The search functionality is under construction.

Keyword Search Result

[Keyword] active(518hit)

61-80hit(518hit)

  • A Support System for Solving Problems of Two-Triangle Congruence Using ‘Backward Chaining’

    Ryosuke ONDA  Yuki HIRAI  Kay PENNY  Bipin INDURKHYA  Keiichi KANEKO  

     
    PAPER-Educational Technology

      Pubricized:
    2017/07/07
      Vol:
    E100-D No:10
      Page(s):
    2567-2577

    We developed a system called DELTA that supports the students' use of backward chaining (BC) to prove the congruence of two triangles. DELTA is designed as an interactive learning environment and supports the use of BC by providing hints and a function to automatically check the proofs inputted by the students. DELTA also has coloring, marking, and highlighting functions to support students' attempts to prove the congruence of two triangles. We evaluated the efficacy of DELTA with 36 students in the second grade of a junior high school in Japan. We found that (1) the mean number of problems, which the experimental group (EG) completely solved, was statistically higher than that of the control group on the post-test; (2) the EG effectively used the BC strategy to solve problems; and (3) the students' attempt to use both the forward chaining strategy and the BC strategy led to solving the problems completely.

  • A 15GHz-Band 4-Channel Transmit/Receive RF Core-Chip for High SHF Wide-Band Massive MIMO in 5G

    Koji TSUTSUMI  Takaya MARUYAMA  Wataru YAMAMOTO  Takanobu FUJIWARA  Tatsuya HAGIWARA  Ichiro SOMADA  Eiji TANIGUCHI  Mitsuhiro SHIMOZAWA  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    825-832

    A 15GHz-band 4-channel transmit/receive RF core-chip is presented for high SHF wide-band massive MIMO in 5G. In order to realize small RF frontend for 5G base stations, both 6bit phase shifters (PS) and 0.25 dB resolution variable gain amplifiers (VGA) are integrated in TX and RX paths of 4-channels on the chip. A PS calibration technique is applied to compensate the error of 6bit PS caused by process variations. A common gate current steering topology with tail current control is used for VGA to enhance the gain control accuracy. The 15GHz-band RF core-chip fabricated in 65 nm CMOS process achieved phase control error of 1.9deg. rms., and amplitude control error of 0.23 dB. rms.

  • First Demonstration of Mode Selective Active Multimode Interferometer Laser Diode

    Bingzhou HONG  Takuya KITANO  Haisong JIANG  Akio TAJIMA  Kiichi HAMAMOTO  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    775-781

    We newly propose the first lateral mode selective active multimode interferometer laser diode. The design principle is to arrange identical propagation path of different lateral mode. Thanks to multimode waveguide structure, 0th mode and 1st order mode has individual propagation path within one device. Individual lasing of fundamental mode as well as first mode was confirmed successfully.

  • Group Signature with Deniability: How to Disavow a Signature

    Ai ISHIDA  Keita EMURA  Goichiro HANAOKA  Yusuke SAKAI  Keisuke TANAKA  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1825-1837

    Group signatures are a class of digital signatures with enhanced privacy. By using this type of signature, a user can sign a message on behalf of a specific group without revealing his identity, but in the case of a dispute, an authority can expose the identity of the signer. However, it is not always the case that we need to know the specific identity of a signature. In this paper, we propose the notion of deniable group signatures, where the authority can issue a proof showing that the specified user is NOT the signer of a signature, without revealing the actual signer. We point out that existing efficient non-interactive zero-knowledge proof systems cannot be straightforwardly applied to prove such a statement. We circumvent this problem by giving a fairly practical construction through extending the Groth group signature scheme (ASIACRYPT 2007). In particular, a denial proof in our scheme consists of 96 group elements, which is about twice the size of a signature in the Groth scheme. The proposed scheme is provably secure under the same assumptions as those of the Groth scheme.

