The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] functional(142hit)

41-60hit(142hit)

  • Decidability of the Security against Inference Attacks Using a Functional Dependency on XML Databases

    Kenji HASHIMOTO  Hiroto KAWAI  Yasunori ISHIHARA  Toru FUJIWARA  

     
    PAPER-Database Security

      Vol:
    E95-D No:5
      Page(s):
    1365-1374

    This paper discusses verification of the security against inference attacks on XML databases in the presence of a functional dependency. So far, we have provided the verification method for k-secrecy, which is a metric for the security against inference attacks on databases. Intuitively, k-secrecy means that the number of candidates of sensitive data (i.e., the result of unauthorized query) of a given database instance cannot be narrowed down to k-1 by using available information such as authorized queries and their results. In this paper, we consider a functional dependency on database instances as one of the available information. Functional dependencies help attackers to reduce the number of the candidates for the sensitive information. The verification method we have provided cannot be naively extended to the k-secrecy problem with a functional dependency. The method requires that the candidate set can be captured by a tree automaton, but the candidate set when a functional dependency is considered cannot be always captured by any tree automaton. We show that the ∞-secrecy problem in the presence of a functional dependency is decidable when a given unauthorized query is represented by a deterministic topdown tree transducer, without explicitly computing the candidate set.

  • Functional Duality between Distributed Source Coding and Broadcast Channel Coding in the Case of Correlated Messages

    Suhan CHOI  Hichan MOON  Eunchul YOON  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:1
      Page(s):
    275-278

    In this letter, functional duality between distributed source coding (DSC) with correlated messages and broadcast channel coding (BCC) with correlated messages is considered. It is shown that under certain conditions, for a given DSC problem with correlated messages, a functional dual BCC problem with correlated messages can be obtained, and vice versa. That is, the optimal encoder-decoder mappings for one problem become the optimal decoder-encoder mappings for the dual problem. Furthermore, the correlation structure of the messages in the two dual problems and the source distortion and channel cost measure for this duality are specified.

  • TE Plane Wave Reflection and Transmission from a Two-Dimensional Random Slab – Slanted Fluctuation –

    Yasuhiko TAMURA  

     
    PAPER-Random Media and Rough Surfaces

      Vol:
    E95-C No:1
      Page(s):
    36-43

    This paper deals with reflection and transmission of a TE plane wave from a two-dimensional random slab with slanted fluctuation by means of the stochastic functional approach. Such slanted fluctuation of the random slab is written by a homogeneous random field having a power spectrum with a rotation angle. By starting with the previous paper [IEICE Trans. Electron., Vol. E92-C, no.1, pp.77–84, January 2009], any statistical quantities are immediately obtained even for slanted fluctuation cases. The first-order incoherent scattering cross section is numerically calculated and illustrated in figures. It is then newly found that shift and separation phenomena of the leading or enhanced peaks at four characteristic scattering angles take place in the transmission and reflection sides, respectively.

  • A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude

    Gregory BLANC  Youki KADOBAYASHI  

     
    PAPER

      Vol:
    E94-D No:11
      Page(s):
    2159-2166

    Modern web applications incorporate many programmatic frameworks and APIs that are often pushed to the client-side with most of the application logic while contents are the result of mashing up several resources from different origins. Such applications are threatened by attackers that often attempts to inject directly, or by leveraging a stepstone website, script codes that perform malicious operations. Web scripting based malware proliferation is being more and more industrialized with the drawbacks and advantages that characterize such approach: on one hand, we are witnessing a lot of samples that exhibit the same characteristics which make these easy to detect, while on the other hand, professional developers are continuously developing new attack techniques. While obfuscation is still a debated issue within the community, it becomes clear that, with new schemes being designed, this issue cannot be ignored anymore. Because many proposed countermeasures confess that they perform better on unobfuscated contents, we propose a 2-stage technique that first relieve the burden of obfuscation by emulating the deobfuscation stage before performing a static abstraction of the analyzed sample's functionalities in order to reveal its intent. We support our proposal with evidence from applying our technique to real-life examples and provide discussion on performance in terms of time, as well as possible other applications of proposed techniques in the areas of web crawling and script classification. Additionally, we claim that such approach can be generalized to other scripting languages similar to JavaScript.

