The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] tin(3578hit)

1161-1180hit(3578hit)

  • A New Construction of Permutation Arrays

    Jung Youl PARK  Hong-Yeop SONG  

     
    PAPER-Sequences

      Vol:
    E95-A No:11
      Page(s):
    1855-1861

    Let PA(n, d) be a permutation array (PA) of order n and the minimum distance d. We propose a new construction of the permutation array PA(pm, pm-1k) for a given prime number p, a positive integer k < p and a positive integer m. The resulted array has (|PA(p,k)|p(m-1)(p-k))m rows. Compared to the other constructions, the new construction gives a permutation array of far bigger size with a large minimum distance, for example, when k ≥ 2p/3. Moreover the proposed construction provides an algorithm to find the i-th row of PA (pm, pm-1k) for a given index i very simply.

  • Collaborative Access Control for Multi-Domain Cloud Computing

    Souheil BEN AYED  Fumio TERAOKA  

     
    PAPER-Information Network

      Vol:
    E95-D No:10
      Page(s):
    2401-2414

    The Internet infrastructure is evolving with various approaches such as cloud computing. Interest in cloud computing is growing with the rise of services and applications particularly in business community. For delivering service securely, cloud computing providers are facing several security issues, including controlling access to services and ensuring privacy. Most of access control approaches tend to a centralization of policy administration and decision by introducing a mediator central third party. However, with the growth of the Internet and the increase of cloud computing providers, a centralized administration is no longer supported. In this paper, we present a new collaborative access control infrastructure for distributed cloud computing environment, supporting collaborative delegations across multiple domains in order to authorize users to access services at a visited domain that does not have a direct cooperative relationship with the user's home domain. For this purpose, we propose an extension of the XACML (eXtensible Access Control Markup Language) model with a new entity called Delegation Validation Point (DVP) to support multi-domain delegation in a distributed environment. We describe the new extended model and functionalities of the new component. In addition, we define new XACML messages for acquiring delegation across domains. For exchanging delegation between domains we use SAML (Security Association Markup Language) and Diameter protocol. Two Diameter applications are defined for transporting securely multiple delegation requests and answers and for building a trusted path of cooperation to acquire the chain of delegations. We detail the implemented prototype and evaluate performance within a testbed of up to 20 domains.

  • Optical Fast Circuit Switching Networks Employing Dynamic Waveband Tunnel

    Takahiro OGAWA  Hiroshi HASEGAWA  Ken-ichi SATO  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E95-B No:10
      Page(s):
    3139-3148

    We propose a novel dynamic hierarchical optical path network architecture that achieves efficient optical fast circuit switching. In order to complete wavelength path setup/teardown efficiently, the proposed network adaptively manages waveband paths and bundles of optical paths, which provide virtual mesh connectivity between node pairs for wavelength paths. Numerical experiments show that operational and facility costs are significantly reduced by employing the adaptive virtual waveband connections.

  • Accurate 3-Dimensional Imaging Method Based on Extended RPM for Rotating Target Model

    Shouhei KIDERA  Hiroyuki YAMADA  Tetsuo KIRIMOTO  

     
    PAPER-Sensing

      Vol:
    E95-B No:10
      Page(s):
    3279-3289

    Three-dimensional (3-D) reconstruction techniques employed by airborne radars are essential for object recognition in scenarios where optically vision is blurry, and are required for the monitoring of disasters and coast-guard patrols. There have been reports on 3-D reconstruction methods that exploit the layover appearing in inverse synthetic aperture radar (ISAR) imagery, which are suitable for the recognition of artificial targets such as buildings, aircraft or ships. However, existing methods assume only a point target or the aggregate of point targets, and most require the tracking of the multiple points over sequential ISAR images. In the case of a solid object with a continuous boundary, such as a wire or polyhedral structure, the positioning accuracy of such methods is severely degraded owing to scattering centers continuously shifting on the target surface with changes in the rotation angle. To overcome this difficulty, this paper extends the original Range Points Migration (RPM) method to the ISAR observation model, where a double mono-static model with two transmitting and receiving antennas is introduced to suppress cross-range ambiguity. The results of numerical simulation and experimental validation demonstrate that the extended RPM method has a distinct advantage for accurate 3-D imaging, even for non-point targets.

