The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] tin(3578hit)

1-20hit(3578hit)

  • Differential-Neural Cryptanalysis on AES Open Access

    Liu ZHANG  Zilong WANG  Jinyu LU  

     
    LETTER-Information Network

      Pubricized:
    2024/06/20
      Vol:
    E107-D No:10
      Page(s):
    1372-1375

    Based on the framework of a multi-stage key recovery attack for a large block cipher, 2 and 3-round differential-neural distinguishers were trained for AES using partial ciphertext bits. The study introduces the differential characteristics employed for the 2-round ciphertext pairs and explores the reasons behind the near 100% accuracy of the 2-round differential neural distinguisher. Utilizing the trained 2-round distinguisher, the 3-round subkey of AES is successfully recovered through a multi-stage key guessing. Additionally, a complexity analysis of the attack is provided, validating the effectiveness of the proposed method.

  • 3D Parallel ReRAM Computation-in-Memory for Hyperdimensional Computing Open Access

    Fuyuki KIHARA  Chihiro MATSUI  Ken TAKEUCHI  

     
    BRIEF PAPER

      Pubricized:
    2024/04/16
      Vol:
    E107-C No:10
      Page(s):
    436-439

    In this work, we propose a 1T1R ReRAM CiM architecture for Hyperdimensional Computing (HDC). The number of Source Lines and Bit Lines is reduced by introducing memory cells that are connected in series, which is especially advantageous when using a 3D implementation. The results of CiM operations contain errors, but HDC is robust against them, so that even if the XNOR operation has an error of 25%, the inference accuracy remains above 90%.

  • Sub-60-mV Charge Pump and its Driver Circuit for Extremely Low-Voltage Thermoelectric Energy Harvesting Open Access

    Hikaru SEBE  Daisuke KANEMOTO  Tetsuya HIROSE  

     
    PAPER

      Pubricized:
    2024/04/09
      Vol:
    E107-C No:10
      Page(s):
    400-407

    Extremely low-voltage charge pump (ELV-CP) and its dedicated multi-stage driver (MS-DRV) for sub-60-mV thermoelectric energy harvesting are proposed. The proposed MS-DRV utilizes the output voltages of each ELV-CP to efficiently boost the control clock signals. The boosted clock signals are used as switching signals for each ELV-CP and MS-DRV to turn switch transistors on and off. Moreover, reset transistors are added to the MS-DRV to ensure an adequate non-overlapping period between switching signals. Measurement results demonstrated that the proposed MS-DRV can generate boosted clock signals of 350 mV from input voltage of 60 mV. The ELV-CP can boost the input voltage of 100 mV with 10.7% peak efficiency. The proposed ELV-CP and MS-DRV can boost the low input voltage of 56 mV.

  • Chaos and Synchronization - Potential Ingredients of Innovation in Analog Circuit Design? Open Access

    Ludovico MINATI  

     
    INVITED PAPER

      Pubricized:
    2024/03/11
      Vol:
    E107-C No:10
      Page(s):
    376-391

    Recent years have seen a general resurgence of interest in analog signal processing and computing architectures. In addition, extensive theoretical and experimental literature on chaos and analog chaotic oscillators exists. One peculiarity of these circuits is the ability to generate, despite their structural simplicity, complex spatiotemporal patterns when several of them are brought towards synchronization via coupling mechanisms. While by no means a systematic survey, this paper provides a personal perspective on this area. After briefly covering design aspects and the synchronization phenomena that can arise, a selection of results exemplifying potential applications is presented, including in robot control, distributed sensing, reservoir computing, and data augmentation. Despite their interesting properties, the industrial applications of these circuits remain largely to be realized, seemingly due to a variety of technical and organizational factors including a paucity of design and optimization techniques. Some reflections are given regarding this situation, the potential relevance to discontinuous innovation in analog circuit design of chaotic oscillators taken both individually and as synchronized networks, and the factors holding back the transition to higher levels of technology readiness.

