The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

1981-2000hit(16314hit)

  • Formal Method for Security Analysis of Electronic Payment Protocols

    Yi LIU  Qingkun MENG  Xingtong LIU  Jian WANG  Lei ZHANG  Chaojing TANG  

     
    PAPER-Information Network

      Pubricized:
    2018/06/19
      Vol:
    E101-D No:9
      Page(s):
    2291-2297

    Electronic payment protocols provide secure service for electronic commerce transactions and protect private information from malicious entities in a network. Formal methods have been introduced to verify the security of electronic payment protocols; however, these methods concentrate on the accountability and fairness of the protocols, without considering the impact caused by timeliness. To make up for this deficiency, we present a formal method to analyze the security properties of electronic payment protocols, namely, accountability, fairness and timeliness. We add a concise time expression to an existing logical reasoning method to represent the event time and extend the time characteristics of the logical inference rules. Then, the Netbill protocol is analyzed with our formal method, and we find that the fairness of the protocol is not satisfied due to the timeliness problem. The results illustrate that our formal method can analyze the key properties of electronic payment protocols. Furthermore, it can be used to verify the time properties of other security protocols.

  • Review Rating Prediction on Location-Based Social Networks Using Text, Social Links, and Geolocations

    Yuehua WANG  Zhinong ZHONG  Anran YANG  Ning JING  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/06/01
      Vol:
    E101-D No:9
      Page(s):
    2298-2306

    Review rating prediction is an important problem in machine learning and data mining areas and has attracted much attention in recent years. Most existing methods for review rating prediction on Location-Based Social Networks only capture the semantics of texts, but ignore user information (social links, geolocations, etc.), which makes them less personalized and brings down the prediction accuracy. For example, a user's visit to a venue may be influenced by their friends' suggestions or the travel distance to the venue. To address this problem, we develop a review rating prediction framework named TSG by utilizing users' review Text, Social links and the Geolocation information with machine learning techniques. Experimental results demonstrate the effectiveness of the framework.

  • An Application of Intuitionistic Fuzzy Sets to Improve Information Extraction from Thai Unstructured Text

    Peerasak INTARAPAIBOON  Thanaruk THEERAMUNKONG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/05/23
      Vol:
    E101-D No:9
      Page(s):
    2334-2345

    Multi-slot information extraction, also known as frame extraction, is a task that identify several related entities simultaneously. Most researches on this task are concerned with applying IE patterns (rules) to extract related entities from unstructured documents. An important obstacle for the success in this task is unknowing where text portions containing interested information are. This problem is more complicated when involving languages with sentence boundary ambiguity, e.g. the Thai language. Applying IE rules to all reasonable text portions can degrade the effect of this obstacle, but it raises another problem that is incorrect (unwanted) extractions. This paper aims to present a method for removing these incorrect extractions. In the method, extractions are represented as intuitionistic fuzzy sets, and a similarity measure for IFSs is used to calculate distance between IFS of an unclassified extraction and that of each already-classified extraction. The concept of k nearest neighbor is adopted to design whether the unclassified extraction is correct or not. From the experiment on various domains, the proposed technique improves extraction precision while satisfactorily preserving recall.

  • Incremental Estimation of Natural Policy Gradient with Relative Importance Weighting

    Ryo IWAKI  Hiroki YOKOYAMA  Minoru ASADA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/06/01
      Vol:
    E101-D No:9
      Page(s):
    2346-2355

    The step size is a parameter of fundamental importance in learning algorithms, particularly for the natural policy gradient (NPG) methods. We derive an upper bound for the step size in an incremental NPG estimation, and propose an adaptive step size to implement the derived upper bound. The proposed adaptive step size guarantees that an updated parameter does not overshoot the target, which is achieved by weighting the learning samples according to their relative importances. We also provide tight upper and lower bounds for the step size, though they are not suitable for the incremental learning. We confirm the usefulness of the proposed step size using the classical benchmarks. To the best of our knowledge, this is the first adaptive step size method for NPG estimation.