  • Improving the Efficiency in Halftone Image Generation Based on Structure Similarity Index Measurement

    Aroba KHAN  Hernan AGUIRRE  Kiyoshi TANAKA  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E95-D No:10
      Page(s):
    2495-2504

    This paper presents two halftoning methods to improve efficiency in generating structurally similar halftone images using Structure Similarity Index Measurement (SSIM). Proposed Method I reduces the pixel evaluation area by applying pixel-swapping algorithm within inter-correlated blocks followed by phase block-shifting. The effect of various initial pixel arrangements is also investigated. Proposed Method II further improves efficiency by applying bit-climbing algorithm within inter-correlated blocks of the image. Simulation results show that proposed Method I improves efficiency as well as image quality by using an appropriate initial pixel arrangement. Proposed Method II reaches a better image quality with fewer evaluations than pixel-swapping algorithm used in Method I and the conventional structure aware halftone methods.

  • Agile Spectrum Mobility Aided Spectrum-Aware Routing Protocol for Cognitive Radio Ad Hoc Networks

    Omid ABEDI  Reza BERANGI  

     
    PAPER-Network

      Vol:
    E95-B No:10
      Page(s):
    3187-3196

    In this paper, a Spectrum-Aware Routing (SAR) protocol for cognitive radio ad hoc networks, (CRAHN), is proposed which is robust to primary user activity and node failures. The protocol allows nodes to collect spectrum information during a spectrum management interval followed by a transmission period. Cognitive users discover routes by joint channel and next hop selection (synchronization) in the transmission intervals. A restricted geographical routing approach is adopted to avoid performance degradation specially due to routing overhead. We also add spectrum mobility capabilities to routes in our proposed method to provide robustness to primary user activity. SAR protocol performance is investigated through simulations of different scenarios and is compared with the most similar work, CAODV protocol. The results indicate that SAR can achieve significant reduction in control overhead as well as improved throughput.

  • An Efficient Prefix Caching Scheme with Bounded Prefix Expansion for High-Speed IP Lookup

    Junghwan KIM  Minkyu PARK  Sangchul HAN  Jinsoo KIM  

     
    LETTER-Network System

      Vol:
    E95-B No:10
      Page(s):
    3298-3301

    Prefix caching improves the performance of IP lookup by exploiting spatial and temporal locality of IP references. However, it cannot cache non-leaf prefixes, so several prefix expansion schemes have been proposed to handle those prefixes. Such schemes have some drawbacks to incur modification of routing table or severe miss penalty. We propose an efficient prefix expansion scheme which achieves good performance without additional burden to lookup scheme. In the proposed scheme a non-leaf prefix is expanded to the length of the longest immediate descendant prefix when it is cached. Evaluation result shows our scheme achieves very low miss ratio even though it does not increase the size of routing table and cache miss penalty.

  • A Verification-Aware Design Methodology for Thread Pipelining Parallelization

    Guo-An JIAN  Cheng-An CHIEN  Peng-Sheng CHEN  Jiun-In GUO  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E95-D No:10
      Page(s):
    2505-2513

    This paper proposes a verification-aware design methodology that provides developers with a systematic and reliable approach to performing thread-pipelining parallelization on sequential programs. In contrast to traditional design flow, a behavior-model program is constructed before parallelizing as a bridge to help developers gradually leverage the technique of thread-pipelining parallelization. The proposed methodology integrates verification mechanisms into the design flow. To demonstrate the practicality of the proposed methodology, we applied it to the parallelization of a 3D depth map generator with thread pipelining. The parallel 3D depth map generator was further integrated into a 3D video playing system for evaluation of the verification overheads of the proposed methodology and the system performance. The results show the parallel system can achieve 33.72 fps in D1 resolution and 12.22 fps in HD720 resolution through a five-stage pipeline. When verifying the parallel program, the proposed verification approach keeps the performance degradation within 23% and 21.1% in D1 and HD720 resolutions, respectively.

