The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] order(489hit)

121-140hit(489hit)

  • A Property for Full CLEFIA-128 Detected by a Middletext Distinguisher under the Known-Key Setting

    Kazumaro AOKI  

     
    LETTER

      Vol:
    E97-A No:1
      Page(s):
    292-297

    CLEFIA is a 128-bit block cipher proposed by Shirai et al. at FSE 2007, and it was selected as several standards. CLEFIA adopts a generalized Feistel structure with the switching diffusion mechanism, which realizes a compact hardware implementation for CLEFIA, and it seems one of the promising candidates to be used for restricted environments, which require that a cryptographic primitive is versatile. It means that we need to evaluate the security of CLEFIA even for unusual scenario such as known-key scenario. As Knudsen and Rijmen did for 7-round AES at Asiacrypt 2007, we construct 17-round known-key distinguisher using two integral characteristics. To combine the 17-round known-key distinguisher with the standard subkey recovery technique for a secret-key scenario, we can construct a known-key distinguisher for full CLEFIA-128 from a random permutation under the framework of middletext distinguisher proposed by Minier et al. at Africacrypt 2009. The known-key distinguisher requires query of 2112 texts, time complexity of 2112, and memory complexity of 23 blocks, with the advantage of e-1, where e is the base of the natural logarithm. Note that there is no practical impact on the security of CLEFIA-128 for the current usages, since the result can only work under the known-key setting and data used by the adversary are enormous and needs a special form.

  • A New Higher Order Differential of CLEFIA

    Naoki SHIBAYAMA  Toshinobu KANEKO  

     
    PAPER-Symmetric Key Based Cryptography

      Vol:
    E97-A No:1
      Page(s):
    118-126

    CLEFIA is a 128-bit block cipher proposed by Shirai et al. at FSE2007. It has been reported that CLEFIA has a 9-round saturation characteristic, in which 32bits of the output of 9-th round 112-th order differential equals to zero. By using this characteristic, a 14-round CLEFIA with 256-bit secret key is attacked with 2113 blocks of chosen plaintext and 2244.5 times of data encryption. In this paper, we focused on a higher order differential of CLEFIA. This paper introduces two new concepts for higher order differential which are control transform for the input and observation transform for the output. With these concepts, we found a new 6-round saturation characteristic, in which 24bits of the output of 6-th round 9-th order differential equals to zero. We also show a new 9-round saturation characteristic using 105-th order differential which is a 3-round extension of the 6-round one. If we use it, instead of 112-th order differential, using the meet-in-the-middle attack technique for higher order differential table, the data and computational complexity for the attack to 14-round CLEFIA can be reduced to around 2-5, 2-34 of the conventional attack, respectively.

  • Voice Activity Detection Based on Generalized Normal-Laplace Distribution Incorporating Conditional MAP

    Ji-Hyun SONG  Sangmin LEE  

     
    LETTER-Speech and Hearing

      Vol:
    E96-D No:12
      Page(s):
    2888-2891

    In this paper, we propose a novel voice activity detection (VAD) algorithm based on the generalized normal-Laplace (GNL) distribution to provide enhanced performance in adverse noise environments. Specifically, the probability density function (PDF) of a noisy speech signal is represented by the GNL distribution; the variance of the speech and noise of the GNL distribution are estimated using higher-order moments. After in-depth analysis of estimated variances, a feature that is useful for discrimination between speech and noise at low SNRs is derived and compared to a threshold to detect speech activity. To consider the inter-frame correlation of speech activity, the result from the previous frame is employed in the decision rule of the proposed VAD algorithm. The performance of our proposed VAD algorithm is evaluated in terms of receiver operating characteristics (ROC) and detection accuracy. Results show that the proposed method yields better results than conventional VAD algorithms.

