Takuya NIIMI Shouhei KIDERA Tetsuo KIRIMOTO
Microwave ultra-wideband (UWB) radar systems are advantageous for their high-range resolution and ability to penetrate dielectric objects. Internal imaging of dielectric objects by UWB radar is a promising nondestructive method of testing aging roads and bridges and a noninvasive technique for human body examination. For these applications, we have already developed an accurate internal imaging approach based on the range points migration (RPM) method, combined with a method that efficiently estimates the dielectric constant. Although this approach accurately extracts the internal boundary, it is applicable only to highly conductive targets immersed in homogeneous dielectric media. It is not suitable for multi-layered dielectric structures such as human tissues or concrete objects. To remedy this limitation, we here propose a novel dielectric constant and boundary extraction method for double-layered materials. This new approach, which simply extends the Envelope method to boundary extraction of the inner layer, is evaluated in finite difference time domain (FDTD)-based simulations and laboratory experiments, assuming a double-layered concrete cylinder. These tests demonstrate that our proposed method accurately and simultaneously estimates the dielectric constants of both media and the layer boundaries.
Toru OMURA Tomoaki AKIBA Xiao XIAO Hisashi YAMAMOTO
A connected-(r,s)-out-of-(m,n): F system is a kind of the connected-X-out-of-(m,n): F system defined by Boehme et al. [2]. A connected-(r,s)-out-of-(m,n): F system consists of m×n components arranged in (m,n)-matrix. This system fails if and only if there exists a grid of size r×s in which all components are failed. When m=r, this system can be regarded as a consecutive-s-out-of-n: F system, and then the optimal arrangement of this system satisfies theorem which stated by Malon [9] in the case of s=2. In this study, we proposed a new algorithm for obtaining optimal arrangement of the connected-(r,2)-out-of-(m,n): F system based on the above mentioned idea. We performed numerical experiments in order to compare the proposed algorithm with the algorithm of enumeration method, and calculated the order of the computation time of these two algorithms. The numerical experiments showed that the proposed algorithm was more efficiently than the algorithm of enumeration method.
Yesheng GAO Hui SHENG Kaizhi WANG Xingzhao LIU
A signal-model-based SAR image formation algorithm is proposed in this paper. A model is used to describe the received signal, and each scatterer can be characterized by a set of its parameters. Two parameter estimation methods via atomic decomposition are presented: (1) applying 1-D matching pursuit to azimuthal projection data; (2) applying 2-D matching pursuit to raw data. The estimated parameters are mapped to form a SAR image, and the mapping procedure can be implemented under application guidelines. This algorithm requires no prior information about the relative motion between the platform and the target. The Cramer-Rao bounds of parameter estimation are derived, and the root mean square errors of the estimates are close to the bounds. Experimental results are given to validate the algorithm and indicate its potential applications.
This paper proposes an algorithm for exemplar-based image inpainting, which produces the same result as that of Criminisi's original scheme but at the cost of much smaller computation cost. The idea is to compute mean and standard deviation of every patch in the image, and use the values to decide whether to carry out pixel by pixel comparison or not when searching for the best matching patch. Due to the missing pixels in the target patch, the same pixels in the candidate patch should be omitted when computing the distance between patches. Thus, we first compute the range of mean and standard deviation of a candidate patch with missing pixels, using the average and standard deviation of the entire patch. Then we use the range to determine if the pixel comparison should be conducted. Measurements with well-known images in the inpainting literature show that the algorithm can save significant amount of computation cost, without risking degradation of image quality.
Shihao WANG Dajiang ZHOU Jianbin ZHOU Takeshi YOSHIMURA Satoshi GOTO
In this paper, VLSI architecture design of unified motion vector (MV) and boundary strength (BS) parameter decoder (PDec) for 8K UHDTV HEVC decoder is presented. The adoption of new coding tools in PDec, such as Advanced Motion Vector Prediction (AMVP), increases the VLSI hardware realization overhead and memory bandwidth requirement, especially for 8K UHDTV application. We propose four techniques for these challenges. Firstly, this work unifies MV and BS parameter decoders for line buffer memory sharing. Secondly, to support high throughput, we propose the top-level CU-adaptive pipeline scheme by trading off between implementation complexity and performance. Thirdly, PDec process engine with optimizations is adopted for 43.2k area reduction. Finally, PU-based coding scheme is proposed for 30% DRAM bandwidth reduction. In 90nm process, our design costs 93.3k logic gates with 23.0kB line buffer. The proposed architecture can support real-time decoding for 7680x4320@60fps application at 249MHz in the worst case.
