The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

1021-1040hit(22683hit)

  • A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions

    Jiao DU  Shaojing FU  Longjiang QU  Chao LI  Tianyin WANG  Shanqi PANG  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/08/03
      Vol:
    E105-A No:2
      Page(s):
    93-99

    In this paper, by using the properties of the cyclic Hadamard matrices of order 4t, an infinite class of (4t-1)-variable 2-resilient rotation symmetric Boolean functions is constructed, and the nonlinearity of the constructed functions are also studied. To the best of our knowledge, this is the first class of direct constructions of 2-resilient rotation symmetric Boolean functions. The spirit of this method is different from the known methods depending on the solutions of an equation system proposed by Du Jiao, et al. Several situations are examined, as the direct corollaries, three classes of (4t-1)-variable 2-resilient rotation symmetric Boolean functions are proposed based on the corresponding sequences, such as m sequences, Legendre sequences, and twin primes sequences respectively.

  • Rate Adaptation for Robust and Low-Latency Video Transmissions Using Multi-AP Wireless LAN

    Kazuma YAMAMOTO  Hiroyuki YOMO  

     
    PAPER

      Pubricized:
    2021/08/20
      Vol:
    E105-B No:2
      Page(s):
    177-185

    In this paper, we propose rate adaptation mechanisms for robust and low-latency video transmissions exploiting multiple access points (Multi-AP) wireless local area networks (WLANs). The Multi-AP video transmissions employ link-level broadcast and packet-level forward error correction (FEC) in order to realize robust and low-latency video transmissions from a WLAN station (STA) to a gateway (GW). The PHY (physical layer) rate and FEC rate play a key role to control trade-off between the achieved reliability and airtime (i.e., occupancy period of the shared channel) for Multi-AP WLANs. In order to finely control this trade-off while improving the transmitted video quality, the proposed rate adaptation controls PHY rate and FEC rate to be employed for Multi-AP transmissions based on the link quality and frame format of conveyed video traffic. With computer simulations, we evaluate and investigate the effectiveness of the proposed rate adaptation in terms of packet delivery rate (PDR), airtime, delay, and peak signal to noise ratio (PSNR). Furthermore, the quality of video is assessed by using the traffic encoded/decoded by the actual video encoder/decoder. All these results show that the proposed rate adaptation controls trade-off between the reliability and airtime well while offering the high-quality and low-latency video transmissions.

  • Comprehensive Survey of Research on Emerging Communication Technologies from ICETC2020 Open Access

    Takuji TACHIBANA  

     
    INVITED PAPER

      Pubricized:
    2021/08/17
      Vol:
    E105-B No:2
      Page(s):
    98-115

    The 2020 International Conference on Emerging Technologies for Communications (ICETC2020) was held online on December 2nd—4th, 2020, and 213 research papers were accepted and presented in each session. It is expected that the accepted papers will contribute to the development and extension of research in multiple research areas. In this survey paper, all accepted research papers are classified into four research areas: Physical & Fundamental, Communications, Network, and Information Technology & Application, and then research papers are classified into each research topic. For each research area and topic, this survey paper briefly introduces the presented technologies and methods.

  • On the Strength of Damping Effect in Online User Dynamics for Preventing Flaming Phenomena Open Access

    Shinichi KIKUCHI  Chisa TAKANO  Masaki AIDA  

     
    PAPER

      Pubricized:
    2021/09/01
      Vol:
    E105-B No:2
      Page(s):
    240-249

    As online social networks (OSNs) have become remarkably active, we often experience explosive user dynamics such as online flaming, which can significantly impact the real world. Since the rapidity with which online user dynamics propagates, countermeasures based on social analyses of the individuals who cause online flaming take too much time that timely measures cannot be taken. To consider immediate solutions without individuals' social analyses, a countermeasure technology for flaming phenomena based on the oscillation model, which describes online user dynamics, has been proposed. In this framework, the strength of damping to prevent online flaming was derived based on the wave equation of networks. However, the assumed damping strength was to be a constant independent of the frequency of user dynamics. Since damping strength may generally depend on frequency, it is necessary to consider such frequency dependence in user dynamics. In this paper, we derive the strength of damping required to prevent online flaming under the general condition that damping strength depends on the frequency of user dynamics. We also investigate the existence range of the Laplacian matrix's eigenvalues representing the OSN structure assumed from the real data of OSNs, and apply it to the countermeasure technology for online flaming.

