著者
Osama HALABI Fatma AL-MESAIFRI Mariam AL-ANSARI Roqaya AL-SHAABI Kazunori MIYATA
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Information and Systems (ISSN:09168532)
巻号頁・発行日
vol.E97-D, no.8, pp.2048-2052, 2014-08-01

This paper proposes a novel multimodal interactive surgical simulator that incorporates haptic, olfactory, as well as traditional vision feedback. A scent diffuser was developed to produce odors when errors occur. Haptic device was used to provide the sense of touch to the user. The preliminary results show that adding smell as an aid to the simulation enhanced the memory retention that lead to better performance.
著者
Akira TAMAMORI Yoshihiko NANKAKU Keiichi TOKUDA
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Information and Systems (ISSN:09168532)
巻号頁・発行日
vol.E97-D, no.7, pp.1842-1854, 2014-07-01

In this paper, a novel statistical model based on 2-D HMMs for image recognition is proposed. Recently, separable lattice 2-D HMMs (SL2D-HMMs) were proposed to model invariance to size and location deformation. However, their modeling accuracy is still insufficient because of the following two assumptions, which are inherited from 1-D HMMs: i) the stationary statistics within each state and ii) the conditional independent assumption of state output probabilities. To overcome these shortcomings in 1-D HMMs, trajectory HMMs were proposed and successfully applied to speech recognition and speech synthesis. This paper derives 2-D trajectory HMMs by reformulating the likelihood of SL2D-HMMs through the imposition of explicit relationships between static and dynamic features. The proposed model can efficiently capture dependencies between adjacent observations without increasing the number of model parameters. The effectiveness of the proposed model was evaluated in face recognition experiments on the XM2VTS database.
著者
Masashi KOMORI Hiroko KAMIDE Satoru KAWAMURA Chika NAGAOKA
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Information and Systems (ISSN:09168532)
巻号頁・発行日
vol.E96-D, no.3, pp.507-513, 2013-03-01

This study investigated the relationship between social skills and facial asymmetry in facial expressions. Three-dimensional facial landmark data of facial expressions (neutral, happy, and angry) were obtained from Japanese participants (n = 62). Following a facial expression task, each participant completed KiSS-18 (Kikuchi's Scale of Social Skills; Kikuchi, 2007). Using a generalized Procrustes analysis, faces and their mirror-reversed versions were represented as points on a hyperplane. The asymmetry of each individual face was defined as Euclidian distance between the face and its mirror reversed face on this plane. Subtraction of the asymmetry level of a neutral face of each individual from the asymmetry level of a target emotion face was defined as the index of “expression asymmetry” given by a particular emotion. Correlation coefficients of KiSS-18 scores and expression asymmetry scores were computed for both happy and angry expressions. Significant negative correlations between KiSS-18 scores and expression asymmetries were found for both expressions. Results indicate that the symmetry in facial expressions increases with higher level of social skills.
著者
島岡 政基 西村 健 古村 隆明 中村 素典 佐藤 周行 岡部 寿男 曽根原 登
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
電子情報通信学会論文誌 B (ISSN:13444697)
巻号頁・発行日
vol.J95-B, no.7, pp.871-882, 2012-07-01

通信の安全を確立するサーバ認証を適切に行うには,パブリック認証局から発行されたサーバ証明書が必要である.しかしながら,過去にはパブリック認証局から発行を受けることの重要性が正しく認識されてこなかったことがあり,更には商用のサーバ証明書は審査手続きが煩雑な上に学術機関の実態に沿っていないなどの課題もあったため,学術機関におけるサーバ証明書の普及は遅れていた.そこで筆者らは,学術機関のために最適化したサーバ証明書発行スキームと,証明書自動発行支援システムからなる学術機関のためのサーバ証明書発行フレームワークを提案した.国立情報学研究所による実証実験と本運用を通じて,同スキームにより高い身元確認レベルを確保しつつ審査手続きの学術機関最適化を,また同システムにより認証事業者の証明書発行業務を自動化するとともに各学術機関が必要な学内システムを用意した場合には学術機関側の工数削減も可能であることを実証した.
著者
住元 宗一朗 中川 博之 田原 康之 大須賀 昭彦
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
電子情報通信学会論文誌 D (ISSN:18804535)
巻号頁・発行日
vol.J94-D, no.11, pp.1800-1811, 2011-11-01

