The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] idea(86hit)

21-40hit(86hit)

  • Probabilistic Secret Sharing Schemes for Multipartite Access Structures

    Xianfang WANG  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E99-A No:4
      Page(s):
    856-862

    In this paper, we construct ideal and probabilistic secret sharing schemes for some multipartite access structures, including the General Hierarchical Access Structure and Compartmented Access Structures. We devise an ideal scheme which implements the general hierarchical access structure. For the compartmented access structures, we consider three special access structures. We propose ideal and probabilistic schemes for these three compartmented access structures by bivariate interpolation.

  • A New Scheme of Blockcipher Hash

    Rashed MAZUMDER  Atsuko MIYAJI  

     
    PAPER-Cryptography and cryptographic protocols

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    796-804

    A cryptographic hash is an important tool in the area of a modern cryptography. It comprises a compression function, where the compression function can be built by a scratch or blockcipher. There are some familiar schemes of blockcipher compression function such as Weimar, Hirose, Tandem, Abreast, Nandi, ISA-09. Interestingly, the security proof of all the mentioned schemes are based on the ideal cipher model (ICM), which depends on ideal environment. Therefore, it is desired to use such a proof technique model, which is close to the real world such as weak cipher model (WCM). Hence, we proposed an (n, 2n) blockcipher compression function, which is secure under the ideal cipher model, weak cipher model and extended weak cipher model (ext.WCM). Additionally, the majority of the existing schemes need multiple key schedules, where the proposed scheme and the Hirose-DM follow single key scheduling property. The efficiency-rate of our scheme is r=1/2. Moreover, the number of blockcipher call of this scheme is 2 and it runs in parallel.

  • k Nearest Neighbor Classification Coprocessor with Weighted Clock-Mapping-Based Searching

    Fengwei AN  Lei CHEN  Toshinobu AKAZAWA  Shogo YAMASAKI  Hans Jürgen MATTAUSCH  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:3
      Page(s):
    397-403

    Nearest-neighbor-search classifiers are attractive but they have high intrinsic computational demands which limit their practical application. In this paper, we propose a coprocessor for k (k with k≥1) nearest neighbor (kNN) classification in which squared Euclidean distances (SEDs) are mapped into the clock domain for realizing high search speed and energy efficiency. The minimal SED searching is carried out by weighted frequency dividers that drastically reduce the normally exponential increase of the worst-case search-clock number with the bit width of vector components to only a linear increase. This also results in low power dissipation and high area-efficiency in comparison to the traditional method using large numbers of adders and comparators. The kNN classifier determines the class of an unknown input sample with a majority decision among the k nearest reference samples. The required majority-decision circuit is integrated with the clock-mapping-based minimal-SED searching architecture and proceeds with the classification immediately after identification of each of the k nearest references. A test chip in 180 nm CMOS technology, which can process 8 dimensions of 32 reference vectors in parallel, achieves low power dissipation of 40.32 mW (at 51.21 MHz clock frequency and 1.8 V supply voltage). Significantly, the distance search circuit consumes only 5.99 mW. Feature vectors with different dimensionality up to 2048 dimensions can be handled by the designed coprocessor due to a dimension extension circuit, enabling large flexibility for usage in different application.

  • An ITI-Mitigating 5/6 Modulation Code for Bit-Patterned Media Recording

    Chanon WARISARN  Autthasith ARRAYANGKOOL  Piya KOVINTAVEWAT  

     
    PAPER-Storage Technology

      Vol:
    E98-C No:6
      Page(s):
    528-533

    In bit-patterned media recording (BPMR), the readback signal is severely corrupted by the inter-symbol interference (ISI) and inter-track interference (ITI), especially at high recording densities, due to small bit and track pitches. One way to alleviate the ITI effect is to encode an input data sequence before recording, so as to avoid some data patterns that easily cause an error at the data detection process. This paper proposes an ITI-mitigating 5/6 modulation code for a multi-track multi-head BPMR system to eliminate the data patterns that lead to severe ITI. Specifically, each of the 5 user bits is converted into a 6-bit codeword in the form of a 3-by-2 data array, based on a look-up table. Experimental results indicate that the system with the proposed coding scheme outperforms that without coding, especially when an areal density is high and/or the position jitter is large.

