IEEJ Transactions on Electronics, Information and Systems
Online ISSN : 1348-8155
Print ISSN : 0385-4221
ISSN-L : 0385-4221
Volume 138, Issue 12
Displaying 1-25 of 25 articles from this issue
Special Issue on “2017 Tokai-section Joint Conference on Electrical, Electronics, Information, and Related Engineering”
Special Issue Paper
<Electrical and Electronic Circuit, LSI>
  • Yusuke Nozaki, Masaya Yoshikawa
    2018 Volume 138 Issue 12 Pages 1455-1463
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    The illegal attacks for embedded devices have recently been reported. Therefore, lightweight block ciphers, which are suitable for embedded devices, have been attracted attention. Midori is a lightweight low power block cipher. Regarding the hardware security, the risk of power analysis for the cryptographic hardware is pointed out. Hence, the tamper resistance evaluation of a lightweight low power cipher Midori is very important to guarantee the security of embedded devices. However, power analysis of Midori has not been studied. Therefore, this study proposes a new power analysis method for Midori. The proposed method performs the hierarchical power analysis to analyze the all secret keys. Moreover, to reduce the computational complexity, the proposed method performs the efficient improvement method utilizing the characteristic of Midori algorithm. Experiments using a field programmable gate array prove the validity of the proposed method.

    Download PDF (1132K)
<Information and Communication Technology>
  • Maya Tabuchi, Yoshihiro Ito
    2018 Volume 138 Issue 12 Pages 1464-1468
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    This paper proposes a method of estimating the most appropriate transmission rate of an IEEE 802.11g wireless LAN based on QoE for Web services. The method utilizes the linear multiple regression analysis to find a formula for calculating QoE from QoS; it then estimates the most appropriate transmission rate by using the multiple regression line. This paper confirms the effectiveness of the method by experiment. In the experiment, the authors target actual two Web services, a shopping service and a map service; they consider the round trip time and the packet loss ratio as QoS parameters and treat the satisfaction as a QoE parameter. The authors performed QoS evaluation and QoE assessment. The experimental results show the appropriateness of the method.

    Download PDF (777K)
<Systems, Instrument, Control>
  • Masayuki Okamura, Kazuhiro Yubai, Daisuke Yashiro, Satoshi Komada
    2018 Volume 138 Issue 12 Pages 1469-1477
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    Generally, there are unmodelled dynamics and uncertainty between an actual plant and its mathematical model. which causes performance degradation or destabilization of the control system at worst. This paper focuses on mini-mization of performance degradation between the nominal performance and the actual performance by appropriately designing a Youla parameter in the presence of unmodelled dynamics and uncertainty of the plant. By introducing the Youla parameter and the dual Youla parameter, control performance is analyzed using coprime factorizations of the plant and the controller, and then a design method of a fully-parameterized fixed-order Youla parameter based on frequency responses of the plant is formulated for Single-Input-Single-Output systems as a convex optimization problem. The one of merits of the proposed method is to directly design a low-order Youla parameter from frequency responses without any controller reduction techniques. The effectiveness of the proposed method is confirmed by some experiments.

    Download PDF (1121K)
  • Takatoshi Gonda, Suguru Mototani, Kae Doki, Akihiro Torii
    2018 Volume 138 Issue 12 Pages 1478-1484
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    In this study, the effect of air space in waterproof sealed case of undersea magnetic field resonance type wireless power transfer (WPT) is reported. It has been reported that the transmission power is increased by the air space between the transmitter and receiver coil in the waterproofing case and the wall surface of the case. We evaluated the dependence of the thickness of the air space from measurement and magnetic field analysis. The measurement and magnetic field analysis results indicated the similar tendency to increase the transmission power by 9.8% with the 10 mm air space at the transmitter side and the 30 mm air space at the receiver side.