  • Effect of Multiple Antennas on the Transport Capacity in Large-Scale Ad Hoc Networks

    Won-Yong SHIN  Koji ISHIBASHI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E95-B No:10
      Page(s):
    3113-3119

    A one-dimensional ad hoc network with a single active source–destination pair is analyzed in terms of transport capacity, where each node uses multiple antennas. The analysis is based on using a multi-hop opportunistic routing transmission in the presence of fading. Specifically, the lower and upper bounds on the transport capacity are derived and their scaling law is analyzed as the node density, λ, is assumed to be infinitely large. The lower and upper bounds are shown to have the same scaling (ln λ)1/α, where α denotes the path-loss exponent. We also show that using multiple antennas at each node does not fundamentally change the scaling law.

  • Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-Distortion Model and Optimal Side Information Selection

    Junxiang WANG  Jiangqun NI  Dong ZHANG  Hao LUO  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E95-D No:10
      Page(s):
    2552-2555

    In the letter, we propose an improved histogram shifting (HS) based reversible data hiding scheme for small payload embedding. Conventional HS based schemes are not suitable for low capacity embedding with relatively large distortion due to the inflexible side information selection. From an analysis of the whole HS process, we develop a rate-distortion model and provide an optimal adaptive searching approach for side information selection according to the given payload. Experiments demonstrate the superior performance of the proposed scheme in terms of performance curve for low payload embedding.

  • Online Speaker Clustering Using Incremental Learning of an Ergodic Hidden Markov Model

    Takafumi KOSHINAKA  Kentaro NAGATOMO  Koichi SHINODA  

     
    PAPER-Speech and Hearing

      Vol:
    E95-D No:10
      Page(s):
    2469-2478

    A novel online speaker clustering method based on a generative model is proposed. It employs an incremental variant of variational Bayesian learning and provides probabilistic (non-deterministic) decisions for each input utterance, on the basis of the history of preceding utterances. It can be expected to be robust against errors in cluster estimation and the classification of utterances, and hence to be applicable to many real-time applications. Experimental results show that it produces 50% fewer classification errors than does a conventional online method. They also show that it is possible to reduce the number of speech recognition errors by combining the method with unsupervised speaker adaptation.

  • Experimental Evaluation of the SAR Induced in Head Phantoms of Three- and Eight-Year-Old Children

    Marie-Christine GOSSELIN  Sven KUHN  Andreas CHRIST  Marcel ZEFFERER  Emilio CHERUBINI  Jurriaan F. BAKKER  Gerard C. van RHOON  Niels KUSTER  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E95-B No:10
      Page(s):
    3215-3224

    The exposure of children to mobile phones has been a concern for years, but so far the conclusions with respect to compliance with safety standards are based only on simulations. Regulators have requested that these conclusions be supported by experimental evidence. The objectives of this study are 1) to test if the hypothesis that the specific anthropomorphic mannequin (SAM) used in standardized compliance testing is also conservative for homogeneous child head models and 2) to validate the numerical prediction of the peak spatial SAR (psSAR) in child head phantoms. To achieve these objectives, head phantoms of 3- and 8-year-old children were developed and manufactured. The results confirm that SAM is also conservative for child head phantoms, and that the agreement between numerical and experimental values are within the combined uncertainty of 0.9 dB, provided that the actual peak spatial SAR (psSAR) is determined. The results also demonstrate that the currently suggested numerical SAR averaging procedures may underestimate the actual psSAR by more than 1.3 dB and that the currently defined limits in terms of the average of a cubic mass are impractical for non-ambiguous evaluations, i.e., for achieving inter-laboratory repeatability.

  • A Data Transfer Scheme Based on Autonomous Clustering with Positions and Moving Direction of Vehicles for VANETs

    Yasuharu OHTA  Tomoyuki OHTA  Yoshiaki KAKUDA  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2728-2739

    An ad hoc network is a decentralized network that consists of mobile nodes with wireless communication devices without the aid of access points. A Vehicular Ad-hoc NETwork (VANET) is one of the representative applications of the ad hoc network. Epidemic routing has been proposed as a routing protocol based on Store-Carry-Forward mechanism for VANET environment. However, in Epidemic Routing, network resources such as packet buffer of a node are significantly consumed because data packets are spread across the network. Therefore, this paper proposes a new autonomous clustering-based data transfer scheme using positions and moving direction of vehicles for VANETs. The autonomous clustering configures multiple clusters in the network and then only the cluster head that manages the cluster stores data packets. Whenever the cluster meets a new cluster, the cluster head of the cluster decides whether it should forward data packets to the new cluster based on its own position, the destination node's position, and moving direction of the cluster. Finally, this paper presents the simulation results to show the effectiveness of the proposed scheme.

