The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

11001-11020hit(18690hit)

  • C/V Segmentation on Mandarin Spontaneous Spoken Speech Signals Using SNR Improvement and Energy Variation

    Ching-Ta LU  Hsiao-Chuan WANG  

     
    LETTER-Speech and Hearing

      Vol:
    E89-D No:1
      Page(s):
    363-366

    An efficient and simple approach to consonant/vowel (C/V) segmentation by incorporating the SNR improvement of a speech enhancement system with the energy variation of two adjacent frames is proposed. Experimental results show that the proposed scheme performs well in segmenting C/V for a spontaneously spoken utterance.

  • The Fusion of Two User-friendly Biometric Modalities: Iris and Face

    Byungjun SON  Yillbyung LEE  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E89-D No:1
      Page(s):
    372-376

    In this paper, we present the biometric authentication system based on the fusion of two user-friendly biometric modalities: Iris and Face. Using one biometric feature can lead to good results, but there is no reliable way to verify the classification. To achieve robust identification and verification we are combining two different biometric features. We specifically apply 2-D discrete wavelet transform to extract the feature sets of low dimensionality from the iris and face. And then to obtain Reduced Joint Feature Vector (RJFV) from these feature sets, Direct Linear Discriminant Analysis (DLDA) is used in our multimodal system. This system can operate in two modes: to identify a particular person or to verify a person's claimed identity. Our results for both cases show that the proposed method leads to a reliable person authentication system.

  • Detection of TCP Performance Degradation Using Link Utilization Statistics

    Keisuke ISHIBASHI  Ryoichi KAWAHARA  Takuya ASAKA  Masaki AIDA  Satoshi ONO  Shoichiro ASANO  

     
    PAPER-Network

      Vol:
    E89-B No:1
      Page(s):
    47-56

    In this paper, we propose a method of detecting TCP performance degradation using only bottleneck-link utilization statistics: mean and variance. The variance of link utilization normally increases as the mean link-utilization increases. However, because link-utilization has a maximum of 100%, as the mean approaches 100%, the possible range of fluctuation becomes narrow and the variance decreases to zero. In this paper, using the M/G/R processor sharing model, we relate this phenomenon to the behavior of flows. We also show that by using this relationship, we can detect TCP performance degradation using the mean and variance of link utilization. In particular, this method enables a network operator to determine whether or not the degradation originates from the congestion of his/her own network. Because our method requires us to measure only link utilization, the cost of performance management can be greatly decreased compared with the conventional method, which requires dedicated functions for directly measuring the TCP performance.

  • Syllable Alignment: A Novel Model for Phonetic String Search

    Ruibin GONG  Tony K.Y. CHAN  

     
    PAPER-Natural Language Processing

      Vol:
    E89-D No:1
      Page(s):
    332-339

    Phonetic string search of written text is an important topic in Information Retrieval. While most of the previous methods convert a string into intermediate codes with phonetic transformation rules, this paper proposes a novel algorithm to segment two phonetic strings into syllables and find the optimal pairing of the corresponding syllables to calculate their similarity score. The experiment shows that this method is very effective and flexible. It can be easily adapted to different datasets and achieves optimal performance on average.

  • Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem

    Tsuyoshi TAKAGI  David REIS, Jr.  Sung-Ming YEN  Bo-Ching WU  

     
    PAPER-Elliptic Curve Cryptography

      Vol:
    E89-A No:1
      Page(s):
    115-123

    Recently, the radix-3 representation of integers is used for the efficient implementation of pairing based cryptosystems. In this paper, we propose non-adjacent form of radix-r representation (rNAF) and efficient algorithms for generating rNAF. The number of non-trivial digits is (r-2)(r+1)/2 and its average density of non-zero digit is asymptotically (r-1)/(2r-1). For r=3, the non-trivial digits are {2, 4} and the non-zero density is 0.4. We then investigate the width-w version of rNAF for the general radix-r representation, which is a natural extension of the width-w NAF. Finally we compare the proposed algorithms with the generalized NAF (gNAF) discussed by Joye and Yen. The proposed scheme requires a larger table but its non-zero density is smaller even for large radix. We explain that gNAF is a simple degeneration of rNAF--we can consider that rNAF is a canonical form for the radix-r representation. Therefore, rNAF is a good alternative to gNAF.

  • A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application

    Katsuyuki TAKASHIMA  

     
    PAPER-Elliptic Curve Cryptography

      Vol:
    E89-A No:1
      Page(s):
    124-133

    The Gallant-Lambert-Vanstone method [14](GLV method for short) is a scalar multiplication method for elliptic curve cryptography (ECC). In WAP WTLS [49], SEC 2 [44], ANSI X9.62 [1] and X9.63 [2], several domain parameters for applications of the GLV method are described. Curves with those parameters have efficiently-computable endomorphisms. Recently the GLV method for Jacobians of hyperelliptic curve (HEC) has also been studied. In this paper, we discuss applications of the GLV method to curves with real multiplication (RM). It is the first time to use RM for efficient scalar multiplication as far as we know. We describe the general algorithm for using such RM, and we show that some genus 2 curves with RM have enough effciency to be used in the GLV method as in the previous CM case. Moreover, we will see that such RM curves can be obtained abundantly unlike the previously proposed CM curves of genus 2.

