Masahiro TADA Masayuki NISHIDA
In this study, we use a vision-based driving monitoring sensor to track drivers’ visual scanning behavior, a key factor for preventing traffic accidents. Our system evaluates driver’s behaviors by referencing the safety knowledge of professional driving instructors, and provides real-time voice-guided safety advice to encourage safer driving. Our system’s evaluation of safe driving behaviors matched the instructor’s evaluation with accuracy over 80%.
Takako MIZOGUCHI Akihiko KANDORI Keiji ENPUKU
Simple and quick tests at medical clinics have become increasingly important. Magnetic sensing techniques have been developed to detect biomarkers using magnetic nanoparticles in liquid-phase assays. We developed a biomarker assay that involves using an alternating current (AC) susceptibility measurement system that uses functional magnetic particles and magnetic sensing technology. We also developed compact biomarker measuring equipment to enable quick testing. Our assay is a one-step homogeneous assay that involves simply mixing a sample with a reagent, shortening testing time and simplifying processing. Using our compact measuring equipment, which includes anisotropic magneto resistance (AMR) sensors, we conducted high-sensitivity measurements of extremely small amounts of two biomarkers (C-reactive protein, CRP and α-Fetoprotein, AFP) used for diagnosing arteriosclerosis and malignant tumors. The results indicate that an extremely small amount of CRP and AFP could be detected within 15 min, which demonstrated the possibility of a simple and quick high-sensitivity immunoassay that involves using an AC-susceptibility measurement system.
Lin CHEN Xueyuan YIN Dandan ZHAO Hongwei LU Lu LI Yixiang CHEN
ARM chips with low energy consumption and low-cost investment have been rapidly applied to smart office and smart entertainment including cloud mobile phones and cloud games. This paper first summarizes key technologies and development status of the above scenarios including CPU, memory, IO hardware virtualization characteristics, ARM hypervisor and container, GPU virtualization, network virtualization, resource management and remote transmission technologies. Then, in view of the current lack of publicly referenced ARM cloud constructing solutions, this paper proposes and constructs an implementation framework for building an ARM cloud, and successively focuses on the formal definition of virtualization framework, Android container system and resource quota management methods, GPU virtualization based on API remoting and GPU pass-through, and the remote transmission technology. Finally, the experimental results show that the proposed model and corresponding component implementation methods are effective, especially, the pass-through mode for virtualizing GPU resources has higher performance and higher parallelism.
Sunwoo JANG Young-Kyoon SUH Byungchul TAK
This letter presents a technique that observes system call mapping behavior of the proxy kernel layer of secure container runtimes. We applied it to file system operations of a secure container runtime, gVisor. We found that gVisor's operations can become more expensive than the native by 48× more syscalls for open, and 6× for read and write.
Hiroki URASAWA Hayato SOYA Kazuhiro YAMAGUCHI Hideaki MATSUE
We evaluated the transmission performance, including received power and transmission throughput characteristics, in 4×4 single-user multiple-input multiple-output (SU-MIMO) transmission for synchronous time division duplex (TDD) and downlink data channels in comparison with single-input single-output (SISO) transmission in an environment where a local 5G wireless base station was installed on the roof of a research building at our university. Accordingly, for the received power characteristics, the difference between the simulation value, which was based on the ray tracing method, and the experimental value at 32 points in the area was within a maximum difference of approximately 10 dB, and sufficient compliance was obtained. Regarding the transmission throughput versus received power characteristics, after showing a simulation method for evaluating throughput characteristics in MIMO, we compared the results with experimental results. The cumulative distribution function (CDF) of the transmission throughput shows that, at a CDF of 50%, in SISO transmission, the simulated value is approximately 115Mbps, and the experimental value is 105Mbps, within a difference of approximately 10Mbps. By contrast, in MIMO transmission, the simulation value is 380Mbps, and the experimental value is approximately 420Mbps, which is a difference of approximately 40Mbps. It was shown that the received power and transmission throughput characteristics can be predicted with sufficient accuracy by obtaining the delay profile and the system model at each reception point using the both ray tracing and MIMO simulation methods in actual environments.
In this survey we summarize properties of pseudorandomness and non-randomness of some number-theoretic sequences and present results on their behaviour under the following measures of pseudorandomness: balance, linear complexity, correlation measure of order k, expansion complexity and 2-adic complexity. The number-theoretic sequences are the Legendre sequence and the two-prime generator, the Thue-Morse sequence and its sub-sequence along squares, and the prime omega sequences for integers and polynomials.