    Download PDF (1321K)
<Media Information, User Interface>
  • Kazuaki Fukuta, Shohei Kato
    2018 Volume 138 Issue 12 Pages 1485-1492
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    Recently, we frequently interact with computers, such as information guides, entertainment robots, etc. In order to make those interactions smooth, low-stress, and enjoyable, computer agents should not only exchange messages but also have emotions and tastes. Many methods for making computer agents have proposed. However, these methods do not consider taste changes. Therefore, we propose an agent which updates tastes and emotions through dialogues based on Heider's balance theory. Also, this paper reported the experiments of conversation with agents. We confirmed the effectiveness for enhancing agent's friendliness by the results of semantic differencial method and factor analysis.

    Download PDF (3681K)
<Softcomputing, Learning>
  • Kosuke Naito, Shohei Kato
    2018 Volume 138 Issue 12 Pages 1493-1499
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    In recent years, Social Networking Serveices (SNSs) have been popular among young people. According to the popularity of SNSs, the cyberbullying becomes a social problem. To find the mechanism of cyberbullying, there are several studies using multi-agent simulation which can analyze human relationships. Therefore, in this study, we model SNSs in classroom and analyze the influence of SNSs on classroom friendship. This model is based on the Socion theory. In the model, an agent can communicate other agents using two kinds of networks: a network of classroom and networks of SNSs via a network recognized by each individual. Agents communicate face to face (FTF) in the classroom and do SNS communication in SNSs. In this paper, we conduct simulation of friendship relations considering SNSs, and disccuss the influence of SNSs on classroom relationships from the simulaion results. As a result, the average favorability rating of agents increased through SNSs. On the other hand, a result that specific agent was rejected also appeared. We consider that information sharing by SNSs is related to increased bullying.

    Download PDF (842K)
<Information Processing, Software>
  • Yoko Kawamura, Koji Tajima, Hirobumi Yamada, Tetsuro Tokoro
    2018 Volume 138 Issue 12 Pages 1500-1507
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    National Institute of Technology (NIT), Gifu College applied for the “Acceleration Program for University Education Rebuilding” started by the Ministry of Education, Culture, Sports, Science and Technology in 2014, and our application, a composite type of project (Theme I & II) was adopted. As one of our activities, we built “a collection of subjects highly recommended by company engineers” together with senior graduates of NIT, Gifu College. Then, we provide the subjects to the student as the CBT (Computer Based Testing) subjects using Moodle. Furthermore, we introduced a learning support system where students can gain the “practical engineering credit point” through taking the subjects. Through the learning support, the number of the LMS access to “a collection of subjects highly recommended by company engineers” increased by 1.3 times from last year.

    Download PDF (5075K)
  • Hideki Sato, Yasuhiro Nakayama
    2018 Volume 138 Issue 12 Pages 1508-1516
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    Geographical information query <D, F, ψskyline> retrieves a subset from geographical objects D under multi-criteria, each of which is an aggregate network distance in road networks and expressed by function fi(p, Qi) (∈ F) where p is an geographical object and Qi is a set of query points. ψskyline is skyline operation which is used to deal with multi-criteria. To process geographical information queries, Basic algorithms have been developed before. Two techniques, (1) shortest path search using path information cache and (2) incremental computation of aggregate network distances, are presented to improve processing performance of Basic algorithms. By applying both techniques to BasicLBC algorithm which is the most efficient among Basic algorithms, 2 algorithms, IncrementalLocalLBC and IncrementalGlobalLBC, are developed. Experimental results show that processing time of IncrementalGlobalLBC is reduced to 18% of that of BasicLBC, which is equal to 3% of that of BasicCE, an naive Basic algorithm.

    Download PDF (553K)
Paper
<Electrical and Electronic Circuit, LSI>
  • Jianlong Wang, Gopal Adhikari, Nobukazu Tsukiji, Haruo Kobayashi
    2018 Volume 138 Issue 12 Pages 1517-1528
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    This paper proposes to use Routh-Hurwitz stability criterion for analysis and design of the opamp stability, when its small equivalent circuit is derived; this can lead to explicit stability condition derivation for opamp circuit parameters. In the theoretical part, we describe the equivalence between Nyquist and Routh-Hurwitz stability criteria under some conditions, and we deduce the relationship that between parameters of Routh-Hurwitz stability criterion and phase margin of the operational amplifier. In the verification part, our statement is confirmed with LTspice simulations at transistor level opamp circuits.

