{"title":"Ternary/MV Reversible Functions with Component Functions from Different Equivalence Classes","authors":"P. Kerntopf, R. Stankovic, K. Podlaski, C. Moraga","doi":"10.1109/ISMVL.2018.00027","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00027","url":null,"abstract":"In an earlier paper we considered whether all component functions of a ternary reversible function either can belong to the same equivalent class in some classifications or can have the same property in the sense of classical logic synthesis. This problem has a direct relationship to studying different aspects of classification of reversible functions. In this paper we present reversible ternary/MV functions of any number of variables with all component functions belonging to different P-equivalence classes.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"3 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114106033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic Intrusion Detection Technique for an In-vehicle Network Based on Time-Series Feature Extraction","authors":"Hiroki Suda, M. Natsui, T. Hanyu","doi":"10.1109/ISMVL.2018.00018","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00018","url":null,"abstract":"In this paper, we propose a systematic intrusion detection algorithm based on time-series feature extraction for an in-vehicle network. Since packet-type valid data are transmitted inside an in-vehicle network periodically, illegal data due to unauthorized intrusion attack can be easily and uniformly detected by using periodical time-series feature of valid data, where recurrent neural network is a key tool to efficiently extract their time-series feature. In fact, through an evaluation using data acquired from actual vehicles, we show that the proposed method can detect typical intrusion attack patterns such as data modification attack and injection attack.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121876368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Kostolny, E. Zaitseva, Patrik Rusnak, M. Kvassay
{"title":"Application of Multiple-Valued Logic in Importance Analysis of k-out-of-n Multi-state Systems","authors":"J. Kostolny, E. Zaitseva, Patrik Rusnak, M. Kvassay","doi":"10.1109/ISMVL.2018.00012","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00012","url":null,"abstract":"Multi-State Systems (MSSs) represent one of the basic approaches used in reliability analysis. They define several performance levels at which the system and its components can operate. A special type of a MSS is k-out-of-n system whose instances can be found in complex systems with redundant components, such as distribution networks. In this paper we deal with importance analysis of such systems using direct partial logic derivatives. We present how these derivatives can be used to compute structural and Birnbaum's importance of system components, and we derive an algorithm for efficient calculation of Birnbaum's importance using multi-valued decision diagrams.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple-Valued Random Digit Extraction","authors":"Micah Thornton, M. Thornton","doi":"10.1109/ISMVL.2018.00036","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00036","url":null,"abstract":"We describe a parameterized random value extraction function for producing symbol strings based upon a user-specified radix value. The presentation of the extractor function is accompanied with a theoretical discussion that describes how the radix value, and hence the symbol set cardinality, affects the entropy of an extracted symbol string. Experimental results are provided where extracted strings with respect to different radix values are analyzed for randomness quality. The empirical data is obtained by applying our parameterized extractor function to a weakly random source that provides a set of inter-packet delay spacings observed from a network interface card in a general-purpose computer. Our results show how the quality of the extracted random strings varies for differing radix values. These results provide guidelines for choosing an appropriate radix value in an extractor function.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134491513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Spectral Algorithm for Ternary Function Classification","authors":"D. M. Miller, Mathias Soeken","doi":"10.1109/ISMVL.2018.00042","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00042","url":null,"abstract":"The spectral representation and classification of 2-valued and multiple-valued functions has been previously studied and found to be useful in logic design and testing for conventional circuits. Spectral techniques also have potential application for reversible and quantum circuits. This paper addresses the classification of ternary functions into spectral translation equivalence classes. An efficient algorithm is presented that determines the spectral translations to map a given function to the representative function for the equivalence class containing the given function. Using this algorithm we show that the 2-variable ternary functions partition into 11 equivalence classes. While the number of spectral equivalence classes for ternary functions with 3 or more variables is very large, prohibiting full enumeration, we determine a lower bound of 167,275 classes for 3 variables. The algorithm can be used for a significant number of variables to quickly determine if two functions fall within the same equivalence class and, if they do, to find a sequence of spectral translations to map one to the other. Generalization of the approach to higher radix functions is briefly discussed.