  • Metastable Ordered Phase Formation in CoPt and Co3Pt Alloy Thin Films Epitaxially Grown on Single-Crystal Substrates

    Mitsuru OHTAKE  Daisuke SUZUKI  Fumiyoshi KIRINO  Masaaki FUTAMOTO  

     
    REVIEW PAPER

      Vol:
    E96-C No:12
      Page(s):
    1460-1468

    CoPt and Co3Pt alloy thin films are prepared on MgO(111), SrTiO3(111), and Al2O3(0001) single-crystal substrates by varying the substrate temperature in a range from room temperature to 600°C by using an ultra-high vacuum radio-frequency magnetron sputtering system. The formation of metastable ordered phase and the structural thermal stability are briefly investigated. CoPt and Co3Pt films with the close-packed plane parallel to the substrate surface grow epitaxially on these oxide single-crystal substrates. CoPt epitaxial films are also formed by employing Pt, Pd, Cu, Cr, Ti, and Ru underlayers hetero-epitaxially grown on MgO(111) substrates. The crystal structure is evaluated by considering the order degree and the atomic stacking sequence of close-packed plane. Metastable ordered phases of L11, Bh, and D019 are preferentially formed in the CoPt and the Co3Pt films deposited around 300°C. Metastable ordered phase formation is influenced by the substrate temperature, the film composition, and the underlayer material. With increasing the substrate temperature up to around 300°C, the order degree increases. As the substrate temperature further increases, the order degree decreases. Annealing a disordered film at 300°C does not effectively enhance ordering. The CoPt and the Co3Pt films which include metastable ordered phases have flat surfaces and show strong perpendicular magnetic anisotropies reflecting the magnetocrystalline anisotropies of ordered crystals.

  • Effective Barrier Coverage Constructions for Improving Border Security in Wireless Sensor Networks

    Manato FUJIMOTO  Hayato OZAKI  Takuya SUZUKI  Hiroaki KOYAMASHITA  Tomotaka WADA  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER

      Vol:
    E96-B No:12
      Page(s):
    3007-3016

    Recently, the border security systems attract attention as large-scale monitoring system in wireless sensor networks (WSNs). In the border security systems whose aim is the monitoring of illegal immigrants and the information management in long-period, it deploys a lot of sensor nodes that have the communication and sensing functions in the detection area. Hence, the border security systems are necessary to reduce the power consumption of the whole system in order to extend the system lifetime and accurately monitor the track of illegal immigrants. In this paper, we propose two effective barrier coverage construction methods by switch dynamically operation modes of sensor nodes to reduce the operating time of the sensing function that wastes a lot of power consumption. We carry out performance evaluations by computer simulations to show the effectiveness of two proposed methods and show that the proposed methods are suitable for the border security systems.

  • A Robust Method for Recognition of Complicated Pulse Repetition Interval Modulations

    Mahmoud KESHAVARZI  Amir Mansour PEZESHK  Forouhar FARZANEH  Delaram AMIRI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:11
      Page(s):
    2306-2310

    After receiving emitted signals from various radars by electronic support measures (ESM) system, several processes are applied to signals such as: deinterleaving, recognition of pulse repetition interval (PRI) modulation, PRI estimation and etc. Indeed, recognition of PRI modulation is an essential task of ESM system. In this paper a novel and robust method for recognition of complicated PRI Modulations is presented. This method uses specifications such as distribution related to members of sequences obtained from first and second order derivation of TOAs around a constant value and continuity of these sequences to recognize the PRI modulation. Some numerical simulations are performed to illustrate the effectiveness of proposed method. Simulation results show high robustness of proposed method against noise (spurious and missing pulses) and unwanted jitter.

  • Multimodal Affect Recognition Using Boltzmann Zippers

    Kun LU  Xin ZHANG  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E96-D No:11
      Page(s):
    2496-2499

    This letter presents a novel approach for automatic multimodal affect recognition. The audio and visual channels provide complementary information for human affective states recognition, and we utilize Boltzmann zippers as model-level fusion to learn intrinsic correlations between the different modalities. We extract effective audio and visual feature streams with different time scales and feed them to two component Boltzmann chains respectively. Hidden units of the two chains are interconnected to form a Boltzmann zipper which can effectively avoid local energy minima during training. Second-order methods are applied to Boltzmann zippers to speed up learning and pruning process. Experimental results on audio-visual emotion data recorded by ourselves in Wizard of Oz scenarios and collected from the SEMAINE naturalistic database both demonstrate our approach is robust and outperforms the state-of-the-art methods.

