The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

11721-11740hit(42807hit)

  • Scalar Equal Gain Transmission and the Quantized Equal Gain Codebooks for MISO and MIMO Communications

    Yaser FAEDFAR  Mohd Fadzli Mohd SALLEH  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    208-222

    The conventional Equal Gain Transmission and Maximum Ratio Combining (EGT/MRC) requires nonlinear optimization to find the optimal beamforming vector at the receiver. This study shows that the optimal beamforming vector can be easily formed by the geometrical concepts. Accordingly, a novel transmission/reception scheme, called the Scalar Equal Gain Transmission and Generalized Maximum Ratio Combining (SEGT/GMRC), is presented and examined. The Monte-Carlo simulations validate the theory and it is shown that the optimal beamforming vector formed by SEGT is the same as the one determined by the nonlinear optimizer. The closed-form analytical error performance of the SEGT/GMRC scheme is also derived for multiple input single output (MISO) communications. This study also introduces the new limited-feedback geometrical codebooks, called the Quantized Equal gain (QE) codebooks, which can be easily installed as symbol mappers. These codebooks are based on quantized SEGT/GMRC, which eliminates the need for any iterative searching scheme, such as exhaustive search at the receiver. The minimum amount of feedback bits depends on the modulation scheme, where a general M-PSK modulation requires at least log2M bits per quantized phase angle. It is also shown that BPSK modulation requires at least 2 bits per quantized phase angle for near-optimal performance.

  • Joint Rate Adaption, Power Control, and Spectrum Allocation in OFDMA-Based Multi-Hop CRNs

    Mui Van NGUYEN  Sungwon LEE  Choong Seon HONG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    242-253

    The overall performance of multi-hop cognitive radio networks (MHCRNs) can be improved significantly by employing the diversity of orthogonal licensed channels in underlay fashion. However, the mutual interference between secondary links and primary links and the congestion due to the contention among traffic flows traversing the shared link become obstacles to this realizing technique. How to control congestion efficiently in coordination with power and spectrum allocation optimally in order to obtain a high end-to-end throughput is motivating cross-layer designs for MHCRNs. In this paper, by taking into account the problem of joint rate adaption, power control, and spectrum allocation (JRPS), we propose a new cross-layer optimization framework for MHCRNs using orthogonal frequency division multiple access (OFDMA). Specifically, the JRPS formulation is shown to be a mix-integer non-linear programming (MINLP) problem, which is NP-Hard in general. To solve the problem, we first develop a partially distributed algorithm, which is shown to converge to the global optimum within a reasonable time interval. We next propose a suboptimal solution which addresses the shortcomings of the first. Using numerical results, we finally demonstrate the efficiency of the proposed algorithms.

  • A Long Range Dependent Internet Traffic Model Using Unbounded Johnson Distribution

    Sunggon KIM  Seung Yeob NAM  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E96-B No:1
      Page(s):
    301-304

    It is important to characterize the distributional property and the long-range dependency of traffic arrival processes in modeling Internet traffic. To address this problem, we propose a long-range dependent traffic model using the unbounded Johnson distribution. Using the proposed model, a sequence of traffic rates with the desired four quantiles and Hurst parameter can be generated. Numerical studies show how well the sequence of traffic rates generated by the proposed model mimics that of the real traffic rates using a publicly available Internet traffic trace.

  • Mutual Coupling Reduction between Closely-Placed MSAs for Bi-Static Radar Using Wave Absorber

    Takenori YASUZUMI  Koudai TAKAHASHI  Naoki SANO  Ryosuke SUGA  Osamu HASHIMOTO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E96-C No:1
      Page(s):
    77-83

    This paper presents a new simple method for reducing mutual coupling between dual-element microstrip antennas (MSAs) for bistatic radar using a wave absorber. The two elements are closely placed on a substrate by the distance of λ0/4 through the wall-shaped absorber. The height and width of the absorber were optimized for minimum mutual coupling with the electromagnetic simulator. It was found that less than -60 dB minimum mutual coupling can be achieved by the impedance matching of the absorber in a near field. The influence for the reflection characteristics from the absorber is small enough, and the reduction of the antenna gain is only 1.1 dB. The rate of the lost power characteristics showed that the absorption improves the mutual couplings. Then the proposed structure for a practical configuration was investigated. The measurement results of the optimized structure tallied well with the simulation results.