  • L5-TSPP: A Protocol for Disruption Tolerant Networking in Layer-5

    Hiroki WATANABE  Fumio TERAOKA  

     
    PAPER

      Pubricized:
    2021/09/01
      Vol:
    E105-B No:2
      Page(s):
    215-227

    TCP/IP, the foundation of the current Internet, assumes a sufficiently low packet loss rate for links in communication path. On the other hand, for communication services such as mobile and wireless communications, communication link tends to be disruptive. In this paper, we propose Layer-5 temporally-spliced path protocol (L5-TSPP), which provides disruption-tolerance in the L5 temporally-spliced path (L5-TSP), as one of the communication paths provided by Layer-5 (L5-paths). We design and implement an API for using L5-paths (L5 API). The L5 API is designed and implemented to support not only POSIX systems but also non-POSIX systems. L5 API and L5-TSPP are implemented in the user space in Go language. The measurement results show that L5-TSP achieves lower and more stable connection establishment time and better end-to-end throughput in the presence of disruption than conventional communication paths.

  • Estimating the Birefringence and Absorption Losses of Hydrogen-bonded Liquid Crystals with Alkoxy Chains at 2.5 THz Open Access

    Ryota ITO  Hayato SEKIYA  Michinori HONMA  Toshiaki NOSE  

     
    INVITED PAPER

      Pubricized:
    2021/08/17
      Vol:
    E105-C No:2
      Page(s):
    68-71

    Liquid crystal (LC) device has high tunability with low power consumption and it is important not only in visible region but also in terahertz region. In this study, birefringence and absorption losses of hydrogen-bonded LC was estimated at 2.5 THz. Our results indicate that introduction of alkoxy chain to hydrogen-bonded LC is effective to increase birefringence in terahertz region. These results indicate that hydrogen-bonded LCs are a strong candidate for future terahertz devices because of their excellent properties in the terahertz region.

  • A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment

    Tao PENG  Kejian GUAN  Jierong LIU  

     
    PAPER

      Pubricized:
    2021/09/15
      Vol:
    E105-D No:2
      Page(s):
    215-226

    A mobile crowdsensing system (MCS) utilizes a crowd of users to collect large-scale data using their mobile devices efficiently. The collected data are usually linked with sensitive information, raising the concerns of user privacy leakage. To date, many approaches have been proposed to protect the users' privacy, with the majority relying on a centralized structure, which poses though attack and intrusion vulnerability. Some studies build a distributed platform exploiting a blockchain-type solution, which still requires a fully trusted third party (TTP) to manage a reliable reward distribution in the MCS. Spurred by the deficiencies of current methods, we propose a distributed user privacy protection structure that combines blockchain and a trusted execution environment (TEE). The proposed architecture successfully manages the users' privacy protection and an accurate reward distribution without requiring a TTP. This is because the encryption algorithms ensure data confidentiality and uncouple the correlation between the users' identity and the sensitive information in the collected data. Accordingly, the smart contract signature is used to manage the user deposit and verify the data. Extensive comparative experiments verify the efficiency and effectiveness of the proposed combined blockchain and TEE scheme.

  • Layer-Based Communication-Efficient Federated Learning with Privacy Preservation

    Zhuotao LIAN  Weizheng WANG  Huakun HUANG  Chunhua SU  

     
    PAPER

      Pubricized:
    2021/09/28
      Vol:
    E105-D No:2
      Page(s):
    256-263

    In recent years, federated learning has attracted more and more attention as it could collaboratively train a global model without gathering the users' raw data. It has brought many challenges. In this paper, we proposed layer-based federated learning system with privacy preservation. We successfully reduced the communication cost by selecting several layers of the model to upload for global averaging and enhanced the privacy protection by applying local differential privacy. We evaluated our system in non independently and identically distributed scenario on three datasets. Compared with existing works, our solution achieved better performance in both model accuracy and training time.