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133943449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthesis of Reversible Circuits Using Conventional Hardware Description Languages","authors":"Zaid Al-Wardi, R. Wille, R. Drechsler","doi":"10.1109/ISMVL.2018.00025","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00025","url":null,"abstract":"Hardware Description Languages (HDL) facilitate the design of complex circuits and allow for scalable synthesis. While rather established for conventional circuits, HDL-based design of reversible circuits is in its infancy. This motivates the question whether conventional HDLs can also be efficiently used for the design of reversible circuits. This work investigates this question and provides a basis towards a design flow that requires only little knowledge of reversible computation. This eases the acceptance of this non-conventional paradigm amongst designers and stakeholders.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130254861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quaternary Debiasing for Physically Unclonable Functions","authors":"Manami Suzuki, Rei Ueno, N. Homma, T. Aoki","doi":"10.1109/ISMVL.2018.00010","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00010","url":null,"abstract":"This paper proposes a new multiple-valued debiasing method for extracting uniform random binary responses from physically unclonable functions (PUFs). The proposed method handles PUF responses as quaternary values and extracts the corresponding binary responses in a stable and ef?cient manner. Two experiments were conducted to evaluate the stability and effectiveness of the proposed method with simulated and actual responses of the latch PUFs. The results show that the debiased, random binary responses obtained using the proposed method were 55--128% longer than those obtained using conventional best methods.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Reed-Muller-Fourier Spectrum of Multiple-Valued Rotation Symmetric Functions","authors":"C. Moraga, R. Stankovic, J. Astola","doi":"10.1109/ISMVL.2018.00049","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00049","url":null,"abstract":"The concept of rotation symmetric functions from the Boolean domain is extended to the multiple-valued (MV) domain. It is shown that symmetric functions are a subset of the rotation symmetric functions. Functions exhibiting these kinds of symmetry may be given a compact value vector representation. It is shown that the Reed-Muller-Fourier spectrum of a function preserves the kind of symmetry and therefore it may be given a compact vector representation of the same length as the compact value vector of the corresponding function. A method is presented for calculating the RMF spectrum of symmetric and rotation symmetric functions from their compact representations.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"858 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133969973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quaternary Generalized Boolean Bent Functions Obtained Through Permutation of Binary Boolean Bent Functions","authors":"R. Stankovic, M. Stankovic, J. Astola, C. Moraga","doi":"10.1109/ISMVL.2018.00009","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00009","url":null,"abstract":"Various generalizations of binary Boolean bent functions have some applications in both binary and multiple-valued domain. The generalized Boolean functions having binary variables but taking four different values are of a special interest due to simple realizations. In this paper, we study how relationships between binary bent functions and generalized Boolean bent functions with quaternary values can be used to construct these functions.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134628186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaitlin N. Smith, T. LaFave, D. MacFarlane, M. Thornton
{"title":"A Radix-4 Chrestenson Gate for Optical Quantum Computation","authors":"Kaitlin N. Smith, T. LaFave, D. MacFarlane, M. Thornton","doi":"10.1109/ISMVL.2018.00052","DOIUrl":"https://doi.org/10.1109/ISMVL.2018.00052","url":null,"abstract":"A recently developed four-port directional coupler used in optical signal processing applications is shown to be equivalent to a radix-4 Chrestenson operator, or gate, in quantum information processing (QIP) applications. The radix-4 qudit is implemented as a location-encoded photon incident on one of the four ports of the coupler. The quantum informatics transfer matrix is derived for the device based upon the conservation of energy equations when the coupler is employed in a classical sense in an optical communications environment. The resulting transfer matrix is the radix-4 Chrestenson transform. This result indicates that a new practical device is available for use in the implementation of radix-4 QIP applications or in the construction of a radix-4 quantum computer.","PeriodicalId":434323,"journal":{"name":"2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126924187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}