The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

5501-5520hit(18690hit)

  • Small and Low-Cost Dual-Rate Optical Triplexer for OLT Transceivers in 10G/1G Co-existing 10G-EPON Systems

    Atsushi KANDA  Akira OHKI  Takeshi KUROSAKI  Hiroaki SANJOH  Kota ASAKA  Ryoko YOSHIMURA  Toshio ITO  Makoto NAKAMURA  Masafumi NOGAWA  Yusuke OHTOMO  Mikio YONEYAMA  

     
    PAPER

      Vol:
    E96-C No:7
      Page(s):
    996-1002

    The 10-gigabit Ethernet passive optical network (10G-EPON) is a promising candidate for the next generation of fiber-to-the-home access systems. In the symmetric 10G-EPON system, the gigabit Ethernet passive optical network (GE-PON) and 10G-EPON will have to co-exist on the same optical network. For this purpose, an optical triplexer (10G-transmitter, 1G-transmitter, and 10G/1G-receiver) for optical line terminal (OLT) transceivers in 10G/1G co-existing EPON systems has been developed. Reducing the size and cost of the optical triplexer has been one of the largest issues in the effort to deploy 10G-EPON systems for practical use. In this paper, we describe a novel small and low-cost dual-rate optical triplexer for use in 10G-EPON applications. By reducing the optical path length by means of a light collection system with a low-magnification long-focus coupling lens, we have successfully miniaturized the optical triplexer for use in 10G-EPON OLT 10-gigabit small form factor pluggable (XFP) transceivers and decreased the number of lenses. A low-cost design of sub-assemblies also contributes to cost reduction. The triplexer's performance complies with IEEE 802.3av specifications.

  • Non-iterative Algorithm of MIMO Adaptive Array Based on Correlation Matrix Including Parasitic Antennas

    Naoki HONMA  Kentaro NISHIMORI  Takefumi HIRAGURI  Yoshitaka TSUNEKAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:7
      Page(s):
    1945-1952

    Parasitic antenna elements with tunable terminations can be used for interference suppression in multi-antenna systems without using the degrees of freedom. The authors have proposed a fast non-iterative algorithm for optimizing the termination conditions. However, this method cannot be used for suppressing the interference from unknown systems since it requires the channel state information. In this paper, a fast non-iterative algorithm based on the correlation matrix, which can be obtained even from unknown interference sources, is proposed for the multi-antenna system with parasitic antenna elements. The correlation matrix including both receiving and parasitic antennas can be estimated from a few observations of the signals even without receiving signals at the parasitic antenna. By using this correlation matrix, the power of the interference with the arbitrary termination conditions can be easily estimated. Therefore, the termination condition, which minimizes the interference power, can be calculated without knowledge of the channel state information or additional estimations. The results of a numerical analysis indicate that proposed method works well in suppressing the interference without the perfect channel state information.

  • PAPR Reduction for Systems Using SRRC Filters Based on Modified ACE

    Fang YANG  Keqian YAN  Changyong PAN  Jian SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:7
      Page(s):
    1675-1677

    Square root-raised-cosine (SRRC) filters are used in many systems for spectrum shaping, which leads to a high peak-to-average power ratio (PAPR). Nevertheless, some applications demand a low PAPR in terms of both the error performance and the strict restriction of the spectrum mask. In this letter, we propose a PAPR reduction method based on the modified active constellation extension for systems using SRRC filters. Results show that the proposed method substantially reduces the PAPR, and therefore it is applicable to satellite communications to improve the power efficiency at the transmitter.

  • Stride Static Chunking Algorithm for Deduplication System

    Young-Woong KO  Ho-Min JUNG  Wan-Yeon LEE  Min-Ja KIM  Chuck YOO  

     
    LETTER-Computer Systems

      Vol:
    E96-D No:7
      Page(s):
    1544-1547

    In this paper, we propose a stride static chunking deduplication algorithm using a hybrid approach that exploits the advantages of static chunking and byte-shift chunking algorithm. The key contribution of our approach is to reduce the computation time and enhance deduplication performance. We assume that duplicated data blocks are generally gathered into groups; thus, if we find one duplicated data block using byte-shift, then we can find subsequent data blocks with the static chunking approach. Experimental results show that stride static chunking algorithm gives significant benefits over static chunking, byte-shift chunking and variable-length chunking algorithm, particularly for reducing processing time and storage space.

