Yaser FAEDFAR Mohd Fadzli Mohd SALLEH
The conventional Equal Gain Transmission and Maximum Ratio Combining (EGT/MRC) requires nonlinear optimization to find the optimal beamforming vector at the receiver. This study shows that the optimal beamforming vector can be easily formed by the geometrical concepts. Accordingly, a novel transmission/reception scheme, called the Scalar Equal Gain Transmission and Generalized Maximum Ratio Combining (SEGT/GMRC), is presented and examined. The Monte-Carlo simulations validate the theory and it is shown that the optimal beamforming vector formed by SEGT is the same as the one determined by the nonlinear optimizer. The closed-form analytical error performance of the SEGT/GMRC scheme is also derived for multiple input single output (MISO) communications. This study also introduces the new limited-feedback geometrical codebooks, called the Quantized Equal gain (QE) codebooks, which can be easily installed as symbol mappers. These codebooks are based on quantized SEGT/GMRC, which eliminates the need for any iterative searching scheme, such as exhaustive search at the receiver. The minimum amount of feedback bits depends on the modulation scheme, where a general M-PSK modulation requires at least log2M bits per quantized phase angle. It is also shown that BPSK modulation requires at least 2 bits per quantized phase angle for near-optimal performance.
Mui Van NGUYEN Sungwon LEE Choong Seon HONG
The overall performance of multi-hop cognitive radio networks (MHCRNs) can be improved significantly by employing the diversity of orthogonal licensed channels in underlay fashion. However, the mutual interference between secondary links and primary links and the congestion due to the contention among traffic flows traversing the shared link become obstacles to this realizing technique. How to control congestion efficiently in coordination with power and spectrum allocation optimally in order to obtain a high end-to-end throughput is motivating cross-layer designs for MHCRNs. In this paper, by taking into account the problem of joint rate adaption, power control, and spectrum allocation (JRPS), we propose a new cross-layer optimization framework for MHCRNs using orthogonal frequency division multiple access (OFDMA). Specifically, the JRPS formulation is shown to be a mix-integer non-linear programming (MINLP) problem, which is NP-Hard in general. To solve the problem, we first develop a partially distributed algorithm, which is shown to converge to the global optimum within a reasonable time interval. We next propose a suboptimal solution which addresses the shortcomings of the first. Using numerical results, we finally demonstrate the efficiency of the proposed algorithms.
It is important to characterize the distributional property and the long-range dependency of traffic arrival processes in modeling Internet traffic. To address this problem, we propose a long-range dependent traffic model using the unbounded Johnson distribution. Using the proposed model, a sequence of traffic rates with the desired four quantiles and Hurst parameter can be generated. Numerical studies show how well the sequence of traffic rates generated by the proposed model mimics that of the real traffic rates using a publicly available Internet traffic trace.
Takenori YASUZUMI Koudai TAKAHASHI Naoki SANO Ryosuke SUGA Osamu HASHIMOTO
This paper presents a new simple method for reducing mutual coupling between dual-element microstrip antennas (MSAs) for bistatic radar using a wave absorber. The two elements are closely placed on a substrate by the distance of λ0/4 through the wall-shaped absorber. The height and width of the absorber were optimized for minimum mutual coupling with the electromagnetic simulator. It was found that less than -60 dB minimum mutual coupling can be achieved by the impedance matching of the absorber in a near field. The influence for the reflection characteristics from the absorber is small enough, and the reduction of the antenna gain is only 1.1 dB. The rate of the lost power characteristics showed that the absorption improves the mutual couplings. Then the proposed structure for a practical configuration was investigated. The measurement results of the optimized structure tallied well with the simulation results.
Yoshihiro NIWA Shouhei KIDERA Tetsuo KIRIMOTO
Ultra wideband radar is one of the most promising techniques for non-invasive imaging in a dielectric medium, which is suitable for both medical screening and non-destructive testing applications. A novel imaging method for such an application is proposed in this brief paper, which has been extended from the advanced range points migration method to a multi-static observation model with circular arrays. One notable feature of this method is that it is applicable to either arbitrary dielectric or internal object shapes, and it can also expand the reconstructible image region compared with that obtained using the mono-static model by employing received signals after penetrating various propagation paths in dielectric medium. Numerical results for the investigation of an elliptical object, surrounded by a random dielectric surface, show the remarkable advantages of the proposed method with respect to image expansion.
Three synchronization issues, i.e., phase, frequency, and symbol time, have to be properly controlled to achieve distributed beamforming gain. In orthogonal frequency division multiplexing (OFDM) systems, frequency offset in cooperating signals is more important than other synchronization issues since it results in SNR degradation as well as inter-carrier interference (ICI). In this paper, the impact of frequency offset in distributed beamforming is analyzed for OFDM systems. ICI resulting from frequency offset between cooperating signals is also investigated and approximated. Performance degradation due to frequency offset is shown with various numbers of cooperating signals and offset values. We show that frequency offset between cooperating signals is critical in OFDM systems since it leads to interference from the other subcarriers as well as power loss in the desired signal.
