The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

2881-2900hit(18690hit)

  • 400Gbit/s/ch Field Demonstration of Modulation Format Adaptation Based on Pilot-Aided OSNR Estimation Using Real-Time DSP Open Access

    Seiji OKAMOTO  Kazushige YONENAGA  Kengo HORIKOSHI  Mitsuteru YOSHIDA  Yutaka MIYAMOTO  Masahito TOMIZAWA  Takeshi OKAMOTO  Hidemi NOGUCHI  Jun-ichi ABE  Junichiro MATSUI  Hisao NAKASHIMA  Yuichi AKIYAMA  Takeshi HOSHIDA  Hiroshi ONAKA  Kenya SUGIHARA  Soichiro KAMETANI  Kazuo KUBO  Takashi SUGIHARA  

     
    INVITED PAPER

      Pubricized:
    2017/04/20
      Vol:
    E100-B No:10
      Page(s):
    1726-1733

    We describe a field experiment of flexible modulation format adaptation on a real-time 400Gbit/s/ch DSP-LSI. This real-time DSP-LSI features OSNR estimation, practical simplified back propagation, and high gain soft-decision forward error correction. With these techniques, we have successfully demonstrated modulation format allocation and transmission of 56-channel 400Gbit/s-2SC-PDM-16QAM and 200Gbit/s-2SC-PDM-QPSK signals in 216km and 3246km standard single mode fiber, respectively.

  • Urban Zone Discovery from Smart Card-Based Transit Logs

    Jae-Yoon JUNG  Gyunyoung HEO  Kyuhyup OH  

     
    LETTER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2465-2469

    Smart card payment systems provide a convenient billing mechanism for public transportation providers and passengers. In this paper, a smart card-based transit log is used to reveal functionally related regions in a city, which are called zones. To discover significant zones based on the transit log data, two algorithms, minimum spanning trees and agglomerative hierarchical clustering, are extended by considering the additional factors of geographical distance and adjacency. The hierarchical spatial geocoding system, called Geohash, is adopted to merge nearby bus stops to a region before zone discovery. We identify different urban zones that contain functionally interrelated regions based on passenger trip data stored in the smart card-based transit log by manipulating the level of abstraction and the adjustment parameters.

  • Timed Model-Based Formal Analysis of a Scheduler of Qplus-AIR, an ARINC-653 Compliance RTOS

    Sanghyun YOON  Dong-Ah LEE  Eunji PAK  Taeho KIM  Junbeom YOO  

     
    LETTER-Software System

      Pubricized:
    2017/06/23
      Vol:
    E100-D No:10
      Page(s):
    2644-2647

    Qplus-AIR is a real-time operating system for avionics, and its safety and correctness should be analyzed and guaranteed. We performed model checking a version of Qplus-AIR with the Times model checker and identified one abnormal case that might result in safety-critical situations.

  • Hierarchical-Masked Image Filtering for Privacy-Protection

    Takeshi KUMAKI  Takeshi FUJINO  

     
    PAPER-Privacy, anonymity, and fundamental theory

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2327-2338

    This paper presents a hierarchical-masked image filtering method for privacy-protection. Cameras are widely used for various applications, e.g., crime surveillance, environment monitoring, and marketing. However, invasion of privacy has become a serious social problem, especially regarding the use of surveillance cameras. Many surveillance cameras point at many people; thus, a large amount of our private information of our daily activities are under surveillance. However, several surveillance cameras currently on the market and related research often have a complicated or institutional masking privacy-protection functionality. To overcome this problem, a Hierarchical-Masked image Filtering (HMF) method is proposed, which has unmaskable (mask reversal) capability and is applicable to current surveillance camera systems for privacy-information protection and can satisfy privacy-protection related requirements. This method has five main features: unmasking of the original image from only the masked image and a cipher key, hierarchical-mask level control using parameters for the length of a pseudorandom number, robustness against malicious attackers, fast processing on an embedded processor, and applicability of mask operation to current surveillance camera systems. Previous studies have difficulty in providing these features. To evaluate HMF on actual equipment, an HMF-based prototype system is developed that mainly consists of a USB web camera, ultra-compact single board computer, and notebook PC. Through experiments, it is confirmed that the proposed method achieves mask level control and is robust against attacks. The increase in processing time of the HMF-based prototype system compared with a conventional non-masking system is only about 1.4%. This paper also reports on the comparison of the proposed method with conventional privacy protection methods and favorable responses of people toward the HMF-based prototype system both domestically and abroad. Therefore, the proposed HMF method can be applied to embedded systems such as those equipped with surveillance cameras for protecting privacy.