Yuping SU Ying LI Guanghui SONG
Information-theoretic limits of a multi-way relay channel with direct links (MWRC-DL), where multiple users exchange their messages through a relay terminal and direct links, are discussed in this paper. Under the assumption that a restricted encoder is employed at each user, an outer bound on the capacity region is derived first. Then, a decode-and-forward (DF) strategy is proposed and the corresponding rate region is characterized. The explicit outer bound and the achievable rate region for the Gaussian MWRC-DL are also derived. Numerical examples are provided to demonstrate the performance of the proposed DF strategy.
Eiichiro FUJISAKI Akinori KAWACHI Ryo NISHIMAKI Keisuke TANAKA Kenji YASUNAGA
Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f(x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient PKE scheme exists if the adversary may have access to the secret-key leakage oracle to receive only one bit after it was given the challenge ciphertext. Similarly, there exists no sender-randomness leakage resilient PKE scheme if one-bit leakage occurs after the target public key was given to the adversary. At TCC 2011, Halevi and Lin have broken the barrier of after-the-fact leakage, by proposing the so-called split state model, where a secret key of a party is explicitly divided into at least two pieces, and the adversary may have not access to the entire secret at once, but each divided pieces, one by one. In the split-state model, they have constructed post-challenge secret-key leakage resilient CPA secure PKEs from hash proof systems, but the construction of CCA secure post-challenge secret-key leakage PKE has remained open. They have also remained open to construct sender-randomness leakage PKE in the split state model. This paper provides a solution to the open issues. We also note that the proposal of Halevi and Lin is post-challenge secret-key leakage CPA secure against a single challenge ciphertext; not against multiple challenges. We present an efficient generic construction that converts any CCA secure PKE scheme into a multiple-challenge CCA secure PKE that simultaneously tolerates post-challenge secret-key and sender-randomness leakage in the split state model, without any additional assumption. In addition, our leakage amount of the resulting schemes is the same as that of Halevi and Lin CPA PKE, i.e., (1/2+γ)l/2 where l denotes the length of the entire secret (key or randomness) and γ denotes a universal (possitive) constant less than 1/2. Our conversion is generic and available for many other public-key primitives. For instance, it can convert any identity-based encryption (IBE) scheme to a post-challenge master-key leakage and sender-randomness leakage secure IBE.
Xushan CHEN Xiongwei ZHANG Jibin YANG Meng SUN Weiwei YANG
Compressive sensing (CS) exploits the sparsity or compressibility of signals to recover themselves from a small set of nonadaptive, linear measurements. The number of measurements is much smaller than Nyquist-rate, thus signal recovery is achieved at relatively expense. Thus, many signal processing problems which do not require exact signal recovery have attracted considerable attention recently. In this paper, we establish a framework for parameter estimation of a signal corrupted by additive colored Gaussian noise (ACGN) based on compressive measurements. We also derive the Cramer-Rao lower bound (CRB) for the frequency estimation problems in compressive domain and prove some useful properties of the CRB under different compressive measurements. Finally, we show that the theoretical conclusions are along with experimental results.
Haoyan GUO Changyong GUO Yuanzhi CHENG Shinichi TAMURA
To determine the thickness from MR images, segmentation, that is, boundary detection, of the two adjacent thin structures (e.g., femoral cartilage and acetabular cartilage in the hip joint) is needed before thickness determination. Traditional techniques such as zero-crossings of the second derivatives are not suitable for the detection of these boundaries. A theoretical simulation analysis reveals that the zero-crossing method yields considerable biases in boundary detection and thickness measurement of the two adjacent thin structures from MR images. This paper studies the accurate detection of hip cartilage boundaries in the image plane, and a new method based on a model of the MR imaging process is proposed for this application. Based on the newly developed model, a hip cartilage boundary detection algorithm is developed. The in-plane thickness is computed based on the boundaries detected using the proposed algorithm. In order to correct the image plane thickness for overestimation due to oblique slicing, a three-dimensional (3-D) thickness computation approach is introduced. Experimental results show that the thickness measurement obtained by the new thickness computation approach is more accurate than that obtained by the existing thickness computation approaches.
