The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ions(1385hit)

521-540hit(1385hit)

  • Hash Functions and Information Theoretic Security

    Nasour BAGHERI  Lars R. KNUDSEN  Majid NADERI  Sφren S. THOMSEN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:12
      Page(s):
    3401-3403

    Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic attack costs and real costs. We show that in the information theoretic model, many well-known and commonly used hash functions such as MD5 and SHA-256 fail to be preimage resistant.

  • 2D Log-Gabor Wavelet Based Action Recognition

    Ning LI  De XU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E92-D No:11
      Page(s):
    2275-2278

    The frequency response of log-Gabor function matches well the frequency response of primate visual neurons. In this letter, motion-salient regions are extracted based on the 2D log-Gabor wavelet transform of the spatio-temporal form of actions. A supervised classification technique is then used to classify the actions. The proposed method is robust to the irregular segmentation of actors. Moreover, the 2D log-Gabor wavelet permits more compact representation of actions than the recent neurobiological models using Gabor wavelet.

  • Downlink Cooperative Wireless Spatial Multiplexing System

    Andreas DARMAWAN  Hiroyuki MORIKAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:11
      Page(s):
    3439-3447

    We investigate and propose the utilization of regenerative and non-regenerative relaying terminals in downlink cooperative MIMO communications, such as in base-station/router-relay-user transmission under different schemes. The source is equipped with multiple antennas, while the relays and destination are single-antenna terminals. From the source to the relays, symbols are transmitted using MIMO spatial-multiplexing technique. Depending on the type of relaying scheme, the relays either fully decode or amplify the received signal before retransmitting it to the destination using simple TDM transmission or Alamouti's space-time coding. We show that the proposed system realizes MIMO performance in single-antenna system environment, and performance-wise it is superior to existing transmission schemes, especially in low-SNR conditions. Furthermore, the proposed system is shown to give a diversity order of N-M+1, similar to that of MIMO V-BLAST system.

  • Recent Japanese R&D in Satellite Communications Open Access

    Masahiro UMEHIRA  Kiyoshi KOBAYASHI  Yoshitsugu YASUI  Masato TANAKA  Ryutaro SUZUKI  Hideyuki SHINONAGA  Nobuyuki KAWAI  

     
    INVITED PAPER

      Vol:
    E92-B No:11
      Page(s):
    3290-3299

    Current trend in telecommunications is "broadband" and "ubiquitous." To achieve this goal, satellite communications systems are expected to play an important role in cooperation with terrestrial communications systems. Along with the advancement of optical fiber transmission systems, the role of satellite communications was dramatically changed from long distance transmission to various applications utilizing unique features of satellite communications. This paper overviews recent Japanese R&D in satellite communications.

  • Automatic Classification of Spatial Relationships among Mathematical Symbols Using Geometric Features

    Walaa ALY  Seiichi UCHIDA  Masakazu SUZUKI  

     
    PAPER-Pattern Recognition

      Vol:
    E92-D No:11
      Page(s):
    2235-2243

    Machine recognition of mathematical expressions on printed documents is not trivial even when all the individual characters and symbols in an expression can be recognized correctly. In this paper, an automatic classification method of spatial relationships between the adjacent symbols in a pair is presented. This classification is important to realize an accurate structure analysis module of math OCR. Experimental results on very large databases showed that this classification worked well with an accuracy of 99.525% by using distribution maps which are defined by two geometric features, relative size and relative position, with careful treatment on document-dependent characteristics.

  • Frequency Asynchronous Cross-Polarization Interference Canceller for Variable Polarization Frequency Division Multiplexing (VPFDM)

    Fumihiro YAMASHITA  Junichi ABE  Kiyoshi KOBAYASHI  Hiroshi KAZAMA  

     
    PAPER

      Vol:
    E92-B No:11
      Page(s):
    3365-3374

    This paper proposes a frequency asynchronous cross-polarization interference canceller for Vertical/Horizontal (V/H) polarization multiplexing satellite communications. In satellite communications, V/H polarization signals are likely to experience different frequency fluctuations, and so the cross-polarization undergoes two different frequency fluctuations. To cancel this cross-polarization interference, a new frequency asynchronous cross-polarization interference canceller that removes interference and frequency offsets is proposed. Computer simulations are carried out to evaluate its fundamental performance. The results show that the proposed canceller can remove the cross-polarization interference created by the two different frequency offsets, simultaneously.

