The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] sign(2667hit)

1321-1340hit(2667hit)

  • Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment

    Younho LEE  Yongsu PARK  Heeyoul KIM  Seong-Min HONG  Hyunsoo YOON  

     
    LETTER-Application Information Security

      Vol:
    E89-D No:8
      Page(s):
    2452-2455

    The security vulnerabilities of a number of provable secure proxy signature schemes are examined with the assumption that users can register their public keys without having corresponding private keys. This assumption is different from that of a standard proxy signature in which the public keys of users are authentic. Under this assumption, both the Triple Schnorr scheme and Kang et al's scheme are shown to be vulnerable to a rogue public key registration attack. This attack gives an adversary the ability to generate a proxy signature without the valid agreement of the original signer. Moreover, it is shown that an adversary can manipulate the description of a delegated signing right at will. This work can be considered as an awakening to the importance of Proof of Possession (PoP) in the PKI environment, as in many cases certificate authorities do not require the PoP protocol, as has been stated [1].

  • A New Design of Polynomial Neural Networks in the Framework of Genetic Algorithms

    Dongwon KIM  Gwi-Tae PARK  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E89-D No:8
      Page(s):
    2429-2438

    We discuss a new design methodology of polynomial neural networks (PNN) in the framework of genetic algorithm (GA). The PNN is based on the ideas of group method of data handling (GMDH). Each node in the network is very flexible and can carry out polynomial type mapping between input and output variables. But the performances of PNN depend strongly on the number of input variables available to the model, the number of input variables, and the type (order) of the polynomials to each node. In this paper, GA is implemented to better use the optimal inputs and the order of polynomial in each node of PNN. The appropriate inputs and order are evolved accordingly and are tuned gradually throughout the GA iterations. We employ a binary coding for encoding key factors of the PNN into the chromosomes. The chromosomes are made of three sub-chromosomes which represent the order, number of inputs, and input candidates for modeling. To construct model by using significant approximation and generalization, we introduce the fitness function with a weighting factor. Comparisons with other modeling methods and conventional PNN show that the proposed design method offers encouraging advantages and better performance.

  • Dynamic Characteristic Analysis and Optimization for the Energy-Saving and Bounce-Reducing Double-Coil Contactor

    Degui CHEN  Yingyi LIU  Weixiong TONG  

     
    PAPER-Contactors & Circuit Breakers

      Vol:
    E89-C No:8
      Page(s):
    1194-1200

    In the optimum design of contactors, it is important to analyze the dynamic behaviors. In this paper, it proposes a new computational approach for analyzing dynamic characteristic of the energy-saving and bouncing-reducing double-coil contactor. According to the contactor's unique characteristic that it has two transferable coils, the paper builds two different sets of equations. One describes the period before the transfer position, and the other describes the period after the transfer position. The equations deal with the electrical circuit, electromagnetic field that can be calculated by using 3-D finite element method and mechanical system considering the influence of friction. The validity of the proposed method is confirmed by experiment. Finally, the paper gives an optimum design for the transfer position of the two coils. The result of the optimum design reduces both of the first and the second bounces of the movable contact.

  • InP DHBT Integrated Circuits for Fiber-Optic High-Speed Applications

    Jean GODIN  Agnieszka KONCZYKOWSKA  Muriel RIET  Jacques MOULU  Philippe BERDAGUER  Filipe JORGE  

     
    INVITED PAPER

      Vol:
    E89-C No:7
      Page(s):
    883-890

    Various mixed-signal very-high-speed integrated circuits have been developed using InP DHBTs. These circuits have been designed for fiber-optic 43 Gbit/s transmissions applications. They include: on the transmitting side, a clocked driver and an EAM driver, as well as a PSBT/DQPSK precoder; on the receiving side, a sensitive decision circuit, a limiting amplifier and an eye monitor. System experiments made possible by these circuits include a 6 Tbit/s transmission on >6000 km distance.

  • Adaptive Morse Code Recognition Using Support Vector Machines for Persons with Physical Disabilities

    Cheng-Hong YANG  Li-Yeh CHUANG  Cheng-Huei YANG  Ching-Hsing LUO  

     
    PAPER-Digital Signal Processing

      Vol:
    E89-A No:7
      Page(s):
    1995-2002

    In this paper, Morse code is selected as a communication adaptive device for persons whose hand coordination and dexterity are impaired by such ailments as amyotrophic lateral sclerosis, multiple sclerosis, muscular dystrophy, and other severe handicaps. Morse code is composed of a series of dots, dashes, and space intervals, and each element is transmitted by sending a signal for a defined length of time. A suitable adaptive automatic recognition method is needed for persons with disabilities due to their difficulty in maintaining a stable typing rate. To overcome this problem, the proposed method combines the support vector machines method with a variable degree variable step size LMS algorithm. The method is divided into five stages: tone recognition, space recognition, training process, adaptive processing, and character recognition. Statistical analyses demonstrated that the proposed method elicited a better recognition rate in comparison to alternative methods from the literature.