  • A Report Generator for Database and Web Applications

    Woei-Kae CHEN  Pin-Ying TU  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E95-D No:9
      Page(s):
    2265-2276

    Report generation is one of the most important tasks for database and e-commerce applications. Current report tools typically provide a set of predefined components that are used to specify report layout and format. However, available layout options are limited, and WYSIWYG formatting is not allowed. This paper proposes a four-phase report generation process to overcome these problems. The first phase retrieves source tables from the database. The second phase reorganizes the layout of the source tables by transferring the source tables into a set of new flat tables (in the first normal form). The third phase restructures the flat tables into a nested table (report) by specifying the report structure. The last phase formats the report with a WYSIWYG format editor supporting a number of formatting rules designed specifically for nested reports. Each phase of the proposed process supports visual programming, giving an easy-to-use user interface and allowing very flexible report layouts and formats. A visual end-user-programming tool, called TPS, is developed to demonstrate the proposed process and show that reports with sophisticated layouts can be created without writing low-level report generation programs.

  • Using Satisfiability Solving for Pairwise Testing in the Presence of Constraints

    Toru NANBA  Tatsuhiro TSUCHIYA  Tohru KIKUNO  

     
    LETTER

      Vol:
    E95-A No:9
      Page(s):
    1501-1505

    This letter discusses the applicability of boolean satisfiability (SAT) solving to pairwise testing in practice. Due to its recent rapid advance, using SAT solving seems a promising approach for search-based testing and indeed has already been practiced in test generation for pairwise testing. The previous approaches use SAT solving either for finding a small test set in the absence of parameter constraints or handling constraints, but not for both. This letter proposes an approach that uses a SAT solver for constructing a test set for pairwise testing in the presence of parameter constraints. This allows us to make full use of SAT solving for pairwise testing in practice.

  • An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks

    Ren Junn HWANG  Yu-Kai HSIAO  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2718-2727

    This study proposes an efficient identity-based secure routing protocol based on Weil pairing, that considers symmetric and asymmetric links for Wireless Mesh Networks (WMNs). A wireless mesh network is a group of wireless mesh routers and several types of wireless devices (or nodes). Individual nodes cooperate by forwarding packets to each other, allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric communication is a special feature of WMNs because of the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Ensuring security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in WMNs. This study proposes a novel distributed routing protocol that considers symmetric and asymmetric links. The proposed protocol guarantees the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior studies. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. Using the proposed protocol, mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access. The proposed protocol enhances wireless mesh network coverage and assures security.

  • A Numerical Evaluation of Entanglement Sharing Protocols Using Quantum LDPC CSS Codes

    Masakazu YOSHIDA  Manabu HAGIWARA  Takayuki MIYADERA  Hideki IMAI  

     
    PAPER-Information Theory

      Vol:
    E95-A No:9
      Page(s):
    1561-1569

    Entangled states play crucial roles in quantum information theory and its applied technologies. In various protocols such as quantum teleportation and quantum key distribution, a good entangled state shared by a pair of distant players is indispensable. In this paper, we numerically examine entanglement sharing protocols using quantum LDPC CSS codes. The sum-product decoding method enables us to detect uncorrectable errors, and thus, two protocols, Detection and Resending (DR) protocol and Non-Detection (ND) protocol are considered. In DR protocol, the players abort the protocol and repeat it if they detect the uncorrectable errors, whereas in ND protocol they do not abort the protocol. We show that DR protocol yields smaller error rate than ND protocol. In addition, it is shown that rather high reliability can be achieved by DR protocol with quantum LDPC CSS codes.