  • A MPBSG Technique Based Parallel Dual-Type Method Used for Solving Distributed Optimal Power Flow Problems

    Huay CHANG  Shieh-Shing LIN  

     
    PAPER-Systems and Control

      Vol:
    E89-A No:1
      Page(s):
    260-269

    In this paper, we propose a method to solve the distributed optimal power flow problem and discuss the associated implementation. We have combined this method with a projected Jacobi (PJ) method and a modified parallel block scaled gradient (MPBSG) method possessing decomposition effects. With the decomposition, our method can be parallel processed and is computationally efficient. We have tested our method for distributed OPF problems on numerous power systems. As seen from the simulation results, our method achieved a dramatic speed-up ratio compared with the commercial IMSL subroutines.

  • Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors

    Masanobu KATAGI  Toru AKISHITA  Izuru KITAMURA  Tsuyoshi TAKAGI  

     
    PAPER-Elliptic Curve Cryptography

      Vol:
    E89-A No:1
      Page(s):
    151-160

    It has recently been reported that the performance of hyperelliptic curve cryptosystems (HECC) is competitive to that of elliptic curve cryptosystems (ECC). Concerning the security of HECC, the theta divisors play an important role. The scalar multiplication using a random base point is vulnerable to an exceptional procedure attack, which is a kind of side-channel attacks, using theta divisors. In the case of cryptographic protocols of the scalar multiplication using fixed base point, however, the exceptional procedure attack is not applicable. First, we present novel efficient scalar multiplication using theta divisors, which is the positive application of theta divisors on HECC. Second, we develop a window-based method using theta divisors that is secure against side-channel attacks. It is not obvious how to construct a base point D such that all pre-computed points are theta divisors. We present an explicit algorithm for generating such divisors.

  • Multi-Matcher On-Line Signature Verification System in DWT Domain

    Isao NAKANISHI  Hiroyuki SAKAMOTO  Naoto NISHIGUCHI  Yoshio ITOH  Yutaka FUKUI  

     
    PAPER-Information Hiding

      Vol:
    E89-A No:1
      Page(s):
    178-185

    This paper presents a multi-matcher on-line signature verification system which fuses the verification scores in pen-position parameter and pen-movement angle one at total decision. Features of pen-position and pen-movement angle are extracted by the sub-band decomposition using the Discrete Wavelet Transform (DWT). In the pen-position, high frequency sub-band signals are considered as individual features to enhance the difference between a genuine signature and its forgery. On the other hand, low frequency sub-band signals are utilized as features for suppressing the intra-class variation in the pen-movement angle. Verification is achieved by the adaptive signal processing using the extracted features. Verification scores in the pen-position and the pen-movement angle are integrated by using a weighted sum rule to make total decision. Experimental results show that the fusion of pen-position and pen-movement angle can improve verification performance.

  • Resource Adaptation Scheme for QoS Provisioning in Pervasive Computing Environments: A Welfare Economic Approach

    Wonjun LEE  Eunkyo KIM  Dongshin KIM  Choonhwa LEE  

     
    PAPER-Networks

      Vol:
    E89-D No:1
      Page(s):
    248-255

    Management of applications in the new world of pervasive computing requires new mechanisms to be developed for admission control, QoS negotiation, allocation and scheduling. To solve such resource-allocation and QoS provisioning problems within pervasive and ubiquitous computational environments, distribution and decomposition of the computation are important. In this paper we present a QoS-based welfare economic resource management model that models the actual price-formation process of an economy. We compare our economy-based approach with a mathematical approach we previously proposed. We use the constructs of application benefit functions and resource demand functions to represent the system configuration and to solve the resource allocation problems. Finally empirical studies are conducted to evaluate the performance of our proposed pricing model and to compare it with other approaches such as priority-based scheme and greedy method.

  • Efficient Identification of Bad Signatures in RSA-Type Batch Signature

    Seungwon LEE  Seongje CHO  Jongmoo CHOI  Yookun CHO  

     
    PAPER-Digital Signature

      Vol:
    E89-A No:1
      Page(s):
    74-80

    As the use of electronic voting systems and e-commerce systems increases, the efficient batch verification of digital signatures becomes more and more important. In this paper, we first propose a new method to identify bad signatures in batches efficiently for the case when the batch contains one bad signature. The method can find out the bad signature using smaller number of modular multiplications than the existing method. We also propose an extension to the proposed method to find out two or more bad signatures in a batch instance. Experimental results show that our method yields better performance than the existing method in terms of the number of modular multiplications.