  • Uniform Microwave Heating via Electromagnetic Coupling Using Zeroth-Order Resonators Open Access

    Baku TAKAHARA  Tomohiko MITANI  Naoki SHINOHARA  

     
    PAPER

      Pubricized:
    2024/04/09
      Vol:
    E107-C No:10
      Page(s):
    340-348

    We propose microwave heating via electromagnetic coupling using zeroth-order resonators (ZORs) to extend the uniform heating area. ZORs can generate resonant modes with a wavenumber of 0, which corresponds to an infinite guide wavelength. Under this condition, uniform heating is expected because the resulting standing waves would not have nodes or antinodes. In the design proposed in this paper, two ZORs fabricated on dielectric substrates are arranged to face each other for electromagnetic coupling, and a sample placed between the resonators is heated. A single ZOR was investigated using a 3D electromagnetic simulator, and the resonant frequency and electric field distribution of the simulated ZOR were confirmed to be in good agreement with those of the fabricated ZOR. Simulations of two ZORs facing each other were then conducted to evaluate the performance of the proposed system as a heating apparatus. It was found that a resonator spacing of 25 mm was suitable for uniform heating. Heating simulations of SiC and Al2O3 sheets were performed with the obtained structure. The heating uniformity was evaluated by the width L50% over which the power loss distribution exceeds half the maximum value. This evaluation index was equal to 0.397λ0 for SiC and 0.409λ0 for Al2O3, both of which exceed λ0/4, the distance between a neighboring node and antinode of a standing wave, where λ0 is the free-space wavelength. Therefore, the proposed heating apparatus is effective for uniform microwave heating. Because of the different electrical parameters of the heated materials, SiC can be easily heated, whereas Al2O3 heats little. Finally, heating experiments were performed on each of these materials. Good uniformity in temperature was obtained for both SiC and Al2O3 sheets.

  • GaN Solid State Power Amplifiers for Microwave Power Transfer and Microwave Heating Open Access

    Koji YAMANAKA  Kazuhiro IYOMASA  Takumi SUGITANI  Eigo KUWATA  Shintaro SHINJO  

     
    INVITED PAPER

      Pubricized:
    2024/04/09
      Vol:
    E107-C No:10
      Page(s):
    292-298

    GaN solid state power amplifiers (SSPA) for wireless power transfer and microwave heating have been reviewed. For wireless power transfer, 9 W output power with 79% power added efficiency at 5.8 GHz has been achieved. For microwave heating, 450 W output power with 70% drain efficiency at 2.45 GHz has been achieved. Microwave power concentration and uniform microwave heating by phase control of multiple SSPAs are demonstrated.

  • Microwave Chemistry as a Candidate of Electrification Technology toward Carbon Neutrality—Microwave Magnesium Smelting as an Example Open Access

    Yuji WADA  

     
    INVITED PAPER

      Pubricized:
    2024/04/23
      Vol:
    E107-C No:10
      Page(s):
    288-291

    Japan encounters an urgent issue of “Carbon Neutrality” as a member of the international world and is required to make the action plans to accomplish this issue, i.e., the zero emission of CO2 by 2050. Our world must change the industries to adapt to the electrification based on the renewable powers. Microwave chemistry is a candidate of electrification of industries for the carbon neutrality on the conditions of usage of renewable energy power generation. This invited paper shows an example of “Microwave Pidgeon process” for smelting magnesium in which heating with burning fossil coals can be replaced with microwave energy for discussing how microwave technology should be developed for that purpose from both the academic and industrial sides.

