Ruibin GUO Dongxiang ZHOU Keju PENG Yunhui LIU
Pose estimation is a basic requirement for the autonomous behavior of robots. In this article we present a robust and fast visual odometry method to obtain camera poses by using RGB-D images. We first propose a motion estimation method based on sparse geometric constraint and derive the analytic Jacobian of the geometric cost function to improve the convergence performance, then we use our motion estimation method to replace the tracking thread in ORB-SLAM for improving its runtime performance. Experimental results show that our method is twice faster than ORB-SLAM while keeping the similar accuracy.
Zi Hao ONG Takahide SATO Satomi OGAWA
A design method of the differential N-path filter with sampling computation is proposed. It enables the scale of the whole filter to be reduced by approximately half for easier realization. On top of that, the proposed method offers the ability to eliminate the harmonic passbands of the clock frequency and an increase of harmonic rejection. By using the proposed method, previous work involving an 8-path filter can be reduced to 5-path. The proposed differential 5-path filter reduces the scale of the circuit and at the same time has the performance of a 10-path filter from previous work. An example of differential 7-path filter using the same proposed design method is also stated in comparison of the differential 5-path filter. The differential 7-path filter offers the ability to eliminate all the passbands below 10 times the clock frequency with a tradeoff of an increase in circuit scale.
Akinori HOSOYAMADA Kazumaro AOKI
It has been said that security of symmetric key schemes is not so much affected by quantum computers, compared to public key schemes. However, recent works revealed that, in some specific situations, symmetric key schemes are also broken in polynomial time by adversaries with quantum computers. These works contain a quantum distinguishing attack on 3-round Feistel ciphers and a quantum key recovery attack on the Even-Mansour cipher by Kuwakado and Morii, in addition to the quantum forgery attack on CBC-MAC which is proposed independently by Kaplan et al., and by Santoli and Schaffner. Iterated Even-Mansour cipher is a simple but important block cipher, which can be regarded as an idealization of AES. Whether there exists an efficient quantum algorithm that can break iterated Even-Mansour cipher with independent subkeys is an important problem from the viewpoint of analyzing post-quantum security of block ciphers. Actually there is an efficient quantum attack on iterated Even-Mansour cipher by Kaplan et al., but their attack can only be applied in the case that all subkeys are the same. This paper shows that there is a polynomial time quantum algorithm that recovers partial keys of the iterated Even-Mansour cipher with independent subkeys, in a related-key setting. The related-key condition is somewhat strong, but our algorithm can recover subkeys with two related oracles. In addition, we also show that our algorithm can recover all keys of the i-round iterated Even-Mansour cipher, if we are allowed to access i related quantum oracles. To realize quantum related-key attacks, we extend Simon's quantum algorithm so that we can recover the hidden period of a function that is periodic only up to constant. Our technique is to take differential of the target function to make a double periodic function, and then apply Simon's algorithm.
This paper presents the method of moments based on electric field integral equation which is capable of solving three-dimensional metallic waveguide problem with no use of another method. Metals are treated as perfectly electric conductor. The integral equation is derived in detail. In order to validate the proposed method, the numerical results are compared with those in a published paper. Three types of waveguide are considered: step discontinuity waveguide, symmetrical resonant iris waveguide, and unsymmetrical resonant iris waveguide. The numerical results are also verified by the law of conservation of energy.
Masayuki ABE Fumitaka HOSHINO Miyako OHKUBO
Bilinear-type conversion is to translate a cryptographic scheme designed over symmetric bilinear groups into one that works over asymmetric bilinear groups with small overhead regarding the size of objects concerned in the target scheme. In this paper, we address scalability for converting complex cryptographic schemes. Our contribution is threefold. Investigating complexity of bilinear-type conversion. We show that there exists no polynomial-time algorithm for worst-case inputs under standard complexity assumption. It means that bilinear-type conversion in general is an inherently difficult problem. Presenting a new scalable conversion method. Nevertheless, we show that large-scale conversion is indeed possible in practice when the target schemes are built from smaller building blocks with some structure. We present a novel conversion method, called IPConv, that uses 0-1 Integer Programming instantiated with a widely available IP solver. It instantly converts schemes containing more than a thousand of variables and hundreds of pairings. Application to computer-aided design. Our conversion method is also useful in modular design of middle to large scale cryptographic applications; first construct over simpler symmetric bilinear groups and run over efficient asymmetric groups. Thus one can avoid complication of manually allocating variables over asymmetric bilinear groups. We demonstrate its usefulness by somewhat counter-intuitive examples where converted DLIN-based Groth-Sahai proofs are more compact than manually built SXDH-based proofs. Though the early purpose of bilinear-type conversion is to save existing schemes from attacks against symmetric bilinear groups, our new scalable conversion method will find more applications beyond the original goal. Indeed, the above computer-aided design can be seen as a step toward automated modular design of cryptographic schemes.
