Zhongda LIU Naoshi NAKAYA Yuuji KOUI
New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and known viruses share a common feature. In this paper we propose a new static analysis technology that can circumvent code obfuscation to extract the common feature and detect unknown viruses based on similarity. The results of evaluation experiments demonstrated that this technique is able to detect unknown viruses without false positives.
Sei NAGASHIMA Koichi ITO Takafumi AOKI Hideaki ISHII Koji KOBAYASHI
This paper presents a technique for high-accuracy estimation of image rotation using 1D Phase-Only Correlation (POC). The rotation angle between two images is estimated as follows: (i) compute the amplitude spectra of the given images, (ii) transform the coordinate system of amplitude spectra from Cartesian coordinates to polar coordinates, and (iii) estimate the translational displacement between the polar-mapped amplitude spectra to obtain the rotation angle. While the conventional approach is to employ 2D POC for high-accuracy displacement estimation in (iii), this paper proposes the use of 1D POC with an adaptive line selection scheme. The proposed technique makes possible to improve the accuracy of rotation estimation for low contrast images of artificial objects with regular geometric shapes and to reduce the total computation cost by 50%.
In this paper, for odd n and any k with gcd(n,k) = 1, new binary sequence families Sk of period 2n-1 are constructed. These families have maximum correlation , family size 22n+2n+1 and maximum linear span . The correlation distribution of Sk is completely determined as well. Compared with the modified Gold codes with the same family size, the proposed families have the same period and correlation properties, but larger linear span. As good candidates with low correlation and large family size, the new families contain the Gold sequences and the Gold-like sequences. Furthermore, Sk includes a subfamily which has the same period, correlation distribution, family size and linear span as the family So(2) recently constructed by Yu and Gong. In particular, when k=1, is exactly So(2).
Chee-Hyun PARK Kwang-Seok HONG
This paper investigates noise reduction performance and performs convergence analysis of a Variable Error Data Normalized Step-Size Least Mean Square (VEDNSS LMS) algorithm. Adopting VEDNSS LMS provides fast convergence at early stages of adaptation while ensuring small final misadjustment. An analysis of convergence and steady-state performance for zero-mean Gaussian inputs is provided. Simulation results comparing the proposed algorithm to existing algorithms indicate its superior performance under various noise and frequency environments.
Fa-Xin YU Zhe-Ming LU Zhen LI Hao LUO
In this Letter, we propose a novel method of low-level global motion feature description based on Vector Quantization (VQ) index histograms of motion feature vectors (MFVVQIH) for the purpose of video shot retrieval. The contribution lies in three aspects: first, we use VQ to eliminate singular points in the motion feature vector space; second, we utilize the global motion feature vector index histogram of a video shot as the global motion signature; third, video shot retrieval based on index histograms instead of original motion feature vectors guarantees the low computation complexity, and thus assures a real-time video shot retrieval. Experimental results show that the proposed scheme has high accuracy and low computation complexity.
An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.
Phanumas KHUMSAT Apisak WORAPISHET Wanlop SURAKAMPONTORN
A double-capacitor phase error compensation configuration is proposed for Gm-C and MOSFET-C filters. The use of two capacitors enables the effective compensation capacitance to track with the tuning resistance, thereby making it more effective over a wider frequency tuning range as compared to the conventional single-capacitor configuration. Simulations of 5th-order Chebyshev filters in a 0.18 µm CMOS process with more than one octave tuning range were carried out to demonstrate the viability of the proposed double-capacitor configuration for both Gm-C and MOSFET-C filters.
In this letter, a novel power allocation scheme is proposed to improve the outage performance of an amplify-and-forward (AF) cooperative communication network with multiple potential relays under the assumption that only mean channel gains are available at the transmitters. In this scheme, power allocation is studied jointly with a relay selection algorithm which has low computational complexity. Simulation results demonstrate the performance improvement of the proposed scheme in terms of outage behavior.
