicates that the discharge gap shape is an important factor in ESD events.

  • Yield-Driven Clock Skew Scheduling for Arbitrary Distributions of Critical Path Delays

    Yanling ZHI  Wai-Shing LUK  Yi WANG  Changhao YAN  Xuan ZENG  

     
    PAPER-Physical Level Design

      Vol:
    E95-A No:12
      Page(s):
    2172-2181

    Yield-driven clock skew scheduling was previously formulated as a minimum cost-to-time ratio cycle problem, by assuming that variational path delays are in Gaussian distributions. However in today's nanometer technology, process variations show growing impacts on this assumption, as variational delays with non-Gaussian distributions have been observed on these paths. In this paper, we propose a novel yield-driven clock skew scheduling method for arbitrary distributions of critical path delays. Firstly, a general problem formulation is proposed. By integrating the cumulative distribution function (CDF) of critical path delays, the formulation is able to handle path delays with any distributions. It also generalizes the previous formulations on yield-driven clock skew scheduling and indicates their statistical interpretations. Generalized Howard algorithm is derived for finding the critical cycles of the underlying timing constraint graphs. Moreover, an effective algorithm based on minimum balancing is proposed for the overall yield improvement. Experimental results on ISCAS89 benchmarks show that, compared with two representative existing methods, our method remarkably improves the yield by 10.25% on average (up to 14.66%).

  • Integer Programming-Based Approach to Attractor Detection and Control of Boolean Networks

    Tatsuya AKUTSU  Yang ZHAO  Morihiro HAYASHIDA  Takeyuki TAMURA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E95-D No:12
      Page(s):
    2960-2970

    The Boolean network (BN) can be used to create discrete mathematical models of gene regulatory networks. In this paper, we consider three problems on BNs that are known to be NP-hard: detection of a singleton attractor, finding a control strategy that shifts a BN from a given initial state to the desired state, and control of attractors. We propose integer programming-based methods which solve these problems in a unified manner. Then, we present results of computational experiments which suggest that the proposed methods are useful for solving moderate size instances of these problems. We also show that control of attractors is -hard, which suggests that control of attractors is harder than the other two problems.

  • Robust Lightweight Embedded Virtualization Layer Design with Simple Hardware Assistance

    Tsung-Han LIN  Yuki KINEBUCHI  Tatsuo NAKAJIMA  

     
    PAPER-Computer System and Services

      Vol:
    E95-D No:12
      Page(s):
    2821-2832

    In this paper, we propose a virtualization architecture for a multi-core embedded system to provide more system reliability and security while maintaining performance and without introducing additional special hardware supports or implementing a complex protection mechanism in the virtualization layer. Embedded systems, especially consumer electronics, have often used virtualization. Virtualization is not a new technique, as there are various uses for both GPOS (General Purpose Operating System) and RTOS (Real Time Operating System). The surge of the multi-core platforms in embedded systems also helps consolidate the virtualization system for better performance and lower power consumption. Embedded virtualization design usually uses two approaches. The first is to use the traditional VMM, but it is too complicated for use in the embedded environment without additional special hardware support. The other approach uses the microkernel, which imposes a modular design. The guest systems, however, would suffer from considerable modifications in this approach, as the microkernel allows guest systems to run in the user space. For some RTOSes and their applications originally running in the kernel space, this second approach is more difficult to use because those codes use many privileged instructions. To achieve better reliability and keep the virtualization layer design lightweight, this work uses a common hardware component adopted in multi-core embedded processors. In most embedded platforms, vendors provide additional on-chip local memory for each physical core, and these local memory areas are only private to their cores. By taking advantage of this memory architecture, we can mitigate the above-mentioned problems at once. We choose to re-map the virtualization layer's program on the local memory, called SPUMONE, which runs all guest systems in the kernel space. Doing so, it can provide additional reliability and security for the entire system because the SPUMONE design in a multi-core platform has each instance installed on a separate processor core. This design differs from traditional virtualization layer design, and the content of each SPUMONE is inaccessible to the others. We also achieve this goal without adding overhead to the overall performance.

1221-1240hit(4570hit)