  • Reciprocal Kit-Build Concept Map: An Approach for Encouraging Pair Discussion to Share Each Other's Understanding

    Warunya WUNNASRI  Jaruwat PAILAI  Yusuke HAYASHI  Tsukasa HIRASHIMA  

     
    PAPER-Educational Technology

      Pubricized:
    2018/05/29
      Vol:
    E101-D No:9
      Page(s):
    2356-2367

    Collaborative learning is an active teaching and learning strategy, in which learners who give each other elaborated explanations can learn most. However, it is difficult for learners to explain their own understanding elaborately in collaborative learning. In this study, we propose a collaborative use of a Kit-Build concept map (KB map) called “Reciprocal KB map”. In a Reciprocal KB map for a pair discussion, at first, the two participants make their own concept maps expressing their comprehension. Then, they exchange the components of their maps and request each other to reconstruct their maps by using the components. The differences between the original map and the reconstructed map are diagnosed automatically as an advantage of the KB map. Reciprocal KB map is expected to encourage pair discussion to recognize the understanding of each other and to create an effective discussion. In an experiment reported in this paper, Reciprocal KB map was used for supporting a pair discussion and was compared with a pair discussion which was supported by a traditional concept map. Nineteen pairs of university students were requested to use the traditional concept map in their discussion, while 20 pairs of university students used Reciprocal KB map for discussing the same topic. The results of the experiment were analyzed using three metrics: a discussion score, a similarity score, and questionnaires. The discussion score, which investigates the value of talk in discussion, demonstrates that Reciprocal KB map can promote more effective discussion between the partners compared to the traditional concept map. The similarity score, which evaluates the similarity of the concept maps, demonstrates that Reciprocal KB map can encourage the pair of partners to understand each other better compared to the traditional concept map. Last, the questionnaires illustrate that Reciprocal KB map can support the pair of partners to collaborate in the discussion smoothly and that the participants accepted this method for sharing their understanding with each other. These results suggest that Reciprocal KB map is a promising approach for encouraging pairs of partners to understand each other and to promote the effective discussions.

  • A Unified Neural Network for Quality Estimation of Machine Translation

    Maoxi LI  Qingyu XIANG  Zhiming CHEN  Mingwen WANG  

     
    LETTER-Natural Language Processing

      Pubricized:
    2018/06/18
      Vol:
    E101-D No:9
      Page(s):
    2417-2421

    The-state-of-the-art neural quality estimation (QE) of machine translation model consists of two sub-networks that are tuned separately, a bidirectional recurrent neural network (RNN) encoder-decoder trained for neural machine translation, called the predictor, and an RNN trained for sentence-level QE tasks, called the estimator. We propose to combine the two sub-networks into a whole neural network, called the unified neural network. When training, the bidirectional RNN encoder-decoder are initialized and pre-trained with the bilingual parallel corpus, and then, the networks are trained jointly to minimize the mean absolute error over the QE training samples. Compared with the predictor and estimator approach, the use of a unified neural network helps to train the parameters of the neural networks that are more suitable for the QE task. Experimental results on the benchmark data set of the WMT17 sentence-level QE shared task show that the proposed unified neural network approach consistently outperforms the predictor and estimator approach and significantly outperforms the other baseline QE approaches.

  • Detection of 3D Reflector Code on Guardrail by Using Infrared Laser Radar for Road Information Acquisition

    Tomotaka WADA  Susumu KAWAI  

     
    LETTER

      Vol:
    E101-A No:9
      Page(s):
    1320-1322

    In order to obtain road information, we propose an information acquisition method using infrared laser radar by detecting 3D reflector code on roadside. The infrared laser radar on vehicle scans the 3D reflector code on guardrail. Through experiments, we show that the proposed method is able to obtain road information by detecting 3D reflector code on guardrail.

  • Meeting Tight Security for Multisignatures in the Plain Public Key Model

    Naoto YANAI  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1484-1493

    Multisignatures are digital signatures for a group consisting of multiple signers where each signer signs common documents via interaction with its co-signers and the data size of the resultant signatures for the group is independent of the number of signers. In this work, we propose a multisignature scheme, whose security can be tightly reduced to the CDH problem in bilinear groups, in the strongest security model where nothing more is required than that each signer has a public key, i.e., the plain public key model. Loosely speaking, our main idea for a tight reduction is to utilize a three-round interaction in a full-domain hash construction. Namely, we surmise that a full-domain hash construction with three-round interaction will become tightly secure under the CDH problem. In addition, we show that the existing scheme by Zhou et al. (ISC 2011) can be improved to a construction with a tight security reduction as an application of our proof framework.