There are two types of elliptic curves, ordinary elliptic curves and supersingular elliptic curves. In 2012, Sutherland proposed an efficient and almost deterministic algorithm for determining whether a given curve is ordinary or supersingular. Sutherland's algorithm is based on sequences of isogenies started from the input curve, and computation of each isogeny requires square root computations, which is the dominant cost of the algorithm. In this paper, we reduce this dominant cost of Sutherland's algorithm to approximately a half of the original. In contrast to Sutherland's algorithm using j-invariants and modular polynomials, our proposed algorithm is based on Legendre form of elliptic curves, which simplifies the expression of each isogeny. Moreover, by carefully selecting the type of isogenies to be computed, we succeeded in gathering square root computations at two consecutive steps of Sutherland's algorithm into just a single fourth root computation (with experimentally almost the same cost as a single square root computation). The results of our experiments using Magma are supporting our argument; for cases of characteristic p of 768-bit to 1024-bit lengths, our proposed algorithm for characteristic p≡1 (mod 4) runs in about 61.5% of the time and for characteristic p≡3 (mod 4) also runs in about 54.9% of the time compared to Sutherland's algorithm.
The CGL hash function is a provably secure hash function using walks on isogeny graphs of supersingular elliptic curves. A dominant cost of its computation comes from iterative computations of power roots over quadratic extension fields. In this paper, we reduce the necessary number of power root computations by almost half, by applying and also extending an existing method of efficient isogeny sequence computation on Legendre curves (Hashimoto and Nuida, CASC 2021). We also point out some relationship between 2-isogenies for Legendre curves and those for Edwards curves, which is of independent interests, and develop a method of efficient computation for 2e-th roots in quadratic extension fields.
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usually, PKI-based AKE schemes are designed to guarantee secrecy of the session key and mutual authentication. However, in practice, there are many cases where mutual authentication is undesirable such as in anonymous networks like Tor and Riffle, or difficult to achieve due to the certificate management at the user level such as the Internet. Goldberg et al. formulated a model of anonymous one-sided AKE which guarantees the anonymity of the client by allowing only the client to authenticate the server, and proposed a concrete scheme. However, existing anonymous one-sided AKE schemes are only known to be secure in the random oracle model. In this paper, we propose generic constructions of anonymous one-sided AKE in the random oracle model and in the standard model, respectively. Our constructions allow us to construct the first post-quantum anonymous one-sided AKE scheme from isogenies in the standard model.
Theoretically secure cryptosystems, digital signatures may not be secure after being implemented on Internet of Things (IoT) devices and PCs because of side-channel attacks (SCA). Because RSA key generation and ECDSA require GCD computations or modular inversions, which are often computed using the binary Euclidean algorithm (BEA) or binary extended Euclidean algorithm (BEEA), the SCA weaknesses of BEA and BEEA become a serious concern. Constant-time GCD (CT-GCD) and constant-time modular inversion (CTMI) algorithms are effective countermeasures in such situations. Modular inversion based on Fermat's little theorem (FLT) can work in constant time, but it is not efficient for general inputs. Two CTMI algorithms, named BOS and BY in this paper, were proposed by Bos, Bernstein and Yang, respectively. Their algorithms are all based on the concept of BEA. However, one iteration of BOS has complicated computations, and BY requires more iterations. A small number of iterations and simple computations during one iteration are good characteristics of a constant-time algorithm. Based on this view, this study proposes new short-iteration CT-GCD and CTMI algorithms over Fp borrowing a simple concept from BEA. Our algorithms are evaluated from a theoretical perspective. Compared with BOS, BY, and the improved version of BY, our short-iteration algorithms are experimentally demonstrated to be faster.
Class imbalance is one of the challenges faced in the field of machine learning. It is difficult for traditional classifiers to predict the minority class data. If the imbalanced data is not processed, the effect of the classifier will be greatly reduced. Aiming at the problem that the traditional classifier tends to the majority class data and ignores the minority class data, imbalanced data over-sampling method based on iterative self-organizing data analysis technique algorithm(ISODATA) clustering is proposed. The minority class is divided into different sub-clusters by ISODATA, and each sub-cluster is over-sampled according to the sampling ratio, so that the sampled minority class data also conforms to the imbalance of the original minority class data. The new imbalanced data composed of new minority class data and majority class data is classified by SVM and Random Forest classifier. Experiments on 12 datasets from the KEEL datasets show that the method has better G-means and F-value, improving the classification accuracy.