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE
A distance bounding protocol provides an upper bound on the distance between communicating parties by measuring the round-trip time between challenges and responses. It is an effective countermeasure against mafia fraud attacks (a.k.a. relay attacks). The adversary success probability of previous distance bounding protocols without a final confirmation message such as digital signature or message authentication code is at least . We propose a unilateral distance bounding protocol without a final confirmation message, which reduces the adversary success probability to .
Takashi KUROKI Toshihiko SHIBAZAKI Teruhiro KINOSHITA
Current distributions induced on a circular disk of conductor are analyzed rigorously for an electric dipole incidence, when the source dipole is polarized parallel to the disk and located at an arbitrary position, and they are evaluated numerically. As the height of the dipole increases, the current distribution of the dipole approaches that of the plane wave incidence. Using a multiple precision arithmetic, numerical data for the current distribution are obtained for larger radii of a disk than the former approach.
Junichi NAKAYAMA Yasuhiko TAMURA
In the theory of diffraction gratings, the conventional integral method is considered as a powerful tool of numerical analysis. But it fails to work at a critical angle of incidence, because a periodic Green's function (integral kernel) diverges. This problem was resolved by the image integral equation in a previous paper. Newly introducing the reflection extinction theorem, this paper derives the image extinction theorem and the image integral equation. Then, it is concluded that the image integral equation is made up of two physical processes: the image surface radiates a reflected plane wave, whereas the periodic surface radiates the diffracted wave.
Yasuhiko TAMURA Junichi NAKAYAMA
This paper deals with reflection and transmission of a TE plane wave from a one-dimensional random slab with slanted fluctuation by means of the stochastic functional approach. By starting with a generalized representation of the random wavefield from a two-dimensional random slab, and by using a manner for slanted anisotropic fluctuation, the corresponding random wavefield representation and its statistical quantities for one-dimensional cases are newly derived. The first-order incoherent scattering cross section is numerically calculated and illustrated in figures.
Masahiko NISHIMOTO Daisuke YOSHIDA Kohichi OGATA Masayuki TANABE
A method of calibration for GPR responses is introduced in order to extract a target response from GPR data. This calibration procedure eliminates undesirable waveform distortion that is caused by antenna characteristics and multiple scattering effects between the antennas and the ground surface. An application result to measured GPR data shows that undesirable late-time responses caused by the antenna characteristics and multiple scattering effects are removed, and that the target response is clearly reconstructed. This result demonstrates that the waveform calibration of GPR data is significant and essential for reliable target identification.
Ryosuke OZAKI Tsuneki YAMASAKI
In this paper, we have analyzed the guiding problem by dielectric waveguide with defects composed of dielectric circular cylinders array and deformed rhombic dielectric structure embedded in the middle layer and investigated the influence of energy flow for defect area by using the propagation constants at the guided area. From the numerical results, it is shown that we can obtain the confinement efficiency by rhombic dielectric structure compared with the deformed rhombic dielectric structure for both TE and TM modes.
Hyung-Gu PARK SoYoung KIM Kang-Yoon LEE
In this paper, a wide input range CMOS multi-mode active rectifier is presented for a magnetic resonant wireless battery charging system. The configuration is automatically changed with respect to the magnitude of the input AC voltage. The output voltage of the multi-mode rectifier is sensed by a comparator. Furthermore, the mode of the multi-mode rectifier is automatically selected by switches among the original rectifier mode, 1-stage voltage multiplier mode, and 2-stage voltage multiplier mode. In the original rectifier, the range of the rectified output DC voltage is from 9 V to 19 V for an input AC voltage from 10 V to 20 V. In the multi-mode rectifier, the input-range is wider compared to the original rectifier by 5 V. As a result, the rectified output DC voltage ranges from 7.5 V to 19 V for an input AC voltage from 5 V to 20 V. The proposed multi-mode rectifier is fabricated in a 0.35 µm CMOS process with an active area of around 2500 µm 1750 µm. When the magnitude of the input AC voltage is 10 V, the power conversion efficiency is about 94%.
Meixun JIN Yong-Hun LEE Jong-Hyeok LEE
This paper presents a new span-based dependency chart parsing algorithm that models the relations between the left and right dependents of a head. Such relations cannot be modeled in existing span-based algorithms, despite their popularity in dependency corpora. We address this problem through ternary-span combination during the subtree derivation. By modeling the relations between the left and right dependents of a head, our proposed algorithm provides a better capability of coordination disambiguation when the conjunction is annotated as the head of the left and right conjuncts. This eventually leads to state-of-the-art performance of dependency parsing on the Chinese data of the CoNLL shared task.
