Outsourcing to a cloud storage brings forth new challenges for the efficient utilization of computing resources as well as simultaneously maintaining privacy and security for the outsourced data. Data deduplication refers to a technique that eliminates redundant data on the storage and the network, and is considered to be one of the most-promising technologies that offers efficient resource utilization in the cloud computing. In terms of data security, however, deduplication obstructs applying encryption on the outsourced data and even causes a side channel through which information can be leaked. Achieving both efficient resource utilization and data security still remains open. This paper addresses this challenging issue and proposes a novel solution that enables data deduplication while also providing the required data security and privacy. We achieve this goal by constructing and utilizing equality predicate encryption schemes which allow to know only equivalence relations between encrypted data. We also utilize a hybrid approach for data deduplication to prevent information leakage due to the side channel. The performance and security analyses indicate that the proposed scheme is efficient to securely manage the outsourced data in the cloud computing.
Jungang XU Hui LI Yan ZHAO Ben HE
Even with the recent development of new types of social networking services such as microblogs, Bulletin Board Systems (BBS) remains popular for local communities and vertical discussions. These BBS sites have high volume of traffic everyday with user discussions on a variety of topics. Therefore it is difficult for BBS visitors to find the posts that they are interested in from the large amount of discussion threads. We attempt to explore several main characteristics of BBS, including organizational flexibility of BBS texts, high data volume and aging characteristic of BBS topics. Based on these characteristics, we propose a novel method of Online Topic Detection (OTD) on BBS, which mainly includes a representative post selection procedure based on Markov chain model and an efficient topic clustering algorithm with candidate topic set generation based on Aging Theory. Experimental results show that our method improves the performance of OTD in BBS environment in both detection accuracy and time efficiency. In addition, analysis on the aging characteristic of discussion topics shows that the generation and aging of topics on BBS is very fast, so it is wise to introduce candidate topic set generation strategy based on Aging Theory into the topic clustering algorithm.
Sang-Uk PARK Jung-Hyun PARK Dong-Jo PARK
This letter deals with a new cell clustering problem subject to signal-to-interference-plus-noise-ratio (SINR) constraints in uplink network MIMO systems, where multiple base stations (BSs) cooperate for joint processing as forming a cluster. We first prove that the SINRs of users in a certain cluster always increase monotonically as the cluster size increases when the receiver filter that maximizes the SINR is used. Using this result, we propose an efficient clustering algorithm to minimize the maximum number of cooperative BSs in a cluster. Simulation results show that the maximum number of cooperative BSs minimized by the proposed method is close to that minimized by the exhaustive search and the proposed scheme outperforms the conventional one in terms of the outage probability.
Jinxiao ZHU Yulong SHEN Xiaohong JIANG Osamu TAKAHASHI Norio SHIRATORI
The fading channel model is seen as an important approach that can efficiently capture the basic time-varying properties of wireless channels, while physical layer security is a promising approach to providing a strong form of security. This paper focuses on the fundamental performance study of applying physical layer security to achieve secure and reliable information transmission over the fading wire-tap channel. For the practical scenario where the main channel is correlated with the eavesdropper channel but only the real time channel state information (CSI) of the main channel is known at the transmitter, we conduct a comprehensive study on the fundamental performance limits of this system by theoretically modeling its secrecy capacity, transmission outage probability and secrecy outage probability. With the help of these theoretical models, we then explore the inherent performance tradeoffs under fading wire-tap channel and also the potential impact of channel correlation on such tradeoffs.
Zhenfei ZHAO Hao LUO Hua ZHONG Bian YANG Zhe-Ming LU
This letter proposes a mobile application framework named erasable photograph tagging (EPT) for photograph annotation and fast retrieval. The smartphone owner's voice is employed as tags and hidden in the host photograph without an extra feature database aided for retrieval. These digitized tags can be erased anytime with no distortion remaining in the recovered photograph.
This paper proposes a new optimization problem and several implementation algorithms for energy-efficient clouds where energy efficiency is measured by the number of physical machines that can be removed from operation and turned off. The optimization problem is formulated is such a way that solutions are considered favorable not only when the number of migrations is minimized but also when the resulting layout has more free physical machines which can therefore be turned off to save electricity.
This paper introduces a comparison of three automatic gait generation methods for quadruped robots: GA (Genetic Algorithm), GP (genetic programming) and CPG (Central Pattern Generator). It aims to provide a useful guideline for the selection of gait generation methods. GA-based approaches seek to optimize paw locus in Cartesian space. GP-based techniques generate joint trajectories using regression polynomials. The CPGs are neural circuits that generate oscillatory output from an input coming from the brain. Optimizations for the three proposed methods are executed and analyzed using a Webots simulation of the quadruped robot built by Bioloid. The experimental comparisons and analyses provided herein will be an informative guidance for research of gait generation method.