  • Cryptanalysis of Reduced Kreyvium

    Yuhei WATANABE  Takanori ISOBE  Masakatu MORII  

     
    PAPER-Cryptography and Information Security

      Vol:
    E101-A No:9
      Page(s):
    1548-1556

    Kreyvium is a NLFSR-based stream cipher which is oriented to homomorphic-ciphertext compression. This is a variant of Trivium with 128-bit security. Designers have evaluated the security of Kreyvium and concluded that the resistance of Kreyvium to the conditional differential cryptanalysis is at least the resistance of Trivium, and even better. However, we consider that this attack is effective for reduced Kreyvium due to the structure of it. This paper shows the conditional differential cryptanalysis for Kreyvium, and we propose distinguishing and key recovery attacks. We show how to arrange differences and conditions to obtain good higher-order conditional differential characteristics. We use two types of higher-order conditional differential characteristics to find a distinguisher, e.g. the bias of higher-order conditional differential characteristics of a keystream and the probabilistic bias of them. In the first one, we obtain the distinguisher on Kreyvium with 730 rounds from 20-th order characteristics. In the second one, we obtain the distinguisher on Kreyvium with 899 rounds from 25-th order conditional differential characteristics. Moreover, we show the key recovery attack on Kreyvium with 736 rounds from 20-th order characteristics. We experimentally confirm all our attacks. The second distinguisher shows that we can obtain the distinguisher on Kreyvium with more rounds than the distinguisher on Trivium. Therefore, Kreyvium has a smaller security margin than Trivium for the conditional differential cryptanalysis.

  • Noise Removal Based on Surface Approximation of Color Line

    Koichiro MANABE  Takuro YAMAGUCHI  Masaaki IKEHARA  

     
    PAPER-Image

      Vol:
    E101-A No:9
      Page(s):
    1567-1574

    In a local region of a color image, the color distribution often takes the form of a linear line in the RGB space. This property is called “Color Line” and we propose a denoising method based on this property. When a noise is added on an image, its color distribution spreads from the Color Line. The denoising is achieved by reducing the spread. In conventional methods, Color Line is assumed to be only a single line, but actual distribution takes various shapes such as a single line, two lines, and a plane and so on. In our method, we estimate the distribution in more detail using plane approximation and denoise each patch by reducing the spread depending on the Color Line types. In this way, we can achieve better denoising results than a conventional method.

  • An Improved Spread Clutter Estimated Canceller for Main-Lobe Clutter Suppression in Small-Aperture HFSWR

    Di YAO  Xin ZHANG  Qiang YANG  Weibo DENG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:9
      Page(s):
    1575-1579

    In small-aperture high frequency surface wave radar, the main-lobe clutter all can be seen as a more severe space spread clutter under the influence of the smaller array aperture. It compromises the detection performance of moving vessels, especially when the target is submerged in the clutter. To tackle this issue, an improved spread clutter estimated canceller, combining spread clutter estimated canceller, adaptive selection strategy of the optimal training samples and rotating spatial beam method, is presented to suppress main-lobe clutter in both angle domain and range domain. According to the experimental results, the proposed algorithm is shown to have far superior clutter suppression performance based on the real data.

  • Compressive Phase Retrieval Realized by Combining Generalized Approximate Message Passing with Cartoon-Texture Model

    Jingjing SI  Jing XIANG  Yinbo CHENG  Kai LIU  

     
    LETTER-Image

      Vol:
    E101-A No:9
      Page(s):
    1608-1615

    Generalized approximate message passing (GAMP) can be applied to compressive phase retrieval (CPR) with excellent phase-transition behavior. In this paper, we introduced the cartoon-texture model into the denoising-based phase retrieval GAMP(D-prGAMP), and proposed a cartoon-texture model based D-prGAMP (C-T D-prGAMP) algorithm. Then, based on experiments and analyses on the variations of the performance of D-PrGAMP algorithms with iterations, we proposed a 2-stage D-prGAMP algorithm, which makes tradeoffs between the C-T D-prGAMP algorithm and general D-prGAMP algorithms. Finally, facing the non-convergence issues of D-prGAMP, we incorporated adaptive damping to 2-stage D-prGAMP, and proposed the adaptively damped 2-stage D-prGAMP (2-stage ADD-prGAMP) algorithm. Simulation results show that, runtime of 2-stage D-prGAMP is relatively equivalent to that of BM3D-prGAMP, but 2-stage D-prGAMP can achieve higher image reconstruction quality than BM3D-prGAMP. 2-stage ADD-prGAMP spends more reconstruction time than 2-stage D-prGAMP and BM3D-prGAMP. But, 2-stage ADD-prGAMP can achieve PSNRs 0.2∼3dB higher than those of 2-stage D-prGAMP and 0.3∼3.1dB higher than those of BM3D-prGAMP.