    Download PDF (1298K)
<Information and Communication Technology>
  • Norio Sasaki, Qiang Chen, Fumiyuki Adachi
    2018 Volume 138 Issue 12 Pages 1529-1538
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    In this paper, we study a minimum mean square error based frequency-domain equalization (MMSE-FDE)scheme for a high-speed digital power line carrier system achieving 1.1 Mbps using 300 kHz bandwidth. Training sequence (TS) inserted single-carrier (SC) block transmission is employed. In the TS-SC block transmission, the Zadoff-Chu sequence is used as TS. TS acts as the cyclic prefix (CP) for MMSE-FDE. The channel estimation and noise power estimation are done using TS for computing the MMSE-FDE weight. In this paper, we design a digital power line carrier system of 210 ksymbol/s, in which the TS length of 64 symbols (Zadoff-Chu sequence) and the data block length of 960 symbols (64QAM) are used for achieving 1.1 Mbps transmission. The transmission performance of the designed digital power line carrier system is evaluated by computer simulation in terms of the normalization mean square error (NMSE) of channel estimation, the mean square error (MSE) of MMSE-FDE, and the bit error rate (BER). It is confirmed that MMSE-FDE is superior to MMSE time-domain equalization (MMSE-TDE) and zero-forcing (ZF) FDE and it achieves the required BER of 1×10-6 when the received Eb/N0=25 dB. Furthermore, we clarified the optimum value of forgetting factors of the first order infinite impulse response (IIR) filters used for channel estimation and noise estimation.

    Download PDF (885K)
<Biomedical Engineering>
  • Kanako Mikami, Kunihiko Oura
    2018 Volume 138 Issue 12 Pages 1539-1546
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    This paper discusses dynamics of oxygenated hemoglobin concentration and electrical signal that comes from inner brain activity relating to visual attention. Attention is well known as a base of cognitive function in neuroscience. Attentional disorder appears frequently in higher order brain dysfunction. In our previous studies, paced auditory serial addition test (PASAT) which is one of the examinations in neuropsychology, has been used to examine auditory attention and measure hemodynamics on prefrontal cortex. The authors changed their target to visual stimulus and proposed paced visual serial addition test (PVSAT) for experiment. Considering the results of hemodynamics or assistive event related electrical potentials, some interesting suggestions are given.

    Download PDF (1573K)
<Systems, Instrument, Control>
  • Yoshitsugu Nakagawa, Chisato Murakami, Kazuyuki Mori, Haruhiko Sato
    2018 Volume 138 Issue 12 Pages 1547-1553
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    In radiation measurement after decontamination in nuclear disaster areas affected by nuclear power plants, it is known that the local high dose sites called hot spots are scattered. The measurement method of efficient and simple and also different from conventional method is required in order to search for local hot spot factors. This paper describes the estimation method of using model possessed the nonlinearity as the way to minimize the influence of both mechanical and stochastic noise included in ether the sensors or data, regarding time-series data monitored by using external sensors. This method could convert to the amount of radiation detection supposed from relative value of it in a static detection at the point by paying attention of change of peak in radiation detection level according to moving velocity in identical amount of radiation detection. We presume the parameters of the model with repeating the least squares method computation steps consisting of a number of finite sampling transition from the starting point of searching in time series data based on a function model according to moving velocity while moving multiple times, and derive the relation to dose level converted to radiation detection indicating for the behavior of hot spot factors at the point.

    Download PDF (784K)
  • Kengo Takeda, Kenji Sawada, Shinji Yokogawa, Seiichi Shin
    2018 Volume 138 Issue 12 Pages 1554-1565
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    Wind and solar power generators cause electric power fluctuation, batteries are combined with such the renewable energy system to absorb power fluctuations, so called, wind turbine and photovoltaic power generators and battery hybrid system (WPBHS). Such the system mainly focuses on the decentralized operation in which a large number of system devices are managed decentrally. On the other hand, its stable generating capability and fault tolerance performance depends on how to group devices into small groups in which components are managed centrally (We call it grouping). That is, the grouping itself can improve the decentralized operation performance. This paper considers overlapping grouping of WPBHS in which one device belongs to multiple groups and proposes a new decentralized operation. To verify the validity of the proposed method, this paper shows numerical experiments in terms of stable generation and fault tolerance.