  • A Wideband Zeroth-Order Resonance Antenna for Wireless Body Area Network Applications Open Access

    Jisoo BAEK  Youngki LEE  Jaehoon CHOI  

     
    INVITED PAPER

      Vol:
    E96-B No:10
      Page(s):
    2348-2354

    A wideband on-body antenna for a wireless body area network for an Industrial, Scientific, and Medical band is proposed. A wideband characteristic is achieved by combining two zeroth-order resonance (ZOR) modes at adjacent frequencies by controlling the value of the shunt capacitance. The size of the proposed antenna is 0.072λ0 × 0.33λ0, and the measured 10-dB return loss bandwidth is 340MHz (14.3%). In addition, the resonance frequencies operating in the ZOR mode are insensitive to the effects of the human body by virtue of the ZOR characteristic.

  • Bayesian Word Alignment and Phrase Table Training for Statistical Machine Translation

    Zezhong LI  Hideto IKEDA  Junichi FUKUMOTO  

     
    PAPER-Natural Language Processing

      Vol:
    E96-D No:7
      Page(s):
    1536-1543

    In most phrase-based statistical machine translation (SMT) systems, the translation model relies on word alignment, which serves as a constraint for the subsequent building of a phrase table. Word alignment is usually inferred by GIZA++, which implements all the IBM models and HMM model in the framework of Expectation Maximum (EM). In this paper, we present a fully Bayesian inference for word alignment. Different from the EM approach, the Bayesian inference makes use of all possible parameter values rather than estimating a single parameter value, from which we expect a more robust inference. After inferring the word alignment, current SMT systems usually train the phrase table from Viterbi word alignment, which is prone to learn incorrect phrases due to the word alignment mistakes. To overcome this drawback, a new phrase extraction method is proposed based on multiple Gibbs samples from Bayesian inference for word alignment. Empirical results show promising improvements over baselines in alignment quality as well as the translation performance.

  • Outage Performance for Antenna Selection in AF Two-Way Relaying System with Channel Estimation Error

    Zhangjun FAN  Daoxing GUO  Bangning ZHANG  Youyun XU  

     
    LETTER-Information Network

      Vol:
    E96-D No:7
      Page(s):
    1552-1556

    This letter investigates the outage performance of a joint transmit and receive antenna selection scheme in an amplify-and-forward two-way relaying system with channel estimation error. A closed-form approximate outage probability expression is derived, based on which the asymptotic outage probability expression is derived to get an insight on system's outage performance at high signal-to-noise (SNR) region. Monte Carlo simulation results are presented to verify the analytical results.

  • Variable-Length Code Based on Order Complexity and Its Application in Random Permuted Symbol

    Soongi HONG  Honglin JIN  Yong-Goo KIM  Yoonsik CHOE  

     
    LETTER-Coding Theory

      Vol:
    E96-A No:7
      Page(s):
    1657-1661

    This paper introduces the concept of order complexity, which represents the minimum number of partial ordering operations to make a string of perfectly ordered symbols. A novel variable-length code expressing such order complexity using binary digits is proposed herein. The proposed code is general, uniquely decipherable, and useful for coding a string of random permuted symbols having unknown statistics or which are preferred to have a uniform distribution.

  • An Algorithm for Allocating User Requests to Licenses in the OMA DRM System

    Nikolaos TRIANTAFYLLOU  Petros STEFANEAS  Panayiotis FRANGOS  

     
    PAPER-Formal Methods

      Vol:
    E96-D No:6
      Page(s):
    1258-1267

    The Open Mobile Alliance (OMA) Order of Rights Object Evaluation algorithm causes the loss of rights on contents under certain circumstances. By identifying the cases that cause this loss we suggest an algebraic characterization, as well as an ordering of OMA licenses. These allow us to redesign the algorithm so as to minimize the losses, in a way suitable for the low computational powers of mobile devices. In addition we provide a formal proof that the proposed algorithm fulfills its intent. The proof is conducted using the OTS/CafeOBJ method for verifying invariant properties.

