The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ions(1388hit)

301-320hit(1388hit)

  • Upper Bounds for the Security of Several Feistel Networks

    Yosuke TODO  

     
    PAPER-Symmetric Key Based Cryptography

      Vol:
    E98-A No:1
      Page(s):
    39-48

    In this paper, we deal with upper bounds for the security of some Feistel networks. Such a topic has been discussed since the introduction of Luby-Rackoff construction. The Luby-Rackoff construction is unrealistic because its round functions must be chosen at random from the set of all functions. Knudsen dealt with a more practical construction whose round functions are chosen at random from a family of 2k randomly chosen functions, and showed an upper bound for the security by demonstrating generic key recovery attacks. However it is still difficult for designers to choose functions randomly. Then, this paper considers the security of some Feistel networks which have more efficient and practical round functions, and such Feistel networks are indeed used by some Feistel ciphers in practice. We show new properties using the relationship between plaintexts and ciphertexts. We propose new generic key recovery attacks by using our properties, and confirm the feasibility by implementing the attack on Feistel ciphers with small block sizes. As a result, we conclude that efficient and practical 6-round Feistel networks are not secure.

  • Theoretical Limitation of the Radiation Efficiency for Homogenous Electrically Small Antennas

    Keisuke FUJITA  Hiroshi SHIRAI  

     
    PAPER

      Vol:
    E98-C No:1
      Page(s):
    2-7

    Maximum radiation efficiency has been derived for homogeneous electrically small antennas. The spherical wave expansion is utilized to express the radiated field and the current distribution on an antenna, and the radiation efficiency is represented by the current, which is expressed in the spherical wave expansion coefficients and the nonradiating current. By using a concept of the nonradiating current, it is shown that the maximum radiation efficiency is achieved if the antenna shape is spherical. The radiation efficiency of a spherical antenna is maximized by varying the expansion coefficients. This radiation efficiency is compared with that of the antenna which achieves the maximum gain and those of linear antennas. The comparison indicates the validity of our proposed upper limit of the radiation efficiency.

  • Software-Defined Data Plane Enhancing SDN and NFV Open Access

    Akihiro NAKAO  

     
    INVITED PAPER

      Vol:
    E98-B No:1
      Page(s):
    12-19

    In this paper, we posit that extension of SDN to support deeply and flexibly programmable, software-defined data plane significantly enhance SDN and NFV and their interaction in terms of (1) enhanced interaction between applications and networks, (2) optimization of network functions, and (3) rapid development of new network protocols. All of these benefits are expected to contribute to improving the quality of diversifying communication networks and services. We identify three major technical challenges for enabling software-defined data plane as (1) ease of programming, (2) reasonable and predictable performance and (3) isolation among multiple concurrent logics. We also promote application-driving thinking towards defining software defined data-plane. We briefly introduce our project FLARE and its related technologies and review four use cases of flexible and deeply programmable data plane.

  • Revocable Group Signatures with Compact Revocation List Using Accumulators

    Toru NAKANISHI  Nobuo FUNABIKI  

     
    PAPER-Public Key Based Cryptography

      Vol:
    E98-A No:1
      Page(s):
    117-131

    A group signature scheme allows a group member to anonymously sign a message on behalf of the group. One of the important issues is the member revocation, and lots of revocable schemes have been proposed so far. A scheme recently proposed by Libert et al. achieves that O(1) or O(log N) efficiency of communication and computation except for the revocation list size (also the revocation cost), for the total number of members N and the number of revoked members R. However, since a signature is required for each subset separated from the set of non-revoked members, the size is about 900R Bytes in the 128-bit security. In the case of R=100,000, it amounts to about 80MB. In this paper, we extend the scheme to reduce the revocation list (also the revocation cost), by accumulating T subsets, which is signed for the revocation list. The revocation list size is reduced by 1/T. Unfortunately, the public key size, membership certificate size and the cost of a witness computation needed for signing increase related to T.

