The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] diff(926hit)

741-760hit(926hit)

  • The Random-Block Feedback Mode for Block Ciphers

    Yoonjeong KIM  Yookun CHO  

     
    LETTER-Information Security

      Vol:
    E83-A No:6
      Page(s):
    1289-1291

    In this letter we propose a new mode for block ciphers which uses an unknown random block as feedback. We show that the successful differential/linear cryptanalyses of DES under the mode require at least the complexity of the exhaustive key search. We also present the processing overhead of our scheme compared to that of ECB mode.

  • Adaptive Multiple-Symbol Differential Detection of MAPSK over Frequency Selective Fading Channels

    Mingya LIU  Shiro HANDA  Masanobu MACHIDA  Shinjiro OSHITA  

     
    PAPER

      Vol:
    E83-A No:6
      Page(s):
    1175-1183

    We propose a novel adaptive multiple-symbol differential detection (MSDD) scheme that has excellent performance over frequency selective fading (FSF) channels. The adaptive MSDD scheme consists of an adaptive noncoherent least mean square channel estimator that can accomplish channel estimation without any decision delay and the MSDD. The M-algorithm is introduced into this detection scheme to reduce the complication of computation due to increasing observed sequence length in the MSDD. Because of the application of the adaptive channel estimator and the M-algorithm, this adaptive MSDD make it possible that channel estimation is accomplished for every symbol along M surviving paths without any decision delay. And the SER performance of this adaptive MSDD is not affected by phase fluctuation introduced by a channel because the MSDD and the noncoherent channel estimator are applied. The adaptive MSDD scheme is applied to typical constellation of 16APSK, the (4,12) QAM and the star QAM. The excellent tracking performance of this adaptive MSDD scheme over FSF channels is confirmed by computer simulations.

  • Neural Networks Learning Differential Data

    Ryusuke MASUOKA  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E83-D No:6
      Page(s):
    1291-1300

    In many of machine learning problems, it is essential to use not only the training data, but also a priori knowledge about how the world is constrained. In many cases, such knowledge is given in the forms of constraints on differential data or more specifically partial differential equations (PDEs). Neural networks with capabilities to learn differential data can take advantage of such knowledge and easily incorporate such constraints into the learning of training value data. In this paper, we report a structure, an algorithm, and results of experiments on neural networks learing differential data.

  • Overview of DiffServ Technology: Its Mechanism and Implementation

    Takeshi AIMOTO  Shigeru MIYAKE  

     
    INVITED PAPER

      Vol:
    E83-D No:5
      Page(s):
    957-964

    On the Internet, a Quality of Service (QoS) guaranteed services are increasingly being demanded, and the Internet Engineering Task Force (IETF) is developing the specification documents for the QoS services intensively. This overview details the technical rationales underlining the contents of the specification documents developed by the IETF for Differentiated Services (DiffServ)--to provide QoS guarantee services in the large IP networks-- and Policy Framework--to manage DiffServ compliant networks. The IP networks with DiffServ consist of boundary routers and interior routers. These routers are composed of packet classifiers and marker, shaper, and policing function. Many vendors have developed DiffServ-compliant routers with gigabit interfaces. An example of an implementation of a DiffServ-compliant router and a demonstration of a QoS service using this router are presented here. The Policy Framework is expected to be one of the promising management solutions to co-operate with and manage many DiffServ-compliant routers. An experiment that adopts the Policy Framework to a DiffServ compliant network is also outlined.

  • A Study on Personal Difference in the Transfer Functions of Sound Localization Using Stereo Earphones

    Shohei YANO  Haruhide HOKARI  Shoji SHIMADA  

     
    PAPER-Engineering Acoustics

      Vol:
    E83-A No:5
      Page(s):
    877-887

    Out-of-head sound localization achieved via binaural earphones is indispensable for a virtual sound system. It is necessary to measure the two transfer functions of each subject, Spatial Sound Transfer Function (SSTF) and Ear Canal Transfer Function (ECTF), for achieving sound localization. It is well known that the quality of sound localization may be poor if the individual transfer functions are not accurately reproduced. This is because each subject has his/her own transfer functions. It is very important to clarify which function includes more individual information, SSTF or ECTF, in order to implement a simpler model. Therefore, we introduce the quantity of "Personal differences" for investigating the subject's transfer functions included in SSTF and ECTF. We measure the transfer functions SSTF and ECTF of 60 subjects in a soundproofed room, and analysis of the data using Principal Component Analysis (PCA) and three subjective assessment tests. This study finds that ECTF differs more widely from person to person than SSTF.