  • Accurate BER Approximation for SIM with BPSK and Multiple Transmit Apertures over Strong Atmospheric Turbulence

    Jinkyu KANG  Seongah JEONG  Hoojin LEE  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2021/07/30
      Vol:
    E105-A No:2
      Page(s):
    126-129

    In this letter, we derive a novel and accurate closed-form bit error rate (BER) approximation of the optical wireless communications (OWC) systems for the sub-carrier intensity modulation (SIM) employing binary phase-shift keying (BPSK) with multiple transmit and single receive apertures over strong atmospheric turbulence channels, which makes it possible to effectively investigate and predict the BER performance for various system configurations. Furthermore, we also derive a concise asymptotic BER formula to quantitatively evaluate the asymptotically achievable error performance (i.e., asymptotic diversity and combining gains) in the high signal-to-noise (SNR) regimes. Some numerical results are provided to corroborate the accuracy and effectiveness of our theoretical expressions.

  • Learning from Noisy Complementary Labels with Robust Loss Functions

    Hiroki ISHIGURO  Takashi ISHIDA  Masashi SUGIYAMA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/11/01
      Vol:
    E105-D No:2
      Page(s):
    364-376

    It has been demonstrated that large-scale labeled datasets facilitate the success of machine learning. However, collecting labeled data is often very costly and error-prone in practice. To cope with this problem, previous studies have considered the use of a complementary label, which specifies a class that an instance does not belong to and can be collected more easily than ordinary labels. However, complementary labels could also be error-prone and thus mitigating the influence of label noise is an important challenge to make complementary-label learning more useful in practice. In this paper, we derive conditions for the loss function such that the learning algorithm is not affected by noise in complementary labels. Experiments on benchmark datasets with noisy complementary labels demonstrate that the loss functions that satisfy our conditions significantly improve the classification performance.

  • Query Transfer Method Using Different Two Skip Graphs for Searching Spatially-Autocorrelated Data

    Yuuki FUJITA  Akihiro FUJIMOTO  Hideki TODE  

     
    PAPER

      Pubricized:
    2021/09/01
      Vol:
    E105-B No:2
      Page(s):
    205-214

    With the increase of IoT devices, P2P-based IoT platforms have been attracting attention because of their capabilities of building and maintaining their networks autonomously in a decentralized way. In particular, Skip Graph, which has a low network rebuilding cost and allows range search, is suitable for the platform. However, when data observed at geographically close points have similar values (i.e. when data have strong spatial autocorrelation), existing types of Skip Graph degrade their search performances. In this paper, we propose a query transfer method that enables efficient search even for spatially autocorrelated data by adaptively using two-types of Skip Graph depending on the key-distance to the target key. Simulation results demonstrate that the proposed method can reduce the query transfer distance compared to the existing method even for spatially autocorrelated data.

  • On the Convergence of Convolutional Approximate Message-Passing for Gaussian Signaling Open Access

    Keigo TAKEUCHI  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2021/08/11
      Vol:
    E105-A No:2
      Page(s):
    100-108

    Convolutional approximate message-passing (CAMP) is an efficient algorithm to solve linear inverse problems. CAMP aims to realize advantages of both approximate message-passing (AMP) and orthogonal/vector AMP. CAMP uses the same low-complexity matched-filter as AMP. To realize the asymptotic Gaussianity of estimation errors for all right-orthogonally invariant matrices, as guaranteed in orthogonal/vector AMP, the Onsager correction in AMP is replaced with a convolution of all preceding messages. CAMP was proved to be asymptotically Bayes-optimal if a state-evolution (SE) recursion converges to a fixed-point (FP) and if the FP is unique. However, no proofs for the convergence were provided. This paper presents a theoretical analysis for the convergence of the SE recursion. Gaussian signaling is assumed to linearize the SE recursion. A condition for the convergence is derived via a necessary and sufficient condition for which the linearized SE recursion has a unique stationary solution. The SE recursion is numerically verified to converge toward the Bayes-optimal solution if and only if the condition is satisfied. CAMP is compared to conjugate gradient (CG) for Gaussian signaling in terms of the convergence properties. CAMP is inferior to CG for matrices with a large condition number while they are comparable to each other for a small condition number. These results imply that CAMP has room for improvement in terms of the convergence properties.