Ittetsu TANIGUCHI Kohei AOKI Hiroyuki TOMIYAMA Praveen RAGHAVAN Francky CATTHOOR Masahiro FUKUI
A fast and accurate architecture exploration for high performance and low energy VLIW data-path is proposed. The main contribution is a method to find Pareto optimal FU structures, i.e., the optimal number of FUs and the best instruction assignment for each FU. The proposed architecture exploration method is based on GA and enables the effective exploration of vast solution space. Experimental results showed that proposed method was able to achieve fast and accurate architecture exploration. For most cases, the estimation error was less than 1%.
Dandan WANG Qingcai CHEN Xiaolong WANG
Text Categorization (TC) is a task of classifying a set of documents into one or more predefined categories. Centroid-based method, a very popular TC method, aims to make classifiers simple and efficient by constructing one prototype vector for each class. It classifies a document into the class that owns the prototype vector nearest to the document. Many studies have been done on constructing prototype vectors. However, the basic philosophies of these methods are quite different from each other. It makes the comparison and selection of centroid-based TC methods very difficult. It also makes the further development of centroid-based TC methods more challenging. In this paper, based on the observation of its general procedure, the centroid-based text classification is treated as a kind of ranking task, and a unified framework for centroid-based TC methods is proposed. The goal of this unified framework is to classify a text via ranking all possible classes by document-class similarities. Prototype vectors are constructed based on various loss functions for ranking classes. Under this framework, three popular centroid-based methods: Rocchio, Hypothesis Margin Centroid and DragPushing are unified and their details are discussed. A novel centroid-based TC method called SLRCM that uses a smoothing ranking loss function is further proposed. Experiments conducted on several standard databases show that the proposed SLRCM method outperforms the compared centroid-based methods and reaches the same performance as the state-of-the-art TC methods.
Chaoqing WANG Tielong SHEN Haibo JI
This paper presents sufficient conditions for the existence of a common quadratic Lyapunov functions for two classes of switched linear systems which possess negative row strictly diagonally dominant and diagonalizable stable state matrices, respectively. Numerical examples will be given to verify the correctness of the proposed theorems.
Shunsuke YAMAKI Masahide ABE Masayuki KAWAMATA
This paper derives the balanced realizations of second-order analog filters directly from the transfer function. Second-order analog filters are categorized into the following three cases: complex conjugate poles, distinct real poles, and multiple real poles. For each case, simple formulas are derived for the synthesis of the balanced realizations of second-order analog filters. As a result, we obtain closed form expressions of the balanced realizations of second-order analog filters.
Dipankar RAYCHAUDHURI Akash BAID
This paper presents the design and proof-of-concept validation of a novel network-assisted spectrum coordination (NASCOR) service for improved radio coexistence in future shared spectrum bands. The basic idea is to create an overlay network service for dissemination of spectrum usage information between otherwise independent radio devices and systems, enabling them to implement decentralized spectrum coexistence policies that reduce interference and improve spectrum packing efficiency. The proposed method is applicable to unlicensed band and shared spectrum systems in general (including femtocells), but is particularly relevant to emerging TV white spaces and cognitive radio systems which are still in need of scalable and accurate solutions for both primary-to-secondary and secondary-to-secondary coordination. Key challenges in enabling a network layer spectrum coordination service are discussed along with the description of our system architecture and a detailed case-study for a specific example of spectrum coordination: client-AP association optimization in dense networks. Performance gains are evaluated through large-scale simulations with multiple overlapping networks, each consisting of 15-35 access points and 50-250 clients in a 0.5×0.5 sq.km. urban setting. Results show an average of 150% improvement in random deployments and upto 7× improvements in clustered deployments for the least-performing client throughputs with modest reductions in the mean client throughputs.
In this paper, we present a new four parameter estimator of sampled sinusoidal signals that does not require iteration. Mathematically, the four parameters (frequency, phase, magnitude, and dc offset) of sinusoidal signals can be obtained when four data points are given. In general, the parameters have to be calculated with iteration since the equations are nonlinear. In this paper, we point out that the four parameters can be obtained analytically if the four data points given are measured using a fixed sampling interval. Analytical expressions for the four parameters are derived using the signal differences. Based on this analysis, we suggest an algorithm of estimating the four parameters from N data samples corrupted by noise without iteration. When comparing with the IEEE-1057 method which is based on the least-square method, the proposed algorithm does not require the initial guess of the parameters for iteration and avoid the convergence problem. Also, the number of required numerical operations for estimation is fixed if N is determined. As a result, the processing time of parameter estimation is much faster than the least-square method which has been confirmed by numerical simulations. Simulation results and the quantitative analysis show that the estimation error of the estimated parameters is less than 1.2 times the square root of the Cramer-Rao bounds when the signal to noise ratio is larger than 20dB.