  • Detection of Image Region Duplication Using Spin Image

    Xianhua SONG  Shen WANG  Siuming YIU  Lin JIANG  Xiamu NIU  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E96-D No:7
      Page(s):
    1565-1568

    Passive-blind image forensics is a technique that judges whether an image is forged in the absence of watermarking. In image forgery, region duplication is a simple and widely used method. In this paper, we proposed a novel method to detect image region duplication using the spin image which is an intensity-based and rotation invariant descriptor. The method can detect region duplication exactly and is robust to geometric transformations. Furthermore, it is superior to the popular SIFT-based detection method when the copied patch is from smooth background. The experiments have proved the method's effectiveness.

  • Time Zone Correlation Analysis of Malware/Bot Downloads

    Khamphao SISAAT  Hiroaki KIKUCHI  Shunji MATSUO  Masato TERADA  Masashi FUJIWARA  Surin KITTITORNKUN  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1753-1763

    A botnet attacks any Victim Hosts via the multiple Command and Control (C&C) Servers, which are controlled by a botmaster. This makes it more difficult to detect the botnet attacks and harder to trace the source country of the botmaster due to the lack of the logged data about the attacks. To locate the C&C Servers during malware/bot downloading phase, we have analyzed the source IP addresses of downloads to more than 90 independent Honeypots in Japan in the CCC (Cyber Clean Center) dataset 2010 comprising over 1 million data records and almost 1 thousand malware names. Based on GeoIP services, a Time Zone Correlation model has been proposed to determine the correlation coefficient between bot downloads from Japan and other source countries. We found a strong correlation between active malware/bot downloads and time zone of the C&C Servers. As a result, our model confirms that malware/bot downloads are synchronized with time zone (country) of the corresponding C&C Servers so that the botmaster can be possibly traced.

  • Variable-Length Code Based on Order Complexity and Its Application in Random Permuted Symbol

    Soongi HONG  Honglin JIN  Yong-Goo KIM  Yoonsik CHOE  

     
    LETTER-Coding Theory

      Vol:
    E96-A No:7
      Page(s):
    1657-1661

    This paper introduces the concept of order complexity, which represents the minimum number of partial ordering operations to make a string of perfectly ordered symbols. A novel variable-length code expressing such order complexity using binary digits is proposed herein. The proposed code is general, uniquely decipherable, and useful for coding a string of random permuted symbols having unknown statistics or which are preferred to have a uniform distribution.

  • A Session State Migration Architecture for Flexible Server Consolidation

    Takeshi USUI  Kiyohide NAKAUCHI  Yozo SHOJI  Yoshinori KITATSUJI  Hidetoshi YOKOTA  Nozomu NISHINAGA  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1727-1741

    This paper proposes a session state migration architecture for flexible server consolidation. One of technical challenges is how to split a session state from a connection and bind the session state to another connection in any servers. A conventional server and client application assumes that a session state is statically bound to a connection once the connection has been established. The proposed architecture reduces the migration latency, compared to an existing study by splitting the session state from the connection. This paper classifies common procedures of session state migration for various services. The session state migration architecture enables service providers to conduct server maintenance at their own convenience, and to conserve energy consumption at servers by consolidating them. A simulation to evaluate server consolidation reveals that the session state migration reduces the number of servers for accommdating users, compared to virtual machine migration. This paper also shows implementation of the session state migration architecture. Experimental results reveal that the impact caused by the proposed architecture on real-time applications is small.

  • A Computing Method for Linear Convolution and Linear Correlation in the DCT Domain

    Izumi ITO   

     
    PAPER-Digital Signal Processing

      Vol:
    E96-A No:7
      Page(s):
    1518-1525

    We propose a computing method for linear convolution and linear correlation between sequences using discrete cosine transform (DCT). Zero-padding is considered as well as linear convolution using discrete Fourier transform (DFT). Analyzing the circular convolution between symmetrically extended sequences, we derive the condition for zero-padding before and after the sequences. The proposed method can calculate linear convolution for any filter and also calculate linear correlation without reversing one of the input sequences. The computational complexity of the proposed method is lower than that of linear convolution using DFT.

