作者:
Fujii, TakashiKikuno, TohruYoshida, NoriyoshiFaculty of Engineering
Hiroshima University Higashi-Hiroshima Japan 724 NEC Corporation Kawasaki Japan 211 Noriyoshi Yoshida received degrees of B. Eng. and Dr. Eng. in Electronics from Kyushu University
Japan in 1955 and 1968 respectively. He joined Kyushu University from 1956 to 1969 holding positions as Lecturer (1961) and Associate Professor (1968). He has been a Professor of Electronic Circuits and Systems Faculty of Engineering Hiroshima University since 1969. His research interests include logical design of digital systems hardware implementation of algorithmic structures and computer networks. He is currently serving as an Advisory Editor of Journal and Transactions of the Institute of Electronics and Communication Engineers of Japan. Dr. Yoshida is a senior member of the Institute of Electric and Electronic Engineers a member of the Institute of Electronics and Communication Engineers of Japan the Institute of Electrical Engineers of Japan Information Processing Society of Japan and the Institute of Medical Electronics and Biomedical Engineering of Japan.
In the one-dimensional array approach, a logic circuit is realized by arranging NAND (NOR) gates in a one-dimensional array and interconnecting them. To minimize the area required, we must find a one-dimensional assig...
详细信息
In the one-dimensional array approach, a logic circuit is realized by arranging NAND (NOR) gates in a one-dimensional array and interconnecting them. To minimize the area required, we must find a one-dimensional assignment of gates so as to minimize the vertical length. This optimization problem (called problem G) has been formulated as a graph problem and has already been proved to be NP-hard. In this paper, a restricted problem (called the problem R) is introduced anew wherein a connection of each net is restricted to be between two gates. The problem R plays an important role in developing a heuristic algorithm for the problem G. As for the time complexity, we show that the problem R is also NP-hard.
This Edited Volume gathers a selection of refereed and revised papers originally presented at the Third International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’17), held on September 13...
详细信息
ISBN:
(数字)9783319679341
ISBN:
(纸本)9783319679334
This Edited Volume gathers a selection of refereed and revised papers originally presented at the Third International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’17), held on September 13–16, 2017 in Manipal, India. The papers offer stimulating insights into biometrics, digital watermarking, recognition systems, image and video processing, signal and speech processing, pattern recognition, machine learning and knowledge-based systems. Taken together, they offer a valuable resource for all researchers and scientists engaged in the various fields of signal processing and related areas.
This book constitutes the refereed proceedings of the 7th International Workshop on Multiple Access communications, MACOM 2014, held in Halmstad, Sweden, in August 2014. The 12 full papers presented were carefully rev...
详细信息
ISBN:
(数字)9783319102627
ISBN:
(纸本)9783319102610
This book constitutes the refereed proceedings of the 7th International Workshop on Multiple Access communications, MACOM 2014, held in Halmstad, Sweden, in August 2014. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They describe the latest advancements in the field of multiple access communications with an emphasis on reliability issues, physical layer techniques, cognitive radio, medium access control protocols, and video coding.
For Wireless Body Area Networks (WBANs), the security of sensitive data of patients is of the utmost importance, particularly in healthcare environments. This study presents a novel methodology for improving the effic...
详细信息
For Wireless Body Area Networks (WBANs), the security of sensitive data of patients is of the utmost importance, particularly in healthcare environments. This study presents a novel methodology for improving the efficacy of signature aggregation in a scenario involving doctors and patients while mitigating concerns about location privacy. Though there have been prior proposals for signature aggregation schemes, the proposed approach seeks to optimize the aggregation process within the considered scenario, thereby improving performance and reducing computational and communication burden. In addition, the proposed scheme integrates a resilient mechanism that safeguards the doctor’s location privacy by utilizing the Chinese Remainder Theorem (CRT). Advanced cryptographic algorithms and location-anonymization techniques are employed in the proposed method to safeguard the confidentiality of the doctors’ location. The security of the proposed scheme is formally analyzed using the Burrows-Abadi-Needham (BAN) logic and formally verified using the automated software validation tool, known as the Scyther tool, and an informal analysis of various security attributes confirms the security robustness of the proposed scheme. The efficacy is evaluated in comparison to analogous works utilizing the Cygwin software. The performance evaluation shows that the proposed scheme has lower communication costs as compared to existing competing schemes. Moreover, the serving ratio in the proposed scheme is high even if the number of patients is low for doctors.
暂无评论