  • A Study on the Increase of Perceivable Information in the Saccade with High Speed Line Display Open Access

    Naoki KAWASAKI  Yuuki MACHIDA  Takayuki MISU  Keiichi ABE  Hiroshi SUGIMURA  Makiko OKUMURA  

     
    INVITED PAPER

      Pubricized:
    2021/08/17
      Vol:
    E105-C No:2
      Page(s):
    72-78

    A line display that utilizes saccade has been proposed. When an observer moves his or her eyes on a one-dimensional fixed line display, two-dimensional information is perceived on the retina. In this paper, a high speed flashing line display was developed using a CPLD and PIC microcontroller. The flashing period was reduced to 20 µs, which was less than half that of our previous system. The relationship between the flashing frequency and the optimum distance that can be perceived with the least distortion was clarified. The results show that the higher the flashing frequency is, the more information can be perceived from a farther position. Calculated values, which were based on the relationship between the flashing period and the width of the light source, were almost identical with measured values at the flashing frequencies from 3.3 kHz to 10 kHz. Due to short flashing period, the developed line display not only was visible at distance of 15 m or more, which is suitable for outdoor use, but also realized 16 gray levels.

  • Feasibility Study for Computer-Aided Diagnosis System with Navigation Function of Clear Region for Real-Time Endoscopic Video Image on Customizable Embedded DSP Cores

    Masayuki ODAGAWA  Tetsushi KOIDE  Toru TAMAKI  Shigeto YOSHIDA  Hiroshi MIENO  Shinji TANAKA  

     
    LETTER-VLSI Design Technology and CAD

      Pubricized:
    2021/07/08
      Vol:
    E105-A No:1
      Page(s):
    58-62

    This paper presents examination result of possibility for automatic unclear region detection in the CAD system for colorectal tumor with real time endoscopic video image. We confirmed that it is possible to realize the CAD system with navigation function of clear region which consists of unclear region detection by YOLO2 and classification by AlexNet and SVMs on customizable embedded DSP cores. Moreover, we confirmed the real time CAD system can be constructed by a low power ASIC using customizable embedded DSP cores.

  • Design and Performance of Low-Density Parity-Check Codes for Noisy Channels with Synchronization Errors

    Ryo SHIBATA  Hiroyuki YASHIMA  

     
    LETTER-Coding Theory

      Pubricized:
    2021/07/14
      Vol:
    E105-A No:1
      Page(s):
    63-67

    In this letter, we study low-density parity-check (LDPC) codes for noisy channels with insertion and deletion (ID) errors. We first propose a design method of irregular LDPC codes for such channels, which can be used to simultaneously obtain degree distributions for different noise levels. We then show the asymptotic/finite-length decoding performances of designed codes and compare them with the symmetric information rates of cascaded ID-noisy channels. Moreover, we examine the relationship between decoding performance and a code structure of irregular LDPC codes.

  • Image Adjustment for Multi-Exposure Images Based on Convolutional Neural Networks

    Isana FUNAHASHI  Taichi YOSHIDA  Xi ZHANG  Masahiro IWAHASHI  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2021/10/21
      Vol:
    E105-D No:1
      Page(s):
    123-133

    In this paper, we propose an image adjustment method for multi-exposure images based on convolutional neural networks (CNNs). We call image regions without information due to saturation and object moving in multi-exposure images lacking areas in this paper. Lacking areas cause the ghosting artifact in fused images from sets of multi-exposure images by conventional fusion methods, which tackle the artifact. To avoid this problem, the proposed method estimates the information of lacking areas via adaptive inpainting. The proposed CNN consists of three networks, warp and refinement, detection, and inpainting networks. The second and third networks detect lacking areas and estimate their pixel values, respectively. In the experiments, it is observed that a simple fusion method with the proposed method outperforms state-of-the-art fusion methods in the peak signal-to-noise ratio. Moreover, the proposed method is applied for various fusion methods as pre-processing, and results show obviously reducing artifacts.

