The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

6761-6780hit(42807hit)

  • Secret Sharing with Cheaters Using Multi-Receiver Authentication

    Rui XU  Kirill MOROZOV  Tsuyoshi TAKAGI  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    115-125

    We introduce two cheater identifiable secret sharing (CISS) schemes with efficient reconstruction, tolerating t

  • Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems

    Seondong HEO  Soojin LEE  Bumsoon JANG  Hyunsoo YOON  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/09/29
      Vol:
    E100-D No:1
      Page(s):
    118-129

    Research on intrusion-tolerant systems (ITSs) is being conducted to protect critical systems which provide useful information services. To provide services reliably, these critical systems must not have even a single point of failure (SPOF). Therefore, most ITSs employ redundant components to eliminate the SPOF problem and improve system reliability. However, systems that include identical components have common vulnerabilities that can be exploited to attack the servers. Attackers prefer to exploit these common vulnerabilities rather than general vulnerabilities because the former might provide an opportunity to compromise several servers. In this study, we analyze software vulnerability data from the National Vulnerability Database (NVD). Based on the analysis results, we present a scheme that finds software combinations that minimize the risk of common vulnerabilities. We implement this scheme with CSIM20, and simulation results prove that the proposed scheme is appropriate for a recovery-based intrusion tolerant architecture.

  • Efficient Balanced Truncation for RC and RLC Networks

    Yuichi TANJI  

     
    PAPER-Circuit Theory

      Vol:
    E100-A No:1
      Page(s):
    266-274

    An efficient balanced truncation for RC and RLC networks is presented in this paper. To accelerate the balanced truncation, sparse structures of original networks are considered. As a result, Lyapunov equations, the solutions of which are necessary for making the transformation matrices, are efficiently solved, and the reduced order models are efficiently obtained. It is proven that reciprocity of original networks is preserved while applying the proposed method. Passivity of the reduced RC networks is also guaranteed. In the illustrative examples, we will show that the proposed method is compatible with PRIMA in efficiency and is more accurate than PRIMA.

  • Delay Tolerant Network for Disaster Information Transmission in Challenged Network Environment Open Access

    Yoshitaka SHIBATA  Noriki UCHIDA  

     
    INVITED PAPER-Network

      Vol:
    E100-B No:1
      Page(s):
    11-16

    After the East Japan great earthquake on March 11, 2011, many Japanese coastal resident areas were isolated from other because of destruction of information infrastructure, disconnection of communication network and excessive traffic congestion. The undelivered disaster information influenced the speed of evacuation, rescue of injured residents, and sending life-support materials to evacuation shelters. From the experience of such disaster, more robust and resilient networks are strongly required, particularly for preparation of large scale disasters. In this paper, in order to respond to those problems, we introduce Delay Tolerant Network (DTN) for disaster information transmission application in challenged network environment. Message delivery by transport vehicles such as cars between disaster-response headquarter and evacuation shelters in challenged network environment is considered. A improved message delivery method combined with DTN protocols and cognitive wireless network is explained. The computer simulation for the actual rural area in Japan is made to evaluate the performance and effectiveness of proposed method.

  • Adaptive Control for LED-Based Underwater Wireless Communications Using Visible Light

    Xin LIN  

     
    INVITED PAPER

      Vol:
    E100-A No:1
      Page(s):
    185-193

    One of the major subjects for marine resources development and information processing is how to realize underwater short-range and large-capacity data transmissions. The acoustic wave is an effective carrier and has been used for underwater data transmissions because it has lower attenuation in seawater than the radio wave, and has average propagation distance of about 10km or more. However, along with the imaging of transmission data, the inherent low speed of the acoustic wave makes it cannot and become an ideal carrier for high-speed and large-capacity communications. On the other hand, visible-light wave with wavelength of 400nm-650nm is an ideal carrier, which has received much attention. Its attractive features are high transparency and low attenuation rate in underwater, easily control the propagation direction and range by the visibility, and high data rate and capacity, making it excellent for application in underwater wireless communications. However, visible-light waves in the seawater have the spectral attenuation characteristics due to different marine environment. Therefore, in this paper an underwater optical wireless communication method with adaptation seawater function is considered for seawater turbidity of the spatio-temporal change. Two crucial components in the underwater optical wireless communication system, the light wavelength and the modulation method are controlled using wavelength- and modulation-adaptation techniques, respectively. The effectiveness of the method of the adaptation wavelength is demonstrated in underwater optical image transmissions.