  • Transmission Performance Evaluation for Designing an OFDM Transmitter That Offers Iterative Peak Reduction

    Akiko KUBO  Shigeru TOMISATO  Masaharu HATA  Hitoshi YOSHINO  

     
    LETTER

      Vol:
    E89-A No:7
      Page(s):
    1968-1971

    One of the key technologies to realize future broadband mobile communications is orthogonal frequency division multiplexing (OFDM) transmission. However, the peak-to-average power ratio (PAPR) in OFDM transmission is so much larger than that in single carrier transmission that its adoption in mobile communication systems is uncertain. This paper evaluates the transmission performance possible with iterative peak reduction to design more efficient OFDM transmitters. The PAPR reduction effect and bit error rate (BER) performance are clarified by computer simulations. We calculate the set PAPR value that achieves a target PAPR in the iterative peak reduction method. The required Eb/N0 performance is evaluated under the calculated PAPR condition. The results are effective in designing the back-off value of a transmission power amplifier given fixed transmission quality and computational complexity.

  • Blocking Probability of a DS-CDMA Multi-Hop Virtual Cellular Network

    Lalla Soundous EL ALAMI  Eisuke KUDOH  Fumiyuki ADACHI  

     
    PAPER

      Vol:
    E89-A No:7
      Page(s):
    1875-1883

    A wireless multi-hop virtual cellular network (VCN) was recently proposed to avoid the large peak transmit power, resulting from the high transmission rates expected for future mobile communication systems. In VCN, calls hop through several links to reach the central port, which is the gateway to the network. With the use of a routing algorithm based on the total uplink transmit power minimization criterion, the total transmit power of all the multi-hop links between the mobile terminal and the central port can be significantly reduced, in comparison with the present (single-hop) cellular network. In this paper, an "on-demand" channel assignment strategy, using the channel segregation dynamic channel allocation (CS-DCA) algorithm, is proposed for multi-hop DS-CDMA VCN. Computer simulation is conducted to evaluate the blocking probability performance and make a comparison between the VCN and the present cellular network.

  • Skeletons and Asynchronous RPC for Embedded Data and Task Parallel Image Processing

    Wouter CAARLS  Pieter JONKER  Henk CORPORAAL  

     
    PAPER-Parallel and Distributed Computing

      Vol:
    E89-D No:7
      Page(s):
    2036-2043

    Developing embedded parallel image processing applications is usually a very hardware-dependent process, often using the single instruction multiple data (SIMD) paradigm, and requiring deep knowledge of the processors used. Furthermore, the application is tailored to a specific hardware platform, and if the chosen hardware does not meet the requirements, it must be rewritten for a new platform. We have proposed the use of design space exploration [9] to find the most suitable hardware platform for a certain application. This requires a hardware-independent program, and we use algorithmic skeletons [5] to achieve this, while exploiting the data parallelism inherent to low-level image processing. However, since different operations run best on different kinds of processors, we need to exploit task parallelism as well. This paper describes how we exploit task parallelism using an asynchronous remote procedure call (RPC) system, optimized for low-memory and sparsely connected systems such as smart cameras. It uses a futures [16]-like model to present a normal imperative C-interface to the user in which the skeleton calls are implicitly parallelized and pipelined. Simulation provides the task dependency graph and performance numbers for the mapping, which can be done at run time to facilitate data dependent branching. The result is an easy to program, platform independent framework which shields the user from the parallel implementation and mapping of his application, while efficiently utilizing on-chip memory and interconnect bandwidth.

  • Multi-Dimensional Mappings of M-ary Constellations for BICM-ID Systems

    Nghi H. TRAN  Ha H. NGUYEN  

     
    LETTER-Coding Theory

      Vol:
    E89-A No:7
      Page(s):
    2088-2091

    This paper studies bit-interleaved coded modulation with iterative decoding (BICM-ID) systems that employ multi-dimensional mappings of M-ary constellations to improve the error performance over Rayleigh fading channels. Based on the analytical evaluations of the asymptotic bit error probability (BEP), the distance criteria for the mapping designs can be obtained. A binary switching algorithm (BSA) is then applied to find the optimal mappings with respect to the asymptotic performance. Simulation and analytical results show that the use of multi-dimensional mappings of M-ary constellations can significantly improve the error performance.

