The search functionality is under construction.

Keyword Search Result

[Keyword] diff(920hit)

1-20hit(920hit)

  • A High-Performance Antenna Array Signal Processing Method in Deep Space Communication Open Access

    Yi Wen JIAO  Ze Fu GAO  Wen Ge YANG  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2023/09/25
      Vol:
    E107-A No:7
      Page(s):
    1062-1065

    In future deep space communication missions, VLBI (Very Long Baseline Interferometry) based on antenna array technology remains a critical detection method, which urgently requires the improvement of synthesis performance for antenna array signals. Considering this, focusing on optimizing the traditional antenna grouping method applied in the phase estimation algorithm, this letter proposes a “L/2 to L/2” antenna grouping method based on the maximum correlation signal-to-noise ratio (SNR). Following this idea, a phase difference estimation algorithm named “Couple” is presented. Theoretical analysis and simulation verification illustrate that: when ρ < -10dB, the proposed “Couple” has the highest performance; increasing the number of antennas can significantly improve its synthetic loss performance and robustness. The research of this letter indicates a promising potential in supporting the rising deep space exploration and communication missions.

  • More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves Open Access

    Kaoru TAKEMURE  Yusuke SAKAI  Bagus SANTOSO  Goichiro HANAOKA  Kazuo OHTA  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2023/10/05
      Vol:
    E107-A No:7
      Page(s):
    966-988

    The existing discrete-logarithm-based two-round multi-signature schemes without using the idealized model, i.e., the Algebraic Group Model (AGM), have quite large reduction loss. This means that an implementation of these schemes requires an elliptic curve (EC) with a very large order for the standard 128-bit security when we consider concrete security. Indeed, the existing standardized ECs have orders too small to ensure 128-bit security of such schemes. Recently, Pan and Wagner proposed two two-round schemes based on the Decisional Diffie-Hellman (DDH) assumption (EUROCRYPT 2023). For 128-bit security in concrete security, the first scheme can use the NIST-standardized EC P-256 and the second can use P-384. However, with these parameter choices, they do not improve the signature size and the communication complexity over the existing non-tight schemes. Therefore, there is no two-round scheme that (i) can use a standardized EC for 128-bit security and (ii) has high efficiency. In this paper, we construct a two-round multi-signature scheme achieving both of them from the DDH assumption. We prove that an EC with at least a 321-bit order is sufficient for our scheme to ensure 128-bit security. Thus, we can use the NIST-standardized EC P-384 for 128-bit security. Moreover, the signature size and the communication complexity per one signer of our proposed scheme under P-384 are 1152 bits and 1535 bits, respectively. These are most efficient among the existing two-round schemes without using the AGM including Pan-Wagner’s schemes and non-tight schemes which do not use the AGM. Our experiment on an ordinary machine shows that for signing and verification, each can be completed in about 65 ms under 100 signers. This shows that our scheme has sufficiently reasonable running time in practice.

  • Simulation of Scalar-Mode Optically Pumped Magnetometers to Search Optimal Operating Conditions Open Access

    Yosuke ITO  Tatsuya GOTO  Takuma HORI  

     
    INVITED PAPER

      Pubricized:
    2023/12/04
      Vol:
    E107-C No:6
      Page(s):
    164-170

    In recent years, measuring biomagnetic fields in the Earth’s field by differential measurements of scalar-mode OPMs have been actively attempted. In this study, the sensitivity of the scalar-mode OPMs under the geomagnetic environment in the laboratory was studied by numerical simulation. Although the noise level of the scalar-mode OPM in the laboratory environment was calculated to be 104 pT/$\sqrt{\mathrm{Hz}}$, the noise levels using the first-order and the second-order differential configurations were found to be 529 fT/cm/$\sqrt{\mathrm{Hz}}$ and 17.2 fT/cm2/$\sqrt{\mathrm{Hz}}$, respectively. This result indicated that scalar-mode OPMs can measure very weak magnetic fields such as MEG without high-performance magnetic shield roomns. We also studied the operating conditions by varying repetition frequency and temperature. We found that scalar-mode OPMs have an upper limit of repetition frequency and temperature, and that the repetition frequency should be set below 4 kHz and the temperature should be set below 120°C.