  • On the Security of Non-Interactive Key Exchange against Related-Key Attacks

    Hiraku MORITA  Jacob C.N. SCHULDT  Takahiro MATSUDA  Goichiro HANAOKA  Tetsu IWATA  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1910-1923

    Non-Interactive Key Exchange (NIKE) is a cryptographic primitive that allows two users to compute a shared key without any interaction. The Diffie-Hellman key exchange scheme is probably the most well-known example of a NIKE scheme. Freire et al. (PKC 2013) defined four security notions for NIKE schemes, and showed implications among them. In these notions, we consider an adversary that is challenged to distinguish a shared key of a new pair of users from a random value, using only its knowledge of keys shared between other pairs of users. To take into account side-channel attacks such as tampering and fault-injection attacks, Bellare and Kohno (Eurocrypt 2003) formalized related-key attacks (RKA), where stronger adversaries are considered. In this paper, we introduce four RKA security notions for NIKE schemes. In these notions, we consider an adversary that can also manipulate the secret keys of users and obtain shared keys computed under the modified secret keys. We also show implications and separations among the security notions, and prove that one of the NIKE schemes proposed by Freire et al. is secure in the strongest RKA sense in the random oracle model under the Double Strong Diffie-Hellman (DSDH) assumption over the group of signed quadratic residues, which is implied by the factoring assumption.

  • Packet Delay Estimation That Transcends a Fundamental Accuracy Bound due to Bias in Active Measurements

    Kohei WATABE  Kenji NAKAGAWA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/02/09
      Vol:
    E100-B No:8
      Page(s):
    1377-1387

    For network researchers and practitioners, active measurement, in which probe packets are injected into a network, is a powerful tool to measure end-to-end delay. It is, however, suffers the intrusiveness problem, where the load of the probe traffic itself affects the network QoS. In this paper, we first demonstrate that there exists a fundamental accuracy bound of the conventional active measurement of delay. Second, to transcend that bound, we propose INTrusiveness-aware ESTimation (INTEST), an approach that compensates for the delays produced by probe packets in wired networks. Simulations of M/M/1 and MMPP/M/1 show that INTEST enables a more accurate estimation of end-to-end delay than conventional methods. Furthermore, we extend INTEST for multi-hop networks by using timestamps or multi-flow probes.

  • Automatic and Effective Delineation of Coronary Arteries from CTA Data Using Two-Way Active Contour Model

    Sammer ZAI  Muhammad Ahsan ANSARI  Young Shik MOON  

     
    PAPER-Biological Engineering

      Pubricized:
    2016/12/29
      Vol:
    E100-D No:4
      Page(s):
    901-909

    Precise estimation of coronary arteries from computed tomography angiography (CTA) data is one of the challenging problems. This study focuses on automatic delineation of coronary arteries from 3D CTA data that may assess the clinicians in identifying the coronary pathologies. In this work, we present a technique that effectively segments the complete coronary arterial tree under the guidance of initial vesselness response without relying on heavily manual operations. The proposed method isolates the coronary arteries with accuracy by using localized statistical energy model in two directions provided with an automated seed which ensures an optimal segmentation of the coronaries. The detection of seed is carried out by analyzing the shape information of the coronary arteries in three successive cross-sections. To demonstrate the efficiency of the proposed algorithm, the obtained results are compared with the reference data provided by Rotterdam framework for lumen segmentation and the level-set active contour based method proposed by Lankton et al. Results reveal that the proposed method performs better in terms of leakages and accuracy in completeness of the coronary arterial tree.

  • Design Optimizaion of Gm-C Filters via Geometric Programming

    Minyoung YOON  Byungjoon KIM  Jintae KIM  Sangwook NAM  

     
    PAPER-Electronic Circuits

      Vol:
    E100-C No:4
      Page(s):
    407-415

    This paper presents a design optimization method for a Gm-C active filter via geometric programming (GP). We first describe a GP-compatible model of a cascaded Gm-C filter that forms a biquadratic output transfer function. The bias, gain, bandwidth, and signal-to-noise ratio (SNR) of the Gm-C filter are described in a GP-compatible way. To further enhance the accuracy of the model, two modeling techniques are introduced. The first, a two-step selection method, chooses whether a saturation or subthreshold model should be used for each transistor in the filter to enhance the modeling accuracy. The second, a bisection method, is applied to include non-posynomial inequalities in the filter modeling. The presented filter model is optimized via a GP solver along with proposed modeling techniques. The numerical experiments over wide ranges of design specifications show good agreement between model and simulation results, with the average error for gain, bandwidth, and SNR being less than 9.9%, 4.4%, and 14.6%, respectively.

