The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] functional(142hit)

21-40hit(142hit)

  • Formal Verification-Based Redundancy Identification of Transition Faults with Broadside Scan Tests

    Hiroshi IWATA  Nanami KATAYAMA  Ken'ichi YAMAGUCHI  

     
    PAPER-Formal techniques

      Pubricized:
    2017/03/07
      Vol:
    E100-D No:6
      Page(s):
    1182-1189

    In accordance with Moore's law, recent design issues include shortening of time-to-market and detection of delay faults. Several studies with respect to formal techniques have examined the first issue. Using the equivalence checking, it is possible to identify whether large circuits are equivalent or not in a practical time frame. With respect to the latter issue, it is difficult to achieve 100% fault efficiency even for transition faults in full scan designs. This study involved proposing a redundant transition fault identification method using equivalence checking. The main concept of the proposed algorithm involved combining the following two known techniques, 1. modeling of a transition fault as a stuck-at fault with temporal expansion and 2. detection of a stuck-at fault by using equivalence checking tools. The experimental results indicated that the proposed redundant identification method using a formal approach achieved 100% fault efficiency for all benchmark circuits in a practical time even if a commercial ATPG tool was unable to achieve 100% fault efficiency for several circuits.

  • An Optimization Strategy for CFDMiner: An Algorithm of Discovering Constant Conditional Functional Dependencies

    Jinling ZHOU  Xingchun DIAO  Jianjun CAO  Zhisong PAN  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/11/06
      Vol:
    E99-D No:2
      Page(s):
    537-540

    Compared to the traditional functional dependency (FD), the extended conditional functional dependency (CFD) has shown greater potential for detecting and repairing inconsistent data. CFDMiner is a widely used algorithm for mining constant-CFDs. But the search space of CFDMiner is too large, and there is still room for efficiency improvement. In this paper, an efficient pruning strategy is proposed to optimize the algorithm by reducing the search space. Both theoretical analysis and experiments have proved the optimized algorithm can produce the consistent results as the original CFDMiner.

  • Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption

    Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    92-117

    This paper proposes the first (practical) inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz, Sahai and Waters), while the existing (practical) IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and fully attribute-hiding under the decisional linear assumption in the standard model. The IPE scheme is comparably as efficient as the existing (practical) attribute-hiding IPE schemes. We also present a variant of the proposed IPE scheme with the same security that achieves shorter public and secret keys. A hierarchical IPE scheme can be constructed that is also adaptively secure and fully attribute-hiding under the same assumption. In this paper, we extend the dual system encryption technique by Waters into a more general manner, in which new forms of ciphertext and secret keys are employed and new types of information theoretical tricks are introduced along with several forms of computational reduction.

  • A Novel Double Oscillation Model for Prediction of fMRI BOLD Signals without Detrending

    Takashi MATSUBARA  Hiroyuki TORIKAI  Tetsuya SHIMOKAWA  Kenji LEIBNITZ  Ferdinand PEPER  

     
    PAPER-Nonlinear Problems

      Vol:
    E98-A No:9
      Page(s):
    1924-1936

    This paper presents a nonlinear model of human brain activity in response to visual stimuli according to Blood-Oxygen-Level-Dependent (BOLD) signals scanned by functional Magnetic Resonance Imaging (fMRI). A BOLD signal often contains a low frequency signal component (trend), which is usually removed by detrending because it is considered a part of noise. However, such detrending could destroy the dynamics of the BOLD signal and ignore an essential component in the response. This paper shows a model that, in the absence of detrending, can predict the BOLD signal with smaller errors than existing models. The presented model also has low Schwarz information criterion, which implies that it will be less likely to overfit the experimental data. Comparison between the various types of artificial trends suggests that the trends are not merely the result of noise in the BOLD signal.

  • A Performance Study to Ensure Emergency Communications during Large Scale Disasters Using Satellite/Terrestrial Integrated Mobile Communications Systems

    Kazunori OKADA  Takayuki SHIMAZU  Akira FUJIKI  Yoshiyuki FUJINO  Amane MIURA  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1627-1636

    The Satellite/Terrestrial Integrated mobile Communication System (STICS), which allows terrestrial mobile phones to communicate directly through a satellite, has been studied [1]. Satellites are unaffected by the seismic activity that causes terrestrial damage, and therefore, the STICS can be expected to be a measure that ensures emergency call connection. This paper first describes the basic characteristics of call blocking rates of terrestrial mobile phone systems in areas where non-functional base stations are geographically clustered, as investigated through computer simulations that showed an increased call blocking rate as the number of non-functional base stations increased. Further simulations showed that restricting the use of the satellite system for emergency calls only ensures the STICS's capacity to transmit emergency communications; however, these simulations also revealed a weakness in the low channel utilization rate of the satellite system [2]. Therefore, in this paper, we propose increasing the channel utilization rate with a priority channel framework that divides the satellite channels between priority channels for emergency calls and non-priority channels that can be available for emergency or general use. Simulations of this priority channel framework showed that it increased the satellite system's channel utilization rate, while continuing to ensure emergency call connection [3]. These simulations showed that the STICS with a priority channel framework can provide efficient channel utilization and still be expected to provide a valuable secondary measure to ensure emergency communications in areas with clustered non-functional base stations during large-scale disasters.