  • Ranking and Unranking of Non-regular Trees in Gray-Code Order

    Ro-Yu WU  Jou-Ming CHANG  An-Hang CHEN  Ming-Tat KO  

     
    PAPER

      Vol:
    E96-A No:6
      Page(s):
    1059-1065

    A non-regular tree T with a prescribed branching sequence (s1,s2,...,sn) is a rooted and ordered tree such that its internal nodes are numbered from 1 to n in preorder and every internal node i in T has si children. Recently, Wu et al. (2010) introduced a concise representation called RD-sequences to represent all non-regular trees and proposed a loopless algorithm for generating all non-regular trees in a Gray-code order. In this paper, based on such a Gray-code order, we present efficient ranking and unranking algorithms of non-regular trees with n internal nodes. Moreover, we show that the ranking algorithm and the unranking algorithm can be run in O(n2) time and O(n2+nSn-1) time, respectively, provided a preprocessing takes O(n2Sn-1) time and space in advance, where .

  • Circuit Techniques to Enhance Linearity and Intrinsic Gain to Realize a 1.2 V, 200 MHz, +10.3 dBm IIP3 and 7th-Order LPF in a 65 nm CMOS

    Yasuhiro SUGIMOTO  Kazuma SAKATOH  

     
    PAPER

      Vol:
    E96-C No:6
      Page(s):
    867-874

    Circuit techniques to enhance the linearity of input-voltage-to-current (V/I) conversion and to increase the output impedance of a current source by compensating for the low intrinsic gain of a transistor were introduced to realize a high-frequency operational transconductance amplifier (OTA) for a low supply voltage using sub-100-nm CMOS processes. Applying these techniques, a MOS 7th-order Gm-C linear-phase low-pass filter (LPF) was realized using a 65 nm CMOS process. A simplified biquad LPF that can serve as a component of a 7th-order LPF was newly developed by replacing OTAs with resistors. As a result, the -3 dB frequency bandwidth, group delay ripple, 3rd-order distortion, and 3rd-order input intercept point (IIP3) were 200 MHz, 2.2%, ≤ -55 dB with a 100 MHz input, and +10.3 dBm, respectively, all with a ± 0.1 Vp-p input signal at each input terminal in the pseudodifferential configuration. The LPF including an output buffer dissipated 60 mW in the case of a 1.2 V supply. Wide spurious-free dynamic range (SFDR) characteristics were confirmed up to high frequencies.

  • Delayless Subband Adaptive Filter for Active Wideband Noise Control

    Qinghua LIU  Shan OUYANG  Junzheng JIANG  

     
    LETTER-Noise and Vibration

      Vol:
    E96-A No:5
      Page(s):
    986-990

    The wideband noise controlling performance of the delayless subband adaptive filtering technique is affected by the group delay and in-band aliasing distortion of analysis filter banks. A method of recursive second-order cone programming is proposed to design the uniform DFT modulated analysis filter banks, with a small in-band aliasing error and low group delay. Simulation results show that the noise controlling performance is improved with small residual noise power spectra, a high noise attenuation level and fast convergence rate.

