Osaka, JAPAN firstname.lastname@example.org
Abstract — A test generation method for datapaths using easily testable functional time expansion models was proposed. In the test generation method, several easily testable time expansion models are generated for datapaths and test sequences are generated using the models. Moreover, the controller is augmented so that the behavior of easily testable functional time expansion models can be controllable. However, when circuit structures of datapaths are not easily testable, it is hard to generate easily testable functional time expansion models with small numbers of time frames even if a controller is augmented. In this paper, sequential depths of operational units are proposed as testability measures for circuit structures of datapaths, and a binding method for testability to reduce the sequential depths is proposed. Experimental results show that the proposed binding method is effective for sequential depths of operational units, fault coverage, and test generation time compared to a conventional binding method without testability consideration.
Osaka, JAPAN email@example.com
Abstract— A binding method for hierarchical testability has been proposed to increase the number of testable operational units in hierarchical testing using behavioral level circuits . The method aims to synthesize many operational units which can be tested by generated test sequences using hierarchical test generation. In this paper, we propose a scheduling method for hierarchical testability to increase the efficiency of the binding method . Experimental results show that the combination of our proposed scheduling method and the binding method  improves fault coverage by 11% on average in hierarchical testing.
Abstract —Full scan designs have been proposed as the most
popular design-for-testability technique. However, the contents of flip-flops can be easily controlled and observed in full scan designs, hence a high risk of information disclosure by scan-based side- channel attacks has been pointed out. To solve this problem, strongly secure designs for generalized shift registers have been proposed. In this paper, we consider extended shift registers instead of generalized shift registers, and propose how to design strongly secure circuits for extended shift registers that are shift register equivalent ( SR- equivalent , for short).
Edited by Daniel S. Simberloff, The University of Tennessee, Knoxville, TN, and approved July 20, 2016 (received for review February 12, 2016) Invasive species threaten biodiversity globally, and invasive mam-
malian predators are particularly damaging, having contributed to considerable species decline and extinction. We provide a global metaanalysis of these impacts and reveal their full extent. Invasive predators are implicated in 87 bird, 45 mammal, and 10 reptile species extinctions—58% of these groups’ contemporary extinc- tions worldwide. These figures are likely underestimated because 23 critically endangered species that we assessed are classed as “possibly extinct.” Invasive mammalian predators endanger a fur- ther 596 species at risk of extinction, with cats, rodents, dogs, and pigs threatening the most species overall. Species most at risk from predators have high evolutionary distinctiveness and inhabit insular environments. Invasive mammalian predators are therefore important drivers of irreversible loss of phylogenetic diversity worldwide. That most impacted species are insular indicates that management of invasive predators on islands should be a global conservation priority. Understanding and mitigating the impact of invasive mammalian predators is essential for reducing the rate of global biodiversity loss.
Koumoto, T., Saito, N., Aoki, N., Iwasaki, T., Kawai, S., Yokoi, S. and Shimono, H.* (2016) Effects of salt and low light intensity during the vegetative stage on susceptibility of rice to male sterility induced by chilling stress during the reproductive stage. Plant Production Science (in press).
T HE THEORY : If we regard language as an effective system of message transfer (Hall et al. 2016), it follows that messages are understood from the signal in the context produced. In terms of probability theory, we can formalize this idea as (1):
(1) Let �(�������|������, �������) be the probability of listeners retrieving the intended message given its signal (=phonetic form) and the context. Speakers keep �(�������|������, �������) high and constant.
In this paper, we derive TETU in reduplicants from a general theory of information transfer without recourse to constraint interaction. Our approach is inspired distally by information theory (Shannon, 1948) and more proximally by Message-Based Phonology (Hall, Hume, Jaeger, & Wedel, 2016).
Kumagai, E., Homma, K., Kuroda, E. and Shimono, H.* (2016) Finlay-Wilkinson’s regression coefficient as a pre-screening criterion for yield responsiveness to elevated atmospheric CO 2
concentration in crops. Physiologia Plantarum (in press) * Corresponding author
Takahashi D, Imai H, Kawamura Y, Uemura M. 2016. Lipid profiles of detergent resistant fractions of the plasma membrane in oat and rye in association with cold acclimation and freezing tolerance. Cryobiology 72: 123-134 (doi: 10.1016/j.cryobiol.2016.02.003)
植物 低温馴化過程 秋 冬 け 低温 短日化を感知し 凍結 耐え 能力を上昇
Masamichi Isogai*, Y. Matsuhashi, K. Suzuki, S. Yashima, M. Watanabe, N. Yoshikawa Occurrence of blueberry mosaic associated virus in highbush blueberry trees with blueberry mosaic disease in Japan.
Journal of General Plant Pathology (2016) In Press