Chi-Jung HUANG Shaw-Hwa HWANG Cheng-Yu YEH
This study proposes an improvement to the Triangular Inequality Elimination (TIE) algorithm for vector quantization (VQ). The proposed approach uses recursive and intersection (RI) rules to compensate and enhance the TIE algorithm. The recursive rule changes reference codewords dynamically and produces the smallest candidate group. The intersection rule removes redundant codewords from these candidate groups. The RI-TIE approach avoids over-reliance on the continuity of the input signal. This study tests the contribution of the RI rules using the VQ-based, G.729 standard LSP encoder and some classic images. Results show that the RI rules perform excellently in the TIE algorithm.
Multiparty Simultaneous Quantum Identity Authentication (MSQIA) is a form of quantum authentication protocol in which a verifier can simultaneously authenticate all users. Yang et al. previously proposed the MSQIA protocol, but in that protocol the user's key is revealed by the fake signal attack. This paper proposes a new MSQIA protocol that is secure against fake signal attacks. It also demonstrates that this scheme is secure against several well-known attacks on MSQIA. This protocol can be efficiently used for MSQIA in a network and is feasible with current technology, like the protocol of Yang et al.
Ken KIHARA Marina SEKI Sakuichi OHTSUKA
We investigate the visibility of scrolling text presented nearby a dynamically moving image. In two experiments, we evaluate the subjective speed and readability of scrolled fake addresses presented immediately above a moving grating pattern that covers a large part of the visual field. The drift speed and direction of the grating were controlled to reveal the visibility of the text. The results show that the scrolling addresses exhibited slower subjective speed and better readability when the grating moved in the same direction as the scrolling addresses. On the contrary, faster subjective speed and worse readability of the scrolling addresses were raised by the grating moving in the opposite direction. The strength of these effects was dependent on the speed difference between the scrolling addresses and the grating. These results suggest that the visibility of the scrolling text, assessed in terms of subjective speed and readability, strongly depends on nearby moving images.
Takuho MITSUNAGA Yoshifumi MANABE Tatsuaki OKAMOTO
This paper presents efficient secure auction protocols for first price auction and second price auction. Previous auction protocols are based on a generally secure multi-party protocol called mix-and-match protocol based on plaintext equality tests. However, the time complexity of the plaintext equality tests is large, although the mix-and-match protocol can securely calculate any logical circuits. The proposed protocols reduce the number of times the plaintext equality tests is used by replacing them with the Boneh-Goh-Nissim encryption, which enables calculation of 2-DNF of encrypted data.
Masayuki ABE Tatsuaki OKAMOTO Koutarou SUZUKI
In this paper, we present a framework to construct message recovery signature schemes from Sigma-protocols. The key technique of our construction is the redundancy function that adds some redundancy to the message only legitimately signed and recovered message can have. We provide a characterization of the redundancy functions that make the resulting message recovery signature scheme proven secure. Our framework includes known schemes when the building blocks are given concrete implementations, i.e., random oracles and ideal ciphers, hence presents insightful explanation to their structure.
Takahiro KASAMA Katsunari YOSHIOKA Daisuke INOUE Tsutomu MATSUMOTO
As the number of new malware has increased explosively, traditional malware detection approaches based on pattern matching have been less effective. Therefore, it is important to develop a detection method which relies on not signatures but characteristic behaviors of malware. Recently, malware authors have been embedding functions for countermeasure against malware analyses and detections into malware. Accordingly, modern malware often changes their runtime behaviors in each execution to tolerate against malware analyses and detections. For example, when malware copies itself on a file system, it can randomly determine its file name for avoiding the detections. Another example is that when malware tries to connect its command and control server, it randomly chooses a domain name from a hard-coded domain name list to avoid being blocked by a static blacklist of malicious domain names. We assume that such evasive behaviors are unnecessary for benign software. Therefore the behaviors can be the clues to distinguish malware from benign software. In this paper, we propose a novel behavior-based malware detection method which focuses attention on such characteristics. Our proposed method conducts dynamic analysis on an executable file multiple times in same sandbox environment so as to obtain plural lists of API call sequences and plural traffic logs, and then compares the lists and the logs to find the difference between the multiple executions. In the experiments with 5,697 malware samples and 819 benign software samples, we can detect about 70% malware samples and the false positive rate is about 1%. In addition, we can detect about 50% malware samples which were not detected by each Anti-Virus Software engine. Therefore we confirm the possibility the proposed method may be able to improve the accuracy of malware detection utilizing in combination with other existing methods.