  • EfficientNet Empowered by Dendritic Learning for Diabetic Retinopathy Open Access

    Zeyuan JU  Zhipeng LIU  Yu GAO  Haotian LI  Qianhang DU  Kota YOSHIKAWA  Shangce GAO  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2024/05/20
      Vol:
    E107-D No:9
      Page(s):
    1281-1284

    Medical imaging plays an indispensable role in precise patient diagnosis. The integration of deep learning into medical diagnostics is becoming increasingly common. However, existing deep learning models face performance and efficiency challenges, especially in resource-constrained scenarios. To overcome these challenges, we introduce a novel dendritic neural efficientnet model called DEN, inspired by the function of brain neurons, which efficiently extracts image features and enhances image classification performance. Assessments on a diabetic retinopathy fundus image dataset reveal DEN’s superior performance compared to EfficientNet and other classical neural network models.

  • Joint Optimization of Task Offloading and Resource Allocation for UAV-Assisted Edge Computing: A Stackelberg Bilayer Game Approach Open Access

    Peng WANG  Guifen CHEN  Zhiyao SUN  

     
    PAPER-Information Network

      Pubricized:
    2024/05/21
      Vol:
    E107-D No:9
      Page(s):
    1174-1181

    Unmanned Aerial Vehicle (UAV)-assisted Mobile Edge Computing (MEC) can provide mobile users (MU) with additional computing services and a wide range of connectivity. This paper investigates the joint optimization strategy of task offloading and resource allocation for UAV-assisted MEC systems in complex scenarios with the goal of reducing the total system cost, consisting of task execution latency and energy consumption. We adopt a game theoretic approach to model the interaction process between the MEC server and the MU Stackelberg bilayer game model. Then, the original problem with complex multi-constraints is transformed into a duality problem using the Lagrangian duality method. Furthermore, we prove that the modeled Stackelberg bilayer game has a unique Nash equilibrium solution. In order to obtain an approximate optimal solution to the proposed problem, we propose a two-stage alternating iteration (TASR) algorithm based on the subgradient method and the marginal revenue optimization method. We evaluate the effective performance of the proposed algorithm through detailed simulation experiments. The simulation results show that the proposed algorithm is superior and robust compared to other benchmark methods and can effectively reduce the task execution latency and total system cost in different scenarios.

  • Stop-Probability-Based Network Topology Discovery Method Open Access

    Yuguang ZHANG  Zhiyong ZHANG  Wei ZHANG  Deming MAO  Zhihong RAO  

     
    PAPER-Network

      Vol:
    E107-B No:9
      Page(s):
    583-594

    Using a limited number of probes has always been a focus in interface-level network topology probing to discover complete network topologies. Stop-set-based network topology probing methods significantly reduce the number of probes sent but suffer from the side effect of incomplete topology information discovery. This study proposes an optimized probing method based on stop probabilities (SPs) that builds on existing stop-set-based network topology discovery methods to address the issue of incomplete topology information owing to multipath routing. The statistics of repeat nodes (RNs) and multipath routing on the Internet are analyzed and combined with the principles of stop-set-based probing methods, highlighting that stopping probing at the first RN compromises the completeness of topology discovery. To address this issue, SPs are introduced to adjust the stopping strategy upon encountering RNs during probing. A method is designed for generating SPs that achieves high completeness and low cost based on the distribution of the number of RNs. Simulation experiments demonstrate that the proposed stop-probability-based probing method almost completely discovers network nodes and links across different regions and times over a two-year period, while significantly reducing probing redundancy. In addition, the proposed approach balances and optimizes the trade-off between complete topology discovery and reduced probing costs compared with existing topology probing methods. Building on this, the factors influencing the probing cost of the proposed method and methods to further reduce the number of probes while ensuring completeness are analyzed. The proposed method yields universally applicable SPs in the current Internet environment.

  • On Weighted-Sum Orthogonal Latin Squares and Secret Sharing Open Access

    Koji NUIDA  Tomoko ADACHI  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2023/12/19
      Vol:
    E107-A No:9
      Page(s):
    1492-1495

    Latin squares are a classical and well-studied topic of discrete mathematics, and recently Takeuti and Adachi (IACR ePrint, 2023) proposed (2, n)-threshold secret sharing based on mutually orthogonal Latin squares (MOLS). Hence efficient constructions of as large sets of MOLS as possible are also important from practical viewpoints. In this letter, we determine the maximum number of MOLS among a known class of Latin squares defined by weighted sums. We also mention some known property of Latin squares interpreted via the relation to secret sharing and a connection of Takeuti-Adachi’s scheme to Shamir’s secret sharing scheme.

