The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

11601-11620hit(42807hit)

  • Two Heuristic Algorithms for the Minimum Initial Marking Problem of Timed Petri Nets

    Satoru OCHIIWA  Satoshi TAOKA  Masahiro YAMAUCHI  Toshimasa WATANABE  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E96-A No:2
      Page(s):
    540-553

    A timed Petri net, an extended model of an ordinary Petri net with introduction of discrete time delay in firing activity, is practically useful in performance evaluation of real-time systems and so on. Unfortunately though, it is often too difficult to solve (efficiently) even most basic problems in timed Petri net theory. This motivates us to do research on analyzing complexity of Petri net problems and on designing efficient and/or heuristic algorithms. The minimum initial marking problem of timed Petri nets (TPMIM) is defined as follows: “Given a timed Petri net, a firing count vector X and a nonnegative integer π, find a minimum initial marking (an initial marking with the minimum total token number) among those initial ones M each of which satisfies that there is a firing scheduling which is legal on M with respect to X and whose completion time is no more than π, and, if any, find such a firing scheduling.” In a production system like factory automation, economical distribution of initial resources, from which a schedule of job-processings is executable, can be formulated as TPMIM. The subject of the paper is to propose two pseudo-polynomial time algorithms TPM and TMDLO for TPMIM, and to evaluate them by means of computer experiment. Each of the two algorithms finds an initial marking and a firing sequence by means of algorithms for MIM (the initial marking problem for non-timed Petri nets), and then converts it to a firing scheduling of a given timed Petri net. It is shown through our computer experiments that TPM has highest capability among our implemented algorithms including TPM and TMDLO.

  • Low Complexity Logarithmic and Anti-Logarithmic Converters for Hybrid Number System Processors and DSP Applications

    Van-Phuc HOANG  Cong-Kha PHAM  

     
    PAPER-Digital Signal Processing

      Vol:
    E96-A No:2
      Page(s):
    584-590

    This paper presents an efficient approach for logarithmic and anti-logarithmic converters which can be used in the arithmetic unit of hybrid number system processors and logarithm/exponent function generators in DSP applications. By employing the novel quasi-symmetrical difference method with only the simple shift-add logic and the look-up table, the proposed approach can reduce the hardware area and improve the conversion speed significantly while achieve similar accuracy compared with the previous methods. The implementation results in both FPGA and 0.18-µm CMOS technology are also presented and discussed.

  • An Area-Time Efficient Key Equation Solver with Euclidean Algorithm for Reed-Solomon Decoders

    Kazuhito ITO  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E96-A No:2
      Page(s):
    609-617

    Reed-Solomon (RS) code is one of the well-known and widely used error correction codes. Among the components of a hardware RS decoder, the key equation solver (KES) unit occupies a relatively large portion of the hardware. It is important to develop an efficient KES architecture to implement efficient RS decoders. In this paper, a novel polynomial division technique used in the Euclidean algorithm (EA) of the KES is presented which achieves the short critical path delay of one Galois multiplier and one Galois adder. Then a KES architecture with the EA is proposed which is efficient in the sense of the product of area and time.

  • Exact Power Analysis of Unified Code over Generalized Mersenne Prime Fields

    Toshiyuki MASUE  

     
    PAPER-Cryptography and Information Security

      Vol:
    E96-A No:2
      Page(s):
    618-625

    This paper presents a power analysis that applies to elliptic curves over generalized Mersenne prime field Fp. This prime field enables efficient modular reductions which influence the computational performance of an elliptic curve cryptosystem. The general modular reductions stochastically calculate extra operations. Some studies showed the possibility of power analysis attacks to scalar multiplication with a unified code by using the statistical information of extra operations. In this paper, we present the statistical experiment and possibility of attacks, and propose the more sensitive attack and the countermeasure without performance impact.