  • Issues in Augmenting Diffserv to Meet Application's CoS Requirements

    Youki KADOBAYASHI  Shinji SHIMOJO  

     
    INVITED PAPER

      Vol:
    E83-D No:5
      Page(s):
    965-971

    The increasing diversity in Internet applications necessitates extended Internet architecture that can differentiate forwarding treatment of different types of flows. Diffserv can be a solution to the problem when it is augmented by several additional components. In this paper we describe various issues and possible directions in augmenting Diffserv. We present our analysis of Diffserv architecture, anticipated developments to augment Diffserv architecture, and potential applications of Diffserv.

  • Pure Green Light-Emitting Diodes Based on High Quality ZnTe Substrates and a Thermal Diffusion Process

    Kenji SATO  Mikio HANAFUSA  Akira NODA  Atsutoshi ARAKAWA  Toshiaki ASAHI  Masayuki UCHIDA  Osamu ODA  

     
    PAPER

      Vol:
    E83-C No:4
      Page(s):
    579-584

    Pure green ZnTe light-emitting diodes (LEDs) were first realized reproducibly based on high quality ZnTe substrates and a simple thermal diffusion process. This success which overcomes the compensation effect in II-VI materials is due to the use of high quality p-type ZnTe single crystals with low dislocation densities of the level of 2000 cm-2 grown by the vertical gradient freezing (VGF) method and the suppression of as compensating point defects by low temperature annealing with covering the surface of the substrates by the deposition of n-type dopant, Al. The thermal diffusion coefficient and the activation energy of Al were determined from the pn interface observed by scanning electron spectroscopy (SEM). The formation of the intrinsic pn junctions was confirmed from the electron-beam induced current (EBIC) observation and I-V measurement. The bright 550 nm electroluminescence (EL) from these pn-junctions was reproducibly observed under room light at room temperature, with the lifetime exceeding 1000 hrs.

  • New Self-Healing Scheme that Realizes Differentiated Bandwidth Requirement on ATM Networks

    Taishi YAHARA  Ryutaro KAWAMURA  Satoru OHTA  

     
    PAPER-Signaling System and Communication Protocol

      Vol:
    E83-B No:3
      Page(s):
    672-679

    This paper proposes a new self-healing scheme that differentiates the bandwidth requirement for each network service on ATM networks. First, we show the necessity of our proposed scheme. In the future network, we must satisfy two demands, rapid restoration from failure and differentiated bandwidth requirements. The conventional restoration scheme, called the self-healing scheme, realizes rapid restoration, but does not support bandwidth differentiation; the new self-healing scheme proposed herein does. We also show that the proposed scheme reduces the spare resources required for backup. The scheme can be realized as a simple extension of the conventional self-healing scheme. Finally, simulations show that the proposed scheme requires fewer spare resources while offering comparable restoration time to the conventional approach against any demand pattern.

  • Numerical Techniques for Analysis of Electromagnetic Problems

    Kunio SAWAYA  

     
    INVITED PAPER

      Vol:
    E83-B No:3
      Page(s):
    444-452

    The features of the method of moment (MoM) and the finite difference time domain (FDTD) method for numerical analysis of the electromagnetic scattering problem are presented. First, the integral equations for the conducting wire, conducting plane and the dielectric materials are described. Importance to ensure the condition of the continuity of the current of the scatterers is emphasized and numerical examples for a conducting structure involving a junction of wire segment and planar segment is presented. Finally, the advantages and the disadvantages of the FDTD method are discussed.