  • International Competition on Graph Counting Algorithms 2023 Open Access

    Takeru INOUE  Norihito YASUDA  Hidetomo NABESHIMA  Masaaki NISHINO  Shuhei DENZUMI  Shin-ichi MINATO  

     
    INVITED PAPER-Algorithms and Data Structures

      Pubricized:
    2024/01/15
      Vol:
    E107-A No:9
      Page(s):
    1441-1451

    This paper reports on the details of the International Competition on Graph Counting Algorithms (ICGCA) held in 2023. The graph counting problem is to count the subgraphs satisfying specified constraints on a given graph. The problem belongs to #P-complete, a computationally tough class. Since many essential systems in modern society, e.g., infrastructure networks, are often represented as graphs, graph counting algorithms are a key technology to efficiently scan all the subgraphs representing the feasible states of the system. In the ICGCA, contestants were asked to count the paths on a graph under a length constraint. The benchmark set included 150 challenging instances, emphasizing graphs resembling infrastructure networks. Eleven solvers were submitted and ranked by the number of benchmarks correctly solved within a time limit. The winning solver, TLDC, was designed based on three fundamental approaches: backtracking search, dynamic programming, and model counting or #SAT (a counting version of Boolean satisfiability). Detailed analyses show that each approach has its own strengths, and one approach is unlikely to dominate the others. The codes and papers of the participating solvers are available: https://afsa.jp/icgca/.

  • Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis Open Access

    Gao WANG  Gaoli WANG  Siwei SUN  

     
    PAPER-Information Network

      Pubricized:
    2024/04/12
      Vol:
    E107-D No:8
      Page(s):
    1016-1028

    At Crypto 2019, Gohr first adopted the neural distinguisher for differential cryptanalysis, and since then, this work received increasing attention. However, most of the existing work focuses on improving and applying the neural distinguisher, the studies delving into the intrinsic principles of neural distinguishers are finite. At Eurocrypt 2021, Benamira et al. conducted a study on Gohr’s neural distinguisher. But for the neural distinguishers proposed later, such as the r-round neural distinguishers trained with k ciphertext pairs or ciphertext differences, denoted as NDcpk_r (Gohr’s neural distinguisher is the special NDcpk_r with K = 1) and NDcdk_r , such research is lacking. In this work, we devote ourselves to study the intrinsic principles and relationship between NDcdk_r and NDcpk_r. Firstly, we explore the working principle of NDcd1_r through a series of experiments and find that it strongly relies on the probability distribution of ciphertext differences. Its operational mechanism bears a strong resemblance to that of NDcp1_r given by Benamira et al.. Therefore, we further compare them from the perspective of differential cryptanalysis and sample features, demonstrating the superior performance of NDcp1_r can be attributed to the relationships between certain ciphertext bits, especially the significant bits. We then extend our investigation to NDcpk_r, and show that its ability to recognize samples heavily relies on the average differential probability of k ciphertext pairs and some relationships in the ciphertext itself, but the reliance between k ciphertext pairs is very weak. Finally, in light of the findings of our research, we introduce a strategy to enhance the accuracy of the neural distinguisher by using a fixed difference to generate the negative samples instead of the random one. Through the implementation of this approach, we manage to improve the accuracy of the neural distinguishers by approximately 2% to 8% for 7-round Speck32/64 and 9-round Simon32/64.

