The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TIA(1376hit)

661-680hit(1376hit)

  • Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation

    Yoshiaki TAKATA  Hiroyuki SEKI  

     
    PAPER

      Vol:
    E92-D No:2
      Page(s):
    200-210

    Trust negotiation is an authorizing technique based on digital credentials, in which both a user and a server gradually establish trust in each other by repeatedly exchanging their credentials. A trust negotiation strategy is a function that answers a set of credentials to disclose to the other party, depending on policies and the set of already disclosed credentials. The disclosure tree strategy (DTS), proposed by Yu et al., is one of the strategies that satisfies preferable properties. DTS in a simple implementation requires exponential time and space; however, neither an efficient algorithm nor the lower-bound of its complexity was known. In this paper, we investigate the computational complexity of DTS. We formulate subproblems of DTS as problems on derivation trees of a context-free grammar (CFG), and analyze the computational complexity of the subproblems using the concepts of CFGs. As a result, we show that two subproblems EVL and MSET of DTS are NP-complete and NP-hard, respectively, while both are solvable in polynomial time if we modify EVL not to require non-redundancy and MSET not to answer any subset useless for leading the negotiation to success.

  • Efficient Hybrid DFE Algorithms in Spatial Multiplexing Systems

    Wenjie JIANG  Yusuke ASAI  Satoru AIKAWA  Yasutaka OGAWA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E92-A No:2
      Page(s):
    535-546

    The wireless systems that establish multiple input multiple output (MIMO) channels through multiple antennas at both ends of the communication link, have been proved to have tremendous potential to linearly lift the capacity of conventional scalar channel. In this paper, we present two efficient decision feedback equalization algorithms that achieve optimal and suboptimal detection order in MIMO spatial multiplexing systems. The new algorithms combine the recursive matrix inversion and ordered QR decomposition approaches, which are developed for nulling cancellation interaface Bell Labs layered space time (BLAST) and back substitution interface BLAST. As a result, new algorithms achieve total reduced complexities in frame based transmission with various payload lengths compared with the earlier methods. In addition, they enable shorter detection delay by carrying out a fast hybrid preprocessing. Moreover, the operation precision insensitivity of order optimization greatly relaxes the word length of matrix inversion, which is the most computational intensive part within the MIMO detection task.

  • Tree Based Approximate Optimal Signal Detectors for MIMO Spatial Multiplexing Systems

    Wenjie JIANG  Yusuke ASAI  Shuji KUBOTA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:2
      Page(s):
    544-558

    In multiple antenna systems that use spatial multiplexing to raise transmission rates, it is preferable to use maximum likelihood (ML) detection to exploit the full receive diversity and minimize the error probability. In this paper, we present two tree based approximate ML detectors that use new two ordering criteria in conjunction with efficient search strategies. Unlike conventional tree detectors, the new detectors closely approximate the error performance of the exact ML detector while achieving a dramatic reduction in complexity. Moreover, they ensure a fixed detection delay and high level of parallelization in the tree search.

  • An Intercell Interference Cancellation Method for Eigen-Beamforming Transmission

    Jaewon CHANG  Gwuieon JIN  Wonjin SUNG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:2
      Page(s):
    646-649

    Eigen-beamforming (EB) transmission for multiple-input multiple-output (MIMO) systems is an effective means to maximize the receiver signal-to-noise ratio (SNR) in a noise-limited environment, but suffers a performance degradation when strong interference signals exist. In this letter, we propose an interference cancellation method for EB signals by constructing a new receive beamforming vector which jointly utilizes the EB matrix and minimum mean-square error (MMSE) spatial demultiplexing. The proposed method is shown to outperform the conventional EB receiver in the entire cell range, with a significant increase in the effective signal-to-interference plus noise ratio (SINR) near the cell boundary.

  • Code Acquisition Performance in Correlated MIMO Channel

    Sangchoon KIM  Jinyoung AN  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E92-A No:2
      Page(s):
    547-555

    In this paper, the impacts of using multiple transmit antennas under doubly correlated MIMO channels on CDMA uplink code acquisition is studied. The performance of a MIMO code acquisition system is analyzed by considering spatial fading correlations, which depend on antenna spacing and azimuth spread at both MS and BS. The detection performance and mean acquisition time in the presence of spatially correlated MIMO channel are presented on a frequency selective fading channel and compared with the cases of spatial fading decorrelation via numerical evaluation. It is observed that the acquisition performance relies on the degree of spatial fading correlations. In addition, it is surprisingly seen that a MIMO code acquisition system provides worse performance than SIMO.