  • An Extension of Physical Optics Approximation for Dielectric Wedge Diffraction for a TM-Polarized Plane Wave Open Access

    Duc Minh NGUYEN  Hiroshi SHIRAI  Se-Yun KIM  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2023/11/08
      Vol:
    E107-C No:5
      Page(s):
    115-123

    In this study, the edge diffraction of a TM-polarized electromagnetic plane wave by two-dimensional dielectric wedges has been analyzed. An asymptotic solution for the radiation field has been derived from equivalent electric and magnetic currents which can be determined by the geometrical optics (GO) rays. This method may be regarded as an extended version of physical optics (PO). The diffracted field has been represented in terms of cotangent functions whose singularity behaviors are closely related to GO shadow boundaries. Numerical calculations are performed to compare the results with those by other reference solutions, such as the hidden rays of diffraction (HRD) and a numerical finite-difference time-domain (FDTD) simulation. Comparisons of the diffraction effect among these results have been made to propose additional lateral waves in the denser media.

  • Feasibility Study of Numerical Calculation and Machine Learning Hybrid Approach for Renal Denervation Temperature Prediction

    Aditya RAKHMADI  Kazuyuki SAITO  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2023/05/22
      Vol:
    E106-C No:12
      Page(s):
    799-807

    Transcatheter renal denervation (RDN) is a novel treatment to reduce blood pressure in patients with resistant hypertension using an energy-based catheter, mostly radio frequency (RF) current, by eliminating renal sympathetic nerve. However, several inconsistent RDN treatments were reported, mainly due to RF current narrow heating area, and the inability to confirm a successful nerve ablation in a deep area. We proposed microwave energy as an alternative for creating a wider ablation area. However, confirming a successful ablation is still a problem. In this paper, we designed a prediction method for deep renal nerve ablation sites using hybrid numerical calculation-driven machine learning (ML) in combination with a microwave catheter. This work is a first-step investigation to check the hybrid ML prediction capability in a real-world situation. A catheter with a single-slot coaxial antenna at 2.45 GHz with a balloon catheter, combined with a thin thermometer probe on the balloon surface, is proposed. Lumen temperature measured by the probe is used as an ML input to predict the temperature rise at the ablation site. Heating experiments using 6 and 8 mm hole phantom with a 41.3 W excited power, and 8 mm with 36.4 W excited power, were done eight times each to check the feasibility and accuracy of the ML algorithm. In addition, the temperature on the ablation site is measured for reference. Prediction by ML algorithm agrees well with the reference, with a maximum difference of 6°C and 3°C in 6 and 8 mm (both power), respectively. Overall, the proposed ML algorithm is capable of predicting the ablation site temperature rise with high accuracy.

  • A Note on the Confusion Coefficient of Boolean Functions

    Yu ZHOU  Jianyong HU  Xudong MIAO  Xiaoni DU  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2023/05/24
      Vol:
    E106-A No:12
      Page(s):
    1525-1530

    Low confusion coefficient values can make side-channel attacks harder for vector Boolean functions in Block cipher. In this paper, we give new results of confusion coefficient for f ⊞ g, f ⊡ g, f ⊕ g and fg for different Boolean functions f and g, respectively. And we deduce a relationship on the sum-of-squares of the confusion coefficient between one n-variable function and two (n - 1)-variable decomposition functions. Finally, we find that the confusion coefficient of vector Boolean functions is affine invariant.