  • Typing ZINC Machine with Generalized Algebraic Data Types

    Kwanghoon CHOI  Seog PARK  

     
    PAPER-Software System

      Vol:
    E94-D No:6
      Page(s):
    1190-1200

    The Krivine-style evaluation mechanism is well-known in the implementation of higher-order functions, allowing to avoid some useless closure building. There have been a few type systems that can verify the safety of the mechanism. The incorporation of the proposed ideas into an existing compiler, however, would require significant changes in the type system of the compiler due to the use of some dedicated form of types and typing rules in the proposals. This limitation motivates us to propose an alternative light-weight Krivine typing mechanism that does not need to extend any existing type system significantly. This paper shows how GADTs (Generalized algebraic data types) can be used for typing a ZINC machine following the Krivine-style evaluation mechanism. This idea is new as far as we know. Some existing typed compilers like GHC (Glasgow Haskell compiler) already support GADTs; they can benefit from the Krivine-style evaluation mechanism in the operational semantics with no particular extension in their type systems for the safety. We show the GHC type checker allows to prove mechanically that ZINC instructions are well-typed, which highlights the effectiveness of GADTs.

  • Interaction of Bis-diethylaminosilane with a Hydroxylized Si (001) Surface for SiO2 Thin-Film Growth Using Density Functional Theory

    Seung-Bin BAEK  Dae-Hee KIM  Yeong-Cheol KIM  

     
    PAPER

      Vol:
    E94-C No:5
      Page(s):
    771-774

    We studied the interaction of Bis-diethylaminosilane (SiH2[N(C2H5)2]2, BDEAS) with a hydroxylized Si (001) surface for SiO2 thin-film growth using density functional theory (DFT). BDEAS was adsorbed on the Si surface and reacted with the H atom of hydroxyl (-OH) to produce the di-ethylaminosilane (-SiH2[N(C2H5)2], DEAS) group and di-ethylamine (NH(C2H5)2, DEA). Then, DEAS was able to react with another H atom of -OH to produce DEA and to form the O-(SiH2)-O bond at the inter-dimer, inter-row, or intra-dimer site. Among the three different sites, the intra-dimer site was the most probable when it came to forming the O-(SiH2)-O bond.

  • A Further Improved Technique on the Stochastic Functional Approach for Randomly Rough Surface Scattering -- Analytical-Numerical Wiener Analysis --

    Yasuhiko TAMURA  

     
    PAPER-Random Media and Rough Surfaces

      Vol:
    E94-C No:1
      Page(s):
    39-46

    This paper proposes a further improved technique on the stochastic functional approach for randomly rough surface scattering. The original improved technique has been established in the previous paper [Waves in Random and Complex Media, vol.19, no.2, pp.181-215, 2009] as a novel numerical-analytical method for a Wiener analysis. By deriving modified hierarchy equations based on the diagonal approximation solution of random wavefields for a TM plane wave incidence or even for a TE plane wave incidence under large roughness, large slope or low grazing incidence, such a further improved technique can provide a large reduction of required computational resources, in comparison with the original improved technique. This paper shows that numerical solutions satisfy the optical theorem with very good accuracy, by using small computational resources.

  • F-Scan: A DFT Method for Functional Scan at RTL

    Marie Engelene J. OBIEN  Satoshi OHTAKE  Hideo FUJIWARA  

     
    PAPER-Information Network

      Vol:
    E94-D No:1
      Page(s):
    104-113

    Due to the difficulty of test pattern generation for sequential circuits, several design-for-testability (DFT) approaches have been proposed. An improvement to these current approaches is needed to cater to the requirements of today's more complicated chips. This paper introduces a new DFT method applicable to high-level description of circuits, which optimally utilizes existing functional elements and paths for test. This technique, called F-scan, effectively reduces the hardware overhead due to test without compromising fault coverage. Test application time is also kept at the minimum. The comparison of F-scan with the performance of gate-level full scan design is shown through the experimental results.

