The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

9121-9140hit(21534hit)

  • Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers

    Masayuki YOSHINO  Katsuyuki OKEYA  Camille VUILLAUME  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1851-1858

    This paper proposes novel algorithms for computing double-size modular multiplications with few modulus-dependent precomputations. Low-end devices such as smartcards are usually equipped with hardware Montgomery multipliers. However, due to progresses of mathematical attacks, security institutions such as NIST have steadily demanded longer bit-lengths for public-key cryptography, making the multipliers quickly obsolete. In an attempt to extend the lifespan of such multipliers, double-size techniques compute modular multiplications with twice the bit-length of the multipliers. Techniques are known for extending the bit-length of classical Euclidean multipliers, of Montgomery multipliers and the combination thereof, namely bipartite multipliers. However, unlike classical and bipartite multiplications, Montgomery multiplications involve modulus-dependent precomputations, which amount to a large part of an RSA encryption or signature verification. The proposed double-size technique simulates double-size multiplications based on single-size Montgomery multipliers, and yet precomputations are essentially free: in an 2048-bit RSA encryption or signature verification with public exponent e=216+1, the proposal with a 1024-bit Montgomery multiplier is at least 1.5 times faster than previous double-size Montgomery multiplications.

  • Adaptive Missing Texture Reconstruction Method Based on Kernel Canonical Correlation Analysis with a New Clustering Scheme

    Takahiro OGAWA  Miki HASEYAMA  

     
    PAPER-Image

      Vol:
    E92-A No:8
      Page(s):
    1950-1960

    In this paper, a method for adaptive reconstruction of missing textures based on kernel canonical correlation analysis (CCA) with a new clustering scheme is presented. The proposed method estimates the correlation between two areas, which respectively correspond to a missing area and its neighboring area, from known parts within the target image and realizes reconstruction of the missing texture. In order to obtain this correlation, the kernel CCA is applied to each cluster containing the same kind of textures, and the optimal result is selected for the target missing area. Specifically, a new approach monitoring errors caused in the above kernel CCA-based reconstruction process enables selection of the optimal result. This approach provides a solution to the problem in traditional methods of not being able to perform adaptive reconstruction of the target textures due to missing intensities. Consequently, all of the missing textures are successfully estimated by the optimal cluster's correlation, which provides accurate reconstruction of the same kinds of textures. In addition, the proposed method can obtain the correlation more accurately than our previous works, and more successful reconstruction performance can be expected. Experimental results show impressive improvement of the proposed reconstruction technique over previously reported reconstruction techniques.

  • A Note on Factoring α-LSBS Moduli

    Hung-Min SUN  Mu-En WU  Cheng-Ta YANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:8
      Page(s):
    2137-2138

    In this letter the complexity of factoring an α-LSBS modulus is analyzed. This gives an improvement on the lower bound of the previous results.

  • Mining Noise-Tolerant Frequent Closed Itemsets in Very Large Database

    Junbo CHEN  Bo ZHOU  Xinyu WANG  Yiqun DING  Lu CHEN  

     
    PAPER-Data Mining

      Vol:
    E92-D No:8
      Page(s):
    1523-1533

    Frequent Itemsets(FI) mining is a popular and important first step in analyzing datasets across a broad range of applications. There are two main problems with the traditional approach for finding frequent itemsets. Firstly, it may often derive an undesirably huge set of frequent itemsets and association rules. Secondly, it is vulnerable to noise. There are two approaches which have been proposed to address these problems individually. The first problem is addressed by the approach Frequent Closed Itemsets(FCI), FCI removes all the redundant information from the result and makes sure there is no information loss. The second problem is addressed by the approach Approximate Frequent Itemsets(AFI), AFI could identify and fix the noises in the datasets. Each of these two concepts has its own limitations, however, the authors find that if FCI and AFI are put together, they could help each other to overcome the limitations and amplify the advantages. The new integrated approach is termed Noise-tolerant Frequent Closed Itemset(NFCI). The results of the experiments demonstrate the advantages of the new approach: (1) It is noise tolerant. (2) The number of itemsets generated would be dramatically reduced with almost no information loss except for the noise and the infrequent patterns. (3) Hence, it is both time and space efficient. (4) No redundant information is in the result.

  • Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party

    Chunhua SU  Feng BAO  Jianying ZHOU  Tsuyoshi TAKAGI  Kouichi SAKURAI  

     
    LETTER

      Vol:
    E92-A No:8
      Page(s):
    1868-1871

    The rapid growth of the Internet provides people with tremendous opportunities for data collection, knowledge discovery and cooperative computation. However, it also brings the problem of sensitive information leakage. Both individuals and enterprises may suffer from the massive data collection and the information retrieval by distrusted parties. In this paper, we propose a privacy-preserving protocol for the distributed kernel density estimation-based clustering. Our scheme applies random data perturbation (RDP) technique and the verifiable secret sharing to solve the security problem of distributed kernel density estimation in [4] which assumed a mediate party to help in the computation.

  • Experimental Research of Arc Behavior in Liquid Metal for Current Limiting Application

    Yiying LIU  Mingzhe RONG  Yi WU  Chenxi PAN  Hong LIU  Shijie YU  

     
    PAPER-Arc Discharge & Contact Phenomena

      Vol:
    E92-C No:8
      Page(s):
    1008-1012

    The liquid metal current limiter (LMCL) is a possible alternative to limit the short current of power system due to its special merits. This paper is devoted to the investigation of the arc behavior in liquid metal GaInSn for current limiting application. Firstly, the arc evolution including arc initiation, arc expansion and arc extinguish is observed through an experimental device. The resistance of arc and the self healing property of liquid metal are described. Subsequently, the arc erosion on electrodes is presented with its causes analyzed. Finally, the arc characteristics with the influence of rise rate of prospective current and channel diameter are discussed in details.

  • Physical Layer Network Coding for Wireless Cooperative Multicast Flows

    Jun LI  Wen CHEN  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:8
      Page(s):
    2559-2567

    It has been proved that wireless network coding can increase the throughput of multi-access system [2] and bi-directional system [5] by taking the advantage of the broadcast nature of electromagnetic waves. In this paper, we introduce the wireless network coding to cooperative multicast system. We establish a basic 2-source and 2-destination cooperative system model with arbitrary number of relays (2-N-2 system). Then two regenerative network coding (RNC) protocols are designed to execute the basic idea of network coding in complex field (RCNC) and Galois field (RGNC) respectively. We illuminate how network coding can enhance the throughput distinctly in cooperative multicast system. Power allocation schemes as well as precoder design are also carefully studied to improve the system performance in terms of system frame error probability (SFEP).

  • Using Mobile TLA as a Logic for Dynamic I/O Automata

    Tatjana KAPUS  

     
    PAPER-Fundamentals of Software and Theory of Programs

      Vol:
    E92-D No:8
      Page(s):
    1515-1522

    Input/Output (I/O) automata and the Temporal Logic of Actions (TLA) are two well-known techniques for the specification and verification of concurrent systems. Over the past few years, they have been extended to the so-called dynamic I/O automata and, respectively, Mobile TLA (MTLA) in order to be more appropriate for mobile agent systems. Dynamic I/O automata is just a mathematical model, whereas MTLA is a logic with a formally defined language. In this paper, therefore, we investigate how MTLA could be used as a formal language for the specification of dynamic I/O automata. We do this by writing an MTLA specification of a travel agent system which has been specified semi-formally in the literature on that model. In this specification, we deal with always existing agents as well as with an initially unknown number of dynamically created agents, with mobile and non-mobile agents, with I/O-automata-style communication, and with the changing communication capabilities of mobile agents. We have previously written a TLA specification of this system. This paper shows that an MTLA specification of such a system can be more elegant and faithful to the dynamic I/O automata definition because the agent existence and location can be expressed directly by using agent and location names instead of special variables as in TLA. It also shows how the reuse of names for dynamically created and destroyed agents within the dynamic I/O automata framework can be specified in MTLA.