  • Improvement of Differential-GNSS Positioning by Estimating Code Double-Difference-Error Using Machine Learning

    Hirotaka KATO  Junichi MEGURO  

     
    PAPER-Pattern Recognition

      Pubricized:
    2023/09/12
      Vol:
    E106-D No:12
      Page(s):
    2069-2077

    Recently, Global navigation satellite system (GNSS) positioning has been widely used in various applications (e.g. car navigation system, smartphone map application, autonomous driving). In GNSS positioning, coordinates are calculated from observed satellite signals. The observed signals contain various errors, so the calculated coordinates also have some errors. Double-difference is one of the widely used ideas to reduce the errors of the observed signals. Although double-difference can remove many kinds of errors from the observed signals, some errors still remain (e.g. multipath error). In this paper, we define the remaining error as “double-difference-error (DDE)” and propose a method for estimating DDE using machine learning. In addition, we attempt to improve DGNSS positioning by feeding back the estimated DDE. Previous research applying machine learning to GNSS has focused on classifying whether the signal is LOS (Line Of Sight) or NLOS (Non Line Of Sight), and there is no study that attempts to estimate the amount of error itself as far as we know. Furthermore, previous studies had the limitation that their dataset was recorded at only a few locations in the same city. This is because these studies are mainly aimed at improving the positioning accuracy of vehicles, and collecting large amounts of data using vehicles is costly. To avoid this problem, in this research, we use a huge amount of openly available stationary point data for training. Through the experiments, we confirmed that the proposed method can reduce the DGNSS positioning error. Even though the DDE estimator was trained only on stationary point data, the proposed method improved the DGNSS positioning accuracy not only with stationary point but also with mobile rover. In addition, by comparing with the previous (detect and remove) approach, we confirmed the effectiveness of the DDE feedback approach.

  • Deep Unrolling of Non-Linear Diffusion with Extended Morphological Laplacian

    Gouki OKADA  Makoto NAKASHIZUKA  

     
    PAPER-Image

      Pubricized:
    2023/07/21
      Vol:
    E106-A No:11
      Page(s):
    1395-1405

    This paper presents a deep network based on unrolling the diffusion process with the morphological Laplacian. The diffusion process is an iterative algorithm that can solve the diffusion equation and represents time evolution with Laplacian. The diffusion process is applied to smoothing of images and has been extended with non-linear operators for various image processing tasks. In this study, we introduce the morphological Laplacian to the basic diffusion process and unwrap to deep networks. The morphological filters are non-linear operators with parameters that are referred to as structuring elements. The discrete Laplacian can be approximated with the morphological filters without multiplications. Owing to the non-linearity of the morphological filter with trainable structuring elements, the training uses error back propagation and the network of the morphology can be adapted to specific image processing applications. We introduce two extensions of the morphological Laplacian for deep networks. Since the morphological filters are realized with addition, max, and min, the error caused by the limited bit-length is not amplified. Consequently, the morphological parts of the network are implemented in unsigned 8-bit integer with single instruction multiple data set (SIMD) to achieve fast computation on small devices. We applied the proposed network to image completion and Gaussian denoising. The results and computational time are compared with other denoising algorithm and deep networks.

  • A Method to Improve the Quality of Point-Light-Style Images Using Peripheral Difference Filters with Different Window Sizes

    Toru HIRAOKA  Kanya GOTO  

     
    LETTER-Computer Graphics

      Pubricized:
    2023/05/08
      Vol:
    E106-A No:11
      Page(s):
    1440-1443

    We propose a non-photorealistic rendering method for automatically generating point-light-style (PLS) images from photographic images using peripheral difference filters with different window sizes. The proposed method can express PLS patterns near the edges of photographic images as dots. To verify the effectiveness of the proposed method, experiments were conducted to visually confirm PLS images generated from various photographic images.

  • A Compact Fully-Differential Distributed Amplifier with Coupled Inductors in 0.18-µm CMOS Technology

    Keisuke KAWAHARA  Yohtaro UMEDA  Kyoya TAKANO  Shinsuke HARA  

     
    PAPER

      Pubricized:
    2023/04/19
      Vol:
    E106-C No:11
      Page(s):
    669-676