  • Exploring IA Feasibility in MIMO Interference Networks: Equalized and Non-Equalized Antennas Approach

    Weihua LIU  Zhenxiang GAO  Ying WANG  Zhongfang WANG  Yongming WANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/03/20
      Vol:
    E101-B No:9
      Page(s):
    2047-2057

    For general multiple-input multiple-output (MIMO) interference networks, determining the feasibility conditions of interference alignment (IA) to achieve the maximum degree of freedom (DoF), is tantamount to accessing the maximum spatial resource of MIMO systems. In this paper, from the view of antenna configuration, we first explore the IA feasibility in the K-user MIMO interference channel (IC), G-cell MIMO interference broadcast channel (IBC) and interference multiple access channel (IMAC). We first give the concept of the equalized antenna, and all antenna configurations are divided into two categories, equalized antennas and non-equalized ones. The feasibility conditions of IA system with equalized antennas are derived, and the feasible and infeasible regions are provided. Furthermore, we study the correlations among IC, IBC and IMAC. Interestingly, the G-cell MIMO IBC and IMAC are two special ICs, and a systemic work on IA feasibility for these three interference channels is provided.

  • Simulation of Metal Droplet Sputtering and Molten Pool on Copper Contact under Electric Arc

    Kai BO  Xue ZHOU  Guofu ZHAI  Mo CHEN  

     
    PAPER

      Vol:
    E101-C No:9
      Page(s):
    691-698

    The micro-mechanism of molten pool and metal droplet sputtering are significant to the material erosion caused by breaking or making arcs especially for high-power switching devices. In this paper, based on Navier-Stokes equations for incompressible viscous fluid and potential equation for electric field, a 2D axially symmetric simplified hydrodynamic model was built to describe the formation of the molten metal droplet sputtering and molten pool under arc spot near electrode region. The melting process was considered by the relationship between melting metal volumetric percentage and temperature, a free surface of liquid metal deformation was solved by coupling moving mesh and the automatic re-meshing. The simulated metal droplet sputtering and molten pool behaviors are presented by the temperature and velocity distribution sequences. The influence mechanism of pressure distribution and heat flux on the formation of molten pool and metal droplet sputtering has been analyzed according to the temperature distribution and sputtering angles. Based on the simulation results, we can distinguish two different models of the molten metal droplet sputtering process: edge ejection and center ejection. Moreover, a new explanation is proposed based on calculated results with arc spot pressure distribution in the form of both unimodal and bimodal. It shows that the arc spot pressure distribution plays an important role in the metal droplet ejected from molten pool, the angle of the molten jet drop can be decreased along with the increment of the arc spot pressure.

  • Equivalent Circuit of Yee's Cells and Its Application to Mixed Electromagnetic and Circuit Simulations

    Yuichi TANJI  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E101-C No:9
      Page(s):
    703-710

    An equivalent circuit of Yee's cells is proposed for mixed electromagnetic and circuit simulations. Using the equivalent circuit, a mixed electromagnetic and circuit simulator can be developed, in which the electromagnetic field and circuit responses are simultaneously analyzed. Representing the electromagnetic system as a circuit, active and passive device models in a circuit simulator can be used for the mixed simulations without any modifications. Hence, the propose method is very useful for designing various electronic systems. To evaluate the mixed simulations with the equivalent circuit, two implementations with shared or distributed memory computer system are presented. In the numerical examples, we evaluate the performances of the prototype simulators to demonstrate the effectiveness.

  • Variational-Bayesian Single-Image Devignetting

    Motoharu SONOGASHIRA  Masaaki IIYAMA  Michihiko MINOH  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2018/06/18
      Vol:
    E101-D No:9
      Page(s):
    2368-2380

    Vignetting is a common type of image degradation that makes peripheral parts of an image darker than the central part. Single-image devignetting aims to remove undesirable vignetting from an image without resorting to calibration, thereby providing high-quality images required for a wide range of applications. Previous studies into single-image devignetting have focused on the estimation of vignetting functions under the assumption that degradation other than vignetting is negligible. However, noise in real-world observations remains unremoved after inversion of vignetting, and prevents stable estimation of vignetting functions, thereby resulting in low quality of restored images. In this paper, we introduce a methodology of image restoration based on variational Bayes (VB) to devignetting, aiming at high-quality devignetting in the presence of noise. Through VB inference, we jointly estimate a vignetting function and a latent image free from both vignetting and noise, using a general image prior for noise removal. Compared with state-of-the-art methods, the proposed VB approach to single-image devignetting maintains effectiveness in the presence of noise, as we demonstrate experimentally.