  • Polymer Surface Modification Due to Active Oxygen Species and Ultraviolet Light Exposures

    Kazuki HOSOYA  Ryo WAKAYAMA  Kei OYA  Satoru IWAMORI  

     
    BRIEF PAPER

      Vol:
    E100-C No:2
      Page(s):
    137-140

    Active oxygen species (AOS), e.g., excited singlet oxygen atom [O(1D)], excited singlet oxygen molecules (1O2), ground-state oxygen atom [O(3P)] and hydroxyl radical (OH), generated under two wavelengths (185 and 254 nm) of ultraviolet (UV) light were exposed to polyethylene (PE), polypropylene (PP) and polystyrene (PS) sheets. We investigated effects of the AOS exposure on the surface modification of these polymer sheets. Nonwoven sheet was used for the surface modification to eliminate an effect of the UV light irradiation. Although hydrophobicity of the PE and PP surfaces was maintained, the PS was changed into the hydrophilic surface.

  • Novel Cellular Active Array Antenna System at Base Station for Beyond 4G Open Access

    Masayuki NAKANO  

     
    INVITED PAPER

      Vol:
    E100-B No:2
      Page(s):
    195-202

    This paper introduces a base station antenna system as a future cellular technology. The base station antenna system is the key to achieving high-speed data transmission. It is particularly important to improve the frequency reuse factor as one of the roles of a base station. Furthermore, in order to solve the interference problem due to the same frequency being used by the macro cell and the small cell, the author focuses on beam and null control using an AAS (Active Antenna System) and elucidates their effects through area simulations and field tests. The results showed that AAS can improve the SINR (signal to interference-plus-noise ratio) of the small cell area inside macro cells. The paper shows that cell quality performance can be improved by incorporating the AAS into a cellular base station as its antenna system for beyond 4G radio access technology including the 5G cellular system.

  • Effect of Optical Intensity Distribution on Conversion Efficiency of Inverted Organic Photovoltaic Cell

    Toshifumi KOBORI  Norihiko KAMATA  Takeshi FUKUDA  

     
    BRIEF PAPER

      Vol:
    E100-C No:2
      Page(s):
    114-117

    An optical intensity distribution under light irradiation in the organic photovoltaic cell affects the absorbance of the active layer, which determines the photovoltaic performance. In this research, we evaluated the optimum thickness of the organic active layer with poly[4,8-bis(5-(2-ethylhexyl)thiophen-2-yl)benzo[1,2-b;4,5-b']dithiophene-2,6-diyl-alt-(4-(2-ethylhexyl)-3-fluorothieno[3,4-b]thiophene-)-2-carboxylate-2-6-diyl)] and [6,6]-phenyl C71-butyric acid methyl ester. The spectral response of external quantum efficiency was good agreement with the simulated optical intensity distribution within a device stack as a function of the position and the wavelength. As a result, the highest photoconversion efficiency of 10.1% was achieved for the inverted device structure.

  • An Adaptive Routing Protocol with Balanced Stochastic Route Exploration and Stabilization Based on Short-Term Memory

    Tomohiro NAKAO  Jun-nosuke TERAMAE  Naoki WAKAMIYA  

     
    PAPER

      Vol:
    E99-B No:11
      Page(s):
    2280-2288

    Due to rapid increases in the number of users and diversity of devices, temporal fluctuation of traffic on information communication network is becoming large and rapid recently. Especially, sudden traffic changes such as flash crowds often cause serious congestion on the network and result in nearly fatal slow down of date-communication speed. In order to keep communication quality high on the network, routing protocols that are scalable and able to quickly respond to rapid, and often unexpected, traffic fluctuation are highly desired. One of the promising approaches is the distributed routing protocol, which works without referring global information of the whole network but requires only limited informatin of it to realize route selection. These approaches include biologically inspired routing protocols based on the Adaptive Response by Attractor Selection model (ARAS), in which routing tables are updated along with only a scalar value reflecting communication quality measured on each router without evaluating communication quality over the whole network. However, the lack of global knowledge of the current status of the network often makes it difficult to respond promptly to traffic changes on the network that occurs at outside of the local scope of the protocol and causes inefficient use of network resources. In order to solve the essential problem of the local scope, we extend ARAS and propose a routing protocol with active and stochastic route exploration. The proposed protocol can obtain current communication quality of the network beyond its local scope and promptly responds to traffic changes occur on the network by utilizing the route exploration. In order to compensate destabilization of routing itself due to the active and stochastic exploration, we also introduce a short-term memory to the dynamics of the proposed attractor selection model. We conform by numerical simulations that the proposed protocol successfully balances rapid exploration with reliable routing owning to the memory term.