    This paper presents a compact fully-differential distributed amplifier using a coupled inductor. Differential distributed amplifiers are widely required in optical communication systems. Most of the distributed amplifiers reported in the past are single-ended or pseudo-differential topologies. In addition, the differential distributed amplifiers require many inductors, which increases the silicon cost. In this study, we use differentially coupled inductors to reduce the chip area to less than half and eliminate the difficulties in layout design. The challenge in using coupled inductors is the capacitive parasitic coupling that degrades the flatness of frequency response. To address this challenge, the odd-mode image parameters of a differential artificial transmission line are derived using a simple loss-less model. Based on the analytical results, we optimize the dimensions of the inductor with the gradient descent algorithm to achieve accurate impedance matching and phase matching. The amplifier was fabricated in 0.18-µm CMOS technology. The core area of the amplifier is 0.27 mm2, which is 57% smaller than the previous work. Besides, we demonstrated a small group delay variation of ±2.7 ps thanks to the optimization. the amplifier successfully performed 30-Gbps NRZ and PAM4 transmissions with superior jitter performance. The proposed technique will promote the high-density integration of differential traveling wave devices.

  • Inverse Heat Dissipation Model for Medical Image Segmentation

    Yu KASHIHARA  Takashi MATSUBARA  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2023/08/22
      Vol:
    E106-D No:11
      Page(s):
    1930-1934

    The diffusion model has achieved success in generating and editing high-quality images because of its ability to produce fine details. Its superior generation ability has the potential to facilitate more detailed segmentation. This study presents a novel approach to segmentation tasks using an inverse heat dissipation model, a kind of diffusion-based models. The proposed method involves generating a mask that gradually shrinks to fit the shape of the desired segmentation region. We comprehensively evaluated the proposed method using multiple datasets under varying conditions. The results show that the proposed method outperforms existing methods and provides a more detailed segmentation.

  • PNB Based Differential Cryptanalysis of Salsa20 and ChaCha

    Nasratullah GHAFOORI  Atsuko MIYAJI  Ryoma ITO  Shotaro MIYASHITA  

     
    PAPER

      Pubricized:
    2023/07/13
      Vol:
    E106-D No:9
      Page(s):
    1407-1422

    This paper introduces significant improvements over the existing cryptanalysis approaches on Salsa20 and ChaCha stream ciphers. For the first time, we reduced the attack complexity on Salsa20/8 to the lowest possible margin. We introduced an attack on ChaCha7.25. It is the first attack of its type on ChaCha7.25/20. In our approach, we studied differential cryptanalysis of the Salsa20 and ChaCha stream ciphers based on a comprehensive analysis of probabilistic neutral bits (PNBs). The existing differential cryptanalysis approaches on Salsa20 and ChaCha stream ciphers first study the differential bias at specific input and output differential positions and then search for probabilistic neutral bits. However, the differential bias and the set of PNBs obtained in this method are not always the ideal combination to conduct the attack against the ciphers. The researchers have not focused on the comprehensive analysis of the probabilistic neutrality measure of all key bits concerning all possible output difference positions at all possible internal rounds of Salsa20 and ChaCha stream ciphers. Moreover, the relationship between the neutrality measure and the number of inverse quarter rounds has not been scrutinized yet. To address these study gaps, we study the differential cryptanalysis based on the comprehensive analysis of probabilistic neutral bits on the reduced-round Salsa20 and ChaCha. At first, we comprehensively analyze the neutrality measure of 256 key bits positions. Afterward, we select the output difference bit position with the best average neutrality measure and look for the corresponding input differential with the best differential bias. Considering all aspects, we present an attack on Salsa20/8 with a time complexity of 2241.62 and data complexity of 231.5, which is the best-known single bit differential attack on Salsa20/8 and then, we introduced an attack on ChaCha7.25 rounds with a time complexity of 2254.011 and data complexity of 251.81.

  • Improving the Accuracy of Differential-Neural Distinguisher for DES, Chaskey, and PRESENT

    Liu ZHANG  Zilong WANG  Yindong CHEN  

     
    LETTER-Information Network

      Pubricized:
    2023/04/13
      Vol:
    E106-D No:7
      Page(s):
    1240-1243

    In CRYPTO 2019, Gohr first introduced the deep learning method to cryptanalysis for SPECK32/64. A differential-neural distinguisher was obtained using ResNet neural network. Zhang et al. used multiple parallel convolutional layers with different kernel sizes to capture information from multiple dimensions, thus improving the accuracy or obtaining a more round of distinguisher for SPECK32/64 and SIMON32/64. Inspired by Zhang's work, we apply the network structure to other ciphers. We not only improve the accuracy of the distinguisher, but also increase the number of rounds of the distinguisher, that is, distinguish more rounds of ciphertext and random number for DES, Chaskey and PRESENT.