How to reduce communication complexity is a common important issue to design cryptographic protocols. This paper focuses on authenticated key exchange (AKE). Several AKE schemes have been studied, which satisfy strong security such as exposure-resilience in the standard model (StdM). However, there is a large gap on communication costs between schemes in the StdM and in the random oracle model. In this paper, we show a generic construction that is significantly compact (i.e., small communication cost) and secure in the StdM. We follow an existing generic construction from key encapsulated mechanism (KEM). Our main technique is to use a bounded chosen-ciphertext secure KEM instead of an ordinary chosen-ciphertext secure KEM. The communication cost can be reduced to half by this technique, and we achieve the most compact AKE scheme in the StdM. Moreover, our construction has instantiations under wider classes of hardness assumptions (e.g., subset-sum problems and multi-variate quadratic systems) than existing constructions. This work pioneers the first meaningful application of bounded chosen-ciphertext secure KEM.
Young-Tae KIM Min Kyu SONG Dae San KIM Hong-Yeop SONG
In this paper, we show that if the d-decimation of a (q-1)-ary Sidelnikov sequence of period q-1=pm-1 is the d-multiple of the same Sidelnikov sequence, then d must be a power of a prime p. Also, we calculate the crosscorrelation magnitude between some constant multiples of d- and d'-decimations of a Sidelnikov sequence of period q-1 to be upper bounded by (d+d'-1)√q+3.
In this paper, with a modification of our earlier construction in [12], new classes of optimal LHZ FHS sets with new parameters are obtained which are optimal in the sense that their parameters meet the Peng-Fan-Lee bound. It is shown that all the sequences in the proposed FHS sets are shift distinct. The proposed FHS sets are suitable for quasi-synchronous time/frequency hopping code division multiple access systems to eliminate multiple-access interference.
We propose TagFlow, a data plane mechanism for classification in Software-Defined Networking (SDN). We first argue that simple field-matching proposals of current SDN APIs are not efficient and flexible enough and then propose a tag based classification mechanism as an alternative. Moreover, we propose user-defined actions as an improvement over current hardcoded actions in SDN APIs. Our experiments show TagFlow forwarding is almost 40% faster than OpenFlow. Furthermore, our user-defined actions at SDN southbound are thousands of times faster that equivalent northbound implementations in the literature.
This paper proposes a novel method for determining a three-dimensional (3D) bounding box to estimate pose (position and orientation) and size of a 3D object corresponding to a segmented object region in an image acquired by a single calibrated camera. The method is designed to work upon an object on the ground and to determine a bounding box aligned to the direction of the object, thereby reducing the number of degrees of freedom in localizing the bounding box to 5 from 9. Observations associated with the structural properties of back-projected object regions on the ground are suggested, which are useful for determining the object points expected to be on the ground. A suitable base is then estimated from the expected on-ground object points by applying to them an assumption of bilateral symmetry. A bounding box with this base is finally constructed by determining its height, such that back-projection of the constructed box onto the ground minimally encloses back-projection of the given object region. Through experiments with some 3D-modelled objects and real objects, we found that a bounding box aligned to the dominant direction estimated from edges with common direction looks natural, and the accuracy of the pose and size is enough for localizing actual on-ground objects in an industrial working space. The proposed method is expected to be used effectively in the fields of smart surveillance and autonomous navigation.
Wijik LEE Ji-Youp KIM Jong-Seon NO
Let p be an odd prime such that p ≡ 3 mod 4 and n be an odd positive integer. In this paper, two new families of p-ary sequences of period $N = rac{p^n-1}{2}$ are constructed by two decimated p-ary m-sequences m(2t) and m(dt), where d=4 and d=(pn+1)/2=N+1. The upper bound on the magnitude of correlation values of two sequences in the family is derived by using Weil bound. Their upper bound is derived as $rac{3}{sqrt{2}} sqrt{N+rac{1}{2}}+rac{1}{2}$ and the family size is 4N, which is four times the period of the sequence.