  • A Color Scheme Method by Interactive Evolutionary Computing Considering Contrast of Luminance and Design Property

    Keiko YAMASHITA  Kaoru ARAKAWA  

     
    PAPER-Image

      Vol:
    E99-A No:11
      Page(s):
    1981-1989

    A method of color scheme is proposed considering contrast of luminance between adjacent regions and design property. This method aims at setting the contrast of luminance high, in order to make the image understandable to visually handicapped people. This method also realizes preferable color design for visually normal people by assigning color components from color combination samples. Interactive evolutionary computing is adopted to design the luminance and the color, so that the luminance and color components are assigned to each region appropriately on the basis of human subjective criteria. Here, the luminance is designed first, and then color components are assigned, keeping the luminance unchanged. Since samples of fine color combinations are applied, the obtained color design is also fine and harmonic. Computer simulations verify the high performance of this system.

  • Experimental Design Method for High-Efficiency Microwave Power Amplifiers Based on a Low-Frequency Active Harmonic Load-Pull Technique

    Ryo ISHIKAWA  Yoichiro TAKAYAMA  Kazuhiko HONJO  

     
    PAPER

      Vol:
    E99-C No:10
      Page(s):
    1147-1155

    A novel experimental design method based on a low-frequency active load-pull technique that includes harmonic tuning has been proposed for high-efficiency microwave power amplifiers. The intrinsic core component of a transistor with a maximum oscillation frequency of more than several tens of gigahertz can be approximately assumed as the nonlinear current source with no frequency dependence at an operation frequency of several gigahertz. In addition, the reactive parasitic elements in a transistor can be omitted at a frequency of much less than 1GHz. Therefore, the optimum impedance condition including harmonics for obtaining high efficiency in a nonlinear current source can be directly investigated based on a low-frequency active harmonic load-pull technique in the low-frequency region. The optimum load condition at the operation frequency for an external load circuit can be estimated by considering the properties of the reactive parasitic elements and the nonlinear current source. For an InGaAs/GaAs pHEMT, active harmonic load-pull considering up to the fifth-order harmonic frequency was experimentally carried out at the fundamental frequency of 20MHz. By using the estimated optimum impedance condition for an equivalent nonlinear current source, high-frequency amplifiers were designed and fabricated at the 1.9-GHz, 2.45-GHz, and 5.8-GHz bands. The fabricated amplifiers exhibited maximum drain efficiency values of 79%, 80%, and 74% at 1.9GHz, 2.47GHz, and 5.78GHz, respectively.

  • Proactive Handover Based on Human Blockage Prediction Using RGB-D Cameras for mmWave Communications

    Yuta OGUMA  Takayuki NISHIO  Koji YAMAMOTO  Masahiro MORIKURA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:8
      Page(s):
    1734-1744

    To substantially alleviate the human blockage problem in mmWave communications, this paper proposes a proactive handover system based on human blockage prediction using RGB and depth (RGB-D) cameras. The proposed scheme uses RGB-D camera images to estimate the mobility of pedestrians and to predict when blockage will occur. On the basis of this information, the proposed system transfers a mobile station (STA) communicating with one wireless BS (base station) to another BS before human blockage occurs and thus avoids blockage-induced throughput degradation. This paper presents performance modeling of both proactive handover scheme and reactive handover scheme which is based on the received power level. A numerical evaluation reveals conditions under which the proactive handover scheme achieves higher spectral efficiency compared to reactive scheme. In addition, using IEEE 802.11ad-based wireless local area network (WLAN) devices, a testbed for implementing the proposed system is built. The innovative experimental results demonstrate that the proactive handover system can considerably reduce the duration of human blockage-induced degradation of throughput performance relative to the reactive scheme.

  • Behavioral Equivalence of Security-Oriented Interactive Systems

    Guanjun LIU  Changjun JIANG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2061-2068

    In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the determinism and nondeterminism affect the interactional behavior of interactive systems and thus the notion of language does not features the interactional behavior. Therefore, Milner proposed the notion of (weak) bisimulation to solve this problem. With the development of internet, more and more interactive systems occur in the world, such as electronic trading system. Security is one of the most important topics for these systems. We find that different security policies can also affect the interactional behavior of a system, which exactly is the reason why a good policy can strengthen the security. In other words, two interactive systems with different security policies are not of an equivalent behavior although their functions (or business processes) are identical. However, the classic (weak) bisimulation theory draws an opposite conclusion that their behaviors are equivalent. The notion of (weak) bisimulation is not suitable for these security-oriented interactive systems since it does not consider a security policy. This paper proposes the concept of secure bisimulation in order to solve the above problem.