  • Image Expansion Approach for Target Buried in Dielectric Medium with Extended RPM to Multi-Static UWB Radar

    Yoshihiro NIWA  Shouhei KIDERA  Tetsuo KIRIMOTO  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E96-C No:1
      Page(s):
    119-123

    Ultra wideband radar is one of the most promising techniques for non-invasive imaging in a dielectric medium, which is suitable for both medical screening and non-destructive testing applications. A novel imaging method for such an application is proposed in this brief paper, which has been extended from the advanced range points migration method to a multi-static observation model with circular arrays. One notable feature of this method is that it is applicable to either arbitrary dielectric or internal object shapes, and it can also expand the reconstructible image region compared with that obtained using the mono-static model by employing received signals after penetrating various propagation paths in dielectric medium. Numerical results for the investigation of an elliptical object, surrounded by a random dielectric surface, show the remarkable advantages of the proposed method with respect to image expansion.

  • Effect of Frequency Offset in OFDM Systems with Distributed Beamforming

    Youchan JEON  Haesoo KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    371-374

    Three synchronization issues, i.e., phase, frequency, and symbol time, have to be properly controlled to achieve distributed beamforming gain. In orthogonal frequency division multiplexing (OFDM) systems, frequency offset in cooperating signals is more important than other synchronization issues since it results in SNR degradation as well as inter-carrier interference (ICI). In this paper, the impact of frequency offset in distributed beamforming is analyzed for OFDM systems. ICI resulting from frequency offset between cooperating signals is also investigated and approximated. Performance degradation due to frequency offset is shown with various numbers of cooperating signals and offset values. We show that frequency offset between cooperating signals is critical in OFDM systems since it leads to interference from the other subcarriers as well as power loss in the desired signal.

  • Unilateral Distance Bounding Protocol with Bidirectional Challenges

    Myung-Ho PARK  Ki-Gon NAM  Jin Seok KIM  Dae Hyun YUM  Pil Joong LEE  

     
    LETTER-Information Network

      Vol:
    E96-D No:1
      Page(s):
    134-137

    A distance bounding protocol provides an upper bound on the distance between communicating parties by measuring the round-trip time between challenges and responses. It is an effective countermeasure against mafia fraud attacks (a.k.a. relay attacks). The adversary success probability of previous distance bounding protocols without a final confirmation message such as digital signature or message authentication code is at least . We propose a unilateral distance bounding protocol without a final confirmation message, which reduces the adversary success probability to .

  • Current Distribution on a Conductive Circular Disk Induced by Dipole Source Located at Arbitrary Position

    Takashi KUROKI  Toshihiko SHIBAZAKI  Teruhiro KINOSHITA  

     
    PAPER-Scattering and Diffraction

      Vol:
    E96-C No:1
      Page(s):
    3-10

    Current distributions induced on a circular disk of conductor are analyzed rigorously for an electric dipole incidence, when the source dipole is polarized parallel to the disk and located at an arbitrary position, and they are evaluated numerically. As the height of the dipole increases, the current distribution of the dipole approaches that of the plane wave incidence. Using a multiple precision arithmetic, numerical data for the current distribution are obtained for larger radii of a disk than the former approach.

  • Method of Image Green's Function in Grating Theory: Reflection Extinction Theorem

    Junichi NAKAYAMA  Yasuhiko TAMURA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E96-C No:1
      Page(s):
    51-54

    In the theory of diffraction gratings, the conventional integral method is considered as a powerful tool of numerical analysis. But it fails to work at a critical angle of incidence, because a periodic Green's function (integral kernel) diverges. This problem was resolved by the image integral equation in a previous paper. Newly introducing the reflection extinction theorem, this paper derives the image extinction theorem and the image integral equation. Then, it is concluded that the image integral equation is made up of two physical processes: the image surface radiates a reflected plane wave, whereas the periodic surface radiates the diffracted wave.

  • TE Plane Wave Reflection and Transmission from a One-Dimensional Random Slab – Slanted Fluctuation –

    Yasuhiko TAMURA  Junichi NAKAYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E96-C No:1
      Page(s):
    60-63

    This paper deals with reflection and transmission of a TE plane wave from a one-dimensional random slab with slanted fluctuation by means of the stochastic functional approach. By starting with a generalized representation of the random wavefield from a two-dimensional random slab, and by using a manner for slanted anisotropic fluctuation, the corresponding random wavefield representation and its statistical quantities for one-dimensional cases are newly derived. The first-order incoherent scattering cross section is numerically calculated and illustrated in figures.