Abhishek ROY Navrati SAXENA Jitae SHIN
An information-theoretic, optimal framework is developed for tracking the residents in a Context-aware Heterogenous Smart Environment. The resident-tracking problem is formulated in terms of weighted entropy. The framework provides an optimal, online learning and prediction of users movement, location as well as most probable path segments from the symbolic domain. Successful prediction helps in on-demand operations of automated indoor devices along the users future paths and locations, thus providing the necessary comfort at a near-optimal cost. Simulation results corroborate the high prediction success, thereby providing resident-comfort while reducing energy consumption and manual operations.
Yu SASAKI Lei WANG Kazuo OHTA Noboru KUNIHIRO
In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.
Junghyun CHO Jikon KIM Shiho KIM
A single chip NFC transceiver with Dual Antenna structure supporting not only NFC active and passive mode but also 13.56 MHz RFID reader and tag mode is designed and fabricated. The proposed NFC transceiver can operate as a RFID tag even without external power supply thanks to a dual antenna structure for initiator and target. The area increment due to additional target antenna is negligible because the target antenna is constructed by using a shielding layer of the initiator antenna.
A trihedral corner reflector is often used for SAR polarimetric calibration. However, the scattering property of the reflector used for the calibration may not be correct if the high frequency approximation is not satisfied or if an incident angle deviates from the symmetric axis of the reflector. In order to know the conditions for precise SAR polarimetric calibration, we evaluated the polarimetric response of the reflector by a numerical simulation using the method of moment (MoM). It is found that allowable incident angle deviation is 5 degree to azimuth direction and 4 degree to elevation direction for precise SAR polarimetric calibration when the size of the reflector is 7.5 times larger than the wavelength of an incident wave.
Jingyu HUA Limin MENG Gang LI Dongming WANG Xiaohu YOU
In this letter, we first investigate the bias of Doppler shift estimator based on autocorrelation function (ACF). Then we derive a signal-to-noise ratio (SNR) independent condition for Doppler shift estimation and achieve this condition by a adaptive process. Moreover, we present theoretical analysis about the convergency of our adaptive Doppler shift estimator, and derive a close-form expression for its mean square error (MSE). We verify the proposed estimator by computer simulation, the results of which are in agreement with the analysis, i.e., the proposed method achieves a good SNR-independent performance in a wide range of velocities and SNRs.
Koichi ADACHI Fumiyuki ADACHI Masao NAKAGAWA
Orthogonal frequency division multiplexing (OFDM), which uses a number of narrowband orthogonal sub-carriers, is a promising transmission technique. Also multi-carrier code division multi-access (MC-CDMA), which combines OFDM and frequency-domain spreading, has been attracting much attention as a future broadband wireless access. It was shown that MC-CDMA has lower channel capacity than OFDM, due to inter-code interference (ICI) resulting from orthogonality distortion caused by frequency-selective fading. Recently, many ICI cancellers have been proposed to mitigate the effect of ICI. In this paper, we derive a channel capacity expression for MC-CDMA assuming perfect ICI cancellation taking into account both frequency diversity gain and space diversity gain and compare it to that of OFDM. Furthermore, we derive a channel capacity expression for the case of imperfect ICI cancellation to discuss the impact of the residual ICI.
Qinghai YANG Yingji ZHONG Kyung Sup KWAK
We investigate the symbol error rate (SER) of the cooperative transmission with the decode-and-forward relay protocol under Rayleigh fading channels. The technique of orthogonal space-time block coding (OSTBC) is applied at the links source-relay, source-destination and relay-destination. A closed-form SER expression is derived. Simulation results demonstrate the theoretical solutions.
A high-efficiency CMOS rectifier circuit for UHF RFID applications was developed. The rectifier utilizes a self-Vth-cancellation (SVC) scheme in which the threshold voltage of MOSFETs is cancelled by applying gate bias voltage generated from the output voltage of the rectifier itself. A very simple circuit configuration and zero power dissipation characteristics in biasing enable excellent power conversion efficiency (PCE), especially under small RF input power conditions. At higher RF input power conditions, the PCE of the rectifier automatically decreases. This is the built-in self-power-regulation function. The proposed SVC CMOS rectifier was fabricated with a 0.35-µm CMOS process and the measured performance was compared with those of conventional nMOS, pMOS, and CMOS rectifiers and other types of Vth cancellation rectifiers as well. The SVC CMOS rectifier achieves 32% of PCE at the -10 dBm RF input power condition. This PCE is larger than rectifiers reported to date under this condition.