近年増加したコンテンツ投稿型SNSでは日々膨大にコンテンツが増え続けるため,嗜好には合っているもののユーザが見逃してしまうようなコンテンツは少なくない.また,多くの推薦技術では精度を重視するあまり,その推薦結果に面白みがないという課題がある.本論文では,主に音楽,イラスト,詩等の創作者向けであるコンテンツ投稿型SNSにおける未知性,意外性を考慮した推薦手法について述べる.未知性に関しては,質の高いコンテンツを投稿する投稿者(有力投稿者)に注目し,コンテンツの質を確保しつつもロングテールのテール部分に属する,ユーザがまだ知らないコンテンツを推薦する.意外性に関しては,多くのコンテンツ投稿型SNSで利用されているFolksonomyを利用する.以上の二つの推薦部からなる推薦エージェントを提案し,イラスト投稿型SNSであるPixivの実データを用い,未知性,意外性に関する評価実験を実施した.その結果,推薦リストの6割に未知性,意外性のあるコンテンツが含まれ,本研究の有効性が確かめられた.
著者
Ichiro SATOH
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (ISSN:09168508)
巻号頁・発行日
vol.E91.A, no.11, pp.3261-3268, 2008-11-01 (Released:2008-11-28)
参考文献数
13
被引用文献数
1 10

A formal approach for specifying and reasoning about earth-friendly logistics management systems is presented. To reduce fossil fuel consumption and carbon dioxide emissions resulting from transport, we must enhance the transport efficiency of trucks, which play an essential role as carriers in modern logistics services. This paper addresses the milk-run approach. It is one of the most effective and popular solutions to this problem, but it makes it be complicated to implement in a logistics management system. We propose a language for specifying the routes of trucks and an order relation between the requirements of routes and the possible routes of trucks. The former is formulated as process calculus and the latter selects suitable trucks according to their routes.
著者
橋本 修 須賀 良介
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
電子情報通信学会論文誌 C (ISSN:13452827)
巻号頁・発行日
vol.J107-C, no.1, pp.2-8, 2024-01-01

電波環境の悪化にともない,電波吸収体には吸収特性のみならず付加価値として,薄型化,軽量化,透明性,加工性などが要求されている.WPT (Wireless Power Transfer) 分野においても室内で,反射や透過を繰り返すことで多数の伝搬経路が形成されることから生じる室内の電波環境の悪化を良好にすることが要求されている.本論文では,このような目的で室内用の電波吸収体として,発泡剤を用いた軽量電波吸収体,分割導電膜(DCF: Divided Conductive Film)を用いた薄型電波吸収体,円形パッチを配列した超薄型電波吸収体,導電紙を用いた電波吸収体など代表的な研究例について解説する.
著者
Shuhei ENOMOTO Hiroki KUZUNO Hiroshi YAMADA
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE Transactions on Information and Systems (ISSN:09168532)
巻号頁・発行日
vol.E105.D, no.11, pp.1890-1899, 2022-11-01 (Released:2022-11-01)
参考文献数
32
被引用文献数
3

CPU flush instruction-based cache side-channel attacks (cache instruction attacks) target a wide range of machines. For instance, Meltdown / Spectre combined with FLUSH+RELOAD gain read access to arbitrary data in operating system kernel and user processes, which work on cloud virtual machines, laptops, desktops, and mobile devices. Additionally, fault injection attacks use a CPU cache. For instance, Rowhammer, is a cache instruction attack that attempts to obtain write access to arbitrary data in physical memory, and affects machines that have DDR3. To protect against existing cache instruction attacks, various existing mechanisms have been proposed to modify hardware and software aspects; however, when latest cache instruction attacks are disclosed, these mechanisms cannot prevent these. Moreover, additional countermeasure requires long time for the designing and developing process. This paper proposes a novel mechanism termed FlushBlocker to protect against all types of cache instruction attacks and mitigate against cache instruction attacks employ latest side-channel vulnerability until the releasing of additional countermeasures. FlushBlocker employs an approach that restricts the issuing of cache flush instructions and the attacks that lead to failure by limiting control of the CPU cache. To demonstrate the effectiveness of this study, FlushBlocker was implemented in the latest Linux kernel, and its security and performance were evaluated. Results show that FlushBlocker successfully prevents existing cache instruction attacks (e.g., Meltdown, Spectre, and Rowhammer), the performance overhead was zero, and it was transparent in real-world applications.
著者
小久保 燎太 福永 修一
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
電子情報通信学会論文誌 D (ISSN:18804535)
巻号頁・発行日
vol.J106-D, no.12, pp.492-500, 2023-12-01

