IEICE Trans. Fundam. Electron. Commun. Comput. Sci.最新文献

筛选
英文 中文
Improvement of Final Exponentiation for Pairings on BLS Curves with Embedding Degree 15 嵌入度为15的BLS曲线配对最终求幂的改进
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020eal2046
Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Y. Nogami
{"title":"Improvement of Final Exponentiation for Pairings on BLS Curves with Embedding Degree 15","authors":"Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Y. Nogami","doi":"10.1587/transfun.2020eal2046","DOIUrl":"https://doi.org/10.1587/transfun.2020eal2046","url":null,"abstract":"SUMMARY To be suitable in practice, pairings are typically carried out by two steps, which consist of the Miller loop and final exponentiation. To improve the final exponentiation step of a pairing on the BLS family of pairing-friendly elliptic curves with embedding degree 15, the authors provide a new representation of the exponent. The proposal can achieve a more reduction of the calculation cost of the final exponentiation than the previous method by Fouotsa et al.","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116931773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unsupervised Deep Embedded Hashing for Large-Scale Image Retrieval 大规模图像检索的无监督深度嵌入哈希
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020eal2056
Huanmin Wang
{"title":"Unsupervised Deep Embedded Hashing for Large-Scale Image Retrieval","authors":"Huanmin Wang","doi":"10.1587/transfun.2020eal2056","DOIUrl":"https://doi.org/10.1587/transfun.2020eal2056","url":null,"abstract":"Hashing methods have proven to be effective algorithm for image retrieval. However, learning discriminative hash codes is challenging for unsupervised models. In this paper, we propose a novel distinguishable image retrieval framework, named Unsupervised Deep Embedded Hashing (UDEH), to recursively learn discriminative clustering through soft clustering models and generate highly similar binary codes. We reduce the data dimension by auto-encoder and apply binary constraint loss to reduce quantization error. UDEH can be jointly optimized by standard stochastic gradient descent (SGD) in the embedd layer. We conducted a comprehensive experiment on two popular datasets. key words: hashing, unsupervised learning, deep learning","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126631217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load Balancing for Energy-Harvesting Mobile Edge Computing 能量收集移动边缘计算的负载平衡
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020eal2012
Ping Zhao, J. Tao, A. Rauf, Fengde Jia, Longting Xu
{"title":"Load Balancing for Energy-Harvesting Mobile Edge Computing","authors":"Ping Zhao, J. Tao, A. Rauf, Fengde Jia, Longting Xu","doi":"10.1587/transfun.2020eal2012","DOIUrl":"https://doi.org/10.1587/transfun.2020eal2012","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114806204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies ISO/IEC标准的后量子变体:来自同基因的紧凑选择密文安全密钥封装机制
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020cip0011
Kazuki Yoneyama
{"title":"Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies","authors":"Kazuki Yoneyama","doi":"10.1587/transfun.2020cip0011","DOIUrl":"https://doi.org/10.1587/transfun.2020cip0011","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124592412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sum Rate Maximization of Dense Small Cell Network with Load Balance and Power Transfer among SBSs 基于负载均衡和sbb间功率传输的密集小蜂窝网络求和速率最大化
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020eal2011
Xuefei Peng, Xiao-Yong Xue
{"title":"Sum Rate Maximization of Dense Small Cell Network with Load Balance and Power Transfer among SBSs","authors":"Xuefei Peng, Xiao-Yong Xue","doi":"10.1587/transfun.2020eal2011","DOIUrl":"https://doi.org/10.1587/transfun.2020eal2011","url":null,"abstract":"This letter proposes a load balance and power transfer scheme among small cell base stations (SBSs) to maximize the sum rate of small cell network. In the proposed scheme, small cell users (SUEs) are firstly associated with their nearest SBSs, then the overloaded SBSs can be determined. Further, the methods, i.e., Case 1: SUEs of overloaded SBSs are offloaded to their neighbor underloaded SBSs or Case 2: SUEs of overloaded SBSs are served by their original associated SBSs through obtaining power from their nearby SBSs that can provide higher data rate is selected. Finally, numerical simulations demonstrate that the proposed scheme has better performance. key words: load balance, power transfer, data rate","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124302767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks 密钥同态PKE的安全性:防止密钥恢复攻击和密文有效性攻击
