The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] pair(303hit)

221-240hit(303hit)

  • Pairwise Test Case Generation Based on Module Dependency

    Jangbok KIM  Kyunghee CHOI  Gihyun JUNG  

     
    LETTER-Software Engineering

      Vol:
    E89-D No:11
      Page(s):
    2811-2813

    This letter proposes a modified Pairwise test case generation algorithm. The proposed algorithm produces additional test cases that may not be covered by Pairwise algorithm due to the dependency between internal modules of software systems. The algorithm produces additional cases utilizing internal module dependencies. The algorithm effectively increases the coverage of testing without significantly increasing the number of test cases.

  • A Simultaneous Inline Measurement Mechanism for Capacity and Available Bandwidth of End-to-End Network Path

    Cao LE THANH MAN  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E89-B No:9
      Page(s):
    2469-2479

    We previously proposed a new version of TCP, called Inline measurement TCP (ImTCP), in [2],[3]. The ImTCP sender adjusts the transmission intervals of data packets and then utilizes the arrival intervals of ACK packets for available bandwidth estimation. This type of active measurement is preferred because the obtained results are as accurate as those of other conventional types of active measurement, even though no extra probe traffic is injected onto the network. In the present research, we develop a new capacity measurement function and combine it with ImTCP in order to enable simultaneous measurement of both capacity and available bandwidth in ImTCP. The capacity measurement algorithm is a new packet-pair-based measurement technique that utilizes the estimated available bandwidth values for capacity calculation. This new algorithm promises faster measurement than current packet-pair-based measurement algorithms for various situations and works well for high-load networks, in which current algorithms do not work properly. Moreover, the new algorithm provides a confidence interval for the measurement result.

  • Speech Noise Reduction System Based on Frequency Domain ALE Using Windowed Modified DFT Pair

    Isao NAKANISHI  Yuudai NAGATA  Takenori ASAKURA  Yoshio ITOH  Yutaka FUKUI  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    950-959

    The speech noise reduction system based on the frequency domain adaptive line enhancer using a windowed modified DFT (MDFT) pair is presented. The adaptive line enhancer (ALE) is effective for extracting sinusoidal signals blurred by a broadband noise. In addition, it utilizes only one microphone. Therefore, it is suitable for the realization of speech noise reduction in portable electronic devices. In the ALE, an input signal is generated by delaying a desired signal using the decorrelation parameter, which makes the noise in the input signal decorrelated with that in the desired one. In the present paper, we propose to set decorrelation parameters in the frequency domain and adjust them to optimal values according to the relationship between speech and noise. Such frequency domain decorrelation parameters enable the reduction of the computational complexity of the proposed system. Also, we introduce the window function into MDFT for suppressing spectral leakage. The performance of the proposed noise reduction system is examined through computer simulations.

  • Single-Channel Multiple Regression for In-Car Speech Enhancement

    Weifeng LI  Katsunobu ITOU  Kazuya TAKEDA  Fumitada ITAKURA  

     
    PAPER-Speech Enhancement

      Vol:
    E89-D No:3
      Page(s):
    1032-1039

    We address issues for improving hands-free speech enhancement and speech recognition performance in different car environments using a single distant microphone. This paper describes a new single-channel in-car speech enhancement method that estimates the log spectra of speech at a close-talking microphone based on the nonlinear regression of the log spectra of noisy signal captured by a distant microphone and the estimated noise. The proposed method provides significant overall quality improvements in our subjective evaluation on the regression-enhanced speech, and performed best in most objective measures. Based on our isolated word recognition experiments conducted under 15 real car environments, the proposed adaptive nonlinear regression approach shows an advantage in average relative word error rate (WER) reductions of 50.8% and 13.1%, respectively, compared to original noisy speech and ETSI advanced front-end (ETSI ES 202 050).

  • A New Linear Transconductor Combining a Source Coupled Pair with a Transconductor Using Bias-Offset Technique

    Isamu YAMAGUCHI  Fujihiko MATSUMOTO  Makoto IZUMA  Yasuaki NOGUCHI  

     
    PAPER

      Vol:
    E89-A No:2
      Page(s):
    369-376

    Linearity of a transconductor with a theoretical linear characteristic is deteriorated by mobility degradation, in practice. In this paper, a technique to improve the linearity by combining a source-coupled pair with the transconductor is proposed. The proposed transconductor is the circuit that the deteriorated linearity of the conventional part is compensated by the transconductance characteristic of the source-coupled pair. In order to confirm the validity of the proposed technique, SPICE simulation is carried out. The transconductance change ratio of the proposed technique is about 1% and is 1/10 or less of the conventional circuit.