  • Analysis on Physical-Layer Security for Multi-Cell Coordination Aided Ultra-Dense Heterogeneous Networks

    Zhihao ZHONG  Jianhua PENG  Kaizhi HUANG  

     
    PAPER-Network

      Pubricized:
    2017/04/11
      Vol:
    E100-B No:10
      Page(s):
    1846-1855

    In order to satisfy the very high traffic demand in crowded hotspot areas and realize adequate security in future fifth-generation networks, this paper studies physical-layer security in the downlink of a two-tier ultra dense heterogeneous network, where a ubiquitous array formed by ultra dense deployed small-cells surrounds a macrocell base station. In this paper, the locations of legitimate users and eavesdroppers are drawn from Poisson point processes. Then, the cumulative distribution functions of the receive signal-to-interference-plus-noise ratio for legitimate users and eavesdroppers are derived. Further, the average secrecy rate and secrecy coverage probability for each tier as well as for the whole network are investigated. Finally, we analyze the influences on secrecy performance caused by eavesdropper density, transmit power allocation ratio, antenna number allocation ratio, and association area radius.

  • Efficient Producer Mobility Support in Named Data Networking

    Siran ZHANG  Zhiwei YAN  Yong-Jin PARK  Hidenori NAKAZATO  Wataru KAMEYAMA  Kashif NISAR  Ag Asri Ag IBRAHIM  

     
    PAPER-Network

      Pubricized:
    2017/04/06
      Vol:
    E100-B No:10
      Page(s):
    1856-1864

    Named Data Networking (NDN) is a promising architecture for the future Internet and it is mainly designed for efficient content delivery and retrieval. However, producer mobility support is one of the challenging problems of NDN. This paper proposes a scheme which aims to optimize the tunneling-based producer mobility solution in NDN. It does not require NDN routers to change their routing tables (Forwarding Information Base) after a producer moves. Instead, the Interest packet can be sent from a consumer to the moved producer using the tunnel. The piggybacked Data packet which is sent back to the consumer will trigger the consumer to send the following Interest packets through the optimized path to the producer. Moreover, a naming scheme is proposed so that the NDN caching function can be fully utilized. An analysis is carried out to evaluate the performance of the proposal. The results indicate that the proposed scheme reduces the network cost compared to related works and supports route optimization for enhanced producer mobility support in NDN.

  • Undesired Radiation Suppression Technique for Distributed Array Antenna by Antenna Positioning and Delay Signal Processing

    Kouhei SUZUKI  Hideya SO  Daisuke GOTO  Yoshinori SUZUKI  Fumihiro YAMASHITA  Katsuya NAKAHIRA  Kiyoshi KOBAYASHI  Takatoshi SUGIYAMA  

     
    PAPER-Satellite Communications

      Pubricized:
    2017/03/01
      Vol:
    E100-B No:10
      Page(s):
    1959-1967

    This paper introduces distributed array antenna (DAA) systems that offer high antenna gain. A DAA consists of several small antennas with improved antenna gain. This paper proposes a technique that suppresses the off-axis undesired radiation and compensates the time delay by combining signal processing with optimization of array element positioning. It suppresses the undesired radiation by compensating the delay timing with high accuracy and deliberately generating the inter-symbol interference (ISI) in side-lobe directions. Computer simulations show its effective suppression of the equivalent isotropic radiated power (EIRP) pattern and its excellent BER performance.