  • Quasi-Linear Trellis-Coded QAM Using a Matched Mapping

    Tatsumi KONISHI  

     
    LETTER-Coding Theory

      Vol:
    E98-A No:4
      Page(s):
    1049-1053

    We propose a quasi-linear trellis-coded modulation (TCM) using nonbinary convolutional codes for quadrature amplitude modulation (QAM). First, we study a matched mapping which is able to reduce the computational complexity of the Euclidean distances between signal points of MQAM. As an example, we search for rate R=1/2 convolutional codes for coded 64QAM by this method. The symbol error rates of the proposed codes are estimated by the distance properties theoretically and they are verified by simulation. In addition, we compare the minimum free Euclidean distances of these new codes with their upper bounds. Finally, the bit error probabilitiy of the proposed coded modulation is compared with uncoded signal constellations and a conventional TCM code proposed by Ungerboeck. The result shows the proposed scheme outperform them on the AWGN channels.

  • Performance Analysis of LMMSE Filtering in Radar

    Liang LI  Lingjiang KONG  Xiaobo YANG  

     
    PAPER-Sensing

      Vol:
    E97-B No:6
      Page(s):
    1215-1222

    We consider the method of evaluating the detection performance of a single pulse monostatic radar for a fluctuating target in compound-Gaussian clutter plus noise background. The system uses a coded pulse compression waveform as its transmitting signal and the linear minimum mean square error (LMMSE) based reiterated filtering, also known as the adaptive pulse compression (APC). We study the theoretical statistical characteristics of the amplitude of the APC estimation for infinite iterations in this scenario. Based on this theory, we derive both the theoretical probability of false alarm and the probability of detection for the ‘ideal constant false alarm rate (CFAR)’ detector that uses amplitude of the APC estimation as the test statistics. Finaly, we verify the validity of the theoretical detection performance calculations with Monte Carlo simulations. The simulations include three different compound-Gaussian clutter models and all theoretical results well fit the simulated ones.

  • Ideas, Inspirations and Hints Those I Met in the Research of Electromagnetic Theory Open Access

    Kazuo TANAKA  

     
    INVITED PAPER

      Vol:
    E97-C No:1
      Page(s):
    3-10

    “How to get the original ideas” is the fundamental and critical issue for the researchers in science and technology. In this paper, the author writes his experiences concerning how he could encounter the interesting and original ideas of three research subjects, i.e., the accelerating medium effect, the guided-mode extracted integral equation and the surface plasmon gap waveguide.

  • Learning from Ideal Edge for Image Restoration

    Jin-Ping HE  Kun GAO  Guo-Qiang NI  Guang-Da SU  Jian-Sheng CHEN  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E96-D No:11
      Page(s):
    2487-2491

    Considering the real existent fact of the ideal edge and the learning style of image analogy without reference parameters, a blind image recovery algorithm using a self-adaptive learning method is proposed in this paper. We show that a specific local image patch with degradation characteristic can be utilized for restoring the whole image. In the training process, a clear counterpart of the local image patch is constructed based on the ideal edge assumption so that identification of the Point Spread Function is no longer needed. Experiments demonstrate the effectiveness of the proposed method on remote sensing images.

  • Continuous Phase Modulation (CPM) Revisited: Using Time-Limited Phase Shaping Pulses

    Richard Hsin-Hsyong YANG  Chia-Kun LEE  Shiunn-Jang CHERN  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E96-B No:11
      Page(s):
    2828-2839