ポートハミルトン系の強化学習は方策の探索空間を限定することにより学習の高速化を目指した手法である.しかしながらこの方法は,学習が局所解に捕まりにくくなることを期待して制御入力に人為的なノイズを加えた確率的方策を用いている.このノイズがシステムの意図しない動作を引き起こす可能性がある.本研究では,強化学習の手法の一つであるPolicy Gradient with Parameter-based Exploration (PGPE)をポートハミルトン系の強化学習に適用することで,決定論的な方策を用いて制御則を学習できる手法を提案する.PGPEでは決定論的方策におけるパラメータに対して推定分布を仮定し,期待割引報酬和を最大化する推定分布のパラメータを勾配法により学習する.ポートハミルトン系の強化学習は2種類の方策パラメータをもつ.提案手法では,ポートハミルトン系の強化学習における2種類のパラメータに対して推定分布を仮定し,期待割引報酬和を最大化するように推定分布のパラメータを学習する.強化学習のベンチマークである倒立振子の制御問題に対して提案手法を適用し,倒立振子を振り上げ頂点で安定化させる制御則を獲得できることを示した.
著者
Javier Jose DIAZ RIVERA Waleed AKBAR Talha AHMED KHAN Afaq MUHAMMAD Wang-Cheol SONG
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Communications (ISSN:09168516)
巻号頁・発行日
vol.E106-B, no.12, pp.1293-1301, 2023-12-01
被引用文献数
1

Zero Trust Networking (ZTN) is a security model where no default trust is given to entities in a network infrastructure. The first bastion of security for achieving ZTN is strong identity verification. Several standard methods for assuring a robust identity exist (E.g., OAuth2.0, OpenID Connect). These standards employ JSON Web Tokens (JWT) during the authentication process. However, the use of JWT for One Time Token (OTT) enrollment has a latent security issue. A third party can intercept a JWT, and the payload information can be exposed, revealing the details of the enrollment server. Furthermore, an intercepted JWT could be used for enrollment by an impersonator as long as the JWT remains active. Our proposed mechanism aims to secure the ownership of the OTT by including the JWT as encrypted metadata into a Non-Fungible Token (NFT). The mechanism uses the blockchain Public Key of the intended owner for encrypting the JWT. The blockchain assures the JWT ownership by mapping it to the intended owner's blockchain public address. Our proposed mechanism is applied to an emerging Zero Trust framework (OpenZiti) alongside a permissioned Ethereum blockchain using Hyperledger Besu. The Zero Trust Framework provides enrollment functionality. At the same time, our proposed mechanism based on blockchain and NFT assures the secure distribution of OTTs that is used for the enrollment of identities.
著者
Ryoya HONDA Minoru MIZUTANI Masaya TAMURA Takashi OHIRA
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Electronics (ISSN:09168516)
巻号頁・発行日
vol.E106-C, no.11, pp.698-706, 2023-11-01

This paper formulates a class-E synchronous RF rectifier from a new viewpoint. The key point is to introduce a matrix and convolute the DC terms into RF matrices. The explicit expression of input impedance is demonstrated in plane geometry. We find out their input impedance exhibits a geodesic arc in hyperbolic geometry under ZVS operation, where the theoretical RF-DC conversion efficiency results in 100%. We verify the developed theory both numerically (circuit simulation) and experimentally (6.78MHz, 100W). We confirm that the input impedance becomes a geodesic arc for a wide range of DC load resistance. The presented theory is quite elegant since it is based on a matrix-based formulation and plane-geometrical expression.
著者
Lin LI Jianhao HU
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences (ISSN:09168508)
巻号頁・発行日
vol.E106-A, no.11, pp.1416-1423, 2023-11-01

For massive multiple-input multiple-output (MIMO) communication systems, simple linear detectors such as zero forcing (ZF) and minimum mean square error (MMSE) can achieve near-optimal detection performance with reduced computational complexity. However, such linear detectors always involve complicated matrix inversion, which will suffer from high computational overhead in the practical implementation. Due to the massive parallel-processing and efficient hardware-implementation nature, the neural network has become a promising approach to signal processing for the future wireless communications. In this paper, we first propose an efficient neural network to calculate the pseudo-inverses for any type of matrices based on the improved Newton's method, termed as the PINN. Through detailed analysis and derivation, the linear massive MIMO detectors are mapped on PINNs, which can take full advantage of the research achievements of neural networks in both algorithms and hardwares. Furthermore, an improved limited-memory Broyden-Fletcher-Goldfarb-Shanno (L-BFGS) quasi-Newton method is studied as the learning algorithm of PINNs to achieve a better performance/complexity trade-off. Simulation results finally validate the efficiency of the proposed scheme.
著者
Shiling SHI Stefan HOLST Xiaoqing WEN
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Information and Systems (ISSN:09168532)
巻号頁・発行日
vol.E106-D, no.10, pp.1694-1704, 2023-10-01
被引用文献数
1