  • Dual Pairing Vector Spaces and Their Applications

    Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  

     
    INVITED PAPER

      Vol:
    E98-A No:1
      Page(s):
    3-15

    The concept of dual pairing vector spaces (DPVS) was introduced by Okamoto and Takashima in 2009, and it has been employed in various applications, functional encryption (FE) including attribute-based encryption (ABE) and inner-product encryption (IPE) as well as attribute-based signatures (ABS), generic conversion from composite-order group based schemes to prime-order group based ones and public-key watermarking. In this paper, we show the concept of DPVS, the major applications to FE and the key techniques employed in these applications. This paper presents them with placing more emphasis on plain and intuitive descriptions than formal preciseness.

  • A Method to Find Linear Decompositions for Incompletely Specified Index Generation Functions Using Difference Matrix

    Tsutomu SASAO  Yuta URANO  Yukihiro IGUCHI  

     
    PAPER-Logic Synthesis, Test and Verification

      Vol:
    E97-A No:12
      Page(s):
    2427-2433

    This paper shows a method to find a linear transformation that reduces the number of variables to represent a given incompletely specified index generation function. It first generates the difference matrix, and then finds a minimal set of variables using a covering table. Linear transformations are used to modify the covering table to produce a smaller solution. Reduction of the difference matrix is also considered.

  • An Implantable Sacral Nerve Root Recording and Stimulation System for Micturition Function Restoration

    Yuan WANG  Xu ZHANG  Ming LIU  Weihua PEI  Kaifeng WANG  Hongda CHEN  

     
    PAPER-Biological Engineering

      Vol:
    E97-D No:10
      Page(s):
    2790-2801

    This paper provides a prototype neural prosthesis system dedicated to restoring continence and micturition function for patients with lower urinary tract diseases, such as detrusor hyperreflexia and detrusor-sphincter dyssynergia. This system consists of an ultra low-noise electroneurogram (ENG) signal recording module, a bi-phasic electrical stimulator module and a control unit for closed-loop bladder monitoring and controlling. In order to record extremely weak ENG signal from extradural sacral nerve roots, the system provides a programmable gain from 80 dB to 117 dB. By combining of advantages of commercial-off-the-shelf (COTS) electronics and custom designed IC, the recording front-end acquires a fairly low input-referred noise (IRN) of 0.69 μVrms under 300 Hz to 3 kHz and high area-efficiency. An on-chip multi-steps single slope analog-to-digital converter (ADC) is used to digitize the ENG signals at sampling rate of 10 kSPS and achieves an effective number of bits (ENOB) of 12.5. A bi-phasic current stimulus generator with wide voltage supply range (±0.9 V to ±12.5 V) and variable output current amplitude (0-500 μA) is introduced to overcome patient-depended impedance between electrode and tissue electrolyte. The total power consumption of the entire system is 5.61 mW. Recording and stimulation function of this system is switched by control unit with time division multiplexing strategy. The functionality of this proposed prototype system has been successfully verified through in-vivo experiments from dogs extradural sacral nerve roots.

  • Functional Safety Assessment of Safety-Related Systems with Non-perfect Proof-Tests

    Hitoshi MUTA  Yoshinobu SATO  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E97-A No:8
      Page(s):
    1739-1746

    The second edition of the international standard of IEC 61508, functional safety of electrical/electronic/programmable electronic safety-related system (SRS), was published in 2010. This international standard adopts a risk-based approach by which safety integrity requirements can be determined. It presents a formula to estimate the hazardous event rate taking account of non-perfect proof-tests. But it is not clear how to derive the formula. In the present paper, firstly, taking account of non-perfect proof-tests, the relationship between the dangerous undetected failure of SRS, the demand on the SRS and hazardous event is modeled by a fault tree and state-transition diagrams. Next, the hazardous event rate is formulated by use of the state-transition diagrams for the determination of the safety integrity requirements. Then, a comparison is made between the formulas obtained by this paper and given in the standard, and it is found that the latter does not always present rational formulation.

  • Revocable Identity-Based Encryption with Rejoin Functionality

    Jae Hong SEO  Keita EMURA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:8
      Page(s):
    1806-1809

    In the Identity-Based Encryption (IBE) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of RIBE with the rejoin functionality, and also show that the Seo-Emura RIBE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.