Ryunosuke SOUMA Shouhei KIDERA Tetsuo KIRIMOTO
Ultra-wideband pulse radar exhibits high range resolution, and excellent capability in penetrating dielectric media. With that, it has great potential as an innovative non-destructive inspection technique for objects such as human body or concrete walls. For suitability in such applications, we have already proposed an accurate permittivity estimation method for a 2-dimensional dielectric object of arbitrarily shape and clear boundary. In this method, the propagation path estimation inside the dielectric object is calculated, based on the geometrical optics (GO) approximation, where the dielectric boundary points and its normal vectors are directly reproduced by the range point migration (RPM) method. In addition, to compensate for the estimation error incurred using the GO approximation, a waveform compensation scheme employing the finite-difference time domain (FDTD) method was incorporated, where an initial guess of the relative permittivity and dielectric boundary are employed for data regeneration. This study introduces the 3-dimensional extension of the above permittivity estimation method, aimed at practical uses, where only the transmissive data are effectively extracted, based on quantitative criteria that considers the spatial relationship between antenna locations and the dielectric object position. Results from a numerical simulation verify that our proposed method accomplishes accurate permittivity estimations even for 3-dimensional dielectric medium of wavelength size.
Min Kook SONG Jin Bae PARK Young Hoon JOO
This paper is concerned with exploring an extended approach for the stability analysis and synthesis for Markovian jump nonlinear systems (MJNLSs) via fuzzy control. The Takagi-Sugeno (T-S) fuzzy model is employed to represent the MJNLSs with incomplete transition description. In this paper, not all the elements of the rate transition matrices (RTMs), or probability transition matrices (PTMs) are assumed to be known. By fully considering the properties of the RTMs and PTMs, sufficient criteria of stability and stabilization is obtained in both continuous and discrete-time. Stabilization conditions with a mode-dependent fuzzy controller are derived for Markovian jump fuzzy systems in terms of linear matrix inequalities (LMIs), which can be readily solved by using existing LMI optimization techniques. Finally, illustrative numerical examples are provided to demonstrate the effectiveness of the proposed approach.
Shun-ichi AZUMA George J. PAPPAS
This paper addresses the discrete abstraction problem for stochastic nonlinear systems with continuous-valued state. The proposed solution is based on a function, called the bisimulation function, which provides a sufficient condition for the existence of a discrete abstraction for a given continuous system. We first introduce the bisimulation function and show how the function solves the problem. Next, a convex optimization based method for constructing a bisimulation function is presented. Finally, the proposed framework is demonstrated by a numerical simulation.
Mochan YANG Shannai WU Hak-Seong KIM Kyong-Bin SONG Won Cheol LEE Oh-Soon SHIN Yoan SHIN
A D2D (Device-to-Device) communication system needs to cope with inter-cell interference and other types of interferences between cellular network and D2D links. As a result, macro user equipments, particularly those located near a cell edge, will suffer from serious link performance degradation. We propose a novel interference avoidance mechanism assisted by the SRN (Shared Relay Node) in this letter. The SRN not only performs data re-transmission as a typical type-II relay, but has several newly defined features to avoid interference between cellular network and D2D links. The superb performance by the proposed scheme is evaluated through extensive system level simulations.
Ha-Nguyen TRAN Yohannes D. ALEMSEGED Hiroshi HARADA
Spectrum sensing is one of the methods to identify available white spaces for secondary usage which was specified by the regulators. However, signal quality to be sensed can plunge to a very low signal-to-noise-ratio due to signal propagation and hence readings from individual sensors will be unreliable. Distributed sensing by the cooperation of multiple sensors is one way to cope with this problem because the diversity gain due to the combining effect of data captured at different position will assist in detecting signals that might otherwise not be detected by a single sensor. In effect, the probability of detection can be improved. We have implemented a distributed sensing system to evaluate the performance of different cooperative sensing algorithms. In this paper we describe our implementation and measurement experience which include the system design, specification of the system, measurement method, the issues and solutions. This paper also confirms the performance enhancement offered by distributed sensing algorithms, and describes several ideas for further enhancement of the sensing quality.
This paper reports the use of haptic augmented reality in breast tumor palpation. In general, lumps in the breast are stiffer than surrounding tissues, allowing us to haptically detect them through self-palpation. The goal of the study is to assist self-palpation of lumps by haptically augmenting stiffness around lumps. The key steps are to estimate non-linear stiffness of normal tissues in the offline preprocessing step, detect areas that show abnormally stiffer responses, and amplify the difference in stiffness through a haptic augmented reality interface. The performance of the system was evaluated in a user-study, demonstrating the potential of the system.
Hyun-Ho CHOI Hyun-Gyu LEE Jung-Ryun LEE
In this letter, we propose an energy-aware source routing protocol for maximizing the network lifetime in mobile ad hoc networks. We define a new routing cost by considering both transmit and receive power consumption and remaining battery level in each node simultaneously and present an efficient route discovery procedure to investigate the proposed routing cost. Intensive simulation verifies that the proposed routing protocol has similar performance to the conventional routing protocols in terms of the number of transmission hops, transmission rate, and energy consumption while significantly improving the performance with respect to network lifetime.