  • An Application Framework for Smart Education System Based on Mobile and Cloud Systems

    Toru KOBAYASHI  Kenichi ARAI  Hiroyuki SATO  Shigeaki TANIMOTO  Atsushi KANAI  

     
    PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2399-2410

    Smart education environment, that is a learning environment utilizing the Information Communication Technology (ICT), has attracted a great deal of attention. In order to expand this environment, we need a system that can establish the learning environment armed cloud systems to reduce a significant strain on teaching staff. The important issue for such system is extensibility because the system should be adapted to many kinds of original digital learning material with minimum modification. Therefore, this paper proposes “An Application Framework for Smart Education System: SES Framework”. In this Smart Education System, multi-aspect information concerning to a technical term embedded in the original digital learning material can be retrieved from different social media automatically. They can be also displayed on multi-screen devices according to user's operation. It is implemented based on “Transforming Model” which enables the migration of the original digital learning material to the smart education environment. It also has an easy operation flow for trainees named “three-step selection flow”. SES Framework derived from Model-View-Controller (MVC) pattern is based on the system architecture that enables triple mashup against the original digital learning material, external social media, and screen devices in front of users. All these functionalities have been implemented on cloud systems. We show SES Framework through the implementation example. We also demonstrate the effectiveness of SES Framework by indicating the system modification case study.

  • Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data

    Yoshiaki SHIRAISHI  Kenta NOMURA  Masami MOHRI  Takeru NARUSE  Masakatu MORII  

     
    PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2432-2439

    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on cloud storage systems. In ABE, to revoke users' attributes, it is necessary to make them unable to decrypt ciphertexts. Some CP-ABE schemes for efficient attribute revocation have been proposed. However, they have not been given a formal security proof against a revoked user, that is, whether they satisfy forward secrecy has not been shown or they just do not achieve fine-grained access control of shared data. We propose an attribute revocable attribute-based encryption with the forward secrecy for fine-grained access control of shared data. The proposed scheme can use both “AND” and “OR” policy and is IND-CPA secure under the Decisional Parallel Bilinear Diffie-Hellman Exponent assumption in the standard model.

  • Study on Effect of Company Rules and Regulations in Telework Involving Personal Devices

    Takashi HATASHIMA  Yasuhisa SAKAMOTO  

     
    LETTER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2458-2461

    We surveyed employees who use personal devices for work. Residual analysis for cross-tabulation was carried out for three groups classified based on company rules and regulations established for mobile work. We show that the behavior of employees working with personal devices to process business data changes due to the presence or absence of the company rules and regulations.

  • Occluded Appearance Modeling with Sample Weighting for Human Pose Estimation

    Yuki KAWANA  Norimichi UKITA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2017/07/06
      Vol:
    E100-D No:10
      Page(s):
    2627-2634

    This paper proposes a method for human pose estimation in still images. The proposed method achieves occlusion-aware appearance modeling. Appearance modeling with less accurate appearance data is problematic because it adversely affects the entire training process. The proposed method evaluates the effectiveness of mitigating the influence of occluded body parts in training sample images. In order to improve occlusion evaluation by a discriminatively-trained model, occlusion images are synthesized and employed with non-occlusion images for discriminative modeling. The score of this discriminative model is used for weighting each sample in the training process. Experimental results demonstrate that our approach improves the performance of human pose estimation in contrast to base models.

  • Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features

    Toshihiro YAMAUCHI  Yohei AKAO  

     
    LETTER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2377-2381

    An operating system is an essential piece of software that manages hardware and software resources. Thus, attacks on an operating system kernel using kernel rootkits pose a particularly serious threat. Detecting an attack is difficult when the operating system kernel is infected with a kernel rootkit. For this reason, handling an attack will be delayed causing an increase in the amount of damage done to a computer system. In this paper, we propose Kernel Rootkits Guard (KRGuard), which is a new method to detect kernel rootkits that monitors branch records in the kernel space. Since many kernel rootkits make branches that differ from the usual branches in the kernel space, KRGuard can detect these differences by using the hardware features of commodity processors. Our evaluation shows that KRGuard can detect kernel rootkits that involve new branches in the system call handler processing with small overhead.