  • Known-Key Attacks on Generalized Feistel Schemes with SP Round Function

    HyungChul KANG  Deukjo HONG  Dukjae MOON  Daesung KWON  Jaechul SUNG  Seokhie HONG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:9
      Page(s):
    1550-1560

    We present attacks on the generalized Feistel schemes, where each round function consists of a subkey XOR, S-boxes, and then a linear transformation (i.e. a Substitution-Permutation (SP) round function). Our techniques are based on rebound attacks. We assume that the S-boxes have a good differential property and the linear transformation has an optimal branch number. Under this assumption, we firstly describe known-key distinguishers on the type-1, -2, and -3 generalized Feistel schemes up to 21, 13 and 8 rounds, respectively. Then, we use the distinguishers to make several attacks on hash functions where Merkle-Damgård domain extender is used and the compression function is constructed with Matyas-Meyer-Oseas or Miyaguchi-Preneel hash modes from generalized Feistel schemes. Collision attacks are made for 11 rounds of type-1 Feistel scheme. Near collision attacks are made for 13 rounds of type-1 Feistel scheme and 9 rounds of type-2 Feistel scheme. Half collision attacks are made for 15 rounds of type-1 Feistel scheme, 9 rounds of type-2 Feistel scheme, and 5 rounds of type-3 Feistel scheme.

  • Effect of Lubricant on Lifetime of Au-Plated Slip-Ring and Ag-Pd-Cu Brush System for Small Electric Power

    Koichiro SAWA  Yasunori SUZUKI  Noboru MORITA  Kaoru ENDO  Takahiro UENO  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1465-1472

    The authors have been investigating degradation process of Au plated slip ring and Ag-Pd-Cu brush system. In almost all cases the lifetime of the sliding system ends, when Au plating layer is worn out, the ring surface is oxidized to be black in color and contact resistance becomes very high. Further, the lifetime is very short without lubricant. So, the lubricant is very effective to make the lifetime longer. However, even with lubricant the lifetime is varied from about 1000 hours to almost 7000 hours in the past experiments. It is an important issue how the lubricant works on the lifetime of the system. In this paper the effect of lubricant on the degradation process of contact resistance is focused on. In the past tests the lubricant is supplied only once before the test. In this test the lubricant is regularly supplied almost every 900 operation hours. Consequently, the operation more than 8000 hours is realized, which is the longest among tests so far. In addition the contact voltage drop increase gradually until 2600 hours and after that it stays almost constant around 70 mV. According to the Element Analysis after the test the Ni base plating layer is totally exposed in many tracks. It means that the Au plating layer is gradually worn out probably at the stage of increasing voltage drop. In the previous tests the lifetime ended even when the Ni plating layer remained. So, the reason of long operation in this test is guessed to be that the lubricant not only decreases wear of ring and brush, but also suppresses oxidation of the Ni layer.

  • Deformation of Crystal Morphology in Tin Plated Contact Layer Caused by Loading

    Terutaka TAMAI  Shigeru SAWADA  Yasuhiro HATTORI  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1473-1480

    Tin (Sn) contacts are widely applied to connector contacts. Surfaces of plated tin layer are covered with an oxide film that results in high contact resistance. However, it is possible to obtain low contact resistance by using high contact load. Current downsizing trends often make it difficult to obtain high contact loads. Therefore, it is important to conduct basic studies of the contacts resistance characteristics under low contact load conditions. In this study, relationships between contact resistance and the changes of contact traces were examined. When a platinum (Pt) hemisphere contacted to tin plated flat coupon, it was found that the hemisphere surface sank into the softer tin plated flat surface during loading resulting in a piling up tin crystal grains along the periphery of the contact trace. During this process, sudden decrease in contact resistance was observed. To clarify the phenomenon, morphology changes of contact traces were observed by AFM, SEM and EBSD. FEM analysis was also used to analyze the mechanical stress distribution in the tin plated layer. Due to the peculiar distribution of stress, the crystal grains are separated and push out the contact area. This phenomenon is very different from commonly observed decrease in contact resistance due to elastic and plastic deformation inducing mechanical fracture of the surface oxide film.

1161-1180hit(3578hit)