IEICE ESS Fundamentals Review
Online ISSN : 1882-0875
ISSN-L : 1882-0875
Volume 14, Issue 2
Displaying 1-21 of 21 articles from this issue
Cover
Table of Contents
Preface
Review Papers
Proposed by SIS (Smart Info-Media Systems)
  • Kazuhiro TOKUNAGA
    2020 Volume 14 Issue 2 Pages 97-106
    Published: October 01, 2020
    Released on J-STAGE: October 01, 2020
    JOURNAL FREE ACCESS

    Data visualization is an important technique for interpreting complex data and finding relationships between data. Although principal component analysis is widely known as a method of data visualization, the Self-Organizing Map (SOM) proposed by Kohonen, one of the artificial neural networks, is also widely used as a data visualization tool. The SOM performs a topology-preserving transformation from a higher-dimensional vector space to a lower one, and generates a map that represents the relationships between data vectors. In some cases, however, it is necessary to generate maps based on the similarity between models that generate the data vectors. The author proposed a modular network self-organizing map (mnSOM: Modular Network SOM) as a method to solve such problems. The mnSOM has an architecture as a generalized SOM since the mnSOM can generate maps for a variety of models such as input-output functions, dynamical models, manifolds and so on. In this paper, the theory and learning algorithms of mnSOM are explained with an explanation of SOM.

    Download PDF (2126K)
Proposed by HWS (Hardware Security)
  • Kuniyasu SUZAKI
    2020 Volume 14 Issue 2 Pages 107-117
    Published: October 01, 2020
    Released on J-STAGE: October 01, 2020
    JOURNAL FREE ACCESS

    Current CPUs have a Trusted Execution Environment (TEE) mechanism to run a critical process in isolatation from the operating system. Famous TEEs are Intel SGX, AMD SEV, and Arm TrustZone. In addition, the open architecture “RISC-V” has some proposals for TEE implementation. Unfortunately, TEE functions depend on CPU implementation. The common function of a TEE is isolated execution only, which requires supporting technologies for secure processing. In this paper, the details of each TEE implementation as well as its security-supporting technologies, i.e., Root of Trust for critical information and Remote Attestation for verifying CPU and code integrity, are discussed. The software build environment, vulnerability, and standardization activities are also introduced.

    Download PDF (2234K)
Proposed by TL (Thought and Language)
Proposed by SIP (Signal Processing)
  • Shunsuke ONO
    2020 Volume 14 Issue 2 Pages 138-146
    Published: October 01, 2020
    Released on J-STAGE: October 01, 2020
    JOURNAL FREE ACCESS

    Hyperspectral (HS) imagery provides 3D data that contains both spatial (two-dimensional) and spectral (one-dimensional) information acquired by spectroscopic imaging in a wide range of wavelengths from ultraviolet to near-infrared. HS images can visualize physical properties and phenomena that cannot be captured by the human eye or RGB cameras. However, capturing complete spatial―spectral information is often difficult because of the limitations of the optical design and/or measurement conditions. In addition, it is also difficult to avoid degradation due to various types of noise arising in the measurement process. In this paper, we review optimization-based techniques for effectively estimating the desired HS image from such incomplete and degraded measurement data.

    Download PDF (3123K)
Miscellaneous Articles
Let's go to IEICE Workshops!
International Conference Report
Winners' Voice
Call for Participants
Call for Papers
 
Committees & Editors Notes
feedback
Top