  • JPEG Image Steganalysis Using Weight Allocation from Block Evaluation

    Weiwei LUO  Wenpeng ZHOU  Jinglong FANG  Lingyan FAN  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2021/10/18
      Vol:
    E105-D No:1
      Page(s):
    180-183

    Recently, channel-aware steganography has been presented for high security. The corresponding selection-channel-aware (SCA) detecting algorithms have also been proposed for improving the detection performance. In this paper, we propose a novel detecting algorithm of JPEG steganography, where the embedding probability and block evaluation are integrated into the new probability. This probability can embody the change due to data embedding. We choose the same high-pass filters as maximum diversity cascade filter residual (MD-CFR) to obtain different image residuals and a weighted histogram method is used to extract detection features. Experimental results on detecting two typical steganographic methods show that the proposed method can improve the performance compared with the state-of-art methods.

  • Formal Verification for Node-Based Visual Scripts Using Symbolic Model Checking

    Isamu HASEGAWA  Tomoyuki YOKOGAWA  

     
    PAPER-Software System

      Pubricized:
    2021/09/29
      Vol:
    E105-D No:1
      Page(s):
    78-91

    Visual script languages with a node-based interface have commonly been used in the video game industry. We examined the bug database obtained in the development of FINAL FANTASY XV (FFXV), and noticed that several types of bugs were caused by simple mis-descriptions of visual scripts and could therefore be mechanically detected. We propose a method for the automatic verification of visual scripts in order to improve productivity of video game development. Our method can automatically detect those bugs by using symbolic model checking. We show a translation algorithm which can automatically convert a visual script to an input model for NuSMV that is an implementation of symbolic model checking. For a preliminary evaluation, we applied our method to visual scripts used in the production for FFXV. The evaluation results demonstrate that our method can detect bugs of scripts and works well in a reasonable time.

  • Simulation-Based Understanding of “Charge-Sharing Phenomenon” Induced by Heavy-Ion Incident on a 65nm Bulk CMOS Memory Circuit

    Akifumi MARU  Akifumi MATSUDA  Satoshi KUBOYAMA  Mamoru YOSHIMOTO  

     
    BRIEF PAPER-Electronic Circuits

      Pubricized:
    2021/08/05
      Vol:
    E105-C No:1
      Page(s):
    47-50

    In order to expect the single event occurrence on highly integrated CMOS memory circuit, quantitative evaluation of charge sharing between memory cells is needed. In this study, charge sharing area induced by heavy ion incident is quantitatively calculated by using device-simulation-based method. The validity of this method is experimentally confirmed using the charged heavy ion accelerator.

  • Analyzing Web Search Strategy of Software Developers to Modify Source Codes

    Keitaro NAKASAI  Masateru TSUNODA  Kenichi MATSUMOTO  

     
    LETTER

      Pubricized:
    2021/10/29
      Vol:
    E105-D No:1
      Page(s):
    31-36

    Software developers often use a web search engine to improve work efficiency. However, web search strategies (e.g., frequently changing web search keywords) may be different for each developer. In this study, we attempted to define a better web search strategy. Although many previous studies analyzed web search behavior in programming, they did not provide guidelines for web search strategies. To suggest guidelines for web search strategies, we asked 10 subjects four questions about programming which they had to solve, and analyzed their behavior. In the analysis, we focused on the subjects' task time and the web search metrics defined by us. Based on our experiment, to enhance the effectiveness of the search, we suggest (1) that one should not go through the next search result pages, (2) the number of keywords in queries should be suppressed, and (3) previously used keywords must be avoided when creating a new query.

1021-1040hit(22683hit)