  • Bicomplex Waves in Electromagnetic Scattering and Diffraction Problems

    Masahiro HASHIMOTO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E83-C No:2
      Page(s):
    236-247

    The mathematical theory of bicomplex electromagnetic waves in two-dimensional scattering and diffraction problems is developed. The Vekua's integral expression for the two-dimensional fields valid only in the closed source-free region is generalized into the radiating field. The boundary-value problems for scattering and diffraction are formulated in the bicomplex space. The complex function of a single variable, which obeys the Cauchy-Riemann relations and thus expresses low-frequency aspects of the near field at a wedge of the scatterer, is connected with the radiating field by an integral operator having a suitable kernel. The behaviors of this complex function in the whole space are discussed together with those of the far-zone field or the amplitude of angular spectrum. The Hilbert's factorization scheme is used to find out a linear transformation from the far-zone field to the bicomplex-valued function of a single variable. This transformation is shown to be unique. The new integral expression for the field scattered by a thin metallic strip is also obtained.

  • Low Voltage Analog Circuit Design Techniques: A Tutorial

    Shouli YAN  Edgar SANCHEZ-SINENCIO  

     
    INVITED PAPER

      Vol:
    E83-A No:2
      Page(s):
    179-196

    Low voltage (LV) analog circuit design techniques are addressed in this tutorial. In particular, (i) technology considerations; (ii) transistor model capable to provide performance and power tradeoffs; (iii) low voltage implementation techniques capable to reduce the power supply requirements, such as bulk-driven, floating-gate, and self-cascode MOSFETs; (iv) basic LV building blocks; (v) multi-stage frequency compensation topologies; and (vi) fully-differential and fully-balanced systems.

  • Diffraction Pattern Functions of a Wedge Composed of Metal and Lossless Dielectric Illuminated by an E-Polarized Plane Wave

    Huen-Tae HA  Jung-Woong RA  Se-Yun KIM  

     
    LETTER-Antennas and Propagation

      Vol:
    E83-B No:1
      Page(s):
    103-106

    Diffraction pattern functions of an E-polarized scattering by a wedge composed of perfectly conducting metal and lossless dielectric with arbitrary permittivity are analyzed by applying an improved physical optics approximation and its correction. The correction terms are expressed into a complete expansion of the Neumann's series, of which coefficients are calculated numerically to satisfy the null-field condition in the complementary region.

  • Practical Evaluation of Security against Generalized Interpolation Attack

    Kazumaro AOKI  

     
    PAPER

      Vol:
    E83-A No:1
      Page(s):
    33-38

    Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.

  • Digital Differentiators Based on Taylor Series

    Ishtiaq Rasool KHAN  Ryoji OHBA  

     
    LETTER-Digital Signal Processing

      Vol:
    E82-A No:12
      Page(s):
    2822-2824

    The explicit formula for the coefficients of maximally linear digital differentiators is derived by the use of Taylor series. A modification in the formula is proposed to extend the effective passband of the differentiator with the same number of coefficients.

  • Simple Expression of Antenna Coupling by Using a Product of Radiation Patterns

    Hiroaki MIYASHITA  Isamu CHIBA  Shuji URASAKI  Shoichiro FUKAO  

     
    PAPER-Antennas and Propagation

      Vol:
    E82-B No:11
      Page(s):
    1867-1873

    Simple approximate formulas are obtained for the mutual impedance and admittance by using a product of radiation patterns of antennas. The formulas come from a stationary expression of the reaction integral between two antennas where far-field approximations are employed. The theory deals with antennas in free space as well as under the presence of a wedge. Two applications are given for microstrip antennas with experimental verifications.

  • Wave Propagation Phenomena of Phase States in Oscillators Coupled by Inductors as a Ladder

    Masayuki YAMAUCHI  Masahiro WADA  Yoshifumi NISHIO  Akio USHIDA  

     
    PAPER-Nonlinear Problems

      Vol:
    E82-A No:11
      Page(s):
    2592-2598

    In this study, wave propagation phenomena of phase states are observed at van der Pol oscillators coupled by inductors as a ladder. For the case of 17 oscillators, interesting wave propagation phenomena of phase states are found. By using the relationship between phase states and oscillation frequencies, the mechanisms of the propagation and the reflection of wave are explained. Circuit experimental results agree well with computer calculated results qualitatively.