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2021-01-01 DOI: 10.1587/transfun.2020eal2039
K. Emura
{"title":"On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks","authors":"K. Emura","doi":"10.1587/transfun.2020eal2039","DOIUrl":"https://doi.org/10.1587/transfun.2020eal2039","url":null,"abstract":"Theoretically, an adversary sends a homomorphically evaluated challenge ciphertext to the decryption oracle, and can immediately break the security. One may think that this is just a theoretical result and there is no practical impact. Even thoughBleichenbacher’sCCAattack [2] has beenwidely recognized, it is also widely recognized that a weaker security level is acceptable in return for obtaining a homomorphic property. However, several CCA attacks against concrete homomorphic encryption schemes have been also shown. We introduce key recovery attacks (KRA) as follows.","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Quantitative Evaluation Index of Contrast Improvement for Dichromats 一种新的二色者对比度改善定量评价指标
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2020-12-01 DOI: 10.1587/transfun.2020sml0008
Xi Cheng, G. Tanaka
{"title":"A Novel Quantitative Evaluation Index of Contrast Improvement for Dichromats","authors":"Xi Cheng, G. Tanaka","doi":"10.1587/transfun.2020sml0008","DOIUrl":"https://doi.org/10.1587/transfun.2020sml0008","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"93 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Methods during RTL Conversion from Synchronous RTL Models to Asynchronous RTL Models 同步RTL模型向异步RTL模型转换过程中的优化方法
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2020-12-01 DOI: 10.1587/transfun.2020vlp0004
Shogo Semba, H. Saito, M. Tatsuoka, Katsuya Fujimura
{"title":"Optimization Methods during RTL Conversion from Synchronous RTL Models to Asynchronous RTL Models","authors":"Shogo Semba, H. Saito, M. Tatsuoka, Katsuya Fujimura","doi":"10.1587/transfun.2020vlp0004","DOIUrl":"https://doi.org/10.1587/transfun.2020vlp0004","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133767346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PCA-LDA Based Color Quantization Method Taking Account of Saliency 考虑显著性的PCA-LDA颜色量化方法
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2020-12-01 DOI: 10.1587/transfun.2020sml0007
Yoshiaki Ueda, Seiichi Kojima, N. Suetake
{"title":"PCA-LDA Based Color Quantization Method Taking Account of Saliency","authors":"Yoshiaki Ueda, Seiichi Kojima, N. Suetake","doi":"10.1587/transfun.2020sml0007","DOIUrl":"https://doi.org/10.1587/transfun.2020sml0007","url":null,"abstract":"","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compressed Sensing Framework Applying Independent Component Analysis after Undersampling for Reconstructing Electroencephalogram Signals 欠采样后独立分量分析压缩感知框架用于脑电图信号重构
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Pub Date : 2020-12-01 DOI: 10.1587/transfun.2020eap1058
D. Kanemoto, Shun Katsumata, M. Aihara, M. Ohki
{"title":"Compressed Sensing Framework Applying Independent Component Analysis after Undersampling for Reconstructing Electroencephalogram Signals","authors":"D. Kanemoto, Shun Katsumata, M. Aihara, M. Ohki","doi":"10.1587/transfun.2020eap1058","DOIUrl":"https://doi.org/10.1587/transfun.2020eap1058","url":null,"abstract":"This paper proposes a novel compressed sensing (CS) framework for reconstructing electroencephalogram (EEG) signals. A feature of this framework is the application of independent component analysis (ICA) to remove the interference from artifacts after undersampling in a data processing unit. Therefore, we can remove the ICA processing block from the sensing unit. In this framework, we used a random undersampling measurement matrix to suppress the Gaussian. The developed framework, in which the discrete cosine transform basis and orthogonal matching pursuit were used, was evaluated using raw EEG signals with a pseudo-model of an eye-blink artifact. The normalized mean square error (NMSE) and correlation coefficient (CC), obtained as the average of 2,000 results, were compared to quantitatively demonstrate the effectiveness of the proposed framework. The evaluation results of the NMSE and CC showed that the proposed framework could remove the interference from the artifacts under a high compression ratio. key words: EEG, compressed sensing, independent component analysis, random undersampling, artifact","PeriodicalId":348826,"journal":{"name":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115748725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信