Hiromi TSURUMI Takamichi MIYATA Katsunori YAMAOKA Yoshinori SAKAI
Many content distribution systems such as CDN and P2P file sharing have been developed. In these systems, file-type contents require downloads to be completed before they can be played and they have no value before the download finishes. Therefore, a user's satisfaction depends on the length of the service latency. That is, the length of time from when the user issued a request until the user received an entire file. Reducing the sum of that time is necessary for the whole delivery system to satisfy users and maintain dependability on system performance. We discuss a hop-by-hop file delivery system suitable for delivering file contents whereby the sum of service latency is reduced by using the request conditions. Moreover, we propose a file delivery scheduling algorithm for a one-link model given that the content request frequency is unknown. The algorithm is based on a local optimal strategy. We performed a characteristic analysis by computer simulation. The results showed that our algorithm performs at nearly the theoretical efficiency limit of the hop-by-hop system when the request frequency distribution of each content has a deviation.
Yuichi OHSITA Takashi MIYAMURA Shin'ichi ARAKAWA Eiji OKI Kohei SHIOMOTO Masayuki MURATA
Obtaining current traffic matrices is essential to traffic engineering (TE) methods. Because it is difficult to monitor traffic matrices, several methods for estimating them from link loads have been proposed. The models used in these methods, however, are incorrect for some real networks. Thus, methods improving the accuracy of estimation by changing routes also have been proposed. However, existing methods for estimating the traffic matrix by changing routes can only capture long-term variations and cannot obtain current traffic matrices accurately. In this paper, we propose a method for estimating current traffic matrices that uses route changes introduced by a TE method. In this method, we first estimate the long-term variations of traffic by using the link loads monitored at previous times. Then, we adjust the estimated long-term variations so as to fit the current link loads. In addition, when the traffic variation trends change and the estimated long-term variations fail to match the current traffic, our method detects mismatch. Then, so as to capture the current traffic variations, the method re-estimates the long-term variations after removing monitored data corresponding to the end-to-end traffic causing the mismatches. We evaluate our method through simulation. The results show that our method can estimate current traffic matrices accurately even when some end-to-end traffic changes suddenly.
This paper deals with a new formulation for the diffraction of a plane wave by a periodic grating. As a simple example, the diffraction of a transverse magnetic wave by a perfectly conductive periodic array of rectangular grooves is discussed. On the basis of a shadow hypothesis such that no diffraction takes place and only the reflection occurs with the reflection coefficient -1 at a low grazing limit of incident angle, this paper proposes the scattering factor as a new concept. In terms of the scattering factor, several new formulas on the diffraction amplitude, the diffraction efficiency and the optical theorem are obtained. It is newly found that the scattering factor is an even function due to the reciprocity. The diffraction efficiency is defined for a propagating incident wave as well as an evanescent incident wave. Then, it is theoretically found that the 0th order diffraction efficiency becomes unity and any other order diffraction efficiencies vanish when a real angle of incidence becomes low grazing. Numerical examples of the scattering factor and diffraction efficiency are illustrated in figures.
Jinhyun CHO Doowon LEE Sangyong YOON Sanggyu PARK Soo-Ik CHAE
In this paper, we present a high-performance VC-1 main-profile decoder for high-definition (HD) video applications, which can decode HD 720p video streams with 30 fps at 80 MHz. We implemented the decoder with a one-poly eight-metal 0.13 µm CMOS process, which contains about 261,900 logic gates and on-chip memories of 13.9 KB SRAM and 13.1 KB ROM and occupies an area of about 5.1 mm2. In designing the VC-1 decoder, we used a template-based SoC design flow, with which we performed the design space exploration of the decoder by trying various configurations of communication channels. Moreover, we also describe architectures of the computation blocks optimized to satisfy the requirements of VC-1 HD applications.