Takashi HIRAYAMA Hayato SUGAWARA Katsuhisa YAMANAKA Yasuaki NISHITANI
We present a new lower bound on the number of gates in reversible logic circuits that represent a given reversible logic function, in which the circuits are assumed to consist of general Toffoli gates and have no redundant input/output lines. We make a theoretical comparison of lower bounds, and prove that the proposed bound is better than the previous one. Moreover, experimental results for lower bounds on randomly-generated reversible logic functions and reversible benchmarks are given. The results also demonstrate that the proposed lower bound is better than the former one.
Hatsuhiro KATO Hatsuyoshi KATO
Recently, we proposed a weak-form discretization scheme to derive second-order difference equations from the governing equation of the scattering problem. In this paper, under the scope of the proposed scheme, numerical expressions for the waveguide boundary conditions are derived as perfectly absorbing conditions for input and output ports. The waveguide boundary conditions play an important role in extracting the quasi-localized wave as an eigenstate with a complex eigenvalue. The wave-number dependence of the resonance curve in Fano resonance is reproduced by using a semi-analytic model that is developed on the basis of the phase change relevant to the S-matrix. The reproduction confirms that the eigenstate with a complex eigenvalue does cause the observed Fano resonance.
Takashi YAMAMOTO Shigemasa TAKAI
In this paper, we study conjunctive decentralized diagnosis of discrete event systems (DESs). In most existing works on decentralized diagnosis of DESs, it is implicitly assumed that diagnosis decisions of all local diagnosers are available to detect a failure. However, it may be possible that some local diagnosis decisions are not available, due to some reasons. Letting n be the number of local diagnosers, the notion of (n,k)-conjunctive codiagnosability guarantees that the occurrence of any failure is detected in the conjunctive architecture as long as at least k of the n local diagnosis decisions are available. We propose an algorithm for verifying (n,k)-conjunctive codiagnosability. To construct a reliable conjunctive decentralized diagnoser, we need to compute the delay bound within which the occurrence of any failure can be detected as long as at least k of the n local diagnosis decisions are available. We show how to compute the delay bound.
Masaya SHIMAKAWA Shigeki HAGIHARA Naoki YONEZAKI
Many fatal accidents involving safety-critical reactive systems have occurred in unexpected situations that were not considered during the design and test phases of development. To prevent such accidents, reactive systems should be designed to respond appropriately to any request from an environment at any time. Verifying this property during the specification phase reduces development reworking. This property of a specification is commonly known as realizability. Realizability checking for reactive system specifications involves complex and intricate analysis. The complexity of realizability problems is 2EXPTIME-complete. To detect typical simple deficiencies in specifications efficiently, we introduce the notion of bounded strong satisfiability (a necessary condition for realizability), and present a method for checking this property. Bounded strong satisfiability is the property that, for all input patterns represented by loop structures of a given size k, there is a response that satisfies a given specification. We report a checking method based on a satisfiability solver, and show that the complexity of the bounded strong satisfiability problem is co-NEXPTIME-complete. Moreover, we report experimental results showing that our method is more efficient than existing approaches.
The main purpose of this paper is to apply the boundary integral equation (BIE) method to the analysis of spoof localized surface plasmons (spoof LSPs) excited in a perfectly conducting cylinder with longitudinal corrugations. Frequency domain BIE schemes based on electric field integral equation (EFIE), magnetic field integral equation (MFIE) and combined field integral equation (CFIE) formulations are used to solve two-dimensional electromagnetic (EM) problems of scattering from the cylinder illuminated by a transverse electric plane wave. In this approach effects of spoof LSPs are included in the secondary surface current and charge densities resulting from the interaction between the plane wave and the cylinder. Numerical results obtained with the BIE schemes are validated by comparison with that of a recently proposed modal solution based on the metamaterial approximation.