The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

9861-9880hit(16314hit)

  • Balanced C4-Bowtie Decomposition of Complete Multi-Graphs

    Kazuhiko USHIO  Hideaki FUJIMOTO  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1148-1154

    We show that the necessary and sufficient condition for the existence of a balanced C4-bowtie decomposition of the complete multi-graph λKn is λ(n - 1) 0 (mod 16) and n 7. Decomposition algorithms are also given.

  • A Dialogue-Based Information Retrieval Assistant Using Shallow NLP Techniques in Online Sales Domains

    Harksoo KIM  Choong-Nyoung SEON  Jungyun SEO  

     
    PAPER

      Vol:
    E88-D No:5
      Page(s):
    801-808

    Most of commercial websites provide customers with menu-driven navigation and keyword search. However, these inconvenient interfaces increase the number of mouse clicks and decrease customers' interest in surfing the websites. To resolve the problem, we propose an information retrieval assistant using a natural language interface in online sales domains. The information retrieval assistant has a client-server structure; a system connector and a NLP (natural language processing) server. The NLP server performs a linguistic analysis of users' queries with the help of coordinated NLP agents that are based on shallow NLP techniques. After receiving the results of the linguistic analysis from the NLP server, the system connector interacts with outer information provision systems such as conventional information retrieval systems and relational database management systems according to the analysis results. Owing to the client-server structure, we can easily add other information provision systems to the information retrieval assistant with trivial modifications of the NLP server. In addition, the information retrieval assistant guarantees fast responses because it uses shallow NLP techniques. In the preliminary experiment, as compared to the menu-driven system, we found that the information retrieval assistant could reduce the bothersome tasks such as menu selecting and mouse clicking because it provides a convenient natural language interface.

  • A Group Signature Scheme with Efficient Membership Revocation for Middle-Scale Groups

    Toru NAKANISHI  Yuji SUGIYAMA  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1224-1233

    This paper proposes a group signature scheme with efficient membership revocation. Though group signature schemes with efficient membership revocation based on a dynamic accumulator were proposed, the previous schemes force a member to change his secret key whenever he makes a signature. Furthermore, for the modification, the member has to obtain a public membership information of O(nN) bits, where n is the length of the RSA modulus and N is the total number of joining members and removed members. In our scheme, the signer needs no modification of his secret, and the public membership information has only K bits, where K is the maximal number of members. Then, for middle-scale groups with the size that is comparable to the RSA modulus size (e.g., up to about 1000 members for 1024 bit RSA modulus), the public membership information is a single small value only, while the signing/verification also remains efficient.

  • On-Chip di/dt Detector Circuit

    Toru NAKURA  Makoto IKEDA  Kunihiro ASADA  

     
    PAPER

      Vol:
    E88-C No:5
      Page(s):
    782-787

    This paper demonstrates an on-chip di/dt detector circuit. The di/dt detector circuit consists of a power supply line, an underlying spiral inductor and an amplifier. The mutual inductor induces a di/dt proportional voltage, and the amplifier amplifies and outputs the value. The measurement results show that the di/dt detector output and the voltage difference between a resistor have good agreement. The di/dt reduction by a decoupling capacitor is also measured using the di/dt detector.

  • Performance of a Base Station Feedback-Type Adaptive Array Antenna with Mobile Station Diversity Reception

    Jeongkeun CHOI  Yoshihiko AKAIWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:5
      Page(s):
    2081-2086

    In the cellular mobile communication systems, co-channel interference and Rayleigh fading degrade the transmission performance. Adaptive Array Antenna (AAA) can suppress interference and, at the same time, can cope with multi-path fading by using a wide antenna spacing resulting in low correlation of received signals in each antenna element. A feedback-type AAA was proposed for frequency division duplexed (FDD) systems, where mobile station measures channel characteristics and feed-backs them to the base station. In this paper, we extend the system by introducing 2-branch diversity reception at a mobile station, and study the influence of antenna element spacing at the base station and control delay time on bit error rate performance under a realistic propagation model.

  • Immersive Multi-Projector Display on Hybrid Screens with Human-Scale Haptic Interface

    Seungzoo JEONG  Naoki HASHIMOTO  Makoto SATO  

     
    PAPER

      Vol:
    E88-D No:5
      Page(s):
    888-893

    Many immersive displays developed in previous researches are strongly influenced by the design concept of the CAVE, which is the origin of the immersive displays. In the view of human-scale interactive system for virtual environment (VE), the existing immersive systems are not enough to use the potential of a human sense further extent. The displays require more complicated structure for flexible extension, and are more restrictive to user's movement. Therefore we propose a novel multi-projector display for immersive VE with haptic interface for more flexible and dynamic interaction. The display part of our system named "D-vision" has a hybrid curved screen which consist of compound prototype with flat and curve screen. This renders images seamlessly in real time, and generates high-quality stereovision by PC cluster and two-pass technology. Furthermore a human-scale string-based haptic device will integrate with the D-vision for more interactive and immersive VE. In this paper, we show an overview of the D-vision and technologies used for the human-scale haptic interface.