  • Delta-Sigma Domain Signal Processing Revisited with Related Topics in Stochastic Computing Open Access

    Takao WAHO  Akihisa KOYAMA  Hitoshi HAYASHI  

     
    PAPER

      Pubricized:
    2024/04/17
      Vol:
    E107-D No:8
      Page(s):
    966-975

    Signal processing using delta-sigma modulated bit streams is reviewed, along with related topics in stochastic computing (SC). The basic signal processing circuits, adders and multipliers, are covered. In particular, the possibility of preserving the noise-shaping properties inherent in delta-sigma modulation during these operations is discussed. Finally, the root mean square error for addition and multiplication is evaluated, and the performance improvement of signal processing in the delta-sigma domain compared with SC is verified.

  • Triangle Projection Algorithm in ADMM-LP Decoding of LDPC Codes Open Access

    Yun JIANG  Huiyang LIU  Xiaopeng JIAO  Ji WANG  Qiaoqiao XIA  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2024/03/18
      Vol:
    E107-A No:8
      Page(s):
    1364-1368

    In this letter, a novel projection algorithm is proposed in which projection onto a triangle consisting of the three even-vertices closest to the vector to be projected replaces check polytope projection, achieving the same FER performance as exact projection algorithm in both high-iteration and low-iteration regime. Simulation results show that compared with the sparse affine projection algorithm (SAPA), it can improve the FER performance by 0.2 dB as well as save average number of iterations by 4.3%.

  • A Joint Coverage Constrained Task Offloading and Resource Allocation Method in MEC Open Access

    Daxiu ZHANG  Xianwei LI  Bo WEI  Yukun SHI  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E107-A No:8
      Page(s):
    1277-1285

    With the increase of the number of Mobile User Equipments (MUEs), numerous tasks that with high requirements of resources are generated. However, the MUEs have limited computational resources, computing power and storage space. In this paper, a joint coverage constrained task offloading and resource allocation method based on deep reinforcement learning is proposed. The aim is offloading the tasks that cannot be processed locally to the edge servers to alleviate the conflict between the resource constraints of MUEs and the high performance task processing. The studied problem considers the dynamic variability and complexity of the system model, coverage, offloading decisions, communication relationships and resource constraints. An entropy weight method is used to optimize the resource allocation process and balance the energy consumption and execution time. The results of the study show that the number of tasks and MUEs affects the execution time and energy consumption of the task offloading and resource allocation processes in the interest of the service provider, and enhances the user experience.

  • Analytical Model of Maximum Operating Frequency of Class-D ZVS Inverter with Linearized Parasitic Capacitance and any Duty Ratio Open Access

    Yi XIONG  Senanayake THILAK  Yu YONEZAWA  Jun IMAOKA  Masayoshi YAMAMOTO  

     
    PAPER-Circuit Theory

      Pubricized:
    2023/12/05
      Vol:
    E107-A No:8
      Page(s):
    1115-1126

    This paper proposes an analytical model of maximum operating frequency of class-D zero-voltage-switching (ZVS) inverter. The model includes linearized drain-source parasitic capacitance and any duty ratio. The nonlinear drain-source parasitic capacitance is equally linearized through a charge-related equation. The model expresses the relationship among frequency, shunt capacitance, duty ratio, load impedance, output current phase, and DC input voltage under the ZVS condition. The analytical result shows that the maximum operating frequency under the ZVS condition can be obtained when the duty ratio, the output current phase, and the DC input voltage are set to optimal values. A 650 V/30 A SiC-MOSFET is utilized for both simulated and experimental verification, resulting in good consistency.