    Conventional CPM signals employ information sequence with time-unlimited phase shaping pulse (PSP) to achieve power and bandwidth efficient transmission. On the contrary, information sequence using time-limited PSP was believed to produce power-wasting data-independent discrete spectral lines in CPM spectra, and was suggested to be avoided. In this paper, we revisit this problem and adopt the time-limited PSP to replace the one with time-unlimited, it turns out to have an alternative solution to the CPM scheme. We first modify the spectral computing formula for the CPM with time-limited PSP (or CPM-TL) from conventional CPM formula and show that the discrete spectral lines appeared in the power density spectrum of CPM-TL signals can be diminished or become negligible by appropriately choosing PSP. We also show that this class of CPM can use any real number modulation index (h) and the resultant trellis structure of CPM guarantees the maximum constraint length allowed by the number of states in the MLSD receiver. Finally, the energy-bandwidth performance of CPM using time-limited PSP is investigated and compared with conventional CPM with time-unlimited PSP. From numerical results we show that, under the same number of states in the MLSD receiver and bandwidth occupancy, this subclass of CPM could outperform the conventional CPM up to 6dB coding gain, for h<1, in many cases.

  • New Quaternary Sequences with Ideal Autocorrelation Constructed from Legendre Sequences

    Young-Sik KIM  Ji-Woong JANG  Sang-Hyo KIM  Jong-Seon NO  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E96-A No:9
      Page(s):
    1872-1882

    In this paper, for an odd prime p, new quaternary sequences of even period 2p with ideal autocorrelation property are constructed using the binary Legendre sequences of period p. For the new quaternary sequences, two properties which are considered as the major characteristics of pseudo-random sequences are derived. Firstly, the autocorrelation distribution of the proposed quaternary sequences is derived and it is shown that the autocorrelation values of the proposed quaternary sequences are optimal. For both p≡1 mod 4 and p≡3 mod 4, we can construct optimal quaternary sequences while only for p≡3 mod 4, the binary Legendre sequences can satisfy ideal autocorrelation property. Secondly, the linear complexity of the proposed quaternary sequences is also derived by counting non-zero coefficients of the discrete Fourier transform over the finite field Fq which is the splitting field of x2p-1. It is shown that the linear complexity of the quaternary sequences is larger than or equal to p or (3p+1)/2 for p≡1 mod 4 or p≡3 mod 4, respectively.

  • Incremental Single-Source Multi-Target A* Algorithm for LBS Based on Road Network Distance

    Htoo HTOO  Yutaka OHSAWA  Noboru SONEHARA  Masao SAKAUCHI  

     
    PAPER-Spatial DB

      Vol:
    E96-D No:5
      Page(s):
    1043-1052

    Searching for the shortest paths from a query point to several target points on a road network is an essential operation for several types of queries in location-based services. This search can be performed using Dijkstra's algorithm. Although the A* algorithm is faster than Dijkstra's algorithm for finding the shortest path from a query point to a target point, the A* algorithm is not so fast to find all paths between each point and the query point when several target points are given. In this case, the search areas on road network overlap for each search, and the total number of operations at each node is increased, especially when the number of query points increases. In the present paper, we propose the single-source multi-target A* (SSMTA*) algorithm, which is a multi-target version of the A* algorithm. The SSMTA* algorithm guarantees at most one operation for each road network node, and the searched area on road network is smaller than that of Dijkstra's algorithm. Deng et al. proposed the LBC approach with the same objective. However, several heaps are used to manage the search area on the road network and the contents in each heap must always be kept the same in their method. This operation requires much processing time. Since the proposed method uses only one heap, such content synchronization is not necessary. The present paper demonstrates through empirical evaluations that the proposed method outperforms other similar methods.

  • Automatic Topic Identification for Idea Summarization in Idea Visualization Programs

    Kobkrit VIRIYAYUDHAKORN  Susumu KUNIFUJI  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E96-D No:1
      Page(s):
    64-72

    Recent idea visualization programs still lack automatic idea summarization capabilities. This paper presents a knowledge-based method for automatically providing a short piece of English text about a topic to each idea group in idea charts. This automatic topic identification makes used Yet Another General Ontology (YAGO) and Wordnet as its knowledge bases. We propose a novel topic selection method and we compared its performance with three existing methods using two experimental datasets constructed using two idea visualization programs, i.e., the KJ Method (Kawakita Jiro Method) and mind-mapping programs. Our proposed topic identification method outperformed the baseline method in terms of both performance and consistency.