  • A Partial IR Hybrid ARQ Scheme Using Rate-Compatible Punctured LDPC Codes in an HSDPA System

    Chang-Rae JEONG  Hyo-Yol PARK  Kwang-Soon KIM  Keum-Chan WHANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E92-B No:2
      Page(s):
    604-607

    In this paper, an efficient partial incremental redundancy (P-IR) scheme is proposed for an H-ARQ using block type low density parity check (B-LDPC) codes. The performance of the proposed P-IR scheme is evaluated in an HSDPA system using IEEE 802.16e B-LDPC codes. Simulation results show that the proposed H-ARQ using IEEE 802.16e B-LDPC codes outperforms the H-ARQ using 3GPP turbo codes.

  • A Variable Error Data Normalized Step-Size LMS Adaptive Filter Algorithm: Analysis and Simulations

    Chee-Hyun PARK  Kwang-Seok HONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E92-A No:1
      Page(s):
    311-314

    This paper investigates noise reduction performance and performs convergence analysis of a Variable Error Data Normalized Step-Size Least Mean Square (VEDNSS LMS) algorithm. Adopting VEDNSS LMS provides fast convergence at early stages of adaptation while ensuring small final misadjustment. An analysis of convergence and steady-state performance for zero-mean Gaussian inputs is provided. Simulation results comparing the proposed algorithm to existing algorithms indicate its superior performance under various noise and frequency environments.

  • Higher Order Differential Attack on 6-Round MISTY1

    Yukiyasu TSUNOO  Teruo SAITO  Hiroki NAKASHIMA  Maki SHIGERI  

     
    PAPER-Symmetric Cryptography

      Vol:
    E92-A No:1
      Page(s):
    3-10

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.

  • Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Kenichiro SATO  Ryo HASHIMOTO  Makoto YOSHINO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E91-B No:12
      Page(s):
    3821-3830

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  • On Almost Perfect Nonlinear Functions

    Claude CARLET  

     
    INVITED PAPER

      Vol:
    E91-A No:12
      Page(s):
    3665-3678

    A function F:F2n F2n is almost perfect nonlinear (APN) if, for every a 0, b in F2n, the equation F(x)+F(x+a)=b has at most two solutions in F2n. When used as an S-box in a block cipher, it contributes optimally to the resistance to differential cryptanalysis. The function F is almost bent (AB) if the minimum Hamming distance between all its component functions v F, v∈F2n {0} (where "" denotes any inner product in F2n ) and all affine Boolean functions on F2n takes the maximal value 2n-1-2. AB functions exist for n odd only and contribute optimally to the resistance to the linear cryptanalysis. Every AB function is APN, and in the n odd case, any quadratic APN function is AB. The APN and AB properties are preserved by affine equivalence: F F' if F'=A1 F A2, where A1,A2 are affine permutations. More generally, they are preserved by CCZ-equivalence, that is, affine equivalence of the graphs of F: {(x,F(xv)) | x∈ F2n} and of F'. Until recently, the only known constructions of APN and AB functions were CCZ-equivalent to power functions F(x)=xd over finite fields (F2n being identified with F2n and an inner product being x y=tr(xy) where tr is the trace function). Several recent infinite classes of APN functions have been proved CCZ-inequivalent to power functions. In this paper, we describe the state of the art in the domain and we also present original results. We indicate what are the most important open problems and make some new observations about them. Many results presented are from joint works with Lilya Budaghyan, Gregor Leander and Alexander Pott.

  • Analyzing Bioelectric Potential Response of Plants Related to Photosynthesis under Blinking Irradiation

    Ki ANDO  Yuki HASEGAWA  Hitoshi MAEKAWA  Teruaki KATSUBE  

     
    PAPER-Bioelectronics

      Vol:
    E91-C No:12
      Page(s):
    1905-1909

    The bioelectric potential of plants is generated by ion concentration difference between inside and outside of plant cells. It has been reported that the bioelectric potential of leaves changes at the beginning of steady irradiation and intensity of the potential response increases with the photosynthetic rate. Although it has been reported that photosynthesis is accelerated by blinking irradiation, the potential response under the blinking irradiation have not been fully clarified. In this study, we measured the bioelectric potential and CO2 consumption of plants under various types of the blinking irradiation. This result showed that the potential response under the blinking irradiation has various behaviors and intensity of the response related to photosynthetic rate. We conclude that our method is suitable for monitoring the biological activity of plants such as photosynthesis.