  • Large Enhancement of Linearity in Electroabsorption Modulator with Composite Quantum-Well Absorption Core

    Yong-Duck CHUNG  Young-Shik KANG  Jiyoun LIM  Sung-Bock KIM  Jeha KIM  

     
    PAPER-Optical Active Devices and Modules

      Vol:
    E88-C No:5
      Page(s):
    967-972

    We proposed a novel structure that improved the linear characteristics of electroabsorption modulator (EAM) with composite quantum-wells as an absorption core layer. We fabricated three types of EAM's whose active cores were 8 nm thick, 12 nm thick and a composite core with 8 nm thick and 12 nm thick quantum-well (QW), respectively. The transfer functions of EAM's were investigated and their third-order inter-modulation distortion (IMD3) was obtained by calculation. The spurious free dynamic range (SFDR) was measured and compared with three types of QW. The linearity of the device with composite quantum-well showed a large enhancement in SFDR by 9.3 dBHz2/3 in TE mode and 7.0 dBHz2/3 in TM mode compared with the conventional EAM.

  • Low Delay-Power Product Current-Mode Multiple Valued Logic for Delay-Insensitive Data Transfer Mechanism

    Myeong-Hoon OH  Dong-Soo HAR  

     
    LETTER-VLSI Design Technology and CAD

      Vol:
    E88-A No:5
      Page(s):
    1379-1383

    Conventional delay-insensitive (DI) data encodings require 2N+1 wires for transferring N-bit. To reduce complexity and power dissipation of wires in designing a large scaled chip, a DI data transfer mechanism based on current-mode multiple valued logic (CMMVL), where N-bit data transfer can be performed with only N+1 wires, is proposed. The effectiveness of the proposed data transfer mechanism is validated by comparisons with conventional data transfer mechanisms using dual-rail and 1-of-4 encodings through simulation at the 0.25-µm CMOS technology. Simulation results with wire lengths of 4 mm or larger demonstrate that the CMMVL scheme significantly reduces delay-power product values of the dual-rail encoding with data rate of 5 MHz or more and the 1-of-4 encoding with data rate of 18 MHz or more.

  • Side Channel Cryptanalysis on XTR Public Key Cryptosystem

    Dong-Guk HAN  Tetsuya IZU  Jongin LIM  Kouichi SAKURAI  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1214-1223

    The XTR public key cryptosystem was introduced in 2000. XTR is suitable for a variety of environments including low-end smart cards, and is regarded as an excellent alternative to RSA and ECC. Moreover, it is remarked that XTR single exponentiation (XTR-SE) is less susceptible than usual exponentiation routines to environmental attacks such as the timing attack and the differential power analysis (DPA). This paper investigates the security of side channel attack (SCA) on XTR. In this paper, we show the immunity of XTR-SE against the simple power analysis if the order of the computation of XTR-SE is carefully considered. In addition, we show that XTR-SE is vulnerable to the data-bit DPA, the address-bit DPA, the doubling attack, the modified refined power analysis, and the modified zero-value attack. Moreover, we propose some countermeasures against these attacks. We also show experimental results of the efficiency of the countermeasures. From our implementation results, if we compare XTR with ECC with countermeasures against "SCAs," we think XTR is as suitable to smart cards as ECC.

  • Improved Channel Estimation for OFDM Systems with Multiple Transmit Antennas over Time-Varying Multipath Fading Channels

    Hui-Chul WON  Gi-Hong IM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:5
      Page(s):
    2093-2101

    By using multiple transmit antennas, wireless systems have a large capacity in time-varying multipath fading channels. Space-time block code (STBC), space-frequency block code (SFBC), and space-time-frequency (STF) block code are well-known techniques in transmitter diversity schemes. While the SFBC (or the STF block coded) system gives full diversity at frequency-nonselective channels, it breaks down when used in a frequency-selective environment. This is because the SFBC (or the STF block code) scheme disregards frequency selectivity of the channel by assuming that channel frequency responses (CFRs) at adjacent subcarriers are the same. In this paper, we propose efficient channel estimation and symbol decoding methods, which consider the difference between CFRs at the adjacent subcarriers of the SFBC (or the STF block coded) orthogonal frequency division multiplexing (OFDM) system in multipath fading channels. The proposed method gives initial channel information by designing a simple training symbol, and the CFRs at all the subcarriers and the differences between the CFRs are easily calculated by using an interpolation method or a discrete Fourier transform (DFT) operation.

  • Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication

    Katsuyuki OKEYA  Dong-Guk HAN  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1140-1147

    Side channel attacks (SCA) are serious attacks on mobile devices. In SCA, the attacker can observe the side channel information while the device performs the cryptographic operations, and he/she can detect the secret stored in the device using such side channel information. Ha-Moon proposed a novel countermeasure against side channel attacks in elliptic curve cryptosystems (ECC). The countermeasure is based on the signed scalar multiplication with randomized concept, and does not pay the penalty of speed. Ha-Moon proved that the countermeasure is secure against side channel attack theoretically, and confirmed its immunity experimentally. Thus Ha-Moon's countermeasure seems to be very attractive. In this paper we propose a novel attack against Ha-Moon's countermeasure, and show that the countermeasure is vulnerable to the proposed attack. The proposed attack utilizes a Markov chain for detecting the secret. The attacker determines the transitions in the Markov chain using side channel information, then detects the relation between consecutive two bits of the secret key, instead of bits of the secret key as they are. The use of such relations drastically reduces the search space for the secret key, and the attacker can easily reveal the secret. In fact, around twenty observations of execution of the countermeasure are sufficient to detect the secret in the case of the standard sizes of ECC. Therefore, the single use of Ha-Moon's countermeasure is not recommended for cryptographic use.

  • Topic Document Model Approach for Naive Bayes Text Classification

    Sang-Bum KIM  Hae-Chang RIM  Jin-Dong KIM  

     
    LETTER-Natural Language Processing

      Vol:
    E88-D No:5
      Page(s):
    1091-1094

    The multinomial naive Bayes model has been widely used for probabilistic text classification. However, the parameter estimation for this model sometimes generates inappropriate probabilities. In this paper, we propose a topic document model for the multinomial naive Bayes text classification, where the parameters are estimated from normalized term frequencies of each training document. Experiments are conducted on Reuters 21578 and 20 Newsgroup collections, and our proposed approach obtained a significant improvement in performance compared to the traditional multinomial naive Bayes.

  • Antenna Design by Using Method of Moments

    Kunio SAWAYA  

     
    INVITED PAPER

      Vol:
    E88-B No:5
      Page(s):
    1766-1773

    The theory of the method of moments (MoM), which has been widely used as a numerical technique for analyzing the characteristics of antennas and scatterers, is described. First, the steps of MoM to solve integral equations for conducting wires and planes are presented. It is pointed out that MoM combined with Galerkin's method yields highly accurate results. The importance of ensuring the continuity condition of current on conducting bodies is emphasized and numerical examples for a conducting structure involving junctions of wire segments and planar segments are presented. Finally, MoM for dielectric scatterers including recent developments is described.

  • A New Inductance Extraction Technique of On-Wafer Spiral Inductor Based on Analytical Interconnect Formula

    Hideki SHIMA  Toshimasa MATSUOKA  Kenji TANIGUCHI  

     
    PAPER

      Vol:
    E88-C No:5
      Page(s):
    824-828

    A new inductance extraction technique of spiral inductor from measurement fixture is presented. We propose a scalable expression of parasitic inductance for interconnects, and design consideration of test structure accommodating spiral inductor. The simple expression includes mutual inductance between the interconnects with high accuracy. The formula matches a commercial field solver inductance values within 1.4%. The layout of the test structure to reduce magnetic coupling between the spiral and the interconnects allows us to extract the intrinsic inductance of spiral more accurately. The proposed technique requires neither special fixture used for measurement-based method nor skilled worker for precise extraction with the analytical technique used.

  • Optical WDM Multicasting Design under Wavelength Conversion Constraints

    Hiroaki HONDA  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Optical Network Architecture

      Vol:
    E88-B No:5
      Page(s):
    1890-1897

    In the next-generation networks, ultra high-speed data transmission will become necessary to support a variety of advanced point-to-point and multipoint multimedia services with stringent quality-of-service (QoS) constraints. Such a requirement desires the realization of optical WDM networks. Researches on multicast in optical WDM networks have become active for the purpose of efficient use of wavelength resources. Since multiple channels are more likely to share the same links in WDM multicast, effective routing and wavelength assignment (RWA) technology becomes very important. The introduction of the wavelength conversion technology leads to more efficient use of wavelength resources. This technology, however, has problems to be solved, and the number of wavelength converters will be restricted in the network. In this paper, we propose an effective WDM multicast design method on condition that wavelength converters on each switching node are restricted, which consists of three separate steps: routing, wavelength converter allocation, and wavelength assignment. In our proposal, preferentially available waveband is classified according to the scale of multicast group. Assuming that the number of wavelength converters on each switching node is limited, we evaluate its performance from a viewpoint of the call blocking probability.