  • Development of Emergency Rescue Evacuation Support System (ERESS) in Panic-Type Disasters: Disaster Recognition Algorithm by Support Vector Machine

    Kazuya MORI  Akinori YAMANE  Youhei HAYAKAWA  Tomotaka WADA  Kazuhiro OHTSUKI  Hiromi OKADA  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E96-A No:2
      Page(s):
    649-657

    Many people have faced mortal risks due to sudden disasters such as earthquakes, fires, and terrorisms, etc. In disasters where most people become panic, it is important to grasp disaster positions immediately and to find out some appropriate evacuation routes. We previously proposed the specific evacuation support system named as Emergency Rescue Evacuation Support System (ERESS). ERESS is based on Mobile Ad-hoc network (MANET) and aims to reduce the number of victims in panic-type disasters. This system consists of mobile terminals with advanced disaster recognition algorithm and various sensors such as acceleration, angular velocity and earth magnetism. However, the former ERESS did not have the clear criteria to detect the disaster outbreak. In this paper, we propose a new disaster recognition algorithm by Support Vector Machine (SVM) which is a kind of machine learning. In this method, an ERESS mobile terminal learns the behaviors of its holder by SVM. The SVM acquires the decision boundary based on the sensing data of the terminal holder, and it is judged whether to be the emergency. We show the validity of the proposed method by panic-type experiments.

  • A Study on the Degrees of Freedom in an Experimental Design Model Based on an Orthonormal System

    Yoshifumi UKITA  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    LETTER-Digital Signal Processing

      Vol:
    E96-A No:2
      Page(s):
    658-662

    Experiments usually aim to study how changes in various factors affect the response variable of interest. Since the response model used most often at present in experimental design is expressed through the effect of each factor, it is straightforward to ascertain how each factor affects the response variable. However, since the response model contains redundant parameters, in the analysis of variance we must calculate the degrees of freedom defined by the number of independent parameters. In this letter, we propose the idea of calculating the degrees of freedom over the model based on an orthonormal system for the first time. In this way, we can easily obtain the number of independent parameters associated with any component, which reduces the risk of mistakes in the calculation of the number of independent parameters and facilitates the implementation of estimation procedures.

  • Benefit of Network Coding for Probabilistic Packet Marking and Collecting Coupons from Different Perspectives at the Collector

    Dung Tien NGO  Tuan Anh LE  Choong Seon HONG  Sungwon LEE  Won-Tae LEE  Jae-Jo LEE  

     
    PAPER

      Vol:
    E96-B No:2
      Page(s):
    489-499

    Probabilistic Packet Marking (PPM) is a scheme for IP traceback where each packet is marked randomly with an IP address of one router on the attack path in order for the victim to trace the source of attacks. In previous work, a network coding approach to PPM (PPM+NC) where each packet is marked with a random linear combination of router IP addresses was introduced to reduce number of packets required to infer the attack path. However, the previous work lacks a formal proof for benefit of network coding to PPM and its proposed scheme is restricted. In this paper, we propose a novel method to prove a strong theorem for benefit of network coding to PPM in the general case, which compares different perspectives (interests of collecting) at the collector in PPM+NC scheme. Then we propose Core PPM+NC schemes based on our core network coding approach to PPM. From experiments, we show that our Core PPM+NC schemes actually require less number of packets than previous schemes to infer the attack path. In addition, based on the relationship between Coupon Collector's Problem (CCP) and PPM, we prove that there exists numerous designs that CCP still benefits from network coding.

  • Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data

    Yasuhiro IKEDA  Ryoichi KAWAHARA  Noriaki KAMIYAMA  Tatsuaki KIMURA  Tatsuya MORI  

     
    PAPER-Internet

      Vol:
    E96-B No:2
      Page(s):
    533-542

    We analyze measured traffic data to investigate the characteristics of TCP quality metrics such as packet retransmission rate, roundtrip time (RTT), and throughput of connections classified by their type (client-server (C/S) or peer-to-peer (P2P)), or by the location of the connection host (domestic or overseas). Our findings are as follows. (i) The TCP quality metrics of the measured traffic data are not necessarily consistent with a theoretical formula proposed in a previous study. However, the average RTT and retransmission rate are negatively correlated with the throughput, which is similar to this formula. Furthermore, the maximum idle time, which is defined as the maximum length of the packet interarrival times, is negatively correlated with throughput. (ii) Each TCP quality metric of C/S connections is higher than that of P2P connections. Here “higher quality” means that either the throughput is higher, or the other TCP quality metrics lead to higher throughput; for example the average RTT is lower or the retransmission rate is lower. Specifically, the median throughput of C/S connections is 2.5 times higher than that of P2P connections in the incoming direction of domestic traffic. (iii) The characteristics of TCP quality metrics depend on the location of the host of the TCP connection. There are cases in which overseas servers might use a different TCP congestion control scheme. Even if we eliminate these servers, there is still a difference in the degree of impact the average RTT has on the throughput between domestic and overseas traffic. One reason for this is thought to be the difference in the maximum idle time, and another is the fact that congestion levels of these types of traffic differ, even if their average RTTs are the same.

  • Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables

    Yong ZHANG  Shi-Ze GUO  Zhe-Ming LU  Hao LUO  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E96-B No:2
      Page(s):
    624-631

    Reversible data hiding has been a hot research topic since both the host media and hidden data can be recovered without distortion. In the past several years, more and more attention has been paid to reversible data hiding schemes for images in compressed formats such as JPEG, JPEG2000, Vector Quantization (VQ) and Block Truncation Coding (BTC). Traditional data hiding schemes in the BTC domain modify the BTC encoding stage or BTC-compressed data according to the secret bits, and they have no ability to reduce the bit rate but may reduce the image quality. This paper presents a novel reversible data hiding scheme for BTC-compressed images by further losslessly encoding the BTC-compressed data according to the secret bits. First, the original BTC technique is performed on the original image to obtain the BTC-compressed data which can be represented by a high mean table, a low mean table and a bitplane sequence. Then, the proposed reversible data hiding scheme is performed on both the high mean table and low mean table. Our hiding scheme is a lossless joint hiding and compression method based on 22 blocks in mean tables, thus it can not only hide data in mean tables but also reduce the bit rate. Experiments show that our scheme outperforms three existing BTC-based data hiding works, in terms of the bit rate, capacity and efficiency.

  • Large-Range Switchable Microwave & Millimeter-Wave Signal Generator Based on a Triple-Wavelength Fiber Laser

    Zhaohui LI  Haiyan SHANG  Xinhuan FENG  Jianping LI  Dejun FENG  Bai-ou GUAN  

     
    BRIEF PAPER

      Vol:
    E96-C No:2
      Page(s):
    197-200

    A large-range switchable RF signal generator is demonstrated using a triple-wavelength fiber laser with uneven-frequency-spacing. Due to the birefringence characteristics of the triple-wavelength fiber laser, switchable dual-wavelength operation can be obtained by adjusting a polarization controller. Therefore, we can achieve a stable RF signals at microwave or millimeter-wave band.

  • User Scheduling Algorithms for Downlink MU-MIMO System Based on the SCSI

    Qiang SUN  Chen SUN  Shi JIN  Yuan ZHANG  Xiqi GAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:2
      Page(s):
    651-655

    In this paper, we investigate the user scheduling algorithms with statistical eigen-mode transmission (SET) for downlink multiuser multiple-input multiple-output (MU-MIMO) system by utilizing the statistical channel state information (SCSI). Given the objective of maximizing the ergodic achievable sum rate per group (EASRPG), our first proposal, the Munkres user assignment algorithm (MUAA), solves the optimal user grouping problem. Different from the conventional user grouping algorithm (e.g. max-min method), MUAA can efficiently solve the user assignment problem and acquire an optimal solution. However, some user groups of the optimal solution called “unfriendly” groups severely degrade the EASRPG by performing the multiuser SET (MU-SET) due to excessive inter-user interference. To overcome this obstacle, the MUAA with sequential iterative separation (MUAA-SIS) is proposed to find the “unfriendly” groups and switch from the MU-SET to the single-user SET. Finally, our numerical results show that MUAA-SIS offers a higher EASRPG.

  • High-Speed Full-Duplex Optical Wireless Communication System with Single Channel Imaging Receiver for Personal Area Networks

    Ke WANG  Ampalavanapillai NIRMALATHAS  Christina LIM  Efstratios SKAFIDAS  

     
    PAPER

      Vol:
    E96-C No:2
      Page(s):
    180-186

    In this paper, we propose a high-speed full-duplex optical wireless communication system using a single channel imaging receiver for personal area network applications. This receiver is composed of an imaging lens, a small sensitive-area photodiode, and a 2-aixs actuator and it can reject most of the background light. Compared with the previously proposed system with single wide field-of-view (FOV) non-imaging receiver, the coverage area at 12.5 Gb/s is extended by > 20%. Furthermore, since the rough location information of the user is available in our proposed system, instead of searching for the focused light spot over a large area on the focal plane of the lens, only a small possible area needs to be scanned. In addition, by pre-setting a proper comparison threshold when searching for the focused light spot, the time needed for searching can be further reduced. Proof-of-concept experiments have been carried out and the results show that with this partial searching algorithm and pre-set threshold, better performance is achieved.