  • A Practical Biometric Random Number Generator for Mobile Security Applications

    Alper KANAK  Salih ERGÜN  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    158-166

    IDMs are getting more effective and secure with biometric recognition and more privacy-preserving with advanced cryptosystems. In order to meet privacy and security needs of an IDM, the cryptographic background should rely on reliable random number generation. In this study, a Biometric Random Number Generator (BRNG) is proposed which plays a crucial role in a typical cryptosystem. The proposed novel approach extracts the high-frequency information in biometric signal which is associated with uncertainty existing in nature of biometrics. This bio-uncertainty, utilized as an entropy source, may be caused by sensory noise, environmental changes, position of the biometric trait, accessories worn, etc. The filtered nondeterministic information is then utilized by a postprocessing technique to obtain a random number set fulfilling the NIST 800-22 statistical randomness criteria. The proposed technique presents random number sequences without need of an additional hardware.

  • Practical Watermarking Method Estimating Watermarked Region from Recaptured Videos on Smartphone

    Motoi IWATA  Naoyoshi MIZUSHIMA  Koichi KISE  

     
    PAPER

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    24-32

    In these days, we can see digital signages in many places, for example, inside stations or trains with the distribution of attractive promotional video clips. Users can easily get additional information related to such video clips via mobile devices such as smartphone by using some websites for retrieval. However, such retrieval is time-consuming and sometimes leads users to incorrect information. Therefore, it is desirable that the additional information can be directly obtained from the video clips. We implement a suitable digital watermarking method on smartphone to extract watermarks from video clips on signages in real-time. The experimental results show that the proposed method correctly extracts watermarks in a second on smartphone.

  • A Resilience Mask for Robust Audio Hashing

    Jin S. SEO  

     
    LETTER

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    57-60

    Audio hashing has been successfully employed for protection, management, and indexing of digital music archives. For a reliable audio hashing system, improving hash matching accuracy is crucial. In this paper, we try to improve a binary audio hash matching performance by utilizing auxiliary information, resilience mask, which is obtained while constructing hash DB. The resilience mask contains reliability information of each hash bit. We propose a new type of resilience mask by considering spectrum scaling and additive noise distortions. Experimental results show that the proposed resilience mask is effective in improving hash matching performance.

  • Response Time Constrained CPU Frequency and Priority Control Scheme for Improved Power Efficiency in Smartphones

    Sung-Woong JO  Taeyoung HA  Taehyun KYONG  Jong-Moon CHUNG  

     
    PAPER-Computer System

      Pubricized:
    2016/09/30
      Vol:
    E100-D No:1
      Page(s):
    65-78

    Dynamic voltage and frequency scaling (DVFS) is an essential mechanism for power saving in smartphones and mobile devices. Central processing unit (CPU) load based DVFS algorithms are widely used due to their simplicity of implementation. However, such algorithms often lead to a poor response time, which is one of the most important factors of user experience, especially for interactive applications. In this paper, the response time is mathematically modeled by considering the CPU frequency and characteristics of the running applications based on the Linux kernel's completely fair scheduler (CFS), and a Response time constrained Frequency & Priority (RFP) control scheme for improved power efficiency of smartphones is proposed. In the RFP algorithm, the CPU frequency and priority of the interactive applications are adaptively adjusted by estimating the response time in real time. The experimental results show that RFP can save energy up to 24.23% compared to the ondemand governor and up to 7.74% compared to HAPPE while satisfying the predefined threshold of the response time in Android-based smartphones.

  • Deep Nonlinear Metric Learning for Speaker Verification in the I-Vector Space

    Yong FENG  Qingyu XIONG  Weiren SHI  

     
    LETTER-Speech and Hearing

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    215-219

    Speaker verification is the task of determining whether two utterances represent the same person. After representing the utterances in the i-vector space, the crucial problem is only how to compute the similarity of two i-vectors. Metric learning has provided a viable solution to this problem. Until now, many metric learning algorithms have been proposed, but they are usually limited to learning a linear transformation. In this paper, we propose a nonlinear metric learning method, which learns an explicit mapping from the original space to an optimal subspace using deep Restricted Boltzmann Machine network. The proposed method is evaluated on the NIST SRE 2008 dataset. Since the proposed method has a deep learning architecture, the evaluation results show superior performance than some state-of-the-art methods.