  • Improved PBFT-Based High Security and Large Throughput Data Resource Sharing for Distribution Power Grid Open Access

    Zhimin SHAO  Chunxiu LIU  Cong WANG  Longtan LI  Yimin LIU  Zaiyan ZHOU  

     
    PAPER-Systems and Control

      Pubricized:
    2024/01/31
      Vol:
    E107-A No:8
      Page(s):
    1085-1097

    Data resource sharing can guarantee the reliable and safe operation of distribution power grid. However, it faces the challenges of low security and high delay in the sharing process. Consortium blockchain can ensure the security and efficiency of data resource sharing, but it still faces problems such as arbitrary master node selection and high consensus delay. In this paper, we propose an improved practical Byzantine fault tolerance (PBFT) consensus algorithm based on intelligent consensus node selection to realize high-security and real-time data resource sharing for distribution power grid. Firstly, a blockchain-based data resource sharing model is constructed to realize secure data resource storage by combining the consortium blockchain and interplanetary file system (IPFS). Then, the improved PBFT consensus algorithm is proposed to optimize the consensus node selection based on the upper confidence bound of node performance. It prevents Byzantine nodes from participating in the consensus process, reduces the consensus delay, and improves the security of data resource sharing. The simulation results verify the effectiveness of the proposed algorithm.

  • Research on Mask-Wearing Detection Algorithm Based on Improved YOLOv7-Tiny Open Access

    Min GAO  Gaohua CHEN  Jiaxin GU  Chunmei ZHANG  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2024/03/19
      Vol:
    E107-D No:7
      Page(s):
    878-889

    Wearing a mask correctly is an effective method to prevent respiratory infectious diseases. Correct mask use is a reliable approach for preventing contagious respiratory infections. However, when dealing with mask-wearing in some complex settings, the detection accuracy still needs to be enhanced. The technique for mask-wearing detection based on YOLOv7-Tiny is enhanced in this research. Distribution Shifting Convolutions (DSConv) based on YOLOv7-tiny are used instead of the 3×3 convolution in the original model to simplify computation and increase detection precision. To decrease the loss of coordinate regression and enhance the detection performance, we adopt the loss function Intersection over Union with Minimum Points Distance (MPDIoU) instead of Complete Intersection over Union (CIoU) in the original model. The model is introduced with the GSConv and VoVGSCSP modules, recognizing the model’s mobility. The P6 detection layer has been designed to increase detection precision for tiny targets in challenging environments and decrease missed and false positive detection rates. The robustness of the model is increased further by creating and marking a mask-wearing data set in a multi environment that uses Mixup and Mosaic technologies for data augmentation. The efficiency of the model is validated in this research using comparison and ablation experiments on the mask dataset. The results demonstrate that when compared to YOLOv7-tiny, the precision of the enhanced detection algorithm is improved by 5.4%, Recall by 1.8%, mAP@.5 by 3%, mAP@.5:.95 by 1.7%, while the FLOPs is decreased by 8.5G. Therefore, the improved detection algorithm realizes more real-time and accurate mask-wearing detection tasks.

  • Efficient Realization of an SC Circuit with Feedback and Its Applications Open Access

    Yuto ARIMURA  Shigeru YAMASHITA  

     
    PAPER-VLSI Design Technology and CAD

      Pubricized:
    2023/10/26
      Vol:
    E107-A No:7
      Page(s):
    958-965

    Stochastic Computing (SC) allows additions and multiplications to be realized with lower power than the conventional binary operations if we admit some errors. However, for many complex functions which cannot be realized by only additions and multiplications, we do not know a generic efficient method to calculate a function by using an SC circuit; it is necessary to realize an SC circuit by using a generic method such as polynomial approximation methods for such a function, which may lose the advantage of SC. Thus, there have been many researches to consider efficient SC realization for specific functions; an efficient SC square root circuit with a feedback circuit was proposed by D. Wu et al. recently. This paper generalizes the SC square root circuit with a feedback circuit; we identify a situation when we can implement a function efficiently by an SC circuit with a feedback circuit. As examples of our generalization, we propose SC circuits to calculate the n-th root calculation and division. We also show our analysis on the accuracy of our SC circuits and the hardware costs; our results show the effectiveness of our method compared to the conventional SC designs; our framework may be able to implement a SC circuit that is better than the existing methods in terms of the hardware cost or the calculation error.

1-20hit(3578hit)