  • System Response to a Single Non-zero Initial Condition in a Lumped-Element LC Ladder

    Clemens M. ZIERHOFER  

     
    LETTER-General Fundamentals and Boundaries

      Vol:
    E97-A No:12
      Page(s):
    2693-2696

    It is shown that an infinite lumped-element LC- ladder network generates all Bessel functions Jn(t) of the first kind as a response to a single non-zero initial condition. Closed-form expressions for the voltage responses in the time domain are presented if the LC- ladder is driven by a step-like input voltage.

  • Removing Deep Faded Subcarrier Channel for Cooperative Multiuser Diversity OFDMA Based on Low Granularity Block

    Yuta IDA  Chang-Jun AHN  Takahiro MATSUMOTO  Shinya MATSUFUJI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E97-A No:12
      Page(s):
    2586-2594

    To achieve more high speed and high quality systems of wireless communications, orthogonal frequency division multiple access (OFDMA) has been proposed. Moreover, OFDMA considering the multiuser diversity (MUDiv) has been also proposed to achieve more high system performance. On the other hand, the conventional MUDiv/OFDMA requires large complexity to select the subcarrier of each user. To solve this problem, we have proposed a MUDiv/OFDMA based on the low granularity block (LGB). However, it degrades the system performance in the environment which contains many deep faded subcarrier channels. Therefore, in this paper, we propose a cooperative LGB-MUDiv/OFDMA to mitigate the influence due to the deep faded subcarrier channel.

  • A Semifixed Complexity Sphere Decoder for Uncoded Symbols for Wireless Communications

    Juan Francisco CASTILLO-LEON  Marco CARDENAS-JUAREZ  Ulises PINEDA-RICO  Enrique STEVENS-NAVARRO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:12
      Page(s):
    2776-2783

    The development of high data rate wireless communications systems using Multiple Input — Multiple Output (MIMO) antenna techniques requires detectors with reduced complexity and good Bit Error Rate (BER) performance. In this paper, we present the Semi-fixed Complexity Sphere Decoder (SCSD), which executes the process of detection in MIMO systems with a significantly lower computation cost than the high-performance/reduced-complexity detectors: Sphere Decoder (SD), K-best, Fixed Complexity Sphere Decoder (FSD) and Adaptive Set Partitioning (ASP). Simulation results show that when the Signal-to-Noise Ratio (SNR) is less than 15dB, the SCSD reduces the complexity by up to 90% with respect to SD, up to 60% with respect to K-best or ASP and by up to 90% with respect to FSD. In the proposed algorithm, the BER performance does not show significant degradation and therefore, can be considered as a complexity reduction scheme suitable for implementing in MIMO detectors.

  • An Improved Cooperative Transmission Scheme Using an Adjacent Base Station in Vehicular Communication System

    Bit-Na KWON  Hyun-Jun SHIN  Hyoung-Kyu SONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E97-A No:12
      Page(s):
    2649-2652

    In this letter, a cooperative scheme based on orthogonal frequency division multiplexing (OFDM) in vehicular communication system is proposed. In the conventional scheme, a destination exploits only one base station to communicate information. The proposed scheme can use an extra source from another base station through a relay, since the restriction of power in vehicle are less than cellular device. If a destination is distant from a base station, the performance is degraded. When a destination is distant from a base station, the proposed scheme employing space time block code (STBC) and cyclic delay diversity (CDD) has a higher bit error rate (BER) performance and throughput than the conventional scheme.

  • Statistical Analysis of Phase-Only Correlation Functions Based on Directional Statistics

    Shunsuke YAMAKI  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Vol:
    E97-A No:12
      Page(s):
    2601-2610

    This paper proposes statistical analysis of phase-only correlation functions based on linear statistics and directional statistics. We derive the expectation and variance of the phase-only correlation functions assuming phase-spectrum differences of two input signals to be probability variables. We first assume linear probability distributions for the phase-spectrum differences. We next assume circular probability distributions for the phase-spectrum differences, considering phase-spectrum differences to be circular data. As a result, we can simply express the expectation and variance of phase-only correlation functions as linear and quadratic functions of circular variance of phase-spectrum differences, respectively.