  • Development of an Immunity Test System for Safety of Personal Care Robots

    Masayuki MURAKAMI  Hiroyasu IKEDA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E97-B No:5
      Page(s):
    1030-1043

    Although many companies have developed robots that assist humans in the activities of daily living, safety requirements and test methods for such robots have not been established. Given the risk associated with a robot malfunctioning in the human living space, from the viewpoints of safety and EMC, it is necessary that the robot does not create a hazardous situation even when exposed to possibly severe electromagnetic disturbances in the operating environment. Thus, in immunity tests for personal care robots, the safety functions should be more rigorously tested than the other functions, and be repeatedly activated in order to ascertain that the safety functions are not lost in the presence of electromagnetic disturbances. In this paper, immunity test procedures for personal care robots are proposed that take into account functional safety requirements. A variety of test apparatuses are presented, which were built for activating the safety functions of robots, and detecting whether they were in a safe state. The practicality of the developed immunity test system is demonstrated using actual robots.

  • On the Topological Changes of Brain Functional Networks under Priming and Ambiguity

    Kenji LEIBNITZ  Tetsuya SHIMOKAWA  Aya IHARA  Norio FUJIMAKI  Ferdinand PEPER  

     
    PAPER

      Vol:
    E96-B No:11
      Page(s):
    2741-2748

    The relationship between different brain areas is characterized by functional networks through correlations of time series obtained from neuroimaging experiments. Due to its high spatial resolution, functional MRI data is commonly used for generating functional networks of the entire brain. These networks are comprised of the measurement points/channels as nodes and links are established if there is a correlation in the measured time series of these nodes. However, since the evaluation of correlation becomes more accurate with the length of the underlying time series, we construct in this paper functional networks from MEG data, which has a much higher time resolution than fMRI. We study in particular how the network topologies change in an experiment on ambiguity of words, where the subject first receives a priming word before being presented with an ambiguous or unambiguous target word.

  • Potential of Fault-Detection Coverage by means of On-Chip Redundancy - IEC61508: Are There Royal Roads to SIL 4?

    Nobuyasu KANEKAWA  

     
    PAPER

      Vol:
    E96-D No:9
      Page(s):
    1907-1913

    This paper investigates potential to improve fault-detection coverage by means of on-chip redundancy. The international standard on functional safety, namely, IEC61508 Ed. 2.0 Part 2 Annex E.3 prescribes the upper bound of βIC (common cause failure (CCF) ratio to all failures) is 0.25 to satisfy frequency upper bound of dangerous failure in the safety function for SIL (Safety Integrated Level) 3. On the other hand, this paper argues that the βIC does not necessarily have to be less than 0.25 for SIL 3, and that the upper bound of βIC can be determined depending on failure rate λ and CCF detection coverage. In other words, the frequency upper bound of dangerous failure for SIL3 can also be satisfied with βIC higher than 0.25 if the failure rate λ is lower than 400[fit]. Moreover, the paper shows that on-chip redundancy has potential to satisfy SIL 4 requirement; the frequency upper bound of dangerous failure for SIL4 can be satisfied with feasible ranges of βIC, λ and CCF coverage which can be realized by redundant code.

  • An Explanation of Signal Changes in DW-fMRI: Monte Carlo Simulation Study of Restricted Diffusion of Water Molecules Using 3D and Two-Compartment Cortical Cell Models

    Shizue NAGAHARA  Takenori OIDA  Tetsuo KOBAYASHI  

     
    PAPER-Biological Engineering

      Vol:
    E96-D No:6
      Page(s):
    1387-1393

    Diffusion-weighted (DW)-functional magnetic resonance imaging (fMRI) is a recently reported technique for measuring neural activities by using diffusion-weighted imaging (DWI). DW-fMRI is based on the property that cortical cells swell when the brain is activated. This approach can be used to observe changes in water diffusion around cortical cells. The spatial and temporal resolutions of DW-fMRI are superior to those of blood-oxygenation-level-dependent (BOLD)-fMRI. To investigate how the DWI signal intensities change in DW-fMRI measurement, we carried out Monte Carlo simulations to evaluate the intensities before and after cell swelling. In the simulations, we modeled cortical cells as two compartments by considering differences between the intracellular and the extracellular regions. Simulation results suggested that DWI signal intensities increase after cell swelling because of an increase in the intracellular volume ratio. The simulation model with two compartments, which respectively represent the intracellular and the extracellular regions, shows that the differences in the DWI signal intensities depend on the ratio of the intracellular and the extracellular volumes. We also investigated the MPG parameters, b-value, and separation time dependences on the percent signal changes in DW-fMRI and obtained useful results for DW-fMRI measurements.