  • Toward More Secure and Convenient User Authentication in Smart Device Era Open Access

    Yasushi YAMAZAKI  Tetsushi OHKI  

     
    INVITED PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2391-2398

    With the rapid spread of smart devices, such as smartphones and tablet PCs, user authentication is becoming increasingly important because various kinds of data concerning user privacy are processed within them. At present, in the case of smart devices, password-based authentication is frequently used; however, biometric authentication has attracted more attention as a user authentication technology. A smart device is equipped with various sensors, such as cameras, microphones, and touch panels, many of which enable biometric information to be obtained. While the function of biometric authentication is available in many smart devices, there remain some problems to be addressed for more secure and convenient user authentication. In this paper, we summarize the current problems with user authentication on smart devices and propose a novel user authentication system based on the concept of context awareness to resolve these problems. We also present our evaluation of the performance of the system by using biometric information that was acquired from smart devices. The evaluation demonstrates the effectiveness of our system.

  • READER: Robust Semi-Supervised Multi-Label Dimension Reduction

    Lu SUN  Mineichi KUDO  Keigo KIMURA  

     
    PAPER-Pattern Recognition

      Pubricized:
    2017/06/29
      Vol:
    E100-D No:10
      Page(s):
    2597-2604

    Multi-label classification is an appealing and challenging supervised learning problem, where multiple labels, rather than a single label, are associated with an unseen test instance. To remove possible noises in labels and features of high-dimensionality, multi-label dimension reduction has attracted more and more attentions in recent years. The existing methods usually suffer from several problems, such as ignoring label outliers and label correlations. In addition, most of them emphasize on conducting dimension reduction in an unsupervised or supervised way, therefore, unable to utilize the label information or a large amount of unlabeled data to improve the performance. In order to cope with these problems, we propose a novel method termed Robust sEmi-supervised multi-lAbel DimEnsion Reduction, shortly READER. From the viewpoint of empirical risk minimization, READER selects most discriminative features for all the labels in a semi-supervised way. Specifically, the ℓ2,1-norm induced loss function and regularization term make READER robust to the outliers in the data points. READER finds a feature subspace so as to keep originally neighbor instances close and embeds labels into a low-dimensional latent space nonlinearly. To optimize the objective function, an efficient algorithm is developed with convergence property. Extensive empirical studies on real-world datasets demonstrate the superior performance of the proposed method.

  • Seamless Mobility in ICN for Mobile Consumers with Mobile Producers

    Jairo LÓPEZ  Takuro SATO  

     
    PAPER-Network

      Pubricized:
    2017/03/29
      Vol:
    E100-B No:10
      Page(s):
    1827-1836

    In order to support seamless mobility in the Information-Centric Networking (ICN) Architecture we propose the Named-Node Network Architecture (3NA). 3NA introduces two independent namespaces to ICN, the 3N namespace used to uniquely identify nodes within a network and the Point of Attachment (PoA) namespace to identify a node's PoA to the network. The mappings between the two namespaces, along with all the necessary mechanisms to keep the mappings updated over time, are used when routing ICN packets to improve delay and the goodput when either the producer or the consumer are mobile. To support simultaneous producer and consumer mobility, we expand on the 3NA by adding a new Protocol Data Unit (PDU), the DU PDU. The DU PDU permits the encapsulation of ICN packets in a header that has source and destination name fields which belong to 3NA's 3N namespace. The new PDU permits seamless connectivity as long as 3NA's point of attachment signaling is strictly followed. We demonstrate the performance of the DU PDU against our previous defined communication methods and Named Data Networking's (NDN) Smart Flooding forwarding strategy using our open source nnnSIM module for the ns-3 framework. The new PDU outperforms all existing alternatives when the producer or both consumer and provider are mobile, obtaining overall lower mean network delay and higher median goodput.

  • Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key

    Shixiong WANG  Longjiang QU  Chao LI  Shaojing FU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:10
      Page(s):
    2113-2122

    In this paper, we study partial key exposure attacks on RSA where the number of unexposed blocks of the private key is greater than or equal to one. This situation, called generalized framework of partial key exposure attack, was first shown by Sarkar [22] in 2011. Under a certain condition for the values of exposed bits, we present a new attack which needs fewer exposed bits and thus improves the result in [22]. Our work is a generalization of [28], and the approach is based on Coppersmith's method and the technique of unravelled linearization.