  • Statistical Channel Modeling for Aeronautical Cognitive Radio Communications

    Chao ZHANG  Junzhou YU  

     
    LETTER

      Vol:
    E97-A No:11
      Page(s):
    2170-2173

    Due to the high speed mobile environment, the aeronautical Cognitive Radio (CR) communications base on the channel with the time-variant stochastic non-continuous spectrum. The traditional fading channel models, such as Rayleigh, Rice, Nakagami-m and multipath channel models, can not describe the whole property of the channels of CR communications. In this letter, the statistical channel modeling scheme for aeronautical CR communications is proposed with a M/M/s(1) queuing model, which properly describes the random spectrum occupation of the primary users, i.e. aircrafts in aeronautical communications. The proposed channel model can be easily utilized in the channel simulation to testify the validity and efficiency of the aeronautical CR communications.

  • Dynamic Game Approach of H2/H Control for Stochastic Discrete-Time Systems

    Hiroaki MUKAIDANI  Ryousei TANABATA  Chihiro MATSUMOTO  

     
    PAPER-Systems and Control

      Vol:
    E97-A No:11
      Page(s):
    2200-2211

    In this paper, the H2/H∞ control problem for a class of stochastic discrete-time linear systems with state-, control-, and external-disturbance-dependent noise or (x, u, v)-dependent noise involving multiple decision makers is investigated. It is shown that the conditions for the existence of a strategy are given by the solvability of cross-coupled stochastic algebraic Riccati equations (CSAREs). Some algorithms for solving these equations are discussed. Moreover, weakly-coupled large-scale stochastic systems are considered as an important application, and some illustrative examples are provided to demonstrate the effectiveness of the proposed decision strategies.

  • Design and Implementation of Network Virtualization Management System

    Yohei KATAYAMA  Takehito YAMAMOTO  Yukio TSUKISHIMA  Kazuhisa YAMADA  Noriyuki TAKAHASHI  Atsushi TAKAHARA  Akihiro NAKAO  

     
    PAPER

      Vol:
    E97-B No:11
      Page(s):
    2286-2301

    Due to the recent network service market trends, network infrastructure providers must make their network infrastructures tolerant of network service complexity and swift at providing new network services. To achieve this, we first make a design decision for the single domain network infrastructure in which we use network virtualization and separate the network service control and management from the network infrastructure and leave the resource connectivity control and management in the network infrastructure so that the infrastructure can maintain simplicity and the network service can become complex and be quickly provided. Along with the decision, we construct an architecture of the network infrastructure and a network management model. The management model defines a slice as being determined by abstracted resource requirements and restructures the roles and planes from the viewpoint of network infrastructure usability so that network service requesters can manage network resources freely and swiftly in an abstract manner within the authorities the network infrastructure operator provides. We give the details of our design and implementation for a network virtualization management system along with the model. We deployed and evaluated our designed and implemented management system on the Japan national R&E testbed (JGN-X) to confirm the feasibility of our management system design and discuss room for improvement in terms of response time and scalability towards practical use. We also investigated certain cases of sophisticated network functions to confirm that the infrastructure can accept these functions without having to be modified.

  • A Performance Fluctuation-Aware Stochastic Scheduling Mechanism for Workflow Applications in Cloud Environment

    Fang DONG  Junzhou LUO  Bo LIU  

     
    PAPER

      Vol:
    E97-D No:10
      Page(s):
    2641-2651

    Cloud computing, a novel distributed paradigm to provide powerful computing capabilities, is usually adopted by developers and researchers to execute complicated IoT applications such as complex workflows. In this scenario, it is fundamentally important to make an effective and efficient workflow application scheduling and execution by fully utilizing the advantages of the cloud (as virtualization and elastic services). However, in the current stage, there is relatively few research for workflow scheduling in cloud environment, where they usually just bring the traditional methods directly into cloud. Without considering the features of cloud, it may raise two kinds of problems: (1) The traditional methods mainly focus on static resource provision, which will cause the waste of resources; (2) They usually ignore the performance fluctuation of virtual machines on the physical machines, therefore it will lead to the estimation error of task execution time. To address these problems, a novel mechanism which can estimate the probability distribution of subtask execution time based on background VM load series over physical machines is proposed. An elastic performance fluctuations-aware stochastic scheduling algorithm is introduced in this paper. The experiments show that our proposed algorithm can outperform the existing algorithms in several metrics and can relieve the influence of performance fluctuations brought by the dynamic nature of cloud.