  • Efficient Algorithm for Sentence Information Content Computing in Semantic Hierarchical Network

    Hao WU  Heyan HUANG  

     
    LETTER-Natural Language Processing

      Pubricized:
    2016/10/18
      Vol:
    E100-D No:1
      Page(s):
    238-241

    We previously proposed an unsupervised model using the inclusion-exclusion principle to compute sentence information content. Though it can achieve desirable experimental results in sentence semantic similarity, the computational complexity is more than O(2n). In this paper, we propose an efficient method to calculate sentence information content, which employs the thinking of the difference set in hierarchical network. Impressively, experimental results show that the computational complexity decreases to O(n). We prove the algorithm in the form of theorems. Performance analysis and experiments are also provided.

  • Detecting Motor Learning-Related fNIRS Activity by Applying Removal of Systemic Interferences

    Isao NAMBU  Takahiro IMAI  Shota SAITO  Takanori SATO  Yasuhiro WADA  

     
    LETTER-Biological Engineering

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    242-245

    Functional near-infrared spectroscopy (fNIRS) is a noninvasive neuroimaging technique, suitable for measurement during motor learning. However, effects of contamination by systemic artifacts derived from the scalp layer on learning-related fNIRS signals remain unclear. Here we used fNIRS to measure activity of sensorimotor regions while participants performed a visuomotor task. The comparison of results using a general linear model with and without systemic artifact removal shows that systemic artifact removal can improve detection of learning-related activity in sensorimotor regions, suggesting the importance of removal of systemic artifacts on learning-related cerebral activity.

  • A New Iterative Algorithm for Weighted Sum Outage Rate Maximization in MISO Interference Channels

    Jun WANG  Desheng WANG  Yingzhuang LIU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/07/29
      Vol:
    E100-B No:1
      Page(s):
    187-193

    In this paper, we investigate the problem of maximizing the weighted sum outage rate in multiuser multiple-input single-output (MISO) interference channels, where the transmitters have no knowledge of the exact values of channel coefficients, only the statistical information. Unfortunately, this problem is nonconvex and very difficult to deal with. We propose a new, provably convergent iterative algorithm where in each iteration, the original problem is approximated as second-order cone programming (SOCP) by introducing slack variables and using convex approximation. Simulation results show that the proposed SOCP algorithm converges in a few steps, and yields a better performance gain with a lower computational complexity than existing algorithms.

  • Combining Color Features for Real-Time Correlation Tracking

    Yulong XU  Zhuang MIAO  Jiabao WANG  Yang LI  Hang LI  Yafei ZHANG  Weiguang XU  Zhisong PAN  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    225-228

    Correlation filter-based approaches achieve competitive results in visual tracking, but the traditional correlation tracking methods failed in mining the color information of the videos. To address this issue, we propose a novel tracker combined with color features in a correlation filter framework, which extracts not only gray but also color information as the feature maps to compute the maximum response location via multi-channel correlation filters. In particular, we modify the label function of the conventional classifier to improve positioning accuracy and employ a discriminative correlation filter to handle scale variations. Experiments are performed on 35 challenging benchmark color sequences. And the results clearly show that our method outperforms state-of-the-art tracking approaches while operating in real-time.

  • Malware Function Estimation Using API in Initial Behavior

    Naoto KAWAGUCHI  Kazumasa OMOTE  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    167-175

    Malware proliferation has become a serious threat to the Internet in recent years. Most current malware are subspecies of existing malware that have been automatically generated by illegal tools. To conduct an efficient analysis of malware, estimating their functions in advance is effective when we give priority to analyze malware. However, estimating the malware functions has been difficult due to the increasing sophistication of malware. Actually, the previous researches do not estimate the functions of malware sufficiently. In this paper, we propose a new method which estimates the functions of unknown malware from APIs or categories observed by dynamic analysis on a host. We examine whether the proposed method can correctly estimate the malware functions by the supervised machine learning techniques. The results show that our new method can estimate the malware functions with the average accuracy of 83.4% using API information.

  • Low Computational Complexity Direction-of-Arrival Estimation of Wideband Signal Sources Based on Squared TOPS

    Hirotaka HAYASHI  Tomoaki OHTSUKI  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    219-226

    We propose a new direction-of-arrival (DOA) estimation method of wideband signals. In several decades, many approaches to estimate DOA of wideband signal sources have been proposed. Test of orthogonality of projected subspaces (TOPS) and Squared TOPS are the estimation algorithms to realize high resolution performance of closely spaced signal sources. These methods, however, are not suitable for DOA estimation of multiple signal sources, because the spatial spectrum calculated by Squared TOPS has some false peaks. Therefore, the authors have proposed the weighted squared TOPS (WS-TOPS) to suppress these false peaks by modifying the orthogonality evaluation matrix, WS-TOPS also achieves better DOA estimation accuracy than that of Squared TOPS. On the other hand, WS-TOPS has a drawback, it requires high computational complexity. Our new method can realize good DOA estimation performance, which is better than that of Squared TOPS, with low computational complexity by reducing the size of orthogonality evaluation matrix and the number of subspaces to be used. Simulation results show that the new method can provide high resolution performance and high DOA estimation accuracy with low computational complexity.