    Download PDF (1054K)
  • Yorinobu Murata, Misato Nishikawa, Masataka Matsuda
    2018 Volume 138 Issue 12 Pages 1566-1572
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    In the process of manufacture of silicon wafers, it becomes a problem that microscopic defect called microcrack may occur in a wafer. It is difficult to detect by an image inspection using infrared or a usual ultrasonic inspection because the aperture of microcrack is closed. In this study, as a nondestructive testing for a silicon wafer, we paid attention to inspection method using the nonlinearity of ultrasonic wave. First, a system which detects microcracks by making ultrasonic wave propagate along the surface of a silicon wafer was constructed. However, the ultrasonic wave propagating in a silicon wafer was not identified, and the optimization of the system had been unsolved. Therefore, the propagation analysis of the ultrasonic wave was carried out. As the result, it was suggested that it is a Lamb wave. Finally, by using the characteristic of Lamb wave, it was demonstrated that the proposed inspection method was useful for not only the microcrack inspection which lengthened the propagation distance but also the microcrack inspection in the back surface.

    Download PDF (1086K)
  • Takuya Otsuyama, Junichi Honda, Masato Watanabe
    2018 Volume 138 Issue 12 Pages 1573-1579
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    Recently, study of Multi-Static Primary Surveillance Radar (MSPSR) which is expected to be used as the next generation primary surveillance radar (PSR) has been active in the filed of aircraft surveillance. MSPSR is one of passive radar which combine multiple receivers and/or transmitters, and many research and development projects are progressing with various radio system as transmitter source.

    Electronic Navigation Research Institute (ENRI) developed an optical fiber connected passive primary surveillance radar (OFC-PPSR) for the effective use of frequency band and the current PSR system enhancement. In this paper, we present the introduction of OFC-PPSR and the preliminary evaluation results of the OFC-PPSR system.

    Download PDF (2250K)
  • Shogo Okada, Shiro Masuda
    2018 Volume 138 Issue 12 Pages 1580-1585
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    The paper proposes data-driven minimum variance regulatory control using a Fictitious Reference Iterative Tuning (FRIT) method. Our previous work has extended the original FRIT for reference signal tracking to the case of a stochastic disturbance attenuation problem. However, the method parametrizes the controller by using plant parameters based on a specific controller structure for minimum variance control. The present work uses a linearly parametrized controller for the inverse of the controller. Thus, a general parametrization is realized, and the integrator is straightforwardly introduced. An analytical result for the data-driven cost function is also given. A numerical example shows effectiveness of the proposed method.

    Download PDF (494K)
<Intelligence, Robotics>
  • Hirotaro Tada, Akihiko Sugiura
    2018 Volume 138 Issue 12 Pages 1586-1594
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    This study examines a method of applying a multistep CNN (Convolutional Neural Network) by creating the surface shape images of the inner surface of a tire to classify defects occurring on a tire inner surface. A multistep classifier is made by using the symmetry of the ratio of the number of the training images for each classification label and the symmetry of the characteristics for each classification label. The examined method shows 17.9% improvement in the defect detection rate and 0.009% reduction of the area rate of overdetection regions by using symmetry, reducing overdetection while maintaining the accuracy of detecting defects. Also, in the environmental condition of a working state, it shows the defect detection rate of 89.3% and the area rate of overdetection regions of 0.049%.