  • Head-Tail Expressions for Interval Functions

    Infall SYAFALNI  Tsutomu SASAO  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E97-A No:10
      Page(s):
    2043-2054

    This paper shows a method to represent interval functions by using head-tail expressions. The head-tail expressions represent greater-than GT(X:A) functions, less-than LT(X:B) functions, and interval functions IN0(X:A,B) more efficiently than sum-of-products expressions. Let n be the number of bits to represent the largest value in the interval (A,B). This paper proves that a head-tail expression (HT) represents an interval function with at most n words in a ternary content addressable memory (TCAM) realization. It also shows the average numbers of factors to represent interval functions by HTs for up to n=16, which were obtained by a computer simulation. It also conjectures that, for sufficiently large n, the average number of factors to represent n-variable interval functions by HTs is at most 2/3n-5/9. Experimental results also show that, for n≥10, to represent interval functions, HTs require at least 20% fewer factors than MSOPs, on the average.

  • Improving Hough Based Pedestrian Detection Accuracy by Using Segmentation and Pose Subspaces

    Jarich VANSTEENBERGE  Masayuki MUKUNOKI  Michihiko MINOH  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E97-D No:10
      Page(s):
    2760-2768

    The Hough voting framework is a popular approach to parts based pedestrian detection. It works by allowing image features to vote for the positions and scales of pedestrians within a test image. Each vote is cast independently from other votes, which allows for strong occlusion robustness. However this approach can produce false pedestrian detections by accumulating votes inconsistent with each other, especially in cluttered scenes such as typical street scenes. This work aims to reduce the sensibility to clutter in the Hough voting framework. Our idea is to use object segmentation and object pose parameters to enforce votes' consistency both at training and testing time. Specifically, we use segmentation and pose parameters to guide the learning of a pedestrian model able to cast mutually consistent votes. At test time, each candidate detection's support votes are looked upon from a segmentation and pose viewpoints to measure their level of agreement. We show that this measure provides an efficient way to discriminate between true and false detections. We tested our method on four challenging pedestrian datasets. Our method shows clear improvements over the original Hough based detectors and performs on par with recent enhanced Hough based detectors. In addition, our method can perform segmentation and pose estimation as byproducts of the detection process.

  • Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method

    Xuyun NIE  Albrecht PETZOLDT  Johannes BUCHMANN  Fagen LI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:9
      Page(s):
    1952-1961

    The Piece in Hand method is a security enhancement technique for Multivariate Public Key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece in Hand method as proposed by Tsuji et al. in 2009. The key point of this method is to introduce an invertible quadratic polynomial map on the plaintext variables to add perturbation to the original MPKC. An additional quadratic map allows the owner of the secret key to remove this perturbation from the system. By our analysis, we find that the security of the enhanced scheme depends mainly on the structure of the quadratic polynomials of this auxiliary map. The two examples proposed by Tsuji et al. for this map can not resist the Linearization Equations attack. Given a valid ciphertext, we can easily get a public key which is equivalent to that of the underlying MPKC. If there exists an algorithm that can recover the plaintext corresponding to a valid ciphertext of the underlying MPKC, we can construct an algorithm that can recover the plaintext corresponding to a valid ciphertext of the enhanced MPKC.