  • Impact of the Primary User's Power Allocation on the Performance of the Secondary User in Cognitive Radio Networks

    Ding XU  Zhiyong FENG  Ping ZHANG  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E96-B No:2
      Page(s):
    668-672

    In spectrum sharing cognitive radio (CR) networks, secondary user (SU) is allowed to share the same spectrum band concurrently with primary user (PU), with the condition that the SU causes no harmful interference to the PU. In this letter, the ergodic and outage capacity loss constraints are proposed to protect the PU according to its service types. We investigate the performance of the SU in terms of ergodic capacity under various power allocation policies of the PU. Specifically, three PU power allocation policies are considered, namely waterfilling, truncated channel inversion with fixed rate (TIFR) and constant power allocation. We obtain the ergodic capacities of the SU under the three PU power allocation policies. The numerical results show that the PU waterfilling and TIFR power allocation policies are superior to the PU constant power allocation in terms of the capacity of the PU. In particular, it is shown that, with respect to the ergodic capacity of the SU, the PU waterfilling power allocation is superior to the PU constant power allocation, while the PU TIFR power allocation is inferior to the PU constant power allocation.

  • 100-GS/s 5-Bit Real-Time Optical Quantization for Photonic Analog-to-Digital Conversion

    Takema SATOH  Kazuyoshi ITOH  Tsuyoshi KONISHI  

     
    BRIEF PAPER

      Vol:
    E96-C No:2
      Page(s):
    223-226

    We report a trial of 100-GS/s optical quantization with 5-bit resolution using soliton self-frequency shift (SSFS) and spectral compression. We confirm that 100-GS/s 5-bit optical quantization is realized to quantize a 5.0-GHz sinusoid electrical signal in simulation. In order to experimentally verify the possibility of 100-GS/s 5-bit optical quantization, we execute 5-bit optical quantization by using two sampled signals with 10-ps intervals.

  • Wireless Microwave-Optical Signal Conversion in Quasi-Phase-Matching Electro-Optic Modulators Using Gap-Embedded Patch-Antennas

    Yusuf Nur WIJAYANTO  Hiroshi MURATA  Yasuyuki OKAMURA  

     
    PAPER

      Vol:
    E96-C No:2
      Page(s):
    212-219

    Quasi-phase-matching (QPM) electro-optic modulators using gap-embedded patch-antennas were proposed for improving wireless microwave-optical signal conversion. The proposed QPM devices can receive wireless microwave signals and convert them to optical signals directly. The QPM structures enable us to have twice antenna elements in the fixed device length. The device operations with improved conversion efficiency of 10 dB were experimentally demonstrated at a wireless signal frequency of 26 GHz. The proposed QPM devices were also tested to a wireless-over-fiber link.

  • A Method to Reduce Inter-ISP Transit Cost Caused by Overlay Routing Based on End-to-End Network Measurement

    Kazuhito MATSUDA  Go HASEGAWA  Satoshi KAMEI  Masayuki MURATA  

     
    PAPER-Information Network

      Vol:
    E96-D No:2
      Page(s):
    289-302

    Overlay routing is an application-level routing mechanism on overlay networks. Previous researches have revealed that the overlay routing can improve user-perceived performance. However, it may also generate traffic unintended by ISPs, incurring additional monetary cost. In addition, since ISPs and end users have their own objectives respectively regarding traffic routing, overlay routing must be operated considering both standpoints. In the present paper, we propose a method to reduce inter-ISP transit costs caused by overlay routing from the both standpoints of ISPs and end users. To determine the relationships among ASes, which are required for ISP cost-aware routing, we construct a method to estimate a transit cost of overlay-routed paths from end-to-end network performance values. Utilizing the metric, we propose a novel method that controls overlay routing from the both standpoints of ISPs and end users. Through extensive evaluations using measurement results from the actual network environments, we confirm that the advantage of the proposed method whereby we can reduce the transit cost in the overlay routing and can control the overlay routing according to the objectives of both ISPs and end users.