  • Analysis of Cell Range Expansion with TDM ICIC in Heterogeneous Cellular Networks

    Weiqiang LIU  Xiaohui CHEN  Weidong WANG  

     
    PAPER-Network

      Vol:
    E96-B No:7
      Page(s):
    1865-1873

    This work investigates the cell range expansion (CRE) possible with time-domain multiplexing inter-cell interference coordination (TDM ICIC) in heterogeneous cellular networks (HCN). CRE is proposed to enable a user to connect to a picocell even when it is not the cell with the strongest received power. However, the users in the expanded region suffer severe interference from the macrocells. To alleviate the cross-tier interference, TDM ICIC is proposed to improve the SIR of pico users. In contrast to previous studies on CRE with TDM ICIC, which rely mostly on simulations, we give theoretical analysis results for different types of users in HCN with CRE and TDM ICIC under the Poisson Point Process (PPP) model, especially for the users in the expanded region of picocells. We analyze the outage probability and average ergodic rate based on the connect probability and statistical distance we obtain in advance. Furthermore, we analyze the optimal ratio of almost blank subframes (ABS) and bias factor of picocells in terms of the network fairness, which is useful in the parameter design of a two-tier HCN.

  • An Advanced Incident Response Methodology Based on Correlation Analysis of Polymorphic Security Events

    Haeng-Gon LEE  Jungsuk SONG  Sang-Soo CHOI  Gi-Hwan CHO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E96-B No:7
      Page(s):
    1803-1813

    In order to cope with the continuous evolution in cyber threats, many security products (e.g., IDS/IPS, TMS, Firewalls) are being deployed in the network of organizations, but it is not so easy to monitor and analyze the security events triggered by the security products constantly and effectively. Thus, in many cases, real-time incident analysis and response activities for each organization are assigned to an external dedicated security center. However, since the external security center deploys its security appliances to only the boundary or the single point of the network, it is very difficult to understand the entire network situation and respond to security incidents rapidly and accurately if they depend on only a single type of security information. In addition, security appliances trigger an unmanageable amount of alerts (in fact, by some estimates, several thousands of alerts are raised everyday, and about 99% of them are false positives), this situation makes it difficult for the analyst to investigate all of them and to identify which alerts are more serious and which are not. In this paper, therefore, we propose an advanced incident response methodology to overcome the limitations of the existing incident response scheme. The main idea of our methodology is to utilize polymorphic security events which can be easily obtained from the security appliances deployed in each organization, and to subject them to correlation analysis. We evaluate the proposed methodology using diverse types of real security information and the results show the effectiveness and superiority of the proposed incident response methodology.

  • An Improved Generalized Optimization of Polarimetric Contrast Enhancement and Its Application to Ship Detection

    Junjun YIN  Jian YANG  Chunhua XIE  Qingjun ZHANG  Yan LI  Yalin QI  

     
    PAPER-Sensing

      Vol:
    E96-B No:7
      Page(s):
    2005-2013

    The optimization of polarimetric contract enhancement (OPCE) is one of the important problems in radar polarimetry since it provides a substantial benefit for target enhancement. Considering different scattering mechanisms between the desired targets and the undesired targets, Yang et al. extended the OPCE model to the generalized OPCE (GOPCE) problem. Based on a modified GOPCE model and the linear discriminant analysis, a ship detector is proposed in this paper to improve the detection performance for polarimetric Synthetic Aperture Radar (SAR) imagery. In the proposed method, we modify the combination form of the three polarimetric parameters (i.e., the plane scattering similarity parameter, the diplane scattering similarity parameter and the Cloude entropy), then use an optimization function resembling the classical Fisher criterion to optimize the optimal polarization states corresponding to the radar received power and the fusion vector corresponding to the polarimetric parameters. The principle of the optimization detailed in this paper lies in maximizing the difference between the desired targets and sea clutter, and minimizing the clutter variance at the same time. RADARSAT-2 polarimetric SAR data acquired over Tanggu Port (Tianjin, China) on June 23, 2011 are used for validation. The experimental results show that the proposed method improves the contrast of the targets and sea clutter and meanwhile reduces the clutter variance. In comparison to another GOPCE based ship detector and the classical polarimetric whitening filter (PWF), the proposed method shows a better performance for weak targets. In addition, we also use the RADARSAT-2 data acquired over San-Francisco on April 9, 2008 to further demonstrate the improvement of this method for target contrast.