The problem of Isomorphism of Polynomials (IP problem) is known to be important to study the security of multivariate public key cryptosystems, one of the major candidates of post-quantum cryptography, against key recovery attacks. In these years, several schemes based on the IP problem itself or its generalization have been proposed. At PQCrypto 2020, Santoso introduced a generalization of the problem of Isomorphism of Polynomials, called the problem of Blockwise Isomorphism of Polynomials (BIP problem), and proposed a new Diffie-Hellman type encryption scheme based on this problem with Circulant matrices (BIPC problem). Quite recently, Ikematsu et al. proposed an attack called the linear stack attack to recover an equivalent key of Santoso's encryption scheme. While this attack reduced the security of the scheme, it does not contribute to solving the BIPC problem itself. In the present paper, we describe how to solve the BIPC problem directly by simplifying the BIPC problem due to the conjugation property of circulant matrices. In fact, we experimentally solved the BIPC problem with the parameter, which has 256 bit security by Santoso's security analysis and has 72.7bit security against the linear stack attack, by about 10 minutes.
Feng LIU Xianlong CHENG Conggai LI Yanli XU
This letter solves the energy efficiency optimization problem for the simultaneous wireless information and power transfer (SWIPT) systems with non-orthogonal multiple access (NOMA), multiple input single output (MISO) and power-splitting structures, where each user may have different individual quality of service (QoS) requirements about information and energy. Nonlinear energy harvesting model is used. Alternate optimization approach is adopted to find the solution, which shows a fast convergence behavior. Simulation results show the proposed scheme has higher energy efficiency than existing dual-layer iteration and throughput maximization methods.
Kaizhan LIN Fangguo ZHANG Chang-An ZHAO
Supersingular isogeny Diffie-Hellman (SIDH) is attractive for its relatively small public key size, but it is still unsatisfactory due to its efficiency, compared to other post-quantum proposals. In this paper, we focus on the performance of SIDH when the starting curve is E6 : y2 = x3 + 6x2 + x, which is fixed in Round-3 SIKE implementation. Inspired by previous works [1], [2], we present several tricks to accelerate key generation of SIDH and each process of SIKE. Our experimental results show that the performance of this work is at least 6.09% faster than that of the SIKE implementation, and we can further improve the performance when large storage is available.
It has been widely recognized that in compressed sensing, many restricted isometry property (RIP) conditions can be easily obtained by using the null space property (NSP) with its null space constant (NSC) 0<θ≤1 to construct a contradicted method for sparse signal recovery. However, the traditional NSP with θ=1 will lead to conservative RIP conditions. In this paper, we extend the NSP with 0<θ<1 to a scale NSP, which uses a factor τ to scale down all vectors belonged to the Null space of a sensing matrix. Following the popular proof procedure and using the scale NSP, we establish more relaxed RIP conditions with the scale factor τ, which guarantee the bounded approximation recovery of all sparse signals in the bounded noisy through the constrained l1 minimization. An application verifies the advantages of the scale factor in the number of measurements.
Dongyue JIN Luming CAO You WANG Xiaoxue JIA Yongan PAN Yuxin ZHOU Xin LEI Yuanyuan LIU Yingqi YANG Wanrong ZHANG
Fast switching speed, low power consumption, and good stability are some of the important properties of spin transfer torque assisted voltage controlled magnetic anisotropy magnetic tunnel junction (STT-assisted VCMA-MTJ) which makes the non-volatile full adder (NV-FA) based on it attractive for Internet of Things. However, the effects of process variations on the performances of STT-assisted VCMA-MTJ and NV-FA will be more and more obvious with the downscaling of STT-assisted VCMA-MTJ and the improvement of chip integration. In this paper, a more accurate electrical model of STT-assisted VCMA-MTJ is established on the basis of the magnetization dynamics and the process variations in film growth process and etching process. In particular, the write voltage is reduced to 0.7 V as the film thickness is reduced to 0.9 nm. The effects of free layer thickness variation (γtf) and oxide layer thickness variation (γtox) on the state switching as well as the effect of tunnel magnetoresistance ratio variation (β) on the sensing margin (SM) are studied in detail. Considering that the above process variations follow Gaussian distribution, Monte Carlo simulation is used to study the effects of the process variations on the writing and output operations of NV-FA. The result shows that the state of STT-assisted VCMA-MTJ can be switched under -0.3%≤γtf≤6% or -23%≤γtox≤0.2%. SM is reduced by 16.0% with β increases from 0 to 30%. The error rates of writing ‘0’ in the NV-FA can be reduced by increasing Vb1 or increasing positive Vb2. The error rates of writing ‘1’ can be reduced by increasing Vb1 or decreasing negative Vb2. The reduction of the output error rates can be realized effectively by increasing the driving voltage (Vdd).