  • Polarization-Reconfigurable Flat Transmitarray Based on Square Frame and Crossed Dipole Elements

    Yujie LIU  Yuehe GE  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/04/07
      Vol:
    E100-B No:10
      Page(s):
    1904-1910

    A novel element is proposed for manipulating two orthogonally-polarized electromagnetic waves, resulting in a polarization-reconfigurable flat transmitarray. This element consists of four identical metallic patterns, including a square frame loaded with short stubs and an internal crossed dipole, which are printed on the two sides of three identical flat dielectric slabs, with no air gap among them. With a linearly-polarized (LP) feeder, the flat transmitarray can transform the LP incident wave into a circular, horizontal or vertical polarization wave in a convenient way. By rotating the LP feeder so that the polarization angle is 0°, 45°, 90° or 135°, the waves of linear horizontal, right-handed circular, linear vertical or left-handed circular polarization can be obtained alternately. Simulations and experiments are conducted to validate the performance. The measured axial ratio bandwidths for RHCP and LHCP transmitarrays are about 7.1% and 5.1%, respectively, the 3dB gain bandwidths are 16.19% and 22.4%, and the peak gains are 25.56dBi and 24.2dBi, respectively.

  • Multipermutation Codes Correcting a Predetermined Number of Adjacent Deletions

    Peng ZHAO  Jianjun MU  Xiaopeng JIAO  

     
    LETTER-Coding Theory

      Vol:
    E100-A No:10
      Page(s):
    2176-2179

    In this letter, three types of constructions for multipermutation codes are investigated by using interleaving technique and single-deletion permutation codes to correct a predetermined number of adjacent deletions. The decoding methods for the proposed codes are provided in proofs and verified with examples. The rates of these multipermutation codes are also compared.

  • Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage

    Kenta NOMURA  Masami MOHRI  Yoshiaki SHIRAISHI  Masakatu MORII  

     
    PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2420-2431

    Internet of Things (IoT) has been widely applied in various fields. IoT data can also be put to cloud, but there are still concerns regarding security and privacy. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is attracted attention in cloud storage as a suitable encryption scheme for confidential data share and transmission. In CP-ABE, the secret key of a user is associated with a set of attributes; when attributes satisfy the access structure, the ciphertext is able to be decrypted. It is necessary that multiple authorities issue and manage secret keys independently. Authorities that generate the secret key can be regarded as managing the attributes of a user in CP-ABE. CP-ABE schemes that have multiple authorities have been proposed. The other hand, it should consider that a user's operation at the terminals is not necessary when a user drop an attribute and key is updated and the design of the communication system is a simple. In this paper, we propose CP-ABE scheme that have multiple key authorities and can revoke attribute immediately with no updating user's secret key for attribute revocation. In addition, the length of ciphertext is fixed. The proposed scheme is IND-CPA secure in DBDH assumption under the standard model. We compare the proposed scheme and the other CP-ABE schemes and show that the proposed scheme is more suitable for cloud storage.

  • 60GHz-Band Photonic-Integrated Array-Antenna and Module for Radio-over-Fiber-Based Beam Forming Open Access

    Kotoko FURUYA  Takayoshi HIRASAWA  Masayuki OISHI  Shigeyuki AKIBA  Jiro HIROKAWA  Makoto ANDO  

     
    INVITED PAPER

      Pubricized:
    2017/04/20
      Vol:
    E100-B No:10
      Page(s):
    1717-1725

    This paper presents a novel 60 GHz-band photonic-integrated array-antenna and module for radio-over-fiber (RoF)-based beam forming. An integrated photonic array-antennas (IPA), where eight photodiodes and 4×2 arrayed patch-antenna are integrated in a single board, is actually fabricated, and 3.5-Gbit/s QPSK digital signal transmission with beam forming of the IPA is experimentally demonstrated. In addition, a novel 60-GHz compact antenna module is proposed and fabricated for increasing the number of antenna elements and flexibility creating various beam patterns. The feasibility of beam forming operation for the proposed antenna module is confirmed by a 60-GHz RoF transmission experiment. The capability of detecting the mobile terminal direction, which is one of the indispensable functions for actual environment, is also studied. The obtained results in this paper will be useful for designing future radio access networks based on RoF transmission technology.

2881-2900hit(18690hit)