Khanh Nam NGUYEN Hiroshi SHIRAI
Kirchhoff approximation (KA) method has been applied for ray-mode conversion to analyze the plane wave scattering by conducting thick slits. The scattering fields can be considered as field radiations from equivalent magnetic current sources assumed by closing the aperture of the slit. The obtained results are compared with those of other methods to validate the accuracy of the proposed formulation in different conditions of slit dimension.
Financial Technology (FinTech) is considered a taxonomy that describes a wide range of ICT (information and communications technology) associated with financial transactions and related operations. Improvement of service quality is the main issue addressed in this taxonomy, and there are a large number of emerging technologies including blockchain-based cryptocurrencies and smart contracts. Due to its innovative nature in accounting, blockchain can also be used in lots of other FinTech contexts where token models play an important role for financial engineering. This paper revisits some of the key concepts accumulated behind this trend, and shows a generalized understanding of the technology using an adapted stochastic process. With a focus on financial instruments using blockchain, research directions toward stable applications are identified with the help of a newly proposed stabilizer: interpretation function of token valuation. The idea of adapted stochastic process is essential for the stabilizer, too.
Takanori ISOBE Kyoji SHIBUTANI
We propose new key recovery attacks on the two-round single-key n-bit Even-Mansour ciphers (2SEM) that are secure up to 22n/3 queries against distinguishing attacks proved by Chen et al. Our attacks are based on the meet-in-the-middle technique which can significantly reduce the data complexity. In particular, we introduce novel matching techniques which enable us to compute one of the two permutations without knowing a part of the key information. Moreover, we present two improvements of the proposed attack: one significantly reduces the data complexity and the other reduces the time complexity. Compared with the previously known attacks, our attack first breaks the birthday barrier on the data complexity although it requires chosen plaintexts. When the block size is 64 bits, our attack reduces the required data from 245 known plaintexts to 226 chosen plaintexts with keeping the time complexity required by the previous attacks. Furthermore, by increasing the time complexity up to 262, the required data is further reduced to 28, and DT=270, where DT is the product of data and time complexities. We show that our data-optimized attack requires DT=2n+6 in general cases. Since the proved lower bound on DT for the single-key one-round n-bit Even-Mansour ciphers is 2n, our results imply that adding one round to one-round constructions does not sufficiently improve the security against key recovery attacks. Finally, we propose a time-optimized attacks on 2SEM in which, we aim to minimize the number of the invocations of internal permutations.
Hiromitsu AWANO Tadayuki ICHIHASHI Makoto IKEDA
An ASIC crypto processor optimized for the 254-bit prime-field optimal-ate pairing over Barreto-Naehrig (BN) curve is proposed. The data path of the proposed crypto processor is designed to compute five Fp2 operations, a multiplication, three addition/subtractions, and an inversion, simultaneously. We further propose a design methodology to automate the instruction scheduling by using a combinatorial optimization solver, with which the total cycle count is reduced to 1/2 compared with ever reported. The proposed crypto processor is designed and fabricated by using a 65nm silicon-on-thin-box (SOTB) CMOS process. The chip measurement result shows that the fabricated chip successfully computes a pairing in 0.185ms when a typical operating voltage of 1.20V is applied, which corresponds to 2.8× speed up compared to the current state-of-the-art pairing implementation on ASIC platform.
Dynamic linear feedback shift registers (DLFSRs) are a scheme to transfer from one LFSR to another. In cryptography each LFSR included in a DLFSR should generate maximal-length sequences, and the number of switches transferring LFSRs should be small for efficient performance. This corresponding addresses on searching such conditioned DLFSRs. An efficient probabilistic algorithm is given to find such DLFSRs with two or four switches, and it is proved to succeed with nonnegligible probability.