High power dissipation during scan test often causes undue yield loss, especially for low-power circuits. One major reason is that the resulting IR-drop in shift mode may corrupt test data. A common approach to solving this problem is partial-shift, in which multiple scan chains are formed and only one group of scan chains is shifted at a time. However, existing partial-shift based methods suffer from two major problems: (1) their IR-drop estimation is not accurate enough or computationally too expensive to be done for each shift cycle; (2) partial-shift is hence applied to all shift cycles, resulting in long test time. This paper addresses these two problems with a novel IR-drop-aware scan shift method, featuring: (1) Cycle-based IR-Drop Estimation (CIDE) supported by a GPU-accelerated dynamic power simulator to quickly find potential shift cycles with excessive peak IR-drop; (2) a scan shift scheduling method that generates a scan chain grouping targeted for each considered shift cycle to reduce the impact on test time. Experiments on ITC'99 benchmark circuits show that: (1) the CIDE is computationally feasible; (2) the proposed scan shift schedule can achieve a global peak IR-drop reduction of up to 47%. Its scheduling efficiency is 58.4% higher than that of an existing typical method on average, which means our method has less test time.
著者
吉敷 由起子 チン ギルバート シー 岡村 航 岩﨑 慧 古川 玲 杉山 健斗 呉 聖屹 白川 正之 川村 雅彦
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
電子情報通信学会論文誌 B (ISSN:13444697)
巻号頁・発行日
vol.J105-B, no.11, pp.862-871, 2022-11-01

Society5.0の時代では,サイバー・フィジカル空間が相互に作用し,電波システムに関しても新たな設計・評価,検証を短時間で実現することが求められる.本論文ではサイバーフィジカルシステム上でエミュレーションを可能とする電波伝搬モデルの開発を目的として,レイトレーシングベースでの研究開発を行っている取り組みについて紹介する.広域環境として,ドローンによる橋梁のインフラ点検業務などを対象としたシナリオでの電波伝搬モデルの検討を,狭空間では,スマート工場を想定して,人や機械が動く環境を対象としたシナリオでの伝搬モデルの検討について述べる.また電波伝搬の解析には構造物の3Dモデル化が重要になってくるので,点群データからレイトレーシング解析用の3Dモデル化の研究内容についても述べる.
著者
川又 憲 石上 忍 藤原 修 スローカ ヤン
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
電子情報通信学会論文誌 B (ISSN:13444697)
巻号頁・発行日
vol.J106-B, no.10, pp.639-645, 2023-10-01

ESD(Electrostatic Discharge: 静電気放電)によりインパルス性の過渡電磁ノイズが発生する.このような広帯域かつ過渡的な電磁ノイズは,機器の誤動作や故障の原因となり,またその対策も簡単ではないためEMC(Electromagnetic Compatibility: 電磁両立性)の観点から重要な問題の一つとされている.そこで,ESDによる電磁ノイズの放射メカニズムを議論するため微小電気ダイポールによる放射モデルを想定して検討を進めている.本論文では,この放射モデル適用の妥当性を実験で確認するため,一対の球電極で発生するESDによる過渡電界波形を10 GHzの帯域を有する光電界プローブを用いて測定し,電界強度ピーク値の距離特性について考察を行った.その結果,電界強度のピーク値は,球電極対の極近傍では放電点からの距離dの1/d3に従って減衰し,近傍では1/d2,更に遠方では1/dに従って減衰した.この結果は電気微小ダイポールによる電磁波放射の距離特性と一致しており,ESDによって発生する過渡電界の放射モデルとして,微小電気ダイポールモデルの妥当性を確認した.
著者
三浦 周 関口 真理子 大倉 拓也 小竹 秀明 白玉 公一 斉藤 嘉彦 カラスコ-カサド アルベルト 阿部 侑真 辻 宏之
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
電子情報通信学会論文誌 C (ISSN:13452827)
巻号頁・発行日
vol.J106-C, no.9, pp.344-353, 2023-09-01

