Tomohiro TAKAHASHI Kazunori URUMA Katsumi KONISHI Toshihiro FURUKAWA
This letter deals with the signal declipping algorithm based on the matrix rank minimization approach, which can be applied to the signal restoration in linear systems. We focus on the null space of a low-rank matrix and provide a block adaptive algorithm of the matrix rank minimization approach to signal declipping based on the null space alternating optimization (NSAO) algorithm. Numerical examples show that the proposed algorithm is faster and has better performance than other algorithms.
A group signature scheme allows a group member to anonymously sign a message on behalf of the group. One of the important issues is the member revocation, and lots of revocable schemes have been proposed so far. A scheme recently proposed by Libert et al. achieves that O(1) or O(log N) efficiency of communication and computation except for the revocation list size (also the revocation cost), for the total number of members N and the number of revoked members R. However, since a signature is required for each subset separated from the set of non-revoked members, the size is about 900R Bytes in the 128-bit security. In the case of R=100,000, it amounts to about 80MB. In this paper, we extend the scheme to reduce the revocation list (also the revocation cost), by accumulating T subsets, which is signed for the revocation list. The revocation list size is reduced by 1/T. Unfortunately, the public key size, membership certificate size and the cost of a witness computation needed for signing increase related to T.
Hiroyuki HATANO Tomoya KITANI Masahiro FUJII Atsushi ITO Yu WATANABE Hironobu ONISHI Toru AOKI
For estimating user's location, Global Navigation Satellite System (GNSS) is very useful. Especially, Global Positioning System (GPS) by USA is very popular. A GPS receiver needs multiple satellites (usually 4 and more satellites). Propagation to the satellites needs line-of-sight. However, in urban area, there are many buildings. Received signals tend to become bad quality. Such signals are often called as non-line-of-sight (NLOS) or multipath signals. The problem is that the receiver cannot get line-of-sight signals from adequate number of the satellites coinstantaneously. This case leads to degradation of estimation quality or impossibility of estimation. In this paper, we will introduce a novel estimation algorithm, which can estimate own position with as low number of satellites as possible. The proposal achieves the estimation by only two satellites. The proposal also uses a traveling distance sensor which is often equipped on vehicles. By recorded satellite data, we will confirm our effectiveness.
Tatsuaki OKAMOTO Katsuyuki TAKASHIMA
The concept of dual pairing vector spaces (DPVS) was introduced by Okamoto and Takashima in 2009, and it has been employed in various applications, functional encryption (FE) including attribute-based encryption (ABE) and inner-product encryption (IPE) as well as attribute-based signatures (ABS), generic conversion from composite-order group based schemes to prime-order group based ones and public-key watermarking. In this paper, we show the concept of DPVS, the major applications to FE and the key techniques employed in these applications. This paper presents them with placing more emphasis on plain and intuitive descriptions than formal preciseness.
Shigeyuki KOMURO Shigeru KURIYAMA Takao JINNO
Multimedia contents can be enriched by introducing navigation with image codes readable by camera-mounted mobile devices such as smartphones. Data hiding technologies were utilized for embedding such codes to make their appearances inconspicuous, which can reduce esthetic damage on visual media. This article proposes a method of embedding two-dimensional codes into images based on successive color mixture for a blue-color channel. This technology can make the color of codes mimic those used on a cover image, while preserving their readability for current general purpose image sensors.
A certificateless aggregate signature scheme saves cost from complicated certificate management in PKI and compresses many signatures on different messages signed by different users to one single signature. It is originally required to be secure against a conspiring group of malicious signers (type I adversary) and against malicious KGC (type II adversary). In this paper, we define a novel fundamental type of adversary for certificateless aggregate signature schemes, type III adversary, called malicious KGC & Signers Coalition, who can break Zhang-Zhang scheme. We also propose two new certificateless aggregate schemes which are provably secure against all three types of adversary.