  • Generation of Zero Pronouns Based on the Centering Theory and Pairwise Salience of Entities

    Ji-Eun ROH  Jong-Hyeok LEE  

     
    PAPER-Natural Language Processing

      Vol:
    E89-D No:2
      Page(s):
    837-846

    This paper investigates zero pronouns in Korean, especially focusing on the center transitions of adjacent utterances under the framework of Centering Theory. Four types of nominal entity (Epair, Einter, Eintra, and Enon) from Centering Theory are defined with the concept of inter-, intra-, and pairwise salience. For each entity type, a case study of zero phenomena is performed through analyzing corpus and building a pronominalization model. This study shows that the zero phenomena of entities which have been neglected in previous Centering works are explained via the center transition of the second previous utterance, and provides valuable results for pronominalization of such entities, such as p2-trans rule. We improve the accuracy of pronominalization model by optimal feature selection and show that our accuracy outperforms the accuracy of previous works.

  • Four-Quadrant-Input Linear Transconductor Employing Source and Sink Currents Pair for Analog Multiplier

    Masakazu MIZOKAMI  Kawori TAKAKUBO  Hajime TAKAKUBO  

     
    PAPER

      Vol:
    E89-A No:2
      Page(s):
    362-368

    A four-quadrant-input linear transconductor generating a product or a product sum current is proposed. The proposed circuit eliminates the influence of channel length modulation and expands a dynamic input voltage range. As an application of the proposed circuit, the four-quadrant analog multiplier is designed. The four-quadrant analog multiplier consists of the proposed circuit, an input circuit and a class AB current buffer. HSPICE simulation results with 0.35 µm n-well single CMOS process parameter are shown in order to evaluate the proposed circuit.

  • Real-Time Measurement of End-to-End Available Bandwidth: A Feasibility Study

    Masahiro MIYASAKA  Takanori IWAI  Hideki KASAHARA  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E89-B No:2
      Page(s):
    401-412

    We propose a real-time measurement method, DPDC (Detection of Packet-Delay Correlation), which models both available bandwidth and the averaging time scale. In this method, measurement periods are short and constant, while the theoretical measurement error is reduced. DPDC is established based on the discussion of the systematic error of the packet pair/train measurement. We evaluate through simulations its accuracy and robustness against the multihop effect. We also verify the feasibility of real-time measurements through testbed experiments using a tool called Linear that implements DPDC. Efficiency is demonstrated through simulations and testbed experiments by analyzing accidental and systematic errors. Finally, we discuss the available bandwidth variation in an Internet path using real-time data produced by Linear measurements and passive monitoring.

  • Candidate One-Way Functions on Non-Supersingular Elliptic Curves

    Taiichi SAITO  Fumitaka HOSHINO  Shigenori UCHIYAMA  Tetsutaro KOBAYASHI  

     
    PAPER-Elliptic Curve Cryptography

      Vol:
    E89-A No:1
      Page(s):
    144-150

    This paper proposes new candidate one-way functions constructed with a certain type of endomorphisms on non-supersingular elliptic curves. We can show that the one-wayness of our proposed functions is equivalent to some special cases of the co-Diffie-Hellman assumption. Also a digital signature scheme is explicitly described using our proposed functions.

  • Efficient Algorithms for Tate Pairing

    Tetsutaro KOBAYASHI  Kazumaro AOKI  Hideki IMAI  

     
    PAPER-Elliptic Curve Cryptography

      Vol:
    E89-A No:1
      Page(s):
    134-143

    This paper presents new algorithms for the Tate pairing on a prime field. Recently, many pairing-based cryptographic schemes have been proposed. However, computing pairings incurs a high computational cost and represents the bottleneck to using pairings in actual protocols. This paper shows that the proposed algorithms reduce the cost of multiplication and inversion on an extension field, and reduce the number of calculations of the extended finite field. This paper also discusses the optimal algorithm to be used for each pairing parameter and shows that the total computational cost is reduced by 50% if k = 6 and 57% if k = 8.

  • Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses

    Lihua WANG  Zhenfu CAO  Takeshi OKAMOTO  Ying MIAO  Eiji OKAMOTO  

     
    PAPER-Protocol

      Vol:
    E89-A No:1
      Page(s):
    106-114

    In this paper authorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al.[8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al.[10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.

  • Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem

    Tsuyoshi TAKAGI  David REIS, Jr.  Sung-Ming YEN  Bo-Ching WU  

     
    PAPER-Elliptic Curve Cryptography

      Vol:
    E89-A No:1
      Page(s):
    115-123

    Recently, the radix-3 representation of integers is used for the efficient implementation of pairing based cryptosystems. In this paper, we propose non-adjacent form of radix-r representation (rNAF) and efficient algorithms for generating rNAF. The number of non-trivial digits is (r-2)(r+1)/2 and its average density of non-zero digit is asymptotically (r-1)/(2r-1). For r=3, the non-trivial digits are {2, 4} and the non-zero density is 0.4. We then investigate the width-w version of rNAF for the general radix-r representation, which is a natural extension of the width-w NAF. Finally we compare the proposed algorithms with the generalized NAF (gNAF) discussed by Joye and Yen. The proposed scheme requires a larger table but its non-zero density is smaller even for large radix. We explain that gNAF is a simple degeneration of rNAF--we can consider that rNAF is a canonical form for the radix-r representation. Therefore, rNAF is a good alternative to gNAF.

  • A Generalized KdV-Family with Variable Coefficients in (2 + 1) Dimensions

    Tadashi KOBAYASHI  Kouichi TODA  

     
    PAPER

      Vol:
    E88-A No:10
      Page(s):
    2548-2553

    Variable-coefficient generalizations of integrable nonlinear equations are one of exciting subjects in the study of mechanical, physical, mathematical and engineering sciences. In this paper, we present a KdV family (namely, KdV, modified KdV, Calogero-Degasperis-Fokas and Harry-Dym equations) with variable coefficients in (2 + 1) dimensions.

  • Identity-Based Key Agreement for Peer Group Communication from Pairings

    Shyi-Tsong WU  Jung-Hui CHIU  Bin-Chang CHIEU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E88-A No:10
      Page(s):
    2762-2768

    Some cryptographic schemes based on the bilinear pairings were proposed recently. In this paper, we apply the pairings on elliptic curve and Elliptic Curve Cryptography to the key agreement of dynamic peer group. Each member performs authentication and contributes a secret data to negotiate a group common key by means of a binary key tree. The proposed protocol does not need a dedicated central server to perform the key agreement, and the overhead is distributed among the group members. To provide a secure dynamic group communication, the key renewing mechanism has to be included. While the member joins/leaves, the group session key will be renewed to provide the backward/forward privacy, respectively. The key renewing is much efficient because it is only confined to the keys of the key-path. The proposed protocol is flexible while the change of membership is frequent.

  • A Method for Building More Non-supersingular Elliptic Curves Suitable for Pairing-based Cryptosystems

    Shi CUI  Pu DUAN  ChoongWah CHAN  

     
    LETTER-Information Security

      Vol:
    E88-A No:9
      Page(s):
    2468-2470

    Non-supersingular elliptic curves are important for the security of pairing-based cryptosystems. But there are few suitable non-supersingular elliptic curves for pairing-based cryptosystems. This letter introduces a method which allows the existing method to generate more non-supersingular elliptic curves suitable for pairing-based cryptosystems when the embedding degree is 6.

  • Anti-Parallel Dipole Coupling of Quantum Dots via an Optical Near-Field Interaction

    Tadashi KAWAZOE  Kiyoshi KOBAYASHI  Motoichi OHTSU  

     
    PAPER

      Vol:
    E88-C No:9
      Page(s):
    1845-1849

    We observed the optically forbidden energy transfer between cubic CuCl quantum dots coupled via an optical near-field interaction using time-resolved near-field photoluminescence (PL) spectroscopy. The energy transfer time and exciton lifetime were estimated from the rise and decay times of the PL pump-probe signal, respectively. We found that the exciton lifetime increased as the energy transfer time fell. This result strongly supports the notion that near-field interaction between QD makes the anti-parallel dipole coupling. Namely, a quantum-dots pair coupled by an optical near field has a long exciton lifetime which indicates the anti-parallel coupling of QDs forming a weakly radiative quadrupole state.