Hiroyasu ISHIKAWA Hiroki ONUKI Hideyuki SHINONAGA
Unmanned aircraft systems (UASs) have been developed and studied as temporal communication systems for emergency and rescue services during disasters, such as earthquakes and serious accidents. In a typical UAS model, several unmanned aerial vehicles (UAVs) are used to provide services over a large area. The UAV is comprised of a transmitter and receiver to transmit/receive the signals to/from terrestrial stations and terminals. Therefore, the carrier frequencies of the transmitted and received signals experience Doppler shifts due to the variations in the line-of-sight velocity between the UAV and the terrestrial terminal. Thus, by observing multiple Doppler shifts from different UAVs, it is possible to detect the position of a user that possesses a communication terminal for the UAS. This study aims to present a methodology for position detection based on the least-squares method to the Doppler shift frequencies. Further, a positioning accuracy index is newly proposed, which can be used as an index for measuring the position accurately, instead of the dilution-of-precision (DOP) method, which is used for global positioning systems (GPSs). A computer simulation was conducted for two different flight route models to confirm the applicability of the proposed positioning method and the positioning accuracy index. The simulation results confirm that the parameters, such as the flight route, the initial position, and velocity of the UAVs, can be optimized by using the proposed positioning accuracy index.
Wataru HASHIMOTO Yuh YAMASHITA Koichi KOBAYASHI
In this paper, we propose a new asymptotically stabilizing control law for a four-wheeled vehicle with a steering limitation. We adopt a locally semiconcave control Lyapunov function (LS-CLF) for the system. To overcome the nonconvexity of the input-constraint set, we utilize a saturation function and a signum function in the control law. The signum function makes the vehicle velocity nonzero except at the origin so that the angular velocity can be manipulated within the input constraint. However, the signum function may cause a chattering phenomenon at certain points of the state far from the origin. Thus, we integrate a lazy-switching mechanism for the vehicle velocity into the control law. The mechanism makes a sign of the vehicle velocity maintain, and the new control input also decreases the value of the LS-CLF. We confirm the effectiveness of our method by a computer simulation and experiments.
Hiroaki UCHIDA Toshimichi SAITO
This paper studies synchronization phenomena in a ring-coupled system of digital spiking neurons. The neuron consists of two shift registers connected by a wiring circuit and can generate various spike-trains. Applying a spike based connection, the ring-coupled system is constructed. The ring-coupled system can generate multi-phase synchronization phenomena of various periodic spike-trains. Using a simple dynamic model, existence and stability of the synchronization phenomena are analyzed. Presenting a FPGA based test circuit, typical synchronization phenomena are confirmed experimentally.
Rugang WANG Feng ZHOU Xiaofang YANG Zhangkai LUO
To improve the robustness of the polarization modulation (PM) technique applied in dual-polarized satellite systems, a zero-forcing aided demodulation (ZFAD) method is proposed to eliminate the impairment to the PM from the depolarization effect (DE). The DE elimination is traditionally dependent on the pre-compensation method, which is based on the channel state information (CSI). While the distance between communication partners in satellite systems is so long that the CSI can not be always updated in time at the transmitter side. Therefore, the pre-compensation methods may not perform well. In the ZFAD method, the CSI is estimated at the receiver side and the zero forcing matrix is constructed to process the received signal before demodulating the PM signal. In this way, the DE is eliminated. In addition, we derive the received signal-to-noise ratio expression of the PC and ZFAD methods with the statistical channel model for a better comparison. Theoretical analysis and simulation results demonstrate the ZFAD method can eliminate the DE effect effectively and achieve a better symbol error rate performance than the pre-compensation method.
Fengde JIA Zishu HE Yikai WANG Ruiyang LI
In this paper, we propose an online antenna-pulse selection method in space time adaptive processing, while maintaining considerable performance and low computational complexity. The proposed method considers the antenna-pulse selection and covariance matrix estimation at the same time by exploiting the structured clutter covariance matrix. Such prior knowledge can enhance the covariance matrix estimation accuracy and thus can provide a better objective function for antenna-pulse selection. Simulations also validate the effectiveness of the proposed method.
Keiji JIMI Isamu MATSUNAMI Ryohei NAKAMURA
In stepped FM radar, the transmitter intermittently transmits narrowband pulse trains of frequencies that are incremented in steps, and the receiver performs phase detection on each pulse and applies the inverse discrete Fourier transform (IDFT) to create ultra-short pulses in the time domain. Furthermore, since the transmitted signal consists of a narrowband pulse train of different frequencies, the transmitter can avoid arbitrary frequency bands while sending the pulse train (spectrum holes), allowing these systems to coexist with other narrowband wireless systems. However, spectrum holes cause degradation in the distance resolution and range sidelobe characteristics of wireless systems. In this paper, we propose a spectrum hole compensation method for stepped FM radars using Khatri-Rao product extended-phase processing to overcome the problem of spectrum holes and investigate the effectiveness of this method through experiments. Additionally, we demonstrate that the proposed method dramatically improves the range sidelobe and distance resolution characteristics.