  • Prognostic and Diagnostic Technology for DC Actuated Contactors and Motor Starters

    Xin ZHOU  Lian ZOU  Roger BRIGGS  

     
    PAPER-Contactors

      Vol:
    E92-C No:8
      Page(s):
    1045-1051

    Unpredicted contactor failure can interrupt production and affect the uptime and throughput of manufacturing. Usually the life of a contactor is based on the manufacturers' life test data. However, due to the way of how the contactor is operated and the environment it is operated in, the working life of a contactor can vary significantly. In this paper, a novel technology has been investigated to predict potential failures of DC actuated contactors by monitoring their DC coil current and contactor currents. Three parameters are derived from this set of data to monitor the health of contactors: contact over-travel, armature pull-in time and coil current differential. Contact over-travel provides information on the remaining life of contacts and coil current differential provides indication of contact weld and carrier jam due to debris. The armature pull-in time provides information on contactor closing speed. Prototype contactors have been built and AC4 tests have been carried out for evaluation. Test results show that the contact over-travel parameter agrees well with contact mass loss data taken after contactors failed. The derived armature pull-in time agrees well with that measured by a laser displacement sensor. The defined parameters provide effective monitoring and prediction of potential contactor failures.

  • Research on Dynamic Characteristics Testing and Analyzing System of Electromagnetic Relay

    Xuerong YE  Huimin LIANG  Jie DENG  Guofu ZHAI  

     
    PAPER-Relacys & Switches

      Vol:
    E92-C No:8
      Page(s):
    1028-1033

    An electromagnetic relay (EMR) is widely used in automatic control field, and its dynamic characteristics play a significant role in EMR researches. According to structural features of the EMR, a dynamic characteristics testing and analyzing system (DCTAS) based on CCD digital image processing technique is designed and implemented. By using the DCTAS, the dynamic characteristics (include displacement, velocity, acceleration and force characteristics) of EMR whose operating time is less than 12 ms and armature travel is less than 10 mm can be investigated. The comparison of testing data obtained by the DCTAS and that of by a high speed camera indicates the validity of the system to EMR dynamic characteristics testing.

  • Multiple Metrics Gateway Selection Scheme in Mobile Ad Hoc Network (MANET) and Infrastructure Network Integration

    Fudhiyanto Pranata SETIAWAN  Safdar H. BOUK  Iwao SASASE  

     
    PAPER-Network

      Vol:
    E92-B No:8
      Page(s):
    2619-2627

    This paper proposes a scheme to select an appropriate gateway based on multiple metrics such as remaining energy, mobility or speed, and number of hops in Mobile Ad Hoc Network (MANET) and the infrastructure network integration. The Multiple Criteria Decision Making (MCDM) method called Simple Additive Weighting (SAW) is used to rank and to select the gateway node. SAW method calculates the weights of gateway node candidates by considering these three metrics. The node with the highest weight will be selected as the gateway. Simulation results show that our scheme can reduce the average energy consumption of MANET nodes, and improve throughput performance, gateway lifetime, Packet Delivery Ratio (PDR) of the MANET and the infrastructure network.

  • A Switching Type-II Hybrid ARQ Scheme with RCPT Codes

    Ju-Ya CHEN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E92-B No:8
      Page(s):
    2723-2726

    A switching type-II hybrid ARQ scheme with rate compatible punctured turbo (RCPT) codes is proposed in this letter. The proposed scheme combines three retransmission schemes by minimizing a cost function that yields a compromise between throughput and delay time. The performance of the proposed algorithm is evaluated by computer simulations. Compared with conventional hybrid ARQ algorithms, the proposed algorithm can offer almost the same throughput performance with smaller time delay.