  • Optimum and Suboptimum Code Allocation for Peak Power Reduction in Down-Link MC CDMA

    Kwonhue CHOI  Jiyu JIN  

     
    LETTER

      Vol:
    E92-B No:11
      Page(s):
    3389-3393

    We develop an optimum code allocation scheme by investigating the peak to average power ratio (PAPR) characteristic of a down-link multi-carrier (MC)-CDMA system using Walsh-Hadamard code. It is shown that PAPR of a MC-CDMA system is highly dependent upon the selection of code combination. Based on this fact, we develop the allocation method which minimizes PAPR according to the number of active users. In addition, an efficient suboptimum code combination search scheme is also proposed for near minimum PAPR.

  • Transformation of BDD into Heterogeneous MDD with Minimal Cost

    Suzana STOJKOVI  Milena STANKOVI  Radomir S. STANKOVI  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E92-A No:10
      Page(s):
    2580-2587

    Decision diagrams (DDs) are data structures commonly used for representation of discrete functions with large number of variables. Binary DDs (BDDs) are used for representation and manipulation with Boolean functions. Complexity of a BDD is usually measured by its size, that is defined as the number of non-terminal nodes in the BDD. Minimization of the sizes of DDs is a problem greatly considered in literature and many related algorithms (exact and heuristic) have been proposed. However, there are many functions for which BDDs when minimized are still large and can have even an exponential size in the number of variables. An approach to derive compact decision diagram representations for such functions is transformation of BDDs into Multi-valued DDs (MDDs) and Heterogeneous MDDs (HMDDs). Complexity of MDDs and HMDDs is measured by the cost which is a generalization of the notion of the size by taking into account complexity of nodes in MDDs and HMDDs. This paper presents a method for transformation of BDD into HMDD with minimal cost. The proposed method reduces the time for determination of the type of nodes in HMDDs by introducing a matrix expressing dependency (interconnections) among nodes at different levels. Comparing to other methods for conversion of BDDs into HMDDs, the method reduces the number of traverses of a BDD necessary for collecting enough information to construct an equivalent HMDD. For an experimental verification of its efficiency, the method is applied to construction of HMDDs for some benchmark functions and their arithmetic and Walsh spectra.

  • A Fixed Point Theorem in Weak Topology for Successively Recurrent System of Set-Valued Mapping Equations and Its Applications

    Kazuo HORIUCHI  

     
    PAPER-Nonlinear Problems

      Vol:
    E92-A No:10
      Page(s):
    2554-2559

    Let us introduce n ( ≥ 2) mappings fi (i=1,,n ≡ 0) defined on reflexive real Banach spaces Xi-1 and let fi:Xi-1 → Yi be completely continuous on bounded convex closed subsets Xi-1(0) ⊂ Xi-1. Moreover, let us introduce n set-valued mappings Fi : Xi-1 Yi → Fc(Xi) (the family of all non-empty compact subsets of Xi), (i=1,,n ≡ 0). Here, we have a fixed point theorem in weak topology on the successively recurrent system of set-valued mapping equations:xi ∈ Fi(xi-1, fi(xi-1)), (i=1,,n ≡ 0). This theorem can be applied immediately to analysis of the availability of system of circular networks of channels undergone by uncertain fluctuations and to evaluation of the tolerability of behaviors of those systems.

  • Antenna Array Calibration Based on Frequency Selection in OFDMA/TDD Systems Open Access

    Yoshitaka HARA  Yasuhiro YANO  Hiroshi KUBO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:10
      Page(s):
    3195-3205

    This paper proposes a new antenna array calibration technique which uses frequency selection in orthogonal frequency division multiple access (OFDMA)/time division duplexing (TDD) systems. In the proposed method, subbands or frequencies of good channel conditions are initially selected for channel measurements. The relative calibration is performed at the selected subbands, which compensates for mismatch of analogue gains in multiple antennas using the measured uplink and downlink channel parameters. Furthermore, the calibration parameters are interpolated in the frequency domain for the whole bandwidth. The proposed calibration maintains accurate channel reciprocity for the whole bandwidth compared to the conventional calibration which does not use the frequency selection. The proposed calibration technique is effective in exploiting channel reciprocity at both base station and terminals with feasible amount of feedback and low-cost operation.