  • A CMOS RF Power Detector Using an Improved Unbalanced Source Coupled Pair

    Hangue PARK  Jaejun LEE  Jaechun LEE  Sangwook NAM  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E91-C No:12
      Page(s):
    1969-1970

    This paper presents the design of a CMOS RF Power Detector (PD) using 0.18 µm standard CMOS technology. The PD is an improved unbalanced source coupled pair incorporating an output differential amplifier and sink current steering. It realizes an input detectable power range of -30 to -20 dBm over 0.1-1 GHz. Also it shows a maximum data rate of 30 Mbps with 2 pF output loading under OOK modulation. The overall current consumption is 1.9 mA under a 1.5 V supply.

  • A Cell-Based Hybrid Indexing Scheme for Energy Conserving k Nearest Neighbor Search on Air

    SeokJin IM  Hee Yong YOUN  

     
    LETTER-Broadcast Systems

      Vol:
    E91-B No:11
      Page(s):
    3799-3802

    This letter proposes a Cell-based Hybrid Index (CHI) for energy conserving k Nearest Neighbor search on air. The proposed CHI provides global knowledge on data distribution for fast decision of the search space and local knowledge for efficient pruning of data items. Simulations show that CHI outperforms the existing indexing schemes in terms of tuning time and energy efficiency. With respect to access time, it outperforms them except the distributed indexing scheme optimized for access time.

  • Configuration Sharing to Reduce Reconfiguration Overhead Using Static Partial Reconfiguration

    Sungjoon JUNG  Tag Gon KIM  

     
    PAPER-Computer Systems

      Vol:
    E91-D No:11
      Page(s):
    2675-2684

    Reconfigurable architectures are one of the most promising solutions satisfying both performance and flexibility. However, reconfiguration overhead in those architectures makes them inappropriate for repetitive reconfigurations. In this paper, we introduce a configuration sharing technique to reduce reconfiguration overhead between similar applications using static partial reconfiguration. Compared to the traditional resource sharing that configures multiple temporal partitions simultaneously and employs a time-multiplexing technique, the proposed configuration sharing reconfigures a device incrementally as an application changes and requires a backend adaptation to reuse configurations between applications. Adopting a data-flow intermediate representation, our compiler framework extends a min-cut placer and a negotiation-based router to deal with the configuration sharing. The results report that the framework could reduce 20% of configuration time at the expense of 1.9% of computation time on average.

  • Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis

    Jongsung KIM  Changhoon LEE  Jaechul SUNG  Seokhie HONG  Sangjin LEE  Jongin LIM  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    3047-3058

    The design and analysis of block ciphers is an established field of study which has seen significant progress since the early 1990s. Nevertheless, what remains on an interesting direction to explore in this area is to design block ciphers with provable security against powerful known attacks such as differential and linear cryptanalysis. In this paper we introduce seven new block cipher structures, named Feistel-variant A, B, CLEFIA and MISTY-FO-variant A, B, C, D structures, and show that these structures are provably resistant against differential cryptanalysis. The main results of this paper are that the average differential probabilities over at least 2 rounds of Feistel-variant A structure and 1 round of Feistel-variant B structure are both upperbounded by p2, while the average differential probabilities over at least 5 rounds of CLEFIA, MISTY-FO-variant A, B, C and D structures are upperbounded by p4+2p5, p4, p4, 2p4 and 2p4, respectively, if the maximum differential probability of a round F function is p. We also give provable security for the Feistel-variant A, B and CLEFIA structures against linear cryptanalysis. Our results are attained under the assumption that all of components in our proposed structures are bijective. We expect that our results are useful to design block ciphers with provable security against differential and linear cryptanalysis.