  • Generation of Reaction-Diffusion-Pattern-Like Images with Partially Variable Size

    Toru HIRAOKA  

     
    LETTER-Image

      Pubricized:
    2022/12/08
      Vol:
    E106-A No:6
      Page(s):
    957-961

    We propose a non-photorealistic rendering method to automatically generate reaction-diffusion-pattern-like images from photographic images. The proposed method uses smoothing filter with a circular window, and changes the size of the circular window depending on the position in photographic images. By partially changing the size of the circular window, the size of reaction-diffusion patterns can be changed partially. To verify the effectiveness of the proposed method, experiments were conducted to apply the proposed method to various photographic images.

  • Analysis of Field Uniformity in a TEM Cell Based on Finite Difference Method and Measured Field Strength

    Yixing GU  Zhongyuan ZHOU  Yunfen CHANG  Mingjie SHENG  Qi ZHOU  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2022/12/12
      Vol:
    E106-B No:6
      Page(s):
    509-517

    This paper proposes a method in calculating the field distribution of the cross section in a transverse electromagnetic (TEM) cell based on the method of finite difference. Besides, E-field uniformity of the cross section is analyzed with the calculation results and the measured field strength. Analysis indicates that theoretical calculation via method proposed in this paper can guide the setup of E-field probes to some extent when it comes to the E-field uniformity analysis in a TEM cell.

  • Cluster Structure of Online Users Generated from Interaction Between Fake News and Corrections Open Access

    Masaki AIDA  Takumi SAKIYAMA  Ayako HASHIZUME  Chisa TAKANO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2022/11/21
      Vol:
    E106-B No:5
      Page(s):
    392-401

    The problem caused by fake news continues to worsen in today's online social networks. Intuitively, it seems effective to issue corrections as a countermeasure. However, corrections can, ironically, strengthen attention to fake news, which worsens the situation. This paper proposes a model for describing the interaction between fake news and the corrections as a reaction-diffusion system; this yields the mechanism by which corrections increase attention to fake news. In this model, the emergence of groups of users who believe in fake news is understood as a Turing pattern that appears in the activator-inhibitor model. Numerical calculations show that even if the network structure has no spatial bias, the interaction between fake news and the corrections creates groups that are strongly interested in discussing fake news. Also, we propose and evaluate a basic strategy to counter fake news.

  • A Novel Differential Evolution Algorithm Based on Local Fitness Landscape Information for Optimization Problems

    Jing LIANG  Ke LI  Kunjie YU  Caitong YUE  Yaxin LI  Hui SONG  

     
    PAPER-Core Methods

      Pubricized:
    2023/02/13
      Vol:
    E106-D No:5
      Page(s):
    601-616

    The selection of mutation strategy greatly affects the performance of differential evolution algorithm (DE). For different types of optimization problems, different mutation strategies should be selected. How to choose a suitable mutation strategy for different problems is a challenging task. To deal with this challenge, this paper proposes a novel DE algorithm based on local fitness landscape, called FLIDE. In the proposed method, fitness landscape information is obtained to guide the selection of mutation operators. In this way, different problems can be solved with proper evolutionary mechanisms. Moreover, a population adjustment method is used to balance the search ability and population diversity. On one hand, the diversity of the population in the early stage is enhanced with a relative large population. One the other hand, the computational cost is reduced in the later stage with a relative small population. The evolutionary information is utilized as much as possible to guide the search direction. The proposed method is compared with five popular algorithms on 30 test functions with different characteristics. Experimental results show that the proposed FLIDE is more effective on problems with high dimensions.