5G/Beyond 5Gと衛星通信を含む非地上系通信網(Non-Terrestrial Networks:NTN)の連携に関し,現在の動向や技術課題,情報通信研究機構(NICT)による研究開発の取組みを俯瞰的に記述する.衛星通信を含むNTNプラットホームが低軌道(Low Earth Orbit:LEO)衛星,高高度プラットホーム(High-Altitude Platform Station: HAPS)等の登場や電波・光技術の進展によって従来よりも大容量化,低遅延化,低コスト化が進んでいる.これを背景として,衛星通信/NTN-5G/Beyond 5G連携のためのネットワークアーキテクチャや無線アクセス方式が検討され,The 3rd Generation Partnership Project(3GPP)等での標準化が進んでおり,国内でも議論や提言,構想の提案がなされている.衛星通信/NTN-5G/Beyond 5G連携のキーとなる技術はネットワーク技術と,これを支える電波・光技術である.NICTでは,Beyond5Gにおける海・空・宇宙をつなぐ3次元ネットワークの実現を目指して衛星通信/NTNと5G/Beyond 5Gの連携技術の研究開発の取組みを進めている.ネットワーク技術では,異なる特徴をもつ複数のネットワークを連携させ,ユーザ及び運用事業者の満足度を最大化するため,統合的なネットワーク制御が必要である.そのため5Gネットワークと衛星の連携の研究や,NTNと地上系を相互接続するためのシステム構成の検討,リソース割当アルゴリズムの開発を行っている.電波技術では,高速大容量化を実現するための高周波数帯(Ka/Q/V帯)の利用,高速大容量化のためのマルチビーム化と周波数利用効率を向上するためのデジタル化を活用したリソース割当の柔軟性の向上,移動体地球局の柔軟性向上のための電子走査型平面アンテナ(AESA)の開発を行っている.光技術では,高速大容量通信や小型軽量化を実現できる利点を生かし,GEO衛星やLEO衛星,HAPS,ドローン等様々なプラットホームに搭載可能な光通信機器の開発や,地上衛星間光通信における大気揺らぎを補償する補償光学の研究を行っている.
著者
Takashi NORIMATSU Yuichi NAKAMURA Toshihiro YAMAUCHI
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE Transactions on Information and Systems (ISSN:09168532)
巻号頁・発行日
vol.E106.D, no.9, pp.1364-1379, 2023-09-01 (Released:2023-09-01)
参考文献数
67

Two problems occur when an authorization server is utilized for a use case where a different security profile needs to be applied to a unique client request for accessing a distinct type of an API, such as open banking. A security profile can be applied to a client request by using the settings of an authorization server and client. However, this method can only apply the same security profile to all client requests. Therefore, multiple authorization servers or isolated environments, such as realms of an authorization server, are needed to apply a different security profile. However, this increases managerial costs for the authorization server administration. Moreover, new settings and logic need to be added to an authorization server if the existing client settings are inadequate for applying a security profile, which requires modification of an authorization server's source code. We aims to propose the policy-based method that resolves these problems. The proposed method does not completely rely on the settings of a client and can determine an applied security profile using a policy and the context of the client's request. Therefore, only one authorization server or isolated environment, such as a realm of an authorization server, is required to support multiple different security profiles. Additionally, the proposed method can implement a security profile as a pluggable software module. Thus, the source code of the authorization server need not be modified. The proposed method and Financial-grade application programming interface (FAPI) security profiles were implemented in Keycloak, which is an open-source identity and access management solution, and evaluation scenarios were executed. The results of the evaluation confirmed that the proposed method resolves these problems. The implementation has been contributed to Keycloak, making the proposed method and FAPI security profiles publicly available.
著者
市川 淳 大倉 光輝 秋吉 政徳
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
電子情報通信学会論文誌 A (ISSN:09135707)
巻号頁・発行日
vol.J106-A, no.7, pp.208-213, 2023-07-01

相手の振る舞いへの同調は,自身にポジティブな印象を抱かせる.本研究では,エージェントの汎用的な非言語同調機能を提案する.実験の結果,付属するLEDランプが発話の基本周波数に同調して点滅することで,傾聴の印象評価が高まる傾向が見られた.
著者
Wenfei Tao Peng Wu Chen Chen
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE Electronics Express (ISSN:13492543)
巻号頁・発行日
vol.20, no.15, pp.20230121, 2023-08-10 (Released:2023-08-10)
参考文献数
30

A virtual zero power (VZP) method was used to reduce the power consumption of hybrid magnetic bearings (HMBs) in left ventricular assist devices (LVADs). The mathematics of the HMB system in LVAD was established, and the stability was analyzed with a proportional-derivative (PD) controller. The unbalanced forces on the rotor can be identified by the output voltage of the PD controller, together with the negative stiffness of the permanent magnet, and the rotor can be suspended at a point where the rotor’s reluctant force is at a minimum to lower power consumption. Experiments were conducted to measure the power consumption of the magnetic bearing at different rotational speeds, and different trajectories of the rotor were demonstrated. The results showed HMB using VZP consumed 0.28W averagely at 1000-4000rpm in the LVAD.