  • Bandwidth-Efficient Mutually Cooperative Relaying with Spatially Coordinate-Interleaved Orthogonal Design

    Hyun-Seok RYU  Kyung-Mi PARK  Hee-Soo LEE  Chung-Gu KANG  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E92-B No:8
      Page(s):
    2731-2734

    This letter proposes a type of mutually cooperative relaying (MCR) scheme based on a spatially coordinate-interleaved orthogonal design (SCID), in which two cooperative users are spatially multiplexed without bandwidth expansion. It provides not only diversity gain (with order of two) as in the existing MCR scheme, but also additional coding gain. Our simulation results demonstrate that the proposed SCID scheme is useful for improving the uplink performance as long as one user can find another active user as a close neighbor that is simultaneously communicating with the same destination, e.g., a base station in the cellular network.

  • Coding Complexity Prediction for H.264/AVC Rate Control

    Yimin ZHOU  Ling TIAN  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E92-D No:8
      Page(s):
    1592-1595

    Coding complexity is a crucial parameter in rate control scheme. Traditional measures for coding complexity are based on statistic and estimation. This way may cause the imprecise coding complexity and finally bring inaccurate output bit rate more or less. To resolve this problem, we propose a hypothetical virtual coding complexity to imitate the real coding complexity. Based on the proposed coding complexity measure, a novel rate control algorithm is proposed either. Experimental results and analysis show that the proposed mearsure for coding complexity is effective, and our scheme outperforms the JVT-W042 solution by providing more accurate QP prediction, reducing frame skipping, and improving visual quality.

  • Performance Enhancement of IEEE 802.11 WLAN with a Cognitive Radio Technique

    Tomoya TANDAI  Masahiro TAKAGI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:8
      Page(s):
    2649-2666

    Cognitive Radio (CR) is expected to bring about a more flexible wireless communication environment by the efficient utilization of spectrum resources. In this paper, a CR coexisting with IEEE 802.11 Wireless Local Area Networks (WLANs) is proposed. In the Distributed Coordination Function (DCF) access scheme in IEEE 802.11 WLAN, a station (STA) transmits a data frame by executing a random backoff procedure after Distributed Inter Frame Space (DIFS) period, and the destination STA of the data frame responds with Ack frame to the source STA after Short Inter Frame Space (SIFS) period. After the Ack frame is transmitted, the same procedures are repeated. The proposed CR terminal recognizes the DIFS period and the SIFS period, and then it transmits CR signals during these periods with the transmission power that does not affect the IEEE 802.11 WLAN protocol. Thus, the proposed CR terminals recognize the periods during which IEEE 802.11 STAs do not transmit any frames and they use the periods to transmit CR signals. In this paper, IEEE 802.11 WLAN STA that has the capability for the proposed CR technique in addition to the normal 802.11 WLAN capability is considered and the improved average throughputs by the CR communications are evaluated in the computer simulation, and then the effectiveness of the proposed method is clarified.

  • Low Power 10-b 250 Msample/s CMOS Cascaded Folding and Interpolating A/D Converter

    Zhi-Yuan CUI  Yong-Gao JIN  Nam-Soo KIM  Ho-Yong CHOI  

     
    PAPER-Electronic Circuits

      Vol:
    E92-C No:8
      Page(s):
    1073-1079

    This paper introduces a new folding amplifier in a folding and interpolating 10-b ADC. The amplifier consists of current mirrors and differential stages. Only one current source is exploited in cascaded differential pairs, which reduces the power consumption significantly. In the folding circuit, the interpolation is implemented with a current division technique. An experiment of the amplifier in 10-b folding signal has been integrated in a single-poly four-metal 0.35 µm CMOS process. The simulation in 10-b folding ADC shows that power consumption is 225 mW at the sampling speed of 250 Msample/s and the power supply of 3.3 V. The preliminary experiment indicates the current steering folder and digital bits operate as expected.

  • Lazy Suffix Array: The Data Structure for Online Construction and Pattern Searching

    Ben HACHIMORI  Tetsuo SHIBUYA  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1750-1756

    In this paper, an idea for improvement of suffix array construction using lazy evaluation is presented. Evaluation of the suffix array is based on the searching queries; only the necessary part of the suffix array is built when unevaluated part of the suffix array is referred during the searching process. This is less time consuming than constructing complete suffix array. We propose lazy evaluation of Schürmann-Stoye algorithm. Experimental results show that lazy Schürmann-Stoye algorithm runs faster than Maniscalco, which is well-recognized as the fastest suffix sorting algorithm, under the constraint of small LCP (longest common prefix) and a limited number of searching queries.