Hong WANG Yue-hua LI Ben-qing WANG
This paper presents a novel signal analysis algorithm, named High-order Bi-orthogonal Fourier Transform (HBFT), which can be seen as an expansion of Fourier transform. The HBFT formula and discrete HBFT formula are derived, some of their main characteristics are briefly discusses. This paper also uses HBFT to analyze the multi-LFM signals, obtain the modulate rate parameters, analyze the high dynamic signals, and obtain the accelerated and varying accelerated motion parameters. The result proves that HBFT is suitable for analysis of the non-stability signals with high-order components.
An aggregate signature scheme,which is an extension of ordinary signature, allows anyone to compress n signatures of n messages from n signers into a single short signature for reducing the size multiple individual signatures. Recently, Liu et al. proposed an efficient certificateless aggregate signature scheme with shorter public key size, constant AS size and with constant pairing computations. Although they proved that the scheme has existential unforgeability against adaptive chosen messages attacks. However, in this paper, two concrete attacks are proposed to show that Liu et al.'s scheme actually does not reach the security as they claimed.
In this letter, we consider the localization problem using received signal strength in wireless sensor networks. Working with a simple non-cooperative scenario in an outdoor localization, we transform the received signal strength measurement model to an alternative optimization problem which is much easier to solve and less complex compared to finding the optimum solutions from the maximum likelihood estimator. Then, we can solve a sequence of nonconvex problems as a range constrainted optimization problem, while the estimated solution also guarantees a monotonic convergence to the original solution. Simulation results confirm the effectiveness of our proposed approach.
Koichi KISE Shinichiro OMACHI Seiichi UCHIDA Masakazu IWAMURA Marcus LIWICKI
This paper reviews several trials of re-designing conventional communication medium, i.e., characters, for enriching their functions by using data-embedding techniques. For example, characters are re-designed to have better machine-readability even under various geometric distortions by embedding a geometric invariant into each character image to represent class label of the character. Another example is to embed various information into handwriting trajectory by using a new pen device, called a data-embedding pen. An experimental result showed that we can embed 32-bit information into a handwritten line of 5 cm length by using the pen device. In addition to those applications, we also discuss the relationship between data-embedding and pattern recognition in a theoretical point of view. Several theories tell that if we have appropriate supplementary information by data-embedding, we can enhance pattern recognition performance up to 100%.
Sumaru NIIDA Satoshi UEMURA Shigehiro ANO
With the rapid growth of high performance ICT (Information Communication Technologies) devices such as smart phones and tablet PCs, multitasking has become one of the popular ways of using mobile devices. The reasons users have adopted multitask operation are that it reduces the level of dissatisfaction regarding waiting time and makes effective use of time by switching their attention from the waiting process to other content. This is a good solution to the problem of waiting; however, it may cause another problem, which is the increase in traffic volume due to the multiple applications being worked on simultaneously. Thus, an effective method to control throughput adapted to the multitasking situation is required. This paper proposes a transmission rate control method for web browsing that takes multitasking behavior into account and quantitatively demonstrates the effect of service by two different field experiments. The main contribution of this paper is to present a service design process for a new transmission rate control that takes into account human-network interaction based on the human-centered approach. We show that the degree of satisfaction in relation to waiting time did not degrade even when a field trial using a testbed showed that throughput of the background task was reduced by 40%.
James LIN Masaya MIYAHARA Akira MATSUZAWA
This paper proposes an ultra-low-voltage, wide signal swing, and clock-scalable differential dynamic amplifier using a common-mode voltage detection technique. The essential characteristics of an amplifier, such as gain, linearity, power consumption, noise, etc., are analyzed. In measurement, the proposed dynamic amplifier achieves a 13dB gain with less than 1dB drop over a differential output signal swing of 340mVpp with a supply voltage of 0.5V. The attained maximum operating frequency is 700MHz. With a 0.7V supply, the gain increases to 16dB with a signal swing of 700mVpp. The prototype amplifier is fabricated in 90nm CMOS technology with the low threshold voltage and the deep N-well options.