  • Analysis and Design of a Reflection-Cancelling Transverse Slot-Pair Array with Grating-Lobe Suppressing Baffles

    Takehito SUZUKI  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:10
      Page(s):
    3236-3242

    This paper presents the analysis and design of a reflection-cancelling transverse slot-pair array antenna with baffles by using the Spectrum of Two-Dimensional Solutions (S2DS) method. For the transverse slot array, the slot spacings with more than one free-space wavelength cause the grating-lobes. The baffles suppress the grating-lobes effectively. A one-dimensional slot array is extracted from the 2D array with in-phase excitation by assuming periodicity in the transversal direction. The uniform excitation over the finite array is synthesized iteratively to demonstrate the fast and accurate results by S2DS. A unit design model with the baffles is introduced to determine the initial parameters of the slot-pairs, which greatly accelerate the iterations process. Experiments at 25.3 GHz demonstrate the suppression of the grating lobes to the level less than -20.0 dB and also the good uniformity of the aperture field distribution.

  • FreeNA: A Multi-Platform Framework for Inserting Upper-Layer Network Services

    Ryota KAWASHIMA  Yusheng JI  Katsumi MARUYAMA  

     
    PAPER-QoS and Quality Management

      Vol:
    E92-D No:10
      Page(s):
    1923-1933

    Networking technologies have recently been evolving and network applications are now expected to support flexible composition of upper-layer network services, such as security, QoS, or personal firewall. We propose a multi-platform framework called FreeNA* that extends existing applications by incorporating the services based on user definitions. This extension does not require users to modify their systems at all. Therefore, FreeNA is valuable for experimental system usage. We implemented FreeNA on both Linux and Microsoft Windows operating systems, and evaluated their functionality and performance. In this paper, we describe the design and implementation of FreeNA including details on how to insert network services into existing applications and how to create services in a multi-platform environment. We also give an example implementation of a service with SSL, a functionality comparison with relevant systems, and our performance evaluation results. The results show that FreeNA offers finer configurability, composability, and usability than other similar systems. We also show that the throughput degradation of transparent service insertion is 2% at most compared with a method of directly inserting such services into applications.

  • Strong Anonymous Signature

    Rui ZHANG  Hideki IMAI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:10
      Page(s):
    2487-2491

    The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the signer, if the message is hidden from the verifier. However, in many practical applications, e.g., an anonymous paper review system mentioned in [18], the message for anonymous authentication is actually known to the verifier. This implies that the effectiveness of previous anonymous signatures may be unjustified in these applications. In this paper, we extend the previous models, and develop a related primitive called strong anonymous signatures. For strong anonymous signatures, the identity of the signer remains secret even if the challenge message is chosen by an adversary. We then demonstrate some efficient constructions and prove their security in our model.

  • New Balanced Boolean Functions with Good Cryptographic Properties

    Qichun WANG  Xiangyang XUE  Haibin KAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:10
      Page(s):
    2633-2637

    It is known that Boolean functions used in stream ciphers should have good cryptographic properties to resist fast algebraic attacks. In this paper, we study a new class of Boolean functions with good cryptographic properties: balancedness, optimum algebraic degree, optimum algebraic immunity and a high nonlinearity.

  • Code Compression with Split Echo Instructions

    Iver STUBDAL  Arda KARADUMAN  Hideharu AMANO  

     
    PAPER-Fundamentals of Software and Theory of Programs

      Vol:
    E92-D No:9
      Page(s):
    1650-1656

    Code density is often a critical issue in embedded computers, since the memory size of embedded systems is strictly limited. Echo instructions have been proposed as a method for reducing code size. This paper presents a new type of echo instruction, split echo, and evaluates an implementation of both split echo and traditional echo instructions on a MIPS R3000 based processor. Evaluation results show that memory requirement is reduced by 12% on average with small additional hardware cost.

  • Approximate Algorithm for Hybrid Model Predictive Control with Time-Varying Reference

    Koichi KOBAYASHI  Kunihiko HIRAISHI  Nguyen Van TANG  

     
    PAPER-Systems and Control

      Vol:
    E92-A No:8
      Page(s):
    2046-2052

    In this paper, we propose a new approximate algorithm for the model predictive control (MPC) problem with a time-varying reference of hybrid systems. The proposed algorithm consists of an offline computation and an online computation. In the offline computation, candidates of mode sequences are derived. In the online computation, after the mode sequence is uniquely decided among candidates, the finite-time optimal control problem, i.e., the quadratic programming problem, is solved. So by applying the proposed algorithm, the computational amount of the online computation is decreased. First, the MPC problem with a time-varying reference is formulated. Next, the proposed algorithm is explained, and the accuracy of the obtained approximate solution is discussed. Finally, the effectiveness of the proposed method is shown by a numerical example.