  • Memory-Efficient and High-Performance Two-Dimensional Discrete Wavelet Transform Architecture Based on Decomposed Lifting Algorithm

    Peng CAO  Chao WANG  Longxing SHI  

     
    PAPER-Digital Signal Processing

      Vol:
    E92-A No:8
      Page(s):
    2000-2008

    The line-based method has been one of the most commonly-used methods of hardware implementation of two-dimensional (2D) discrete wavelet transform (DWT). However, data buffer is required between the row DWT processor and the column DWT processor to solve the data flow mismatch, which increases the on-chip memory size and the output latency. Since the incompatible data flow is induced from the intrinsic property of adopted lifting-based algorithm, a decomposed lifting algorithm (DLA) is presented by rearranging the data path of lifting steps to ensure that image data is processed in raster scan manner in row processor and column processor. Theoretical analysis indicates that the precision issue of DLA outperforms other lifting-based algorithms in terms of round-off noise and internal word-length. A memory-efficient and high-performance line-based architecture is proposed based on DLA without the implementation of data buffer. For an N M image, only 2N internal memory is required for 5/3 filter and 4N of that is required for 9/7 filter to perform 2D DWT, where N and M indicate the width and height of an image. Compared with related 2D DWT architectures, the size of on-chip memory is reduced significantly under the same arithmetic cost, memory bandwidth and timing constraint. This design was implemented in SMIC 0.18 µm CMOS logic fabrication with 32 kbits dual-port RAM and 20 K equivalent 2-input NAND gates in a 1.00 mm 1.00 mm die, which can process 512 512 image under 100 MHz.

  • Viterbi-Type Inter-Carrier Interference Equalization for OFDM over Doubly Selective Channels

    Shuichi OHNO  Kok Ann Donny TEO  

     
    PAPER-Communications

      Vol:
    E92-A No:8
      Page(s):
    1905-1912

    Orthogonal Frequency Division Multiplexing (OFDM) transmission is robust to frequency-selective channels but sensitive to time-selective channels. Time variations of channels generate inter-carrier interference (ICI), which degrades system performance. In this paper, we develop frequency-domain Viterbi-type algorithm to effectively suppress the ICI, by exploiting the property of ICI terms in OFDM symbols. Null subcarriers, which are embedded in OFDM symbols for the reduction of interferences from/to adjacent bands, are exploited to reduce the complexity of the algorithm. Then, an approximate BER expression of Viterbi-type equalizer is derived. Simulations are provided to show the Viterbi-type equalizer works well in time- and frequency-selective (doubly selective) channel with affordable complexity.

  • Integer Variable χ-Based Cross Twisted Ate Pairing and Its Optimization for Barreto-Naehrig Curve

    Yasuyuki NOGAMI  Yumi SAKEMI  Hidehiro KATO  Masataka AKANE  Yoshitaka MORIKAWA  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1859-1867

    It is said that the lower bound of the number of iterations of Miller's algorithm for pairing calculation is log 2r/(k), where () is the Euler's function, r is the group order, and k is the embedding degree. Ate pairing reduced the number of the loops of Miller's algorithm of Tate pairing from ⌊log 2r⌋ to ⌊ log 2(t-1)⌋, where t is the Frobenius trace. Recently, it is known to systematically prepare a pairing-friendly elliptic curve whose parameters are given by a polynomial of integer variable "χ." For such a curve, this paper gives integer variable χ-based Ate (Xate) pairing that achieves the lower bound. In the case of the well-known Barreto-Naehrig pairing-friendly curve, it reduces the number of loops to ⌊log 2χ⌋. Then, this paper optimizes Xate pairing for Barreto-Naehrig curve and shows its efficiency based on some simulation results.

9121-9140hit(21534hit)