  • Effectively Utilizing the Category Labels for Image Captioning

    Junlong FENG  Jianping ZHAO  

     
    PAPER-Core Methods

      Pubricized:
    2021/12/13
      Vol:
    E106-D No:5
      Page(s):
    617-624

    As a further investigation of the image captioning task, some works extended the vision-text dataset for specific subtasks, such as the stylized caption generating. The corpus in such dataset is usually composed of obvious sentiment-bearing words. While, in some special cases, the captions are classified depending on image category. This will result in a latent problem: the generated sentences are in close semantic meaning but belong to different or even opposite categories. It is a worthy issue to explore an effective way to utilize the image category label to boost the caption difference. Therefore, we proposed an image captioning network with the label control mechanism (LCNET) in this paper. First, to further improve the caption difference, LCNET employs a semantic enhancement module to provide the decoder with global semantic vectors. Then, through the proposed label control LSTM, LCNET can dynamically modulate the caption generation depending on the image category labels. Finally, the decoder integrates the spatial image features with global semantic vectors to output the caption. Using all the standard evaluation metrics shows that our model outperforms the compared models. Caption analysis demonstrates our approach can improve the performance of semantic representation. Compared with other label control mechanisms, our model is capable of boosting the caption difference according to the labels and keeping a better consistent with image content as well.

  • Privacy-Preserving Correlation Coefficient

    Tomoaki MIMOTO  Hiroyuki YOKOYAMA  Toru NAKAMURA  Takamasa ISOHARA  Masayuki HASHIMOTO  Ryosuke KOJIMA  Aki HASEGAWA  Yasushi OKUNO  

     
    PAPER

      Pubricized:
    2023/02/08
      Vol:
    E106-D No:5
      Page(s):
    868-876

    Differential privacy is a confidentiality metric and quantitatively guarantees the confidentiality of individuals. A noise criterion, called sensitivity, must be calculated when constructing a probabilistic disturbance mechanism that satisfies differential privacy. Depending on the statistical process, the sensitivity may be very large or even impossible to compute. As a result, the usefulness of the constructed mechanism may be significantly low; it might even be impossible to directly construct it. In this paper, we first discuss situations in which sensitivity is difficult to calculate, and then propose a differential privacy with additional dummy data as a countermeasure. When the sensitivity in the conventional differential privacy is calculable, a mechanism that satisfies the proposed metric satisfies the conventional differential privacy at the same time, and it is possible to evaluate the relationship between the respective privacy parameters. Next, we derive sensitivity by focusing on correlation coefficients as a case study of a statistical process for which sensitivity is difficult to calculate, and propose a probabilistic disturbing mechanism that satisfies the proposed metric. Finally, we experimentally evaluate the effect of noise on the sensitivity of the proposed and direct methods. Experiments show that privacy-preserving correlation coefficients can be derived with less noise compared to using direct methods.

  • Geo-Graph-Indistinguishability: Location Privacy on Road Networks with Differential Privacy

    Shun TAKAGI  Yang CAO  Yasuhito ASANO  Masatoshi YOSHIKAWA  

     
    PAPER

      Pubricized:
    2023/01/16
      Vol:
    E106-D No:5
      Page(s):
    877-894

    In recent years, concerns about location privacy are increasing with the spread of location-based services (LBSs). Many methods to protect location privacy have been proposed in the past decades. Especially, perturbation methods based on Geo-Indistinguishability (GeoI), which randomly perturb a true location to a pseudolocation, are getting attention due to its strong privacy guarantee inherited from differential privacy. However, GeoI is based on the Euclidean plane even though many LBSs are based on road networks (e.g. ride-sharing services). This causes unnecessary noise and thus an insufficient tradeoff between utility and privacy for LBSs on road networks. To address this issue, we propose a new privacy notion, Geo-Graph-Indistinguishability (GeoGI), for locations on a road network to achieve a better tradeoff. We propose Graph-Exponential Mechanism (GEM), which satisfies GeoGI. Moreover, we formalize the optimization problem to find the optimal GEM in terms of the tradeoff. However, the computational complexity of a naive method to find the optimal solution is prohibitive, so we propose a greedy algorithm to find an approximate solution in an acceptable amount of time. Finally, our experiments show that our proposed mechanism outperforms GeoI mechanisms, including optimal GeoI mechanism, with respect to the tradeoff.

1-20hit(920hit)