  • A Transcutaneous Recharging System with the Function of Bi-directional Signal Transmission for Fully-Implantable Middle Ear Hearing Devices

    Il-Yong PARK  Hyung-Gyu LIM  Young-Ho YOON  Min-Kyu KIM  Byung-Seop SONG  Jin-Ho CHO  

     
    LETTER

      Vol:
    E89-A No:6
      Page(s):
    1692-1694

    In this paper, for the fully-implantable middle ear hearing devices (F-IMEHD), a transcutaneous recharging system that has the function of the bi-directional signal transmission with the implant module in a body as well as recharging battery has been designed and implemented. The electromagnetic coupling method using two coils has been adopted for the transfer of electrical power to recharge internal battery of the implant module. To increase the efficiency of power transfer, the switching frequency of recharging system is determined by the consideration of the resonance of LC tank circuits. The bidirectional signal transmission between the recharging system and the implant module has been designed through the on-off keying modulation of switching signal in the recharging system and the impedance variation of LC tank circuit in the implant module. Through the demonstration of the implemented system, it has been verified that the proposed system has the performance of bidirectional signal transmission with the implant module of F-IMEHDs as well as the battery recharging.

  • An Efficient Architecture of High-Performance Deblocking Filter for H.264/AVC

    Seonyoung LEE  Kyeongsoon CHO  

     
    LETTER

      Vol:
    E89-A No:6
      Page(s):
    1736-1739

    We devised an efficient architecture of deblocking filter and implemented the circuit with 15,400 logic gates and a 16032 dual-port SRAM using 0.25 µm standard cell technology. This circuit can process 88 image frames with 1,280720 pixels per second at 166 MHz. Our circuit requires smaller number of accesses to the external memory than other approaches and hence causes less bus traffic in the SoC design platform.

  • An On-Chip Multi-Channel Rail-to-Rail Signal Monitoring Technique for Sub-100-nm Digital Signal Integrity

    Koichiro NOGUCHI  Makoto NAGATA  

     
    PAPER

      Vol:
    E89-C No:6
      Page(s):
    761-768

    A compact on-chip signal monitor circuit uses voltage mode sensing by a source follower circuit with small input device geometry, followed by a current-mode sample and a hold circuit that is connected to a shared current output bus. A prototype signal monitor circuit demonstrated a 1.1-GHz effective bandwidth for 1.0-V full-swing digital signals in a 90-nm CMOS technology, where the monitor used 2.5-V I/O CMOS transistors and occupied a 30 µm120 µm silicon area. We also showed that such signal monitor circuits can be tailored to sense of power-supply, ground, as well as full-swing logic signal wirings, and form an array with a single current output. Therefore, an on-chip multi-channel signal monitor enables multiple-points as well as multiple-voltage domain waveform acquisition for the purpose of the in-depth study of digital signal integrity.

  • Digital Encoding Applied to Sign Language Video

    Kaoru NAKAZONO  Yuji NAGASHIMA  Akira ICHIKAWA  

     
    PAPER-Service and System

      Vol:
    E89-D No:6
      Page(s):
    1893-1900

    We report a specially designed encoding technique for sign language video sequences supposing that the technique is for sign telecommunication such as that using mobile videophones with a low bitrate. The technique is composed of three methods: gradient coding, precedence macroblock coding, and not-coded coding. These methods are based on the idea to distribute a certain number of bits for each macroblock according to the evaluation of importance of parts of the picture. They were implemented on a computer and encoded data of a short clip of sign language dialogue was evaluated by deaf subjects. As a result, the efficiency of the technique was confirmed.

  • An Interactive Multimedia Instruction System: IMPRESSION for Double Loop Instructional Design Process Model

    Yuki HIGUCHI  Takashi MITSUISHI  Kentaro GO  

     
    PAPER-Service and System

      Vol:
    E89-D No:6
      Page(s):
    1877-1884

    In this paper, we propose an interactive instruction system named IMPRESSION, which allows performance of interactive presentations using multimedia educational materials in class. In recent years, although many practices of educational methodology with information technology and presentation tools using multimedia resources as educational materials have come into common use, instructors can only present such materials in a slide-sheet form through the use of such presentation tools in class. Therefore, instructors can neither do formative evaluations nor can they present suitable materials according to students' reactions in class. Our proposed methodology employs a scenario-based approach in a double loop instructional design process to overcome such problems. Instructors design an instructional plan as a scenario, and subsequently implement and modify the plan through formative evaluation during the class. They then conduct a summative evaluation based on planned and implemented instructions for redesign. To realize our methodology, in this paper we propose and design an instruction system that provides functions to select and present multimedia materials interactively provided on the Internet during the class; we then record these instructions. After implementing it, we confirmed that we can conduct the class flexibly based on our methodology through its practical use in an actual classroom environment.