  • A Method of Path Mapping from RTL to Gate Level and Its Application to False Path Identification

    Hiroshi IWATA  Satoshi OHTAKE  Hideo FUJIWARA  

     
    PAPER-Information Network

      Vol:
    E93-D No:7
      Page(s):
    1857-1865

    Information on false paths in a circuit is useful for design and testing. The use of this information may contribute not only to reducing circuit area, the time required for logic synthesis, test generation and test application of the circuit, but also to alleviating over-testing. Since identification of the false paths at gate level is hard, several methods using high-level design information have been proposed. These methods are effective only if the correspondence between paths at register transfer level (RTL) and at gate level can be established. Until now, giving restriction on logic synthesis is the only way to establish the correspondence. However, it is not practical for industrial designs. In this paper, we propose a method for mapping RTL false paths to their corresponding gate level paths without such a specific logic synthesis; it guarantees that the corresponding gate level paths are false. Experimental results show that our path mapping method can establish the correspondences of RTL false paths and many gate level false paths.

  • Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM

    Haruhiko KAIYA  Masaaki TANIGAWA  Shunichi SUZUKI  Tomonori SATO  Akira OSADA  Kenji KAIJIRI  

     
    PAPER-Requirements Engineering

      Vol:
    E93-D No:4
      Page(s):
    702-712

    Quality requirements are scattered over a requirements specification, thus it is hard to measure and trace such quality requirements to validate the specification against stakeholders' needs. We proposed a technique called "spectrum analysis for quality requirements" which enabled analysts to sort a requirements specification to measure and track quality requirements in the specification. In the same way as a spectrum in optics, a quality spectrum of a specification shows a quantitative feature of the specification with respect to quality. Therefore, we can compare a specification of a system to another one with respect to quality. As a result, we can validate such a specification because we can check whether the specification has common quality features and know its specific features against specifications of existing similar systems. However, our first spectrum analysis for quality requirements required a lot of effort and knowledge of a problem domain and it was hard to reuse such knowledge to reduce the effort. We thus introduce domain knowledge called term-characteristic map (TCM) to reuse the knowledge for our quality spectrum analysis. Through several experiments, we evaluate our spectrum analysis, and main finding are as follows. First, we confirmed specifications of similar systems have similar quality spectra. Second, results of spectrum analysis using TCM are objective, i.e., different analysts can generate almost the same spectra when they analyze the same specification.

  • Functionalized Carbon Nanotubes for Mixed Matrix Membrane

    Suhaila MOHD. SANIP  Ahmad Fauzi ISMAIL  Madzlan AZIZ  Tetsuo SOGA  

     
    PAPER-Nanomaterials and Nanostructures

      Vol:
    E92-C No:12
      Page(s):
    1427-1431

    Carbon nanotubes (CNTs) have generated great interest within the many areas of nanotechnology due to their superior and outstanding physical properties. However effective dispersion in many solvents has imposed limitations upon the use of CNTs in a number of novel applications. Functionalization presents a solution for CNTs to be more soluble which make them integrate well into any organic, inorganic or biological systems. CNTs can be easily functionalized using cyclodextrin (CD) treatment. The CD modification of carbon nanotubes is both simple and effective. It requires no prolonged heating, filtration and washing which can severely damage the small diameter nanotubes. The formation of surface functional groups and changes of nanotubes structures of functionalized carbon nanotubes (f-CNTs) were monitored by Fourier transform infrared spectroscopy (FTIR), Thermo gravimetric analysis (TGA) and field emission scanning electron microscopy (FESEM), respectively. From the TGA results, the amount of weight loss of the f-CNTs in varying ratios indicated the amount of CD that was functionalized. It was also noted that the FTIR spectra showed the presence of functional groups associated with CD in the f-CNTs. As a result, the cyclodextrin groups were found to be possibly adsorbed at the surface of the nanotubes walls. The f-CNTs showed substantial solubility in N-methyl-2-pyrrolidone (NMP) which helps in a better distribution of the CNTs in the mixed matrix membrane (MMM) prepared. Hence, the influence of the f-CNTs in the polymer matrix will give rise to enhanced physical properties of the MMM suitable for applications in gas separations.