    Download PDF (1758K)
<Speech and Image Processing, Recognition>
  • Yoshiaki Ueda, Takanori Koga, Noriaki Suetake, Eiji Uchino
    2018 Volume 138 Issue 12 Pages 1595-1603
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    Steganography is a technique to hide a secret data into stego-data for secret communications. In the steganography, it is important to suppress a degradation of the stego-image for data hiding. The stego-image of the steganographic method is divided into full-color images and palette-based images. In this paper, we propose a new multi-bit steganographic method for the palette-based images. In the case of embedding for palette-based images, there are two characteristics described below. (1) Embedding degradation is not remarkable because palette-based images have been degraded due to color quantization and error-diffusion processes. (2) The embedding error tends to greater than full-color images due to usable colors are few. In the proposed method, representative colors of the palette-based image are sorted and their index numbers are replaced so that the embedding error becomes small. The proposed method suppresses the degradation of the cover-image by dispersing the embedding coordinates. We verify the effectiveness of our method through experiments using palette-based color images.

    Download PDF (2071K)
  • Etsuro Nakamura, Tsuyoshi Takahashi, Yoichi Kageyama, Masaki Ishii, Ma ...
    2018 Volume 138 Issue 12 Pages 1604-1612
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    Lip motion features such as changes in the lip width and length provide important information for analyzing psychology and physical conditions. Furthermore, extracting lip motions from facial images of users has some advantages that are "needless of special equipment" and "possible of non-contact measuring". Our previous studies revealed that lip motions relate to mental state. Therefore, it is important to develop a method for extracting the lip shape from facial image data. However, the conventional method failed to extract lips due to individual differences of each subject and influences of the shadows on the periphery of lips. Lip extraction methods based on feature points need to use a lot of learning data. In this paper, we propose a novel lip extraction method using feedforward neural network (FFNN), which is one of machine learning methods. The proposed method is able to learn the features of lips using only one image, and its accuracy is same or higher than that of the conventional method and feature-point-based methods.

    Download PDF (1117K)
<Information Processing, Software>
  • Masaki Yumoto
    2018 Volume 138 Issue 12 Pages 1613-1624
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    In a building air-conditioning system, measured time-series data is observed from many kinds of sensors. It is difficult to detect the fault by the administrators because only the limited experts can diagnose the unusual system. Thus, a new method is required, which can detect faults from measured data using computers automatically. This paper proposes the method of fault detection with rough set based on qualitative model of measured time-series data in building air- conditioning system. First, the proposal method converts target measured time-series data into data set based on target qualitative model. Next, this method constructs the decision rule of a rough set by comparison of the data set for every block. Finally, this method detects fault through comparison of evaluation values. Through practical experiments, it is confirmed that the proposal method can detect faults without expert knowledge in a building air-conditioning system.

    Download PDF (694K)
  • Koji Amano, Hiroyasu Nishiyama, Minoru Koizumi, Katsuto Shimizu, Watar ...
    2018 Volume 138 Issue 12 Pages 1625-1633
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    This paper is to propose an information management technique which is easy to understand by humans and easy to utile analysis program, in order to manage complicated machines and facilities. To manage the facilities, we show a modeling that partly defines the structure of the facilities by set theory, further defines the requirements for joining the Sub-set of structured identifiers on consistency. In verification of the proposal and programming method, we show how to control the amount of information of structured identifier as uniquely identifier. As a result, we show our proposal is useful to address real problems in management software.

    Download PDF (1043K)
  • Kyohei Tokita, Keiichi Iwamura
    2018 Volume 138 Issue 12 Pages 1634-1645
    Published: December 01, 2018
    Released on J-STAGE: December 01, 2018
    JOURNAL FREE ACCESS

    Secure computation is a major issue that affects the utilization of Big Data. Two main approaches are employed to achieve secure computation: homomorphic encryption (HE) and secret sharing schemes (SSSs), where the computational cost of the latter is generally much less than that of HE. Aminuddin et al. proposed a secure product-sum computation that allows secure multiplication for n<2k-1 by using the (scalar value × polynomial) approach. However, this approach requires a polynomial calculation because it uses Shamir's SSS, so it cannot be processed rapidly. In this study, we propose a fast secure computation method based on the XOR method, and we evaluate its performance and security.

    Download PDF (948K)
Letter
<Softcomputing, Learning>
 
 
feedback
Top