  • An Improved Transmission Rate in Cooperative Communication Based on OFDMA System

    Eui-Hak LEE  Hyoung-Kyu SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:7
      Page(s):
    1667-1670

    The sub-channel is empty except each user's allocated sub-channel in an orthogonal frequency division multiple access (OFDMA) system. The scheme of cooperative communication using this empty sub-channel has been studied. But, because each user wastes the time slots in the cooperation phase, it is difficult to achieve the full rate. In this letter, a new cooperative communication scheme based on OFDMA is proposed to improve transmission rate in Rayleigh fading channel.

  • Bayesian Word Alignment and Phrase Table Training for Statistical Machine Translation

    Zezhong LI  Hideto IKEDA  Junichi FUKUMOTO  

     
    PAPER-Natural Language Processing

      Vol:
    E96-D No:7
      Page(s):
    1536-1543

    In most phrase-based statistical machine translation (SMT) systems, the translation model relies on word alignment, which serves as a constraint for the subsequent building of a phrase table. Word alignment is usually inferred by GIZA++, which implements all the IBM models and HMM model in the framework of Expectation Maximum (EM). In this paper, we present a fully Bayesian inference for word alignment. Different from the EM approach, the Bayesian inference makes use of all possible parameter values rather than estimating a single parameter value, from which we expect a more robust inference. After inferring the word alignment, current SMT systems usually train the phrase table from Viterbi word alignment, which is prone to learn incorrect phrases due to the word alignment mistakes. To overcome this drawback, a new phrase extraction method is proposed based on multiple Gibbs samples from Bayesian inference for word alignment. Empirical results show promising improvements over baselines in alignment quality as well as the translation performance.

  • A Unified Construction for Yielding Quaternary Sequences with Optimal Periodic Autocorrelation

    Fanxin ZENG  Xiaoping ZENG  Zhenyu ZHANG  Guixin XUAN  

     
    PAPER-Information Theory

      Vol:
    E96-A No:7
      Page(s):
    1593-1601

    A unified construction for transforming binary sequences of balance or unbalance into quaternary sequences is presented. On the one hand, when optimal and balanced binary sequences with even period are employed, our construction is exactly the same Jang, et al.'s and Chung, et al.'s ones, which result in balanced quaternary sequences with optimal autocorrelation magnitude. On the other hand, when ideal and balanced binary sequences with odd period N are made use of, our construction produces new balanced quaternary sequences with optimal autocorrelation value (OAV), in which there are N distinct sequences in terms of cyclic shift equivalence, and includes Tang, et al.'s and Jang, et al.'s ones as special cases. In addition, when binary sequences without period 2n-1 or balance are employed, the transformation of Jang, et al.'s method is invalid, however, the proposed construction works very good. As a consequence, this unified construction allows us to construct optimal and balanced quaternary sequences from ideal/optimal balanced binary sequences with arbitrary period.

  • Experimental Investigation of Calibration and Resolution in Human-Automation System Interaction

    Akihiro MAEHIGASHI  Kazuhisa MIWA  Hitoshi TERAI  Kazuaki KOJIMA  Junya MORITA  

     
    PAPER-General Fundamentals and Boundaries

      Vol:
    E96-A No:7
      Page(s):
    1625-1636

    This study investigated the relationship between human use of automation and their sensitivity to changes in automation and manual performance. In the real world, automation and manual performance change dynamically with changes in the environment. However, a few studies investigated whether changes in automation or manual performance have more effect on whether users choose to use automation. We used two types of experimental tracking tasks in which the participants had to select whether to use automation or conduct manual operation while monitoring the variable performance of automation and manual operation. As a result, we found that there is a mutual relationship between human use of automation and their sensitivity to automation and manual performance changes. Also, users do not react equally to both automation and manual performance changes although they use automation adequately.

  • Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on pq Variables

    Jiao DU  Qiaoyan WEN  Jie ZHANG  Shanqi PANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:7
      Page(s):
    1653-1656

    In this letter, a property of the characteristic matrix of the Rotation Symmetric Boolean Functions (RSBFs) is characterized, and a sufficient and necessary condition for RSBFs being 1st correlation-immune (1-CI for simplicity) is obtained. This property is applied to construct resilient RSBFs of order 1 (1-resilient for simplicity) on pq variables, where p and q are both prime consistently in this letter. The results show that construction and counting of 1-resilient RSBFs on pq variables are equivalent to solving an equation system and counting the solutions. At last, the counting of all 1-resilient RSBFs on pq variables is also proposed.

  • A Low-Complexity Down-Mixing Structure on Quadraphonic Headsets for Surround Audio

    Tai-Ming CHANG  Yi-Ming SHIU  Pao-Chi CHANG  

     
    PAPER-Digital Signal Processing

      Vol:
    E96-A No:7
      Page(s):
    1526-1533

    This work presents a four-channel headset achieving a 5.1-channel-like hearing experience using a low-complexity head-related transfer function (HRTF) model and a simplified reverberator. The proposed down-mixing architecture enhances the sound localization capability of a headset using the HRTF and by simulating multiple sound reflections in a room using Moorer's reverberator. Since the HRTF has large memory and computation requirements, the common-acoustical-pole and zero (CAPZ) model can be used to reshape the lower-order HRTF model. From a power consumption viewpoint, the CAPZ model reduces computation complexity by approximately 40%. The subjective listening tests in this study shows that the proposed four-channel headset performs much better than stereo headphones. On the other hand, the four-channel headset that can be implemented by off-the-shelf components preserves the privacy with low cost.

  • ASPnP: An Accurate and Scalable Solution to the Perspective-n-Point Problem

    Yinqiang ZHENG  Shigeki SUGIMOTO  Masatoshi OKUTOMI  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E96-D No:7
      Page(s):
    1525-1535

    We propose an accurate and scalable solution to the perspective-n-point problem, referred to as ASPnP. Our main idea is to estimate the orientation and position parameters by directly minimizing a properly defined algebraic error. By using a novel quaternion representation of the rotation, our solution is immune to any parametrization degeneracy. To obtain the global optimum, we use the Grobner basis technique to solve the polynomial system derived from the first-order optimality condition. The main advantages of our proposed solution lie in accuracy and scalability. Extensive experiment results, with both synthetic and real data, demonstrate that our proposed solution has better accuracy than the state-of-the-art noniterative solutions. More importantly, by exploiting vectorization operations, the computational cost of our ASPnP solution is almost constant, independent of the number of point correspondences n in the wide range from 4 to 1000. In our experiment settings, the ASPnP solution takes about 4 milliseconds, thus best suited for real-time applications with a drastically varying number of 3D-to-2D point correspondences.

  • An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication

    Yuzo TAENAKA  Kazuya TSUKAMOTO  Shigeru KASHIHARA  Suguru YAMAGUCHI  Yuji OIE  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1716-1726

    In order to prevent the degradation of TCP performance while traversing two WLANs, we present an implementation design of an inter-domain TCP handover method based on cross-layer and multi-homing. The proposed handover manager (HM) in the transport layer uses two TCP connections previously established via two WLANs (multi-homing) and switches the communication path between the two connections according to the handover trigger and the comparison of new/old APs. The handover trigger and comparison are conducted by assessing the wireless link quality using the frame-retry information obtained from the MAC layer (cross-layer). In a previous study, we proposed a preliminary concept for this method and evaluated its functional effectiveness through simulations. In the present study, we design an implementation considering a real system and then examine the effective performance in a real environment because a real system has several system constraints and suffers from fluctuations in an actual wireless environment. Indeed, depending on the cross-layer design, the implementation often degrades the system performance even if the method exhibits good functional performance. Moreover, the simple assessments of wireless link quality in the previous study indicated unnecessary handovers and inappropriate AP selection in a real environment. Therefore, we herein propose a new architecture that performs cross-layer collaboration between the MAC layer and the transport layer while avoiding degradation of system performance. In addition, we use a new assessment scheme of wireless link quality, i.e., double thresholds of frame retry and comparison of frame retry ratio, in order to prevent handover oscillation caused by fluctuations in the wireless environment. The experimental results demonstrate that the prototype system works well by controlling two TCP connections based on assessments of wireless link quality thereby achieving efficient inter-domain TCP handover in a real WLAN environment.

5501-5520hit(18690hit)