Deep neural networks show good performance in image recognition, speech recognition, and pattern analysis. However, deep neural networks also have weaknesses, one of which is vulnerability to poisoning attacks. A poisoning attack reduces the accuracy of a model by training the model on malicious data. A number of studies have been conducted on such poisoning attacks. The existing type of poisoning attack causes misrecognition by one classifier. In certain situations, however, it is necessary for multiple models to misrecognize certain data as different specific classes. For example, if there are enemy autonomous vehicles A, B, and C, a poisoning attack could mislead A to turn to the left, B to stop, and C to turn to the right simply by using a traffic sign. In this paper, we propose a multi-targeted poisoning attack method that causes each of several models to misrecognize certain data as a different target class. This study used MNIST and CIFAR10 as datasets and Tensorflow as a machine learning library. The experimental results show that the proposed scheme has a 100% average attack success rate on MNIST and CIFAR10 when malicious data accounting for 5% of the training dataset have been used for training.
Yasunori SUZUKI Tetsuo HIROTA Toshio NOJIMA
This paper proposes a new multi-port amplifier configuration that employs feed-forward techniques. In general, a multi-port amplifier is used as a transponder in a satellite transmitter. A multi-port amplifier comprises an N-in N-out input-side matrix network, N amplifiers, and an N-in N-out output-side matrix network. Based on this configuration, other undesired ports leak power to the desired port in a multi-port amplifier. If the power amplifier of a cellular base station uses a multi-port amplifier, the power leakage from the other ports causes degradation in the error vector magnitude. The proposed configuration employs N-parallel feed-forward amplifiers with a multi-port amplifier as the main amplifier. The proposed configuration drastically reduces the power leakage using the employed feed-forward techniques. An experimental 2-GHz band four-in four-out multi-port amplifier is constructed and tested. It achieves the leakage power level of -58 dB, a gain deviation of less than 0.05 dB, and a phase deviation of less than 0.45 deg. with the maximum power of 35 dBm over a 20-MHz bandwidth with the center frequency 2.14 GHz at room temperature. The experimental multi-port amplifier reduces the leakage power level by approximately 30 dB compared to that for a multi-port amplifier without the feed-forward techniques. The proposed configuration can be applied to power amplifiers in cellular base stations.
Yuki KIMURA Sakuyoshi SAITO Yuichi KIMURA Masahiro TATEMATSU
This paper presents improvement of port-to-port isolation characteristics of a linearly dual-polarized dual-band and wideband multi-ring microstrip antenna (MR-MSA) fed by two L-probes. The linearly dual-polarized dual-band and wideband MR-MSA consists of two circular ring patches and two L-probes arranged in a multi-layered dielectric substrate. By using a thick substrate for the L-probe and arranging two ring patches as radiation elements, the proposed antenna operates wideband and dual-band characteristics. Furthermore, by arranging two L-probes at the orthogonal positions, the proposed antenna can radiate dual linear polarizations. In this paper, for improving port-to-port isolation characteristics of the linearly dual-polarized dual-band and wideband MR-MSA fed by two L-probes, a via connected to the ground plane at the center of the radiation elements is arranged. The fractional bandwidths below -10dB reflection obtained by the simulation of the MR-MSA with the via were 17.0% and 14.4%. Furthermore, the simulated isolation characteristics were more than 21.0dB and 17.0dB in the two bands. Improvement of the isolation characteristics between two ports as well as the dual-band and wideband performance of the proposed MR-MSA with the via were confirmed by the simulation and the measurement.
We consider a reliable decentralized supervisory control problem for discrete event systems in the inference-based framework. This problem requires us to synthesize local supervisors such that the controlled system achieves the specification and is nonblocking, even if local control decisions of some local supervisors are not available for making the global control decision. In the case of single-level inference, we introduce a notion of reliable 1-inference-observability and show that reliable 1-inference-observability together with controllability and Lm(G)-closedness is a necessary and sufficient condition for the existence of a solution to the reliable decentralized supervisory control problem.