Yiqiang SHENG Atsushi TAKAHASHI
In this paper, a novel high-performance heuristic algorithm, named relay-race algorithm (RRA), which was proposed to approach a global optimal solution by exploring similar local optimal solutions more efficiently within shorter runtime for NP-hard problem is investigated. RRA includes three basic parts: rough search, focusing search and relay. The rough search is designed to get over small hills on the solution space and to approach a local optimal solution as fast as possible. The focusing search is designed to reach the local optimal solution as close as possible. The relay is to escape from the local optimal solution in only one step and to maintain search continuity simultaneously. As one of typical applications, multi-objective placement problem in physical design optimization is solved by the proposed RRA. In experiments, it is confirmed that the computational performance is considerably improved. RRA achieves overall Pareto improvement of two conflicting objectives: power consumption and maximal delay. RRA has its potential applications to improve the existing search methods for more hard problems.
Tuan Hung NGUYEN Hiroshi SATO Yoshio KOYANAGI Hisashi MORISHITA
This study presents a proposal for space-saving design of built-in antennas for handset terminals based on the concept of requisite design antenna volume. By investigating the relation between antenna input characteristic and electric near-field around the antenna element and surrounding components inside the terminal, and then evaluating the requisite design antenna volume, we propose the most effective deployment for both the antenna and surrounding components. The results show that our simple proposal can help reduced, by about 17% and 31.75%, the space that the antenna element actually requires at least for stable operation inside the terminal, in the single-band designs for the cellular 2GHz band (1920-2170MHz) and 800MHz band (830-880MHz), respectively. In the dual-band design, we verify that it can reduce, the antenna space by about 35.18%, and completely cover the two above cellular bands with good antenna performance.
Bin SHENG Pengcheng ZHU Xin FANG Wanlin LI
Accurate channel estimation is necessary before we can demodulate orthogonal frequency division multiplexing (OFDM) signals since the radio channel is frequency-selective and time-varying for wideband mobile communication systems. For pilot-symbol-aided channel estimation, pilot sequences are inserted periodically into the data stream enabling coherent detection at receiver. The control signal information can be embedded in pilot sequences and transmitted implicitly in OFDM systems to save the bandwidth. In order to estimate the channel and control signal jointly at the receiver, we propose a novel noise subspace based method in this paper. The proposed method is developed from the DFT-based channel estimator. If the hypothesized sequence coincides with the transmitted pilot sequence, the last part of the channel impulse response (CIR) estimate is only contributed by Gaussian noise and its average power is expected to be the minimum among all possible hypothesized sequences. Simulation results show that the proposed method works well in any of the channels even if integer carrier frequency offset (CFO) is considered.
Ittetsu TANIGUCHI Junya KAIDA Takuji HIEDA Yuko HARA-AZUMI Hiroyuki TOMIYAMA
This paper studies mapping techniques of multiple applications on embedded many-core SoCs. The mapping techniques proposed in this paper are static which means the mapping is decided at design time. The mapping techniques take into account both inter-application and intra-application parallelism in order to fully utilize the potential parallelism of the many-core architecture. Additionally, the proposed static mapping supports dynamic application switching, which means the applications mapped onto the same cores are switched to each other at runtime. Two approaches are proposed for static mapping: one approach is based on integer linear programming and the other is based on a greedy algorithm. Experimental results show the effectiveness of the proposed techniques.