  • Extraction of a Target Response from GPR Data for Identification of Buried Objects

    Masahiko NISHIMOTO  Daisuke YOSHIDA  Kohichi OGATA  Masayuki TANABE  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E96-C No:1
      Page(s):
    64-67

    A method of calibration for GPR responses is introduced in order to extract a target response from GPR data. This calibration procedure eliminates undesirable waveform distortion that is caused by antenna characteristics and multiple scattering effects between the antennas and the ground surface. An application result to measured GPR data shows that undesirable late-time responses caused by the antenna characteristics and multiple scattering effects are removed, and that the target response is clearly reconstructed. This result demonstrates that the waveform calibration of GPR data is significant and essential for reliable target identification.

  • Distribution of Energy Flow by Dielectric Waveguide with Rhombic Dielectric Structure along a Middle Layer – Case of Compared with Deformed Rhombic Dielectric Structure –

    Ryosuke OZAKI  Tsuneki YAMASAKI  

     
    BRIEF PAPER-Periodic Structures

      Vol:
    E96-C No:1
      Page(s):
    68-72

    In this paper, we have analyzed the guiding problem by dielectric waveguide with defects composed of dielectric circular cylinders array and deformed rhombic dielectric structure embedded in the middle layer and investigated the influence of energy flow for defect area by using the propagation constants at the guided area. From the numerical results, it is shown that we can obtain the confinement efficiency by rhombic dielectric structure compared with the deformed rhombic dielectric structure for both TE and TM modes.

  • A Wide Input Range, High-Efficiency Multi-Mode Active Rectifier for Magnetic Resonant Wireless Power Transfer System

    Hyung-Gu PARK  SoYoung KIM  Kang-Yoon LEE  

     
    PAPER-Electronic Circuits

      Vol:
    E96-C No:1
      Page(s):
    102-107

    In this paper, a wide input range CMOS multi-mode active rectifier is presented for a magnetic resonant wireless battery charging system. The configuration is automatically changed with respect to the magnitude of the input AC voltage. The output voltage of the multi-mode rectifier is sensed by a comparator. Furthermore, the mode of the multi-mode rectifier is automatically selected by switches among the original rectifier mode, 1-stage voltage multiplier mode, and 2-stage voltage multiplier mode. In the original rectifier, the range of the rectified output DC voltage is from 9 V to 19 V for an input AC voltage from 10 V to 20 V. In the multi-mode rectifier, the input-range is wider compared to the original rectifier by 5 V. As a result, the rectified output DC voltage ranges from 7.5 V to 19 V for an input AC voltage from 5 V to 20 V. The proposed multi-mode rectifier is fabricated in a 0.35 µm CMOS process with an active area of around 2500 µm 1750 µm. When the magnitude of the input AC voltage is 10 V, the power conversion efficiency is about 94%.

  • Dependency Chart Parsing Algorithm Based on Ternary-Span Combination

    Meixun JIN  Yong-Hun LEE  Jong-Hyeok LEE  

     
    PAPER-Natural Language Processing

      Vol:
    E96-D No:1
      Page(s):
    93-101

    This paper presents a new span-based dependency chart parsing algorithm that models the relations between the left and right dependents of a head. Such relations cannot be modeled in existing span-based algorithms, despite their popularity in dependency corpora. We address this problem through ternary-span combination during the subtree derivation. By modeling the relations between the left and right dependents of a head, our proposed algorithm provides a better capability of coordination disambiguation when the conjunction is annotated as the head of the left and right conjuncts. This eventually leads to state-of-the-art performance of dependency parsing on the Chinese data of the CoNLL shared task.

  • A Method for Improving TIE-Based VQ Encoding Introducing RI Rules

    Chi-Jung HUANG  Shaw-Hwa HWANG  Cheng-Yu YEH  

     
    LETTER-Pattern Recognition

      Vol:
    E96-D No:1
      Page(s):
    151-154

    This study proposes an improvement to the Triangular Inequality Elimination (TIE) algorithm for vector quantization (VQ). The proposed approach uses recursive and intersection (RI) rules to compensate and enhance the TIE algorithm. The recursive rule changes reference codewords dynamically and produces the smallest candidate group. The intersection rule removes redundant codewords from these candidate groups. The RI-TIE approach avoids over-reliance on the continuity of the input signal. This study tests the contribution of the RI rules using the VQ-based, G.729 standard LSP encoder and some classic images. Results show that the RI rules perform excellently in the TIE algorithm.

  • Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks

    Atsushi WASEDA  

     
    PAPER-Foundations

      Vol:
    E96-A No:1
      Page(s):
    166-170

    Multiparty Simultaneous Quantum Identity Authentication (MSQIA) is a form of quantum authentication protocol in which a verifier can simultaneously authenticate all users. Yang et al. previously proposed the MSQIA protocol, but in that protocol the user's key is revealed by the fake signal attack. This paper proposes a new MSQIA protocol that is secure against fake signal attacks. It also demonstrates that this scheme is secure against several well-known attacks on MSQIA. This protocol can be efficiently used for MSQIA in a network and is feasible with current technology, like the protocol of Yang et al.

  • Deterioration of Visibility of Scrolling Text Presented Nearby Image Moving in the Opposite Direction

    Ken KIHARA  Marina SEKI  Sakuichi OHTSUKA  

     
    PAPER-Vision

      Vol:
    E96-A No:1
      Page(s):
    340-344

    We investigate the visibility of scrolling text presented nearby a dynamically moving image. In two experiments, we evaluate the subjective speed and readability of scrolled fake addresses presented immediately above a moving grating pattern that covers a large part of the visual field. The drift speed and direction of the grating were controlled to reveal the visibility of the text. The results show that the scrolling addresses exhibited slower subjective speed and better readability when the grating moved in the same direction as the scrolling addresses. On the contrary, faster subjective speed and worse readability of the scrolling addresses were raised by the grating moving in the opposite direction. The strength of these effects was dependent on the speed difference between the scrolling addresses and the grating. These results suggest that the visibility of the scrolling text, assessed in terms of subjective speed and readability, strongly depends on nearby moving images.

  • Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption

    Takuho MITSUNAGA  Yoshifumi MANABE  Tatsuaki OKAMOTO  

     
    PAPER-Public Key Based Protocols

      Vol:
    E96-A No:1
      Page(s):
    68-75

    This paper presents efficient secure auction protocols for first price auction and second price auction. Previous auction protocols are based on a generally secure multi-party protocol called mix-and-match protocol based on plaintext equality tests. However, the time complexity of the plaintext equality tests is large, although the mix-and-match protocol can securely calculate any logical circuits. The proposed protocols reduce the number of times the plaintext equality tests is used by replacing them with the Boneh-Goh-Nissim encryption, which enables calculation of 2-DNF of encrypted data.

  • Message Recovery Signature Schemes from Sigma-Protocols

    Masayuki ABE  Tatsuaki OKAMOTO  Koutarou SUZUKI  

     
    PAPER-Public Key Based Protocols

      Vol:
    E96-A No:1
      Page(s):
    92-100

    In this paper, we present a framework to construct message recovery signature schemes from Sigma-protocols. The key technique of our construction is the redundancy function that adds some redundancy to the message only legitimately signed and recovered message can have. We provide a characterization of the redundancy functions that make the resulting message recovery signature scheme proven secure. Our framework includes known schemes when the building blocks are given concrete implementations, i.e., random oracles and ideal ciphers, hence presents insightful explanation to their structure.

  • Catching the Behavioral Differences between Multiple Executions for Malware Detection

    Takahiro KASAMA  Katsunari YOSHIOKA  Daisuke INOUE  Tsutomu MATSUMOTO  

     
    PAPER-System Security

      Vol:
    E96-A No:1
      Page(s):
    225-232

    As the number of new malware has increased explosively, traditional malware detection approaches based on pattern matching have been less effective. Therefore, it is important to develop a detection method which relies on not signatures but characteristic behaviors of malware. Recently, malware authors have been embedding functions for countermeasure against malware analyses and detections into malware. Accordingly, modern malware often changes their runtime behaviors in each execution to tolerate against malware analyses and detections. For example, when malware copies itself on a file system, it can randomly determine its file name for avoiding the detections. Another example is that when malware tries to connect its command and control server, it randomly chooses a domain name from a hard-coded domain name list to avoid being blocked by a static blacklist of malicious domain names. We assume that such evasive behaviors are unnecessary for benign software. Therefore the behaviors can be the clues to distinguish malware from benign software. In this paper, we propose a novel behavior-based malware detection method which focuses attention on such characteristics. Our proposed method conducts dynamic analysis on an executable file multiple times in same sandbox environment so as to obtain plural lists of API call sequences and plural traffic logs, and then compares the lists and the logs to find the difference between the multiple executions. In the experiments with 5,697 malware samples and 819 benign software samples, we can detect about 70% malware samples and the false positive rate is about 1%. In addition, we can detect about 50% malware samples which were not detected by each Anti-Virus Software engine. Therefore we confirm the possibility the proposed method may be able to improve the accuracy of malware detection utilizing in combination with other existing methods.

11721-11740hit(42807hit)