  • A K-Means-Based Multi-Prototype High-Speed Learning System with FPGA-Implemented Coprocessor for 1-NN Searching

    Fengwei AN  Tetsushi KOIDE  Hans Jürgen MATTAUSCH  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E95-D No:9
      Page(s):
    2327-2338

    In this paper, we propose a hardware solution for overcoming the problem of high computational demands in a nearest neighbor (NN) based multi-prototype learning system. The multiple prototypes are obtained by a high-speed K-means clustering algorithm utilizing a concept of software-hardware cooperation that takes advantage of the flexibility of the software and the efficiency of the hardware. The one nearest neighbor (1-NN) classifier is used to recognize an object by searching for the nearest Euclidean distance among the prototypes. The major deficiency in conventional implementations for both K-means and 1-NN is the high computational demand of the nearest neighbor searching. This deficiency is resolved by an FPGA-implemented coprocessor that is a VLSI circuit for searching the nearest Euclidean distance. The coprocessor requires 12.9% logic elements and 58% block memory bits of an Altera Stratix III E110 FPGA device. The hardware communicates with the software by a PCI Express (4) local-bus-compatible interface. We benchmark our learning system against the popular case of handwritten digit recognition in which abundant previous works for comparison are available. In the case of the MNIST database, we could attain the most efficient accuracy rate of 97.91% with 930 prototypes, the learning speed of 1.310-4 s/sample and the classification speed of 3.9410-8 s/character.

  • A Simple and Effective Clustering Algorithm for Multispectral Images Using Space-Filling Curves

    Jian ZHANG  Sei-ichiro KAMATA  

     
    PAPER-Segmentation

      Vol:
    E95-D No:7
      Page(s):
    1749-1757

    With the wide usage of multispectral images, a fast efficient multidimensional clustering method becomes not only meaningful but also necessary. In general, to speed up the multidimensional images' analysis, a multidimensional feature vector should be transformed into a lower dimensional space. The Hilbert curve is a continuous one-to-one mapping from N-dimensional space to one-dimensional space, and can preserves neighborhood as much as possible. However, because the Hilbert curve is generated by a recurve division process, 'Boundary Effects' will happen, which means data that are close in N-dimensional space may not be close in one-dimensional Hilbert order. In this paper, a new efficient approach based on the space-filling curves is proposed for classifying multispectral satellite images. In order to remove 'Boundary Effects' of the Hilbert curve, multiple Hilbert curves, z curves, and the Pseudo-Hilbert curve are used jointly. The proposed method extracts category clusters from one-dimensional data without computing any distance in N-dimensional space. Furthermore, multispectral images can be analyzed hierarchically from coarse data distribution to fine data distribution in accordance with different application. The experimental results performed on LANDSAT data have demonstrated that the proposed method is efficient to manage the multispectral images and can be applied easily.

  • Scalar Multiplication on Kummer Surface Revisited

    Qiping LIN  Fangguo ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:1
      Page(s):
    410-413

    The main benefit of HECC is that it has much smaller parameter sizes and offers equivalent security as ECC and RSA. However, there are still more researches on ECC than on HECC. One of the reasons is that the computation of scalar multiplication cannot catch up. The Kummer surface can speed up the scalar multiplication in genus two curves. In this paper, we find that the scalar multiplication formulas of Duquesne in characteristic p > 3 on the Kummer surface are not correct. We verify and revise the formulas with mathematical software. The operation counts become 29M + 2S for new pseudo-addition formulas and 30M + 10S for doubling ones. And then we speed up the scalar multiplication on the Kummer surface with Euclidean addition chains.

  • Decoupled Location Parameter Estimation of Near-Field Sources with Symmetric ULA

    Bum-Soo KWON  Tae-Jin JUNG  Kyun-Kyung LEE  

     
    LETTER-Antennas and Propagation

      Vol:
    E94-B No:9
      Page(s):
    2646-2649

    A novel algorithm is presented for near-field source localization with a symmetric uniform linear array (ULA) consisting of an even number of sensors. Based on element reordering of a symmetric ULA, the steering vector is factorised with respect to the range-independent bearing parameters and range-relevant 2-D location parameters, which allows the range-independent bearing estimation with rank-reduction idea. With the estimated bearing, the range estimation for each source is then obtained by defining the 1-D MUSIC spectrum. Simulation results are presented to validate the performance of the proposed algorithm.