  • A Digitally-Controlled SMPS Using a Novel High-Resolution DPWM Generator Based on a Pseudo Relaxation-Oscillation Technique

    Ji-Hoon LIM  Won-Young JUNG  Yong-Ju KIM  Inchae SONG  Jae-Kyung WEE  

     
    PAPER-Electronic Circuits

      Vol:
    E96-C No:2
      Page(s):
    277-284

    We suggest a novel digitally-controlled SMPS using a high-resolution DPWM generator. In the proposed circuit, the duty ratio of the DPWM is determined by the voltage slope control of an internal capacitor using a pseudo relaxation-oscillation technique. This new control method has a simpler structure, and consumes less power compared to a conventional digitally-controlled SMPS. Therefore, the proposed circuit is able to operate at a high switching frequency (1 MHz10 MHz) obtained from a relatively low internal operating frequency (10 MHz100 MHz) with a small area. The maximum current of the core circuit is 2.7 mA, and the total current of the entire circuit, including the output buffer driver, is 15 mA at 10 MHz switching frequency. The proposed circuit is designed to supply a maximum 1A with maximum DPWM duty ratio of 90%. The output voltage ripple is 7 mV at 3.3 V output voltage. To verify the operation of the proposed circuit, we performed a simulation with Dongbu Hitek BCD 0.35 µm technology.

  • Location-Aware Optimal Resource Selection Method for P2P-Based Contents Management and Real-Time Distribution

    Hiroshi YAMAMOTO  Katsuyuki YAMAZAKI  

     
    PAPER

      Vol:
    E96-D No:2
      Page(s):
    213-225

    With the wide-spread use of high-speed network connections and high performance mobile/sensor terminals available, new interactive services based on real-time contents have become available over the Internet. In these services, end-nodes (e.g, smart phone, sensors), which are dispersed over the Internet, generates the real-time contents (e.g, live video, sensor data about human activity), and those contents are utilized to support many kinds of human activities seen in the real world. For the services, a new decentralized contents distribution system which can accommodate a large number of content distributions and which can minimize the end-to-end streaming delay between the content publisher and the subscribers is proposed. In order to satisfy the requirements, the proposed content distribution system is equipped with utilizing two distributed resource selection methods. The first method, distributed hash table (DHT)-based contents management, makes it possible for the system to efficiently decide and locate the server managing content distributions in completely decentralized manner. And, the second one, location-aware server selection, is utilized to quickly select the appropriate servers that distribute the streamed contents to all subscribers in real time. This paper considers the performance of the proposed resource selection methods using a realistic computer simulation and shows that the system with the proposed methods has scalability for a large-scale distributed system that attracts a very large number of users, and achieves real-time locating of the contents without degrading end-to-end streaming delay of content.

  • Design and Implementation of Security for HIMALIS Architecture of Future Networks

    Ved P. KAFLE  Ruidong LI  Daisuke INOUE  Hiroaki HARAI  

     
    PAPER

      Vol:
    E96-D No:2
      Page(s):
    226-237

    For flexibility in supporting mobility and multihoming in edge networks and scalability of the backbone routing system, future Internet is expected to be based on the concept of ID/locator split. Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation (HIMALIS) has been designed as a generic future network architecture based on ID/locator split concept. It can natively support mobility, multihoming, scalable backbone routing and heterogeneous protocols in the network layer of the new generation network or future Internet. However, HIMALIS still lacks security functions to protect itself from various attacks during the procedures of storing, updating, and retrieving of ID/locator mappings, such as impersonation attacks. Therefore, in this paper, we address the issues of security functions design and implementation for the HIMALIS architecture. We present an integrated security scheme consisting of mapping registration and retrieval security, network access security, communication session security, and mobility security. Through the proposed scheme, the hostname to ID and locator mapping records can be securely stored and updated in two types of name registries, domain name registry and host name registry. Meanwhile, the mapping records retrieved securely from these registries are utilized for securing the network access process, communication sessions, and mobility management functions. The proposed scheme provides comprehensive protection of both control and data packets as well as the network infrastructure through an effective combination of asymmetric and symmetric cryptographic functions.

  • A Fully Automatic Player Detection Method Based on One-Class SVM

    Xuefeng BAI  Tiejun ZHANG  Chuanjun WANG  Ahmed A. ABD EL-LATIF  Xiamu NIU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E96-D No:2
      Page(s):
    387-391

    Player detection is an important part in sports video analysis. Over the past few years, several learning based detection methods using various supervised two-class techniques have been presented. Although satisfactory results can be obtained, a lot of manual labor is needed to construct the training set. To overcome this drawback, this letter proposes a player detection method based on one-class SVM (OCSVM) using automatically generated training data. The proposed method is evaluated using several video clips captured from World Cup 2010, and experimental results show that our approach achieves a high detection rate while keeping the training set construction's cost low.

11601-11620hit(42807hit)