  • Video Post-Processing with Adaptive 3-D Filters for Wavelet Ringing Artifact Removal

    Boštjan MARUŠI  Primo SKOIR  Jurij TASI  Andrej KOŠIR  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E88-D No:5
      Page(s):
    1031-1040

    This paper reports on the suitability of the SUSAN filter for the removal of artifacts that result from quantization errors in wavelet video coding. In this paper two extensions of the original filter are described. The first uses a combination of 2-D spatial filtering followed by 1-D temporal filtering along motion trajectories, while the second extension is a pure 3-D motion compensated SUSAN filter. The SUSAN approach effectively reduces coding artifacts, while preserving the original signal structure, by relying on a simple pixel-difference-based classification procedure. Results reported in the paper clearly indicate that both extensions efficiently reduce ringing that is the prevalent artifact perceived in wavelet-based coded video. Experimental results indicate an increase in perceptual as well as objective (PSNR) decoded video quality, which is competitive with state-of-the-art post-processing algorithms, especially when low computational demands of the proposed approach are taken into account.

  • Efficient Web Browsing with Semantic Annotation: A Case Study of Product Images in E-Commerce Sites

    Jason J. JUNG  Kee-Sung LEE  Seung-Bo PARK  Geun-Sik JO  

     
    PAPER

      Vol:
    E88-D No:5
      Page(s):
    843-850

    Web browsing task is based on depth-first searching scheme, so that searching relevant information from Web may be very tedious. In this paper, we propose personal browsing assistant system based on user intentions modeling. Before explicitly requested by a user, this system can analyze the prefetched resources from the hyperlinked Webpages and compare them with the estimated user intention, so that it can help him to make a better decision like which Webpage should be requested next. More important problem is the semantic heterogeneity between Web spaces. It makes the understandability of locally annotated resources more difficult. We apply semantic annotation, which is a transcoding procedure with the global ontology. Therefore, each local metadata can be semantically enriched, and efficiently comparable. As testing bed of our experiment, we organized three different online clothes stores whose images are annotated by semantically heterogeneous metadata. We simulated virtual customers navigating these cyberspaces. According to the predefined preferences of customer models, they conducted comparison-shopping. We have shown the reasonability of supporting the Web browsing, and its performance was evaluated as measuring the total size of browsed hyperspace.

  • An Enhanced Fairness Algorithm for the IEEE 802.17 Resilient Packet Ring

    Tae-Joon KIM  

     
    LETTER-Network

      Vol:
    E88-B No:5
      Page(s):
    2182-2184

    The fairness algorithm of the Resilient Packet Ring IEEE 802.17 standard suffers from throughput degradation under an unbalanced overload. This letter proposes an enhanced fairness algorithm using a valuable piece of information, represented by the transit buffer length, about congestion alleviation on a congested node, under which the throughput degradation can be completely improved.

  • A Test Structure for Two-Dimensional Analysis of MOSFETs by Hot-Carrier-Induced Photoemission

    Toshihiro MATSUDA  Hiroaki TAKEUCHI  Akira MURAMATSU  Hideyuki IWATA  Takashi OHZONE  Kyoji YAMASHITA  Norio KOIKE  Ken-ichiro TATSUUMA  

     
    PAPER

      Vol:
    E88-C No:5
      Page(s):
    811-816

    A test structure and method for two-dimensional analysis of fabrication process variation of MOSFET using a photoemission microscope are presented. Arrays of 2010 (=200) MOSFETs were successfully measured at a time and evaluated the fluctuation of their characteristics. The fluctuation of hot-carrier-induced photoemission intensity was larger as gate length becomes smaller. Although the intensity fluctuation of photoemission in the same MOSFET was within small range, the fluctuation all over the MOSFET array was relatively large and independent of the position in the array. An estimation method of the gate length fluctuation has been demonstrated with the photoemission intensity distribution analysis.

  • Radiation Pattern Analysis of Reflector Antennas--Discussions and Hybrid Use of Physical Optics and Aperture Field Integration Method--

    Makoto ANDO  

     
    INVITED PAPER

      Vol:
    E88-B No:5
      Page(s):
    1790-1800

    This paper reviews the approximation principle of Physical Optics in view of diffraction theory. Two key error factors are identified for PO, that is, 1) errors in edge diffraction coefficients and 2) fictitious penetrating rays. Improved methods named PO-AF and PTD-AF are proposed as the methods which suppress the fictitious penetrating rays from PO and PTD respectively. In deep shadow regions of the reflector antennas, PO-AF and PDT-AF approach to PO-EEC and UTD respectively, while the continuity is assured. The effectiveness is numerically demonstrated for two dimensional scatterers.

9861-9880hit(16314hit)