  • Efficient Residual Coding Method of Spatial Audio Object Coding with Two-Step Coding Structure for Interactive Audio Services

    Byonghwa LEE  Kwangki KIM  Minsoo HAHN  

     
    LETTER-Speech and Hearing

      Pubricized:
    2016/04/08
      Vol:
    E99-D No:7
      Page(s):
    1949-1952

    In interactive audio services, users can render audio objects rather freely to match their desires and the spatial audio object coding (SAOC) scheme is fairly good both in the sense of bitrate and audio quality. But rather perceptible audio quality degradation can occur when an object is suppressed or played alone. To complement this, the SAOC scheme with Two-Step Coding (SAOC-TSC) was proposed. But the bitrate of the side information increases two times compared to that of the original SAOC due to the bitrate needed for the residual coding used to enhance the audio quality. In this paper, an efficient residual coding method of the SAOC-TSC is proposed to reduce the side information bitrate without audio quality degradation or complexity increase.

  • Subcarrier Assignment and Power Allocation for Preference-Aware Multicast Services in Active Array Aided LTE Networks

    Mingli CHU  Qinghai YANG  Kyung Sup KWAK  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:6
      Page(s):
    1371-1379

    In this paper, we investigate a preference-aware multicast mechanism in active array aided LTE (Long Term Evolution) networks. An active antenna system can direct vertical beams in different horizontal and vertical directions, so the amount of energy delivered is more concentrated on the target users. The active array provides each multicast group with an individual beam with specific downtilt delivering shared video to all users in the group. For the multicast system, the objective of our proposed resource allocation scheme is to maximize the total throughput, subject to the constraints of power, subcarrier and antenna downtilt, as well as horizontal angles and the vertical half power bandwidth. To solve the problem, individual beams are steered for multicast groups. Furthermore, a novel subcarrier assignment scheme is proposed to enhance the spectrum resource utilization, and the optimal power allocation is obtained by virtue of Lagrangian method. Simulation results demonstrate the throughput and the spectral efficiency enhancement of our proposed scheme over other conditional schemes.

  • A Comprehensive Medicine Management System with Multiple Sources in a Nursing Home in Taiwan

    Liang-Bi CHEN  Wan-Jung CHANG  Kuen-Min LEE  Chi-Wei HUANG  Katherine Shu-Min LI  

     
    PAPER

      Pubricized:
    2016/04/01
      Vol:
    E99-D No:6
      Page(s):
    1447-1454

    Residents living in a nursing home usually have established medical histories in multiple sources, and most previous medicine management systems have only focused on the integration of prescriptions and the identification of repeated drug uses. Therefore, a comprehensive medicine management system is proposed to integrate medical information from different sources. The proposed system not only detects inappropriate drugs automatically but also allows users to input such information for any non-prescription medicines that the residents take. Every participant can fully track the residents' latest medicine use online and in real time. Pharmacists are able to issue requests for suggestions on medicine use, and residents can also have a comprehensive understanding of their medicine use. The proposed scheme has been practically implemented in a nursing home in Taiwan. The evaluation results show that the average time to detect an inappropriate drug use and complete a medicine record is reduced. With automatic and precise comparisons, the repeated drugs and drug side effects are identified effectively such that the amount of medicine cost spent on the residents is also reduced. Consequently, the proactive feedback, real-time tracking, and interactive consulting mechanisms bind all parties together to realize a comprehensive medicine management system.

  • Efficient Active Measurement for Monitoring Link-by-Link Performance in OpenFlow Networks

    Megumi SHIBUYA  Atsuo TACHIBANA  Teruyuki HASEGAWA  

     
    PAPER

      Vol:
    E99-B No:5
      Page(s):
    1032-1040

    To efficiently monitor the link performance in an OpenFlow network with a single measurement box (referred to a “beacon”), this paper presents a measurement scheme that calculates a set of measurement paths from the beacon to cover all links in the network based on the controllable feature of individual measurement paths in the OpenFlow network and comprehensively estimates the performance of all the physical links from round-trip active measurements. The scheme has a novel feature that minimize the maximum number of exclusive flow-entries for active measurements on OpenFlow switches by utilizing common packet header values in the probing packets to aggregate multiple entries into a single entry to save the resources in OpenFlow switches and controller. We demonstrate the effectiveness and feasibility of our solution through simulations and emulation scenarios.

61-80hit(518hit)