  • Comfortable Intelligence for Evaluating Passenger Characteristics in Autonomous Wheelchairs

    Taishi SAWABE  Masayuki KANBARA  Norihiro HAGITA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1308-1316

    In recent years, autonomous driving technologies are being developed for vehicles and personal mobility devices including golf carts and autonomous wheelchairs for various use cases, not only outside areas but inside areas like shopping malls, hospitals and airpots. The main purpose of developing these autonomous vehicles is to avoid the traffic accidents caused by human errors, to assist people with walking, and to improve human comfort by relieving them from driving. Most relevant research focuses on the efficiency and safety of autonomous driving, however, in order to use by the widespread of people in the society, it is important to consider passenger comfort inside vehicles as well as safety and efficiency. Therefore, in this work, we emphasize the importance of considering passenger comfort in designing the control loop of autonomous navigation for the concept of comfortable intelligence in the future autonomous mobility. Moreover, passenger characteristics, in terms of ride comfort in an autonomous vehicle, have not been investigated with regard to safety and comfort, depending on each passenger's driving experience, habits, knowledge, personality, and preference. There are still few studies on the optimization of autonomous driving control reflecting passenger characteristics and different stress factors during the ride. In this study, passenger stress characteristics with different stress factors were objectively analyzed using physiological indices (heart rate and galvanic skin response sensors) during autonomous wheelchair usages. Two different experimental results from 12 participants suggest that there are always at least two types of passengers: one who experiences stress and the other who does not, depending on the stress factors considered. Moreover, with regard to the classification result for the stress reduction method, there are two types of passenger groups, for whom the solution method is, respectively, either effective or ineffective.

  • In-Storage Anti-Virus System via On-Demand Inspection

    Jaehwan LEE  Youngrang KIM  Ji Sun SHIN  

     
    LETTER-Computer System

      Pubricized:
    2018/05/14
      Vol:
    E101-D No:8
      Page(s):
    2132-2135

    We propose a new signature-based, on-demand anti-virus solution using in-storage processing (ISP) to inspect the inside of a storage device. In-storage anti-virus systems are able to isolate malicious effects from main computing platforms, and they reduce the system overhead for virus detection. We implement our in-storage anti-virus platform using cost-effective, open-source hardware, and we verify that is practically applicable to storage devices.

  • DOA Estimation of Quasi-Stationary Signals Exploiting Virtual Extension of Coprime Array Imbibing Difference and Sum Co-Array

    Tarek Hasan AL MAHMUD  Zhongfu YE  Kashif SHABIR  Yawar Ali SHEIKH  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/02/16
      Vol:
    E101-B No:8
      Page(s):
    1876-1883

    Using local time frames to treat non-stationary real world signals as stationary yields Quasi-Stationary Signals (QSS). In this paper, direction of arrival (DOA) estimation of uncorrelated non-circular QSS is analyzed by applying a novel technique to achieve larger consecutive lags using coprime array. A scheme of virtual extension of coprime array is proposed that exploits the difference and sum co-array which can increase consecutive co-array lags in remarkable number by using less number of sensors. In the proposed method, cross lags as well as self lags are exploited for virtual extension of co-arrays both for differences and sums. The method offers higher degrees of freedom (DOF) with a larger number of non-negative consecutive lags equal to MN+2M+1 by using only M+N-1 number of sensors where M and N are coprime with congenial interelement spacings. A larger covariance matrix can be achieved by performing covariance like computations with the Khatri-Rao (KR) subspace based approach which can operate in undetermined cases and even can deal with unknown noise covariances. This paper concentrates on only non-negative consecutive lags and subspace based method like Multiple Signal Classification (MUSIC) based approach has been executed for DOA estimation. Hence, the proposed method, named Virtual Extension of Coprime Array imbibing Difference and Sum (VECADS), in this work is promising to create larger covariance matrix with higher DOF for high resolution DOA estimation. The coprime distribution yielded by the proposed approach can yield higher resolution DOA estimation while avoiding the mutual coupling effect. Simulation results demonstrate its effectiveness in terms of the accuracy of DOA estimation even with tightly aligned sources using fewer sensors compared with other techniques like prototype coprime, conventional coprime, Coprime Array with Displaced Subarrays (CADiS), CADiS after Coprime Array with Compressed Inter-element Spacing (CACIS) and nested array seizing only difference co-array.

  • Averaging Area of Incident Power Density for Human Exposure from Patch Antenna Arrays

    Daisuke FUNAHASHI  Takahiro ITO  Akimasa HIRATA  Takahiro IYAMA  Teruo ONISHI  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    644-646

    This study discusses an area-averaged incident power density to estimate surface temperature elevation from patch antenna arrays with 4 and 9 elements at the frequencies above 10 GHz. We computationally demonstrate that a smaller averaging area (1 cm2) of power density should be considered at the frequency of 30 GHz or higher compared with that at lower frequencies (4 cm2).

1981-2000hit(16314hit)