  • A Low Computational Complexity Algorithm for Compressive Wideband Spectrum Sensing

    Shiyu REN  Zhimin ZENG  Caili GUO  Xuekang SUN  Kun SU  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:1
      Page(s):
    294-300

    Compressed sensing (CS)-based wideband spectrum sensing approaches have attracted much attention because they release the burden of high signal acquisition costs. However, in CS-based sensing approaches, highly non-linear reconstruction methods are used for spectrum recovery, which require high computational complexity. This letter proposes a two-step compressive wideband sensing algorithm. This algorithm introduces a coarse sensing step to further compress the sub-Nyquist measurements before spectrum recovery in the following compressive fine sensing step, as a result of the significant reduction in computational complexity. Its enabled sufficient condition and computational complexity are analyzed. Even when the sufficient condition is just satisfied, the average reduced ratio of computational complexity can reach 50% compared with directly performing compressive sensing with the excellent algorithm that is used in our fine sensing step.

  • Efficient Data Persistence Scheme Based on Compressive Sensing in Wireless Sensor Networks

    Bo KONG  Gengxin ZHANG  Dongming BIAN  Hui TIAN  

     
    PAPER-Network

      Pubricized:
    2016/07/12
      Vol:
    E100-B No:1
      Page(s):
    86-97

    This paper investigates the data persistence problem with compressive sensing (CS) in wireless sensor networks (WSNs) where the sensed readings should be temporarily stored among the entire network in a distributed manner until gathered by a mobile sink. Since there is an energy-performance tradeoff, conventional CS-based schemes only focus on reducing the energy consumption or improving the CS construction performance. In this paper, we propose an efficient Compressive Sensing based Data Persistence (CSDP) scheme to achieve the optimum balance between energy consumption and reconstruction performance. Unlike most existing CS-based schemes which require packets visiting the entire network to reach the equilibrium distribution, in our proposed scheme information exchange is only performed among neighboring nodes. Therefore, such an approach will result in a non-uniform distribution of measurements, and the CS measurement matrix depends heavily on the node degree. The CS reconstruction performance and energy consumption are analyzed. Simulation results confirm that the proposed CSDP scheme consumes the least energy and computational overheads compared with other representative schemes, while almost without sacrificing the CS reconstruction performance.

  • An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan

    Fakir Sharif HOSSAIN  Tomokazu YONEDA  Michiko INOUE  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/10/20
      Vol:
    E100-D No:1
      Page(s):
    130-139

    Due to outsourcing of numerous stages of the IC manufacturing process to different foundries, the security risk, such as hardware Trojan becomes a potential threat. In this paper, we present a layout aware localized hardware Trojan detection method that magnifies the detection sensitivity for small Trojan in power-based side-channel analysis. A scan segmentation approach with a modified launch-on-capture (LoC) transition delay fault test pattern application technique is proposed so as to maximize the dynamic power consumption of any target region. The new architecture allows activating any target region and keeping others quiet, which reduces total circuit toggling activity. We evaluate our approach on ISCAS89 benchmark and two practical circuits to demonstrate its effectiveness in side-channel analysis.

  • Video Data Modeling Using Sequential Correspondence Hierarchical Dirichlet Processes

    Jianfei XUE  Koji EGUCHI  

     
    PAPER

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    33-41

    Video data mining based on topic models as an emerging technique recently has become a very popular research topic. In this paper, we present a novel topic model named sequential correspondence hierarchical Dirichlet processes (Seq-cHDP) to learn the hidden structure within video data. The Seq-cHDP model can be deemed as an extended hierarchical Dirichlet processes (HDP) model containing two important features: one is the time-dependency mechanism that connects neighboring video frames on the basis of a time dependent Markovian assumption, and the other is the correspondence mechanism that provides a solution for dealing with the multimodal data such as the mixture of visual words and speech words extracted from video files. A cascaded Gibbs sampling method is applied for implementing the inference task of Seq-cHDP. We present a comprehensive evaluation for Seq-cHDP through experimentation and finally demonstrate that Seq-cHDP outperforms other baseline models.

6761-6780hit(42807hit)