  • Consideration of the Embodiment of a New, Human-Centered Interface

    Kyuwan CHOI  Makoto SATO  Yasuharu KOIKE  

     
    PAPER-Robot and Interface

      Vol:
    E89-D No:6
      Page(s):
    1826-1833

    In this study, we achieved predictable control of a wheelchair by changing the existing mapping method of the joystick, which considers the consecutive operations of a motor of a wheelchair, to a new mapping method that corresponds to the internal model of a human being. Since the existing method uses the polar coordinate system, it is not easy at all to use this method to predict either the direction of motion or the operating order for changing the position of the wheelchair according to the requirements of an operator. In order to improve the embodiment, we divided the existing joystick mapping method into two degrees of freedom-one in the vertical axis that can control the velocity and the other, in the horizontal axis for direction control. Based on this division, we implemented a wheelchair model that can be controlled by the electromyography (EMG) signal from the neck and the arm muscles of an operator. This was achieved by mapping the divided degrees of freedom onto the degrees of freedom of the neck and arm of the operator. In this case, since the operator controls the direction of motion by the joint of his/her neck, he/she can move the wheelchair in the desired direction; thus, a more intuitive human interface is implemented.

  • An Enhanced Time-Domain Circuit Simulation Technique Based on LIM

    Hidemasa KUBOTA  Yuichi TANJI  Takayuki WATANABE  Hideki ASAI  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E89-A No:5
      Page(s):
    1505-1506

    In this paper, we show the generalized method of the time-domain circuit simulation based on LIM. Our method is applicable to any structure of circuits by combination with the SPICE-like method. In order to show the validity and efficiency of our method, an example circuit is simulated and the proposed method is compared with the conventional ones.

  • Signature Scheme in Multi-User Setting

    Chik-How TAN  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1339-1345

    Recently, Boneh and Boyen proposed a new provably secure short signature scheme under the q-strong Diffie-Hellman assumption without random oracles. This scheme is based on bilinear map which is different from Cramer-Shoup signature scheme (which is based on the strong RSA assumption). However, Tan [17] showed that Boneh- Boyen scheme is subjected to key substitution attacks in the multi-user setting. In this paper, we propose a new signature scheme. We prove that the proposed scheme is provably secured against existential forgery under adaptive chosen message attack in the standard model and also secure against key substitution attacks.

  • 2-D Laplace-Z Transformation

    Yang XIAO  Moon Ho LEE  

     
    LETTER-Digital Signal Processing

      Vol:
    E89-A No:5
      Page(s):
    1500-1504

    Based on recent results for 2-D continuous-discrete systems, this paper develops 2-D Laplace-z transform, which can be used to analyze 2-D continuous-discrete signals and system in Laplace-z hybrid domain. Current 1-D Laplace transformation and z transform can be combined into the new 2-D s-z transform. However, 2-D s-z transformation is not a simple extension of 1-D transform, in 2-D case, we need consider the 2-D boundary conditions which don't occur in 1-D case. The hybrid 2-D definitions and theorems are given in the paper. To verify the results of this paper, we also derived a numerical inverse 2-D Laplace-z transform, applying it to show the 2-D pulse response of a stable 2-D continuous-discrete system.

  • A Note on Construction of Orthogonal Arrays with Unequal Strength from Error-Correcting Codes

    Tomohiko SAITO  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1307-1315

    Orthogonal Arrays (OAs) have been playing important roles in the field of experimental design. It has been known that OAs are closely related to error-correcting codes. Therefore, many OAs can be constructed from error-correcting codes. But these OAs are suitable for only cases that equal interaction effects can be assumed, for example, all two-factor interaction effects. Since these cases are rare in experimental design, we cannot say that OAs from error-correcting codes are practical. In this paper, we define OAs with unequal strength. In terms of our terminology, OAs from error-correcting codes are OAs with equal strength. We show that OAs with unequal strength are closer to practical OAs than OAs with equal strength. And we clarify the relation between OAs with unequal strength and unequal error-correcting codes. Finally, we propose some construction methods of OAs with unequal strength from unequal error-correcting codes.

  • Group Signature Schemes with Membership Revocation for Large Groups

    Toru NAKANISHI  Nobuo FUNABIKI  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1275-1283

    Group signature schemes with membership revocation have been intensively researched. However, signing and/or verification of some existing schemes have computational costs of O(R), where R is the number of revoked members. Existing schemes using a dynamic accumulator or a similar technique have efficient signing and verifications with O(1) complexity. However, before signing, the signer has to modify his secret key with O(N) or O(R) complexity, where N is the group size. Therefore, for larger groups, signers suffer from enormous costs. On the other hand, an efficient scheme for middle-scale groups with about 1,000 members is previously proposed, where the signer need not modify his secret key. However this scheme also suffers from heavy signing/verification costs for larger groups with more than 10,000 members. In this paper, we adapt the middle-scale scheme to larger groups ranging from 1,000 to 1,000,000 members. At the sacrifice of the group manager's slight cost, our signing/verification is sufficiently efficient.

1321-1340hit(2667hit)