Yohei KATAYAMA Takehito YAMAMOTO Yukio TSUKISHIMA Kazuhisa YAMADA Noriyuki TAKAHASHI Atsushi TAKAHARA Akihiro NAKAO
Due to the recent network service market trends, network infrastructure providers must make their network infrastructures tolerant of network service complexity and swift at providing new network services. To achieve this, we first make a design decision for the single domain network infrastructure in which we use network virtualization and separate the network service control and management from the network infrastructure and leave the resource connectivity control and management in the network infrastructure so that the infrastructure can maintain simplicity and the network service can become complex and be quickly provided. Along with the decision, we construct an architecture of the network infrastructure and a network management model. The management model defines a slice as being determined by abstracted resource requirements and restructures the roles and planes from the viewpoint of network infrastructure usability so that network service requesters can manage network resources freely and swiftly in an abstract manner within the authorities the network infrastructure operator provides. We give the details of our design and implementation for a network virtualization management system along with the model. We deployed and evaluated our designed and implemented management system on the Japan national R&E testbed (JGN-X) to confirm the feasibility of our management system design and discuss room for improvement in terms of response time and scalability towards practical use. We also investigated certain cases of sophisticated network functions to confirm that the infrastructure can accept these functions without having to be modified.
Kazushi MURAOKA Kazuhiko FUKAWA Hiroshi SUZUKI Satoshi SUYAMA
Joint signal detection and channel estimation based on the expectation-maximization (EM) algorithm has been investigated for multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) mobile communications over fast-fading channels. The previous work in [20] developed a channel estimation method suitable for the EM-based iterative receiver. However, it remained possible for unreliable received signals to be repetitively used during the iterative process. In order to improve the EM-based iterative receiver further, this paper proposes spatial removal from the perspective of a message-passing algorithm on factor graphs. The spatial removal performs the channel estimation of a targeted antenna by using detected signals that are obtained from the received signals of all antennas other than the targeted antenna. It can avoid the repetitive use of unreliable received signals for consecutive signal detection and channel estimation. Appropriate applications of the spatial removal are also discussed to exploit both the removal effect and the spatial diversity. Computer simulations under fast-fading conditions demonstrate that the appropriate applications of the spatial removal can improve the packet error rate (PER) of the EM-based receiver thanks to both the removal effect and the spatial diversity.
Akitoshi ITAI Hiroshi YASUKAWA Ichi TAKUMI Masayasu HATA
This paper proposes a background noise estimation method using an outer product expansion with non-linear filters for ELF (extremely low frequency) electromagnetic (EM) waves. We proposed a novel source separation technique that uses a tensor product expansion. This signal separation technique means that the background noise, which is observed in almost all input signals, can be estimated using a tensor product expansion (TPE) where the absolute error (AE) is used as the error function, which is thus known as TPE-AE. TPE-AE has two problems: the first is that the results of TPE-AE are strongly affected by Gaussian random noise, and the second is that the estimated signal varies widely because of the random search. To solve these problems, an outer product expansion based on a modified trimmed mean (MTM) is proposed in this paper. The results show that this novel technique separates the background noise from the signal more accurately than conventional methods.
Pramual CHOORAT Werapon CHIRACHARIT Kosin CHAMNONGTHAI Takao ONOYE
In developing an automatic system of a single tooth length measurement on x-ray image, since a tooth shape is assumed to be straight and curve, an algorithm which can accurately deal with straight and curve is required. This paper proposes an automatic algorithm for measuring the length of single straight and curve teeth. In the algorithm consisting of control point determination, curve fitting, and length measurement, PCA is employed to find the first and second principle axes as vertical and horizontal ones of the tooth, and two terminal points of vertical axis and the junction of those axes are determined as three first-order control points. Signature is then used to find a peak representing tooth root apex as the forth control point. Bezier curve, Euclidean distance, and perspective transform are finally applied with determined four control points in curve fitting and tooth length measurement. In the experiment, comparing with the conventional PCA-based method, the average mean square error (MSE) of the line points plotted by the expert is reduced from 7.548 pixels to 4.714 pixels for tooth image type-I, whereas the average MSE value is reduced from 7.713 pixels and 7.877 pixels to 4.809 pixels and 5.253 pixels for left side and right side of tooth image type-H, respectively.