  • Sound Image Localization Using Dynamic Transaural Reproduction with Non-contact Head Tracking

    Hiroaki KURABAYASHI  Makoto OTANI  Kazunori ITOH  Masami HASHIMOTO  Mizue KAYAMA  

     
    PAPER

      Vol:
    E97-A No:9
      Page(s):
    1849-1858

    Binaural reproduction is one of the promising approaches to present a highly realistic virtual auditory space to a listener. Generally, binaural signals are reproduced using a set of headphones that leads to a simple implementation of such a system. In contrast, binaural signals can be presented to a listener using a technique called “transaural reproduction” which employs a few loudspeakers with crosstalk cancellation for compensating acoustic transmissions from the loudspeakers to both ears of the listener. The major advantage of transaural reproduction is that a listener is able to experience binaural reproduction without wearing any device. This leads to a more natural listening environment. However, in transaural reproduction, the listener is required to be still within a very narrow sweet spot because the crosstalk canceller is very sensitive to the listener's head position and orientation. To solve this problem, dynamic transaural systems have been developed by utilizing contact type head tracking. This paper introduces the development of a dynamic transaural system with non-contact head tracking which releases the listener from any attachment, thereby preserving the advantage of transaural reproduction. Experimental results revealed that sound images presented in the horizontal and median planes were localized more accurately when the system tracked the listener's head rotation than when the listeners did not rotate their heads or when the system did not track the listener's head rotation. These results demonstrate that the system works effectively and correctly with the listener's head rotation.

  • Experimental Study on Arc Duration under Different Atmospheres

    Chen LI  Zhenbiao LI  Qian WANG  Du LIU  Makoto HASEGAWA  Lingling LI  

     
    PAPER

      Vol:
    E97-C No:9
      Page(s):
    843-849

    To clarify the dependence of arc duration on atmosphere, experiments were conducted under conditions of air, N$_{2}$, Ar, He and CO$_{2}$ with the pressure of 0.1,MPa in a 14,V/28,V/42,V circuit respectively. A quantitative relationship between arc duration and gas parameters such as ionization potential, thermal conductivity was obtained from the experimental data. Besides, the inherent mechanism of influence of atmosphere on arc duration was discussed.

  • A Robust Geometric Approach to Room Compensation for Sound Field Rendering

    Antonio CANCLINI  Dejan MARKOVIC  Lucio BIANCHI  Fabio ANTONACCI  Augusto SARTI  Stefano TUBARO  

     
    PAPER

      Vol:
    E97-A No:9
      Page(s):
    1884-1892

    In this manuscript we present a methodology for reducing the impact of the hosting room reflections in sound field rendering applications based on loudspeaker arrays. The problem is formulated in a least-squares sense. Since matrices involved in the problem are ill-conditioned, it is important to devise a suitable technique for the regularisation of the pseudo-inverse. In this work we adopt a truncated SVD method. The truncation, in particular, aims at reducing the impact of numerical errors and also errors on the knowledge of the sound speed. We include a wide set of experimental results, which validate the proposed technique.

  • EDISON Science Gateway: A Cyber-Environment for Domain-Neutral Scientific Computing

    Hoon RYU  Jung-Lok YU  Duseok JIN  Jun-Hyung LEE  Dukyun NAM  Jongsuk LEE  Kumwon CHO  Hee-Jung BYUN  Okhwan BYEON  

     
    PAPER-Scientific Application

      Vol:
    E97-D No:8
      Page(s):
    1953-1964

    We discuss a new high performance computing service (HPCS) platform that has been developed to provide domain-neutral computing service under the governmental support from “EDucation-research Integration through Simulation On the Net” (EDISON) project. With a first focus on technical features, we not only present in-depth explanations of the implementation details, but also describe the strengths of the EDISON platform against the successful nanoHUB.org gateway. To validate the performance and utility of the platform, we provide benchmarking results for the resource virtualization framework, and prove the stability and promptness of the EDISON platform in processing simulation requests by analyzing several statistical datasets obtained from a three-month trial service in the initiative area of computational nanoelectronics. We firmly believe that this work provides a good opportunity for understanding the science gateway project ongoing for the first time in Republic of Korea, and that the technical details presented here can be served as an useful guideline for any potential designs of HPCS platforms.

301-320hit(1388hit)