  • Reflection and Transmission of a TE Plane Wave from a Two-Dimensional Random Slab --- Anisotropic Fluctuation ---

    Yasuhiko TAMURA  Kiyoshi TSUTSUMI  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E92-C No:12
      Page(s):
    1531-1534

    This paper studies reflection and transmission of a TE plane wave from a two-dimensional random slab with statistically anisotropic fluctuation by means of the stochastic functional approach. By starting with a representation of the random wavefield presented in the previous paper [IEICE Trans. Electron., vol.E92-C, no.1, pp.77-84, Jan. 2009], a solution algorithm of the multiple renormalized mass operator is newly shown even for anisotropic fluctuation. The multiple renormalized mass operator, the first-order incoherent scattering cross section and the optical theorem are numerically calculated and illustrated in figures. The relation between statistical properties and anisotropic fluctuation is discussed.

  • Analysis of Path Delay Fault Testability for Two-Rail Logic Circuits

    Kazuteru NAMBA  Hideo ITO  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E92-A No:9
      Page(s):
    2295-2303

    The importance of redundant technologies for improving dependability and delay fault testability are growing. This paper presents properties of a class of redundant technologies, namely two-rail logic, and analyzes testability of path delay faults occurring on two-rail logic circuits. The paper reveals the following characteristics of two-rail logic circuits: While the number of paths in two-rail logic circuits is twice that in ordinary single-rail logic circuits, the number of robust testable path delay faults in two-rail logic circuits is twice or more that in the single-rail logic circuits. This suggests two-rail logic circuits are more testable than ordinary single-rail logic circuits. On two-rail logic circuits, there may be some robust testable path delay faults that are functional un-sensitizable for any input vectors consisting of codewords of two-rail codes, i.e. for any input vectors that can occur during fault-free operation. Even if such faults occur, the circuits are still strongly fault secure for unidirectional stuck-at faults as well as they work correctly.

  • Preliminary Tests of a Practical Fuzzy FES Controller Based on Cycle-to-Cycle Control in the Knee Flexion and Extension Control

    Takashi WATANABE  Tomoya MASUKO  Achmad ARIFIN  

     
    LETTER-Biological Engineering

      Vol:
    E92-D No:7
      Page(s):
    1507-1510

    The fuzzy controller based on cycle-to-cycle control with output value adjustment factors (OAF) was developed for restoring gait of paralyzed subjects by using functional electrical stimulation (FES). Results of maximum knee flexion and extension controls with neurologically intact subjects suggested that the OAFs would be effective in reaching the target within small number of cycles and in reducing the error after reaching the target. Oscillating responses between cycles were also suppressed. The fuzzy controller was expected to be examined to optimize the OAFs with more subjects including paralyzed patients for clinical application.

  • Dual Imager Core Chip with 24.8 Rangemaps/s 3-D and 58 fps 2-D Simultaneous Capture Capability

    Shingo MANDAI  Toru NAKURA  Makoto IKEDA  Kunihiro ASADA  

     
    PAPER

      Vol:
    E92-C No:6
      Page(s):
    798-805

    This paper presents a multi functional range finder employing dual imager core on a single chip. Each imager core has functionalities of 2-D imaging and 3-D capture using the light section method with combinations of the dual imager core. The presented chip achieves, 2-D imaging mode, 3-D capture mode with the conventional light-section method, high-speed 3-D capture mode with the stereo matching mode, and 2-D and 3-D simultaneous capture mode. We demonstrate 58 fps 2-D imaging with 8 bit gray scale, and 24.8 rangemaps/s 3-D range-finder with the maximum range error of 1.619 mm and the standard deviation of 0.385 mm at 700 mm.

  • An Effective Method on Applying Feedback Error Learning Scheme to Functional Electrical Stimulation Controller

    Takashi WATANABE  Kenji KUROSAWA  Makoto YOSHIZAWA  

     
    LETTER-Rehabilitation Engineering and Assistive Technology

      Vol:
    E92-D No:2
      Page(s):
    342-345

    A Feedback Error Learning (FEL) scheme was found to be applicable to joint angle control by Functional Electrical Stimulation (FES) in our previous study. However, the FEL-FES controller had a problem in learning of the inverse dynamics model (IDM) in some cases. In this paper, methods of applying the FEL to FES control were examined in controlling 1-DOF movement of the wrist joint stimulating 2 muscles through computer simulation under several control conditions with several subject models. The problems in applying FEL to FES controller were suggested to be in restricting stimulation intensity to positive values between the minimum and the maximum intensities and in the case of very small output values of the IDM. Learning of the IDM was greatly improved by considering the IDM output range with setting the minimum ANN output value in calculating ANN connection weight change.