Minoru INOMATA Tetsuro IMAI Koshiro KITAO Yukihiko OKUMURA Motoharu SASAKI Yasushi TAKATORI
This paper proposes a radio propagation prediction method that uses point cloud data based on a hybrid of the ray-tracing (RT) method and an effective roughness (ER) model in urban environments for the fifth generation mobile communications system using high frequency bands. The proposed prediction method incorporates propagation characteristics that consider diffuse scattering from surface irregularities. The validity of the proposed method is confirmed by comparisons of measurement and prediction results gained from the proposed method and a conventional RT method based on power delay and angular profiles. From predictions based on the power delay and angular profiles, we find that the proposed method, assuming the roughness of σh=1mm, accurately predicts the propagation characteristics in the 20GHz band for urban line-of-sight environments. The prediction error for the delay spread is 2.1ns to 9.7ns in an urban environment.
The potential for using millimeter-wave (mmWave) frequencies in future 5G wireless cellular communication systems has motivated the study of large-scale antenna arrays to achieve highly directional beamforming. However, the conventional fully digital beamforming (DBF) methods which require one radio frequency (RF) chain per antenna element are not viable for large-scale antenna arrays due to the high cost and large power consumption of high frequency RF chain components. Hybrid precoding can significantly reduce the number of required RF chains and relieve the huge power consumption in mmWave massive multiple-input multiple-output (MIMO) systems, thus attracting much interests from academic and industry. In this paper, we consider the downlink communication of a massive multiuser MIMO (MU-MIMO) system in the mmWave channel, and propose a low complexity hybrid block diagonal geometric mean decomposition (BD-GMD) scheme. More specially, a joint transmit-receive (Tx-Rx) analog beamforming with large-scale arrays is proposed to improve channel gain, and then a low-dimensional BD-GMD approach is implemented at the equivalent baseband channel to mitigate the inter-user interference and equalize different data streams of each user. With the help of successive interference cancellation (SIC) at the receiver, we can decompose each user's MIMO channel into parallel sub-channels with identical higher SNRs/SINRs, thus equal-rate coding can be applied across the sub-channels of each user. Finally, simulation results verify that the proposed hybrid BD-GMD precoding scheme outperforms existing conventional fully digital and hybrid precoding schemes and is able to achieve much better BER performance.
Chi-Yuk CHIU Shanpu SHEN Fan JIANG Katsunori ISHIMIYA Qingsha S. CHENG Ross D. MURCH
Smartphones for wireless communication typically consist of a large area frontal liquid crystal display (LCD), which incorporates a metal back plate, and a back cover chassis made from metal. Leveraging this structure a new approach to construct antennas for smartphones is proposed where the complete metal back cover chassis and LCD back plate are used as the radiating element and ground plane. In the design a feedline is connected between the metal back cover chassis and LCD back plate, along with shorts at various locations between the two metal plates, to control the resonance frequency of the resulting antenna. Multiple-band operation is possible without the need for any slots in the plates for radiation. Results show that antenna frequency reconfigurability can be achieved when switching function is added to the shorts so that several wireless communication bands can be covered. This approach is different from existing metallic frame antenna designs currently available in the market. A design example is provided which uses one PIN diode for the switching shorts and the target frequency bands are 740-780MHz and 900-1000MHz & 1700-1900MHz. The optimization of LC matchings and concerns of hand effects and metallic components between the chassis and LCD metal back plate are also addressed.
Takanori ISHIKURO Ryoichi SATO Yoshio YAMAGUCHI Hiroyoshi YAMADA
In this paper, we propose a simple algorithm for detecting a vehicle trapped in flooded urban area by using quad-polarimetric SAR data. The four-component scattering power decomposition and phase difference of HH-VV co-pol ratio are effectively used in the proposed algorithm. Here we carry out polarimetric scattering measurement for a scaled vehicle model surrounded by two buildings model in an anechoic chamber, to acquire the quad-polarimetric SAR data. It is confirmed from the results of the image analysis for the measured SAR data that the proposed algorithm for vehicle detection works well even under severe environment where the vehicle is set in the shadow of the building and/or the alignment of the vehicle or the buildings is obliquely oriented to direction of the radar line of sight.