  • Design and Implementation of a Low-Complexity Reed-Solomon Decoder for Optical Communication Systems

    Ming-Der SHIEH  Yung-Kuei LU  

     
    PAPER-Computer System

      Vol:
    E94-D No:8
      Page(s):
    1557-1564

    A low-complexity Reed-Solomon (RS) decoder design based on the modified Euclidean (ME) algorithm proposed by Truong is presented in this paper. Low complexity is achieved by reformulating Truong's ME algorithm using the proposed polynomial manipulation scheme so that a more compact polynomial representation can be derived. Together with the developed folding scheme and simplified boundary cell, the resulting design effectively reduces the hardware complexity while meeting the throughput requirements of optical communication systems. Experimental results demonstrate that the developed RS(255, 239) decoder, implemented in the TSMC 0.18 µm process, can operate at up to 425 MHz and achieve a throughput rate of 3.4 Gbps with a total gate count of 11,759. Compared to related works, the proposed decoder has the lowest area requirement and the smallest area-time complexity.

  • A New Set of Optimal Frequency-Hopping Sequences

    Fang LIU  Daiyuan PENG  Xiaohu TANG  

     
    LETTER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2332-2336

    In frequency-hopping (FH) multiple access systems, frequency-hopping sequences (FHSs) with optimal Hamming correlation properties are needed. Based on the d-form functions with ideal autocorrelation properties, a new set of FHSs is constructed. The new FHS set is optimal with respect to the Peng-Fan bounds and each FHS in the set is optimal with respect to the Lempel-Greenberger bound.

  • Binary Sequence Pairs with Two-Level Correlation and Cyclic Difference Pairs

    Seok-Yong JIN  Hong-Yeop SONG  

     
    PAPER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2266-2271

    We investigate binary sequence pairs with two-level correlation in terms of their corresponding cyclic difference pairs (CDPs). We define multipliers of a cyclic difference pair and present an existence theorem for multipliers, which could be applied to check the existence/nonexistence of certain hypothetical cyclic difference pairs. Then, we focus on the ideal case where all the out-of-phase correlation coefficients are zero. It is known that such an ideal binary sequence pair exists for length υ = 4u for every u ≥ 1. Using the techniques developed here on the theory of multipliers of a CDP and some exhaustive search, we are able to determine that, for lengths υ ≤ 30, (1) there does not exist "any other" ideal/ binary sequence pair and (2) every example in this range is equivalent to the one of length υ = 4u above. We conjecture that if there is a binary sequence pair with an ideal two-level correlation then its in-phase correlation must be 4. This implies so called the circulant Hadamard matrix conjecture.

  • High-Speed Low-Complexity Architecture for Reed-Solomon Decoders

    Yung-Kuei LU  Ming-Der SHIEH  

     
    PAPER-Computer System

      Vol:
    E93-D No:7
      Page(s):
    1824-1831

    This paper presents a high-speed, low-complexity VLSI architecture based on the modified Euclidean (ME) algorithm for Reed-Solomon decoders. The low-complexity feature of the proposed architecture is obtained by reformulating the error locator and error evaluator polynomials to remove redundant information in the ME algorithm proposed by Truong. This increases the hardware utilization of the processing elements used to solve the key equation and reduces hardware by 30.4%. The proposed architecture retains the high-speed feature of Truong's ME algorithm with a reduced latency, achieved by changing the initial settings of the design. Analytical results show that the proposed architecture has the smallest critical path delay, latency, and area-time complexity in comparison with similar studies. An example RS(255,239) decoder design, implemented using the TSMC 0.18 µm process, can reach a throughput rate of 3 Gbps at an operating frequency of 375 MHz and with a total gate count of 27,271.

21-40hit(86hit)