  • Highest Probability Data Association for Multi-Target Particle Filtering with Nonlinear Measurements

    Da Sol KIM  Taek Lyul SONG  Darko MUŠICKI  

     
    PAPER-Sensing

      Vol:
    E96-B No:1
      Page(s):
    281-290

    In this paper, we propose a new data association method termed the highest probability data association (HPDA) and apply it to real-time recursive nonlinear tracking in heavy clutter. The proposed method combines the probabilistic nearest neighbor (PNN) with a modified probabilistic strongest neighbor (PSN) approach. The modified PSN approach uses only the rank of the measurement amplitudes. This approach is robust as exact shape of amplitude probability density function is not used. In this paper, the HPDA is combined with particle filtering for nonlinear target tracking in clutter. The measurement with the highest measurement-to-track data association probability is selected for track update. The HPDA provides the track quality information which can be used in for the false track termination and the true track confirmation. It can be easily extended to multi-target tracking with nonlinear particle filtering. The simulation studies demonstrate the HPDA functionality in a hostile environment with high clutter density and low target detection probability.

  • Transaction Ordering in Network-on-Chips for Post-Silicon Validation

    Amir Masoud GHAREHBAGHI  Masahiro FUJITA  

     
    PAPER-Logic Synthesis, Test and Verification

      Vol:
    E95-A No:12
      Page(s):
    2309-2318

    In this paper, we have addressed the problem of ordering transactions in network-on-chips (NoCs) for post-silicon validation. The main idea is to extract the order of the transactions from the local partial orders in each NoC tile based on a set of “happened-before” rules, assuming transactions do not have a timestamp. The assumption is based on the fact that implementation and usage of a global time as timestamp in such systems may not be practical or efficient. When a new transaction is received in a tile, we send special messages to the neighboring tiles to inform them regarding the new transaction. The process of sending those special messages continues recursively in all the tiles that receive them until another such special message is detected. This way, we relate local orders of different tiles with each other. We show that our method can reconstruct the correct transaction orders when communication delays are deterministic. We have shown the effectiveness of our method by correctly ordering the transaction in NoCs with mesh and torus topologies with different sizes from 5*5 to 9*9. Also, we have implemented the proposed method in hardware to show its feasibility.

  • Secure Ranking over Encrypted Documents

    Jiuling ZHANG  Beixing DENG  Xing LI  Xiao-lei ZHANG  

     
    LETTER

      Vol:
    E95-D No:12
      Page(s):
    2954-2955

    Ranking the encrypted documents stored on secure cloud computing servers is becoming prominent with the expansion of the encrypted data collection. In our work, order preserving encryption is employed to pre-rank the encrypted documents. Paillier's additive homomorphic encryption is used to re-rank the top pre-ranked documents of some considerate scale.

  • A Formal Approach to Optimal Register Binding with Ordered Clocking for Clock-Skew Tolerant Datapaths

    Keisuke INOUE  Mineo KANEKO  

     
    PAPER-Logic Synthesis, Test and Verification

      Vol:
    E95-A No:12
      Page(s):
    2330-2337

    The impact of clock-skew on circuit timing increases rapidly as technology scales. As a result, it becomes important to deal with clock-skew at the early stages of circuit designs. This paper presents a novel datapath design that aims at mitigating the impact of clock-skew in high-level synthesis, by integrating margin (evaluated as the maximum number of clock-cycles to absorb clock-skew) and ordered clocking into high-level synthesis tasks. As a first attempt to the proposed datapath design, this paper presents a 0-1 integer linear programming formulation that focuses on register binding to achieve the minimum cost (the minimum number of registers) under given scheduling result. Experimental results show the optimal results can be obtained without increasing the latency, and with a few extra registers compared to traditional high-level synthesis design.

  • Antenna Ordering in Low Complexity MIMO Detection Based on Ring-Type Markov Random Fields

    Seokhyun YOON  Kangwoon SEO  Taehyun JEON  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:11
      Page(s):
    3621-3624

    This letter addresses antenna ordering to improve the performance of the MIMO detectors in [4], where two low complexity MIMO detectors have been proposed based on either fully-connected or ring type pair-wise Markov random field (MRF). The former was shown to be better than the latter, while being more complex. The objective of this letter is to make the performance of the detector based on ring-type MRF (with complexity of O(2M 22m)) close to or better than that of fully-connected MRF (with complexity of O(M (M-1)22m)), by applying appropriate antenna ordering. The simulation results validate the proposed antenna ordering methods.

121-140hit(489hit)