  • Traffic Measurement System with Trap and Polling Methods and Its Performance

    Ken'ichi KAWANISHI  Yoshitaka TAKAHASHI  Toyofumi TAKENAKA  

     
    PAPER-Communication Networks and Services

      Vol:
    E82-B No:10
      Page(s):
    1557-1565

    We propose a traffic measurement system which uses trap and polling methods. To obtain its performance we consider a queueing model with a single server and evaluate a packet delay. In our multi-cast traffic, packets are modeled as a batch with a batch size distribution {gk}. The batch arrival process is observed as two processes on the basis of batch size. For a batch whose size is more than or equal to a threshold L, the batch will be trapped by our traffic measurement system (in queueing model, it will enter a queue immediately after its arrival). For a batch whose size is less than L, it will be observed at a polling cycle T (in queueing model, it will be temporarily stored in a buffer and all these small batches will be cyclically noticed with a cycle T). We analyze this queueing model by a diffusion approximation and compare the packet delay observed by our traffic measurement system with the L=1 original batch arrival model. Evaluating the results of the diffusion approximation, we illustrate that our traffic measurement system has functions not only to give an accurate estimation of the mean waiting time but also reduce the number of measurements by choosing appropriate parameters L and T.

  • Pattern Formation in Reaction-Diffusion Enzyme Transistor Circuits

    Masahiko HIRATSUKA  Takafumi AOKI  Tatsuo HIGUCHI  

     
    PAPER

      Vol:
    E82-A No:9
      Page(s):
    1809-1817

    This paper explores a possibility of constructing massively parallel molecular computing systems using molecular electronic devices called enzyme transistors. The enzyme transistor is, in a sense, an artificial catalyst which selects a specific substrate molecule and transforms it into a specific product. Using this primitive function, various active continuous media for signal transfer/processing can be realized. Prominent examples discussed in this paper are: (i) Turing pattern formation and (ii) excitable wave propagation in a two-dimensional enzyme transistor array. This paper demonstrates the potential of enzyme transistors for creating reaction-diffusion dynamics that performs useful computations in a massively parallel fashion.

  • Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher

    Takeshi SHIMOYAMA  Shiho MORIAI  Toshinobu KANEKO  Shigeo TSUJII  

     
    PAPER-Information Security

      Vol:
    E82-A No:9
      Page(s):
    1971-1980

    Since the proposal of differential cryptanalysis and linear cryptanalysis in 1991 and 1993, respectively, the resistance to these cryptanalysis has been studied. In FSE2, Knudsen proposed a method of attacking block ciphers that used the higher order differential, and in FSE4, Jakobsen and Knudsen applied it to a cipher proposed by Nyberg and Knudsen. Their approach, however, requires large complexity of running time. In this paper, we improve this attack and show that our improved algorithm requires much fewer chosen texts and much less complexity than those of previous works.

  • Parameters and System Order Estimation Using Differential Filters and Resultant

    Yasuo TACHIBANA  Yoshinori SUZUKI  

     
    PAPER-Digital Signal Processing

      Vol:
    E82-A No:9
      Page(s):
    1900-1910

    This paper deals with a method of estimating the parameters and the order of a linear system using differential digital filters and the resultant. From the observed signals of the input and output of an objective system, we extract the differential signals from the zero order to an appropriate high order with the same phase characteristics, using several digital filters. On the assumption that the system order is known, we estimate the parameters of the transfer function and evaluate the estimation error bounds. We propose a criterion function generated by the product of the highest order coefficients and the resultant of the numerator and denominator of the estimated transfer function. Applying this criterion function, we can estimate the order of the objective system. The threshold corresponding to this criterion function is evaluated from the deviation in the frequency characteristics of the used differential filters and the error bound of the estimated parameters. In order to demonstrate the propriety of the proposed method, some numerical simulations are presented.

741-760hit(926hit)