  • TE Plane Wave Reflection and Transmission from a Two-Dimensional Random Slab

    Yasuhiko TAMURA  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    77-84

    This paper reexamines reflection and transmission of a TE plane wave from a two-dimensional random slab discussed in the previous paper [IEICE Trans. Electron., Vol.E79-C, no.10, pp.1327-1333, October 1996] by means of the stochastic functional approach with the multiply renormalizing approximation. A random wavefield representation is explicitly shown in terms of a Wiener-Hermite expansion. The first-order incoherent scattering cross section and the optical theorem are numerically calculated. Enhanced scattering as gentle peaks or dips on the angular distribution of the incoherent scattering is reconfirmed in the directions of reflection and backscattering, and is newly found in the directions of forward scattering and 'symmetrical forward scattering.' The mechanism of enhanced scattering is deeply discussed.

  • 3-D Finite Element Analysis of Dynamic Characteristics of Twin-Type Relay Interfered by Uniform Constant Magnetic Field

    Guofu ZHAI  Wenying YANG  Xue ZHOU  

     
    PAPER-Contact Phenomena

      Vol:
    E91-C No:8
      Page(s):
    1215-1221

    Research on the electromagnetic compatibility of functional module composed of two independent electromagnetic relays in a hermetically sealed shell is the technical foundation for integration and miniaturization of electronic equipment in the future. In this paper, 3D finite element method (FEM) was used to analyze the dynamic characteristics of twin-type relay interfered by uniform constant magnetic field and identify the sensitive direction in which the relay was easily interfered. The models of twin-type relay in three working states were founded. Through simulation and analysis, it was found out how the operation time and electromagnetic torque of twin-type relay changed with the outer interfered magnetic field. When the relay was on the point of operation failure, the critical value of magnetic field was calculated through simulation. The simulation results of the dynamic characteristics of twin-type relay agree well with the experimental data. The conclusion in this paper is of great value for research on the electromagnetic compatibility of relay functional module.

  • Antennas for Ubiquitous Sensor Network Open Access

    Kihun CHANG  Young Joong YOON  

     
    INVITED PAPER

      Vol:
    E91-B No:6
      Page(s):
    1697-1704

    Recent advancements in the ubiquitous sensor network field have brought considerable feasibility to the realization of a ubiquitous society. A ubiquitous sensor network will enable the cooperative gathering of environmental information or the detection of special events through a large number of spatially distributed sensor nodes. Thus far, radio frequency identification (RFID) as an application for realizing the ubiquitous environment has mainly been developed for public and industrial systems. To this end, the most existing applications have demanded low-end antennas. In recent years, interests of ubiquitous sensor network have been broadened to medical body area networks (BAN), wireless personal area networks (WPAN), along with ubiquitous smart worlds. This increasing attention toward in ubiquitous sensor network has great implications for antennas. The design of functional antennas has received much attention because they can provide various kinds of properties and operation modes. These high-end antennas have some functions besides radiation. Furthermore, smart sensor nodes equipped with cooperated high-end antennas would allow them to respond adaptively to environmental events. Therefore, some design approaches of functional antennas with sensing and reconfigurability as high-end solution for smart sensor node, as well as low-end antennas for mobile RFID (mRFID) and SAW transponder are presented in this paper.

  • Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems

    Haruhiko KAIYA  Akira OSADA  Kenji KAIJIRI  

     
    PAPER-Software Engineering

      Vol:
    E91-D No:4
      Page(s):
    897-906

    We present a method to identify stakeholders and their preferences about non-functional requirements (NFR) by using use case diagrams of existing systems. We focus on the changes about NFR because such changes help stakeholders to identify their preferences. Comparing different use case diagrams of the same domain helps us to find changes to be occurred. We utilize Goal-Question-Metrics (GQM) method for identifying variables that characterize NFR, and we can systematically represent changes about NFR using the variables. Use cases that represent system interactions help us to bridge the gap between goals and metrics (variables), and we can easily construct measurable NFR. For validating and evaluating our method, we applied our method to an application domain of Mail User Agent (MUA) system.

41-60hit(142hit)