  • Search Control Algorithm Based on Random Step Size Hill-Climbing Method for Adaptive PMD Compensation

    Ken TANIZAWA  Akira HIROSE  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E92-B No:8
      Page(s):
    2584-2590

    Adaptive polarization mode dispersion (PMD) compensation is required for the speed-up and advancement of the present optical communications. The combination of a tunable PMD compensator and its adaptive control method achieves adaptive PMD compensation. In this paper, we report an effective search control algorithm for the feedback control of the PMD compensator. The algorithm is based on the hill-climbing method. However, the step size changes randomly to prevent the convergence from being trapped at a local maximum or a flat, unlike the conventional hill-climbing method. The randomness depends on the Gaussian probability density functions. We conducted transmission simulations at 160 Gb/s and the results show that the proposed method provides more optimal compensator control than the conventional hill-climbing method.

  • Approximation Algorithms for the Highway Problem under the Coupon Model

    Ryoso HAMANE  Toshiya ITOH  Kouhei TOMITA  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1779-1786

    When a store sells items to customers, the store wishes to decide the prices of items to maximize its profit. Intuitively, if the store sells the items with low (resp. high) prices, the customers buy more (resp. less) items, which provides less profit to the store. So it would be hard for the store to decide the prices of items. Assume that the store has a set V of n items and there is a set E of m customers who wish to buy the items, and also assume that each item i ∈ V has the production cost di and each customer ej ∈ E has the valuation vj on the bundle ej ⊆ V of items. When the store sells an item i ∈ V at the price ri, the profit for the item i is pi=ri-di. The goal of the store is to decide the price of each item to maximize its total profit. We refer to this maximization problem as the item pricing problem. In most of the previous works, the item pricing problem was considered under the assumption that pi ≥ 0 for each i ∈ V, however, Balcan, et al. [In Proc. of WINE, LNCS 4858, 2007] introduced the notion of "loss-leader," and showed that the seller can get more total profit in the case that pi < 0 is allowed than in the case that pi < 0 is not allowed. In this paper, we consider the line highway problem (in which each customer is interested in an interval on the line of the items) and the cycle highway problem (in which each customer is interested in an interval on the cycle of the items), and show approximation algorithms for the line highway problem and the cycle highway problem in which the smallest valuation is s and the largest valuation is (this is called an [s,]-valuation setting) or all valuations are identical (this is called a single valuation setting).

  • Sender Authenticated Key Agreements without Random Oracles

    Chifumi SATO  Takeshi OKAMOTO  Eiji OKAMOTO  

     
    PAPER-Theory

      Vol:
    E92-A No:8
      Page(s):
    1787-1794

    The purpose of this paper is to study sender authenticated key agreements by a third party, which uses the received parameters to verify the fact that a sender of a message knows his long-term private key. In particular, we propose a standard model for the protocol among three entities for the first time. The security of this protocol depends on the difficulty of solving two new problems related to one-way isomorphisms and the decision co-bilinear Diffie-Hellman problem on multiplicative cyclic groups. It is the first time that the security of a key agreement has been formally proven by using negligible probability. We believe that our contribution gives many applications in the cryptographic community.

  • AdjScales: Visualizing Differences between Adjectives for Language Learners

    Vera SHEINMAN  Takenobu TOKUNAGA  

     
    PAPER-Educational Technology

      Vol:
    E92-D No:8
      Page(s):
    1542-1550

    In this study we introduce AdjScales, a method for scaling similar adjectives by their strength. It combines existing Web-based computational linguistic techniques in order to automatically differentiate between similar adjectives that describe the same property by strength. Though this kind of information is rarely present in most of the lexical resources and dictionaries, it may be useful for language learners that try to distinguish between similar words. Additionally, learners might gain from a simple visualization of these differences using unidimensional scales. The method is evaluated by comparison with annotation on a subset of adjectives from WordNet by four native English speakers. It is also compared against two non-native speakers of English. The collected annotation is an interesting resource in its own right. This work is a first step toward automatic differentiation of meaning between similar words for language learners. AdjScales can be useful for lexical resource enhancement.

521-540hit(1385hit)