  • Capacity Analysis of MIMO Rayleigh Channel with Spatial Fading Correlation

    Ha Duyen TRUNG  Watit BENJAPOLAKUL  Kiyomichi ARAKI  

     
    PAPER-Communication Theory

      Vol:
    E91-A No:10
      Page(s):
    2818-2826

    MIMO (Multiple Input Multiple Output) communications systems equipped with array antennas at both the transmitter and receiver sides are a promising scheme to realize higher rate and/or reliable data transmission. In this paper, capacity analysis of MIMO Rayleigh channel with spatial correlation at the receiver of multipath taken into account is presented. In general, a model configuration of local scattering around a mobile station in MIMO environment is carried out by simulation to examine spatial correlation coefficients. Based on statistical properties of the eigenvalues of correlated complex random Wishart matrices, the exact closed-form expressions of distribution of the eigenvalues are investigated. Then, the general closed-form evaluation of integral form is proposed based on Meijer's G-function. The results demonstrate that the ergodic capacities are improved by increasing the number of the antennas and the SNR's. Compared with i.i.d. (independent identically distributed) Rayleigh channel, the incremental improvement of correlated Rayleigh channel is reduced by spatial fading correlation. The analytical results validated by Monte-Carlo simulations show a good agreement.

  • BER Performance Evaluation in 22 MIMO Spatial Multiplexing Systems under Rician Fading Channels

    Yutaka MURAKAMI  Takashi MATSUOKA  Masayuki ORIHASHI  

     
    PAPER-Communication Theory

      Vol:
    E91-A No:10
      Page(s):
    2798-2807

    In this paper, BER (Bit Error Rate) performance in 22 MIMO (Multiple-Input Multiple-Output) spatial multiplexing systems under Rician fading channels is evaluated. We examine BER performances employing inverse channel detection (ICD) under Rician fading channels, adding the phase of the direct path and Rician factor as a parameter. The results clearly indicate that the phase of the direct path and Rician factor have a great influence on BER performances employing ICD under Rician fading channels.

  • QR-LRL Signal Detection for Spatially Multiplexed MIMO Systems

    Seungjae BAHNG  Youn-Ok PARK  Jaekwon KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3383-3386

    The performance of the ordered successive interference cancellation (OSIC) signal detection method is well known to depend on the successful detection of the first layer. In a previous work, in an effort to mitigate the error propagation effect, all the constellation points were tried as the first layer symbol, thereby achieving a better performance. In this letter, we show that the selection of the first layer impacts the error performance significantly, and based on the observation, we propose a novel signal detection method QR-LRL. In the proposed work, the least reliable layer (LRL) is chosen to be the first layer, which is shown to be the best choice in terms of noise enhancement in detecting the other layers. Also, we discuss Log Likelihood Ratio (LLR) computation when the proposed method is used. Computer simulations confirm the efficacy of the proposed method.

  • Fractional Subblocking for Partial Transmit Sequence OFDM

    Abolfazl GHASSEMI  T. Aaron GULLIVER  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E91-B No:10
      Page(s):
    3166-3173

    Partial transmit sequence (PTS) is a well known technique used to reduce the peak-to-average power ratio (PAPR) of an orthogonal frequency division multiplexing (OFDM) signal. However, it has relatively high complexity due to the computation of multiple inverse fast Fourier transforms (IFFTs). To reduce this complexity, we use intermediate signals within a decimation in frequency (DIF) radix IFFT and propose a new PTS subblocking technique which requires the computation of only partial IFFTs. Performance results are presented which show a PAPR reduction similar to that with other techniques such as original PTS (O-PTS). Further, we show that complexity reduction can be achieved with either low or high radix IFFT algorithms.

  • New Quasi-Deadbeat FIR Smoother for Discrete-Time State-Space Signal Models: An LMI Approach

    ChoonKi AHN  

     
    LETTER-Digital Signal Processing

      Vol:
    E91-A No:9
      Page(s):
    2671-2674

    In this letter, we propose a new H2 smoother (H2S) with a finite impulse response (FIR) structure for discrete-time state-space signal models. This smoother is called an H2 FIR smoother (H2FS). Constraints such as linearity, quasi-deadbeat property, FIR structure, and independence of the initial state information are required in advance to design H2FS that is optimal in the sense of H2 performance criterion. It is shown that H2FS design problem can be converted into the convex programming problem written in terms of a linear matrix inequality (LMI) with a linear equality constraint. Simulation study illustrates that the proposed H2FS is more robust against uncertainties and faster in convergence than the conventional H2S.

661-680hit(1376hit)