  • Valid Digit and Overflow Information to Reduce Energy Dissipation of Functional Units in General Purpose Processors

    Kazuhito ITO  Takuya NUMATA  

     
    PAPER

      Vol:
    E96-C No:4
      Page(s):
    463-472

    In order to reduce the dynamic energy dissipation in CMOS LSIs, it is effective to reduce the frequency of value changes of the signals. In this paper, a data expression with the valid digit and lower digit overflow information is proposed to suppress unnecessary signal changes in integer functional units and registers of general purpose processors. Experimental results show that the proposed method reduces the energy dissipation by 9.8% for benchmark programs.

  • Static Dependency Pair Method in Rewriting Systems for Functional Programs with Product, Algebraic Data, and ML-Polymorphic Types

    Keiichirou KUSAKARI  

     
    PAPER

      Vol:
    E96-D No:3
      Page(s):
    472-480

    For simply-typed term rewriting systems (STRSs) and higher-order rewrite systems (HRSs) a la Nipkow, we proposed a method for proving termination, namely the static dependency pair method. The method combines the dependency pair method introduced for first-order rewrite systems with the notion of strong computability introduced for typed λ-calculi. This method analyzes a static recursive structure based on definition dependency. By solving suitable constraints generated by the analysis, we can prove termination. In this paper, we extend the method to rewriting systems for functional programs (RFPs) with product, algebraic data, and ML-polymorphic types. Although the type system in STRSs contains only product and simple types and the type system in HRSs contains only simple types, our RFPs allow product types, type constructors (algebraic data types), and type variables (ML-polymorphic types). Hence, our RFPs are more representative of existing functional programs than STRSs and HRSs. Therefore, our result makes a large contribution to applying theoretical rewriting techniques to actual problems, that is, to proving the termination of existing functional programs.

  • Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption

    Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  

     
    PAPER-Public Key Based Protocols

      Vol:
    E96-A No:1
      Page(s):
    42-52

    This paper proposes an inner-product encryption (IPE) scheme, which achieves selectively fully-attribute-hiding security in the standard model almost tightly reduced from the decisional linear (DLIN) assumption, and whose ciphertext is almost the shortest among the existing (weakly/fully) attribute-hiding IPE schemes, i.e., it consists of n+4 elements of G and 1 element of GT for a prime-order symmetric bilinear group (G, GT), where n is the dimension of attribute/predicate vectors. We also present a variant of the proposed IPE scheme that enjoys shorter public and secret keys with preserving the security. A hierarchical IPE (HIPE) scheme can be realized that has short ciphertexts and selectively fully-attribute-hiding security almost tightly reduced from the DLIN assumption.

  • TE Plane Wave Reflection and Transmission from a One-Dimensional Random Slab – Slanted Fluctuation –

    Yasuhiko TAMURA  Junichi NAKAYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E96-C No:1
      Page(s):
    60-63

    This paper deals with reflection and transmission of a TE plane wave from a one-dimensional random slab with slanted fluctuation by means of the stochastic functional approach. By starting with a generalized representation of the random wavefield from a two-dimensional random slab, and by using a manner for slanted anisotropic fluctuation, the corresponding random wavefield representation and its statistical quantities for one-dimensional cases are newly derived. The first-order incoherent scattering cross section is numerically calculated and illustrated in figures.

  • CompSize: A Model-Based and Automated Approach to Size Estimation of Embedded Software Components

    Kenneth LIND  Rogardt HELDAL  

     
    PAPER

      Vol:
    E95-D No:9
      Page(s):
    2183-2192

    Accurate estimation of Software Code Size is important for developing cost-efficient embedded systems. The Code Size affects the amount of system resources needed, like ROM and RAM memory, and processing capacity. In our previous work, we have estimated the Code Size based on CFP (COSMIC Function Points) within 15% accuracy, with the purpose of deciding how much ROM memory to fit into products with high cost pressure. Our manual CFP measurement process would require 2.5 man years to estimate the ROM size required in a typical car. In this paper, we want to investigate how the manual effort involved in estimation of Code Size can be minimized. We define a UML Profile capturing all information needed for estimation of Code Size, and develop a tool for automated estimation of Code Size based on CFP. A case study will show how UML models save manual effort in a realistic case.

  • Topological Comparison of Brain Functional Networks and Internet Service Providers

    Kenji LEIBNITZ  Tetsuya SHIMOKAWA  Hiroaki UMEHARA  Tsutomu MURATA  

     
    PAPER

      Vol:
    E95-B No:5
      Page(s):
    1539-1546

    Network structures can be found in almost any kind of natural or artificial systems as transport medium for communication between the respective nodes. In this paper we study certain key topological features of brain functional networks obtained from functional magnetic resonance imaging (fMRI) measurements. We compare complex network measures of the extracted topologies with those from Internet service providers (ISPs). Our goal is to identify important features which will be helpful in designing more robust and adaptive future information network architectures.

21-40hit(142hit)