  • Evaluation of Damage in DNA Molecules Caused by Very-Low-Frequency Magnetic Fields Using Bacterial Cells

    Akira HAGA  Yoshiaki KUMAGAI  Hidetoshi MATSUKI  Ginro ENDO  Akira IGARASHI  Koichiro KOBAYASHI  

     
    PAPER-Biological Effects

      Vol:
    E88-B No:8
      Page(s):
    3249-3256

    The effect of intermediate frequency magnetic fields or, very-low-frequency magnetic fields (VLFMF) on living biological cells was investigated using a highly sensitive mutagenesis assay method. A bacterial gene expression system for mutation repair (umu system) was used for the sensitive evaluation of damage in DNA molecules. Salmonella typhimurium TA1535 (pSK1002) were exposed to VLFMF (20 kHz and 600 µT) in a specially designed magnetic field loading chamber. The experiment results showed the possibility of applying the umu assay for sensitive and effective evaluation of damage in DNA molecules. No effects from exposure to 20 kHz and 600 µT magnetic fields in terms of damage in DNA molecules were observed.

  • Characteristics of Balance-Unbalance Conversion Factor and Radiated Emission for Differential Type Microstrip Lines with Partial Unbalance

    Ken FUJIYOSHI  Masatake SHIGENAGA  Chiharu MIYAZAKI  Masamitsu TOKUDA  

     
    PAPER-Printed Circuit Boards

      Vol:
    E88-B No:8
      Page(s):
    3200-3206

    In this paper, a balance-unbalance conversion factor (TCTL: Transverse Conversion Transfer Loss, TCL: Transverse Conversion Loss) and a radiated emission for differential type microstrip lines with a partial unbalance on a PCB (Printed Circuit Board) are investigated. As the result, after inserting an unbalance element, it can be seen that a radiated emission increased according to the deterioration of TCL. The calculated results of the TCTL and TCL by using 4-terminal pair network chain matrix agreed with the measured results very well. In order to calculate radiated emission from the differential type microstrip lines, a common mode current on differential type microstrip lines with a partial unbalance was calculated by using 4-terminal pair network chain matrix. The calculated results of the radiated emission also agreed with the measured results.

  • Optical Network Design with Optical Constraints in IP/WDM Networks

    Kwangil LEE  Mark A. SHAYMAN  

     
    PAPER-Optical Network Architecture

      Vol:
    E88-B No:5
      Page(s):
    1898-1905

    In this paper we consider algorithms for the logical topology design and traffic grooming problem in WDM networks with router interface constraints as well as optical constraints. The optical constraints include restricted transmission range due to optical impairments as well as limits on the number of available wavelengths. We formulate this problem as an integer linear program which is NP-complete. We then introduce heuristic algorithms which use a graphical modeling tool called the Virtual Neighbor Graph and add lightpaths sequentially. The best performing heuristic uses a so-called Resource Efficiency Factor to determine the order in which paths are provisioned for the traffic demands. By giving priority to demands that can be routed over paths that make efficient use of network resources, it is able to achieve good performance both in terms of weighted hop count and network throughput. For finding optimal multi-hop paths sequentially, we introduce interface constraint shortest path problem and solve it using minimum weight perfect matching.

  • Performance Evaluation of Dynamic Tree-Based Reliable Multicast

    Zuo Wen WAN  Michel KADOCH  Ahmed ELHAKEEM  

     
    PAPER-Network

      Vol:
    E88-B No:5
      Page(s):
    2035-2045

    Due to the pruning and joining of members, multicast groups are dynamic. Both the topology and the total number of links change during multicast sessions, and the multicast performance, measured in terms of the bandwidth consumption, will change accordingly. In this paper, we investigate the dynamic performance of multicast communication with homogeneous packet loss probability; indeed, we evaluate the effects of the pruning of receivers and of subnets, after which we find the optimal placements of repair servers. A new 3-phase algorithm for adapting the optimal repair server placements to the dynamic changes of network topologies is presented and analyzed.

221-240hit(303hit)