  • Improvement of an Efficient and Practical Solution to Remote Authentication: Smart Card

    Her-Tyan YEH  

     
    LETTER-Internet

      Vol:
    E89-B No:1
      Page(s):
    210-211

    Recently, Chien et al. proposed an efficient timestamp-based remote user authentication scheme using smart cards. The main merits include: (1) user-independent server, i.e., there is no password or verification table kept in the server; (2) users can freely choose their passwords; (3) mutual authentication is provided between the user and the server; and (4) lower communication and computation cost. In this paper, we show that Chien et al.'s scheme is insecure against forgery attack because one adversary can easily pretend to be a legal user, pass the server's verification and login to the remote system successfully. An improved scheme is proposed that can overcome the security risk while still preserving all the above advantages.

  • Iterative Demodulation of M-Ary Orthogonal Signaling Formats in Coded DS-CDMA Systems with Soft Interference Cancellation and Channel Estimation

    Pei XIAO  Erik STROM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:1
      Page(s):
    150-161

    The system under study is a convolutionally coded and orthogonally modulated DS-CDMA system over time-varying frequency-selective Rayleigh fading channels in multiuser environments. Iterative soft demodulation and decoding using the Turbo principle can be applied to such a system to increase the system capacity and performance. To combat multiple access interference (MAI), we incorporate the interference cancellation (IC) and decision-directed channel estimation (CE) in the demodulator. However, both IC and CE are subject to performance degradation due to incorrect decisions. In order to prevent error propagation from the decision feedback, soft interference cancellation and channel estimation assisted demodulation is proposed in this paper. The performance of this strategy is evaluated numerically and proved to be superior to the hard decision-directed approach with a minor increase in complexity.

  • Limiting the Holding Time Considering Emergency Calls in Mobile Cellular Phone Systems during Disasters

    Kazunori OKADA  

     
    PAPER-Network

      Vol:
    E89-B No:1
      Page(s):
    57-65

    During devastating natural disasters, numerous people want to make calls to check on their families and friends in the stricken areas, but many call attempts on mobile cellular systems are blocked due to limited radio frequency resources. To reduce call blocking and enable as many people as possible to access mobile cellular systems, placing a limit on the holding time for each call has been studied [1],[2]. However, during a catastrophe, emergency calls, e.g., calls to fire, ambulance, or police services are also highly likely to increase and it is important that the holding time for these calls is not limited. A method of limiting call holding time to make provision for emergency calls while considering the needs of ordinary callers is proposed. In this method, called the HTL-E method, all calls are classified as emergency calls or other according to the numbers that are dialed or the terminal numbers that are given in advance to the particular terminals making emergency calls, and only the holding time of other calls is limited. The performance characteristics of the HTL-E method were evaluated using computer simulations. The results showed that it reduced the rates of blocking and forced call termination at handover considerably, without reducing the holding time for emergency calls. The blocking rate was almost equal for emergency and other calls. In addition, the HTL-E method handles fluctuations in the demand for emergency calls flexibly. A simple method of estimating the holding-time limit for other calls, which reduces the blocking rate for emergency and other calls to the normal rate for periods of increased call demand is also presented. The calculated results produced by this method agreed well with the simulation results.

  • A Modified Early-Late Gate for Blind Symbol Timing Recovery of OFDM Systems

    Arafat AL-DWEIK  Reyad EL-KHAZALI  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E89-B No:1
      Page(s):
    11-18

    This paper presents a new blind symbol timing recovery technique for OFDM systems. The proposed technique is based on modifying the conventional early-late loop used for single carrier systems. The new topology exploits the interference introduced by the loss of orthogonality due to symbol timing offsets. The new structure is completely non data-aided and is independent of the OFDM symbol structure. The new technique can extract symbol timing with carrier frequency offset up to 94% of the OFDM spectrum.

  • A Novel Image Segmentation Approach Based on Particle Swarm Optimization

    Chih-Chin LAI  

     
    LETTER-Digital Signal Processing

      Vol:
    E89-A No:1
      Page(s):
    324-327

    Image segmentation denotes a process by which an image is partitioned into non-intersecting regions and each region is homogeneous. Utilizing histogram information to aim at segmenting an image is a commonly used method for many applications. In this paper, we view the image segmentation as an optimization problem. We find a curve which gives the best fit to the given image histogram, and the parameters in the curve are determined by using the particle swarm optimization algorithm. The experimental results to confirm the proposed approach are also included.

  • Access Control Scheme for CDMA Systems Based on Delay and Transmission Rate Control

    Seung Sik CHOI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:1
      Page(s):
    227-230

    An effective access control scheme in CDMA networks is proposed to provide multimedia services. The proposed scheme controls the access of multimedia traffic using the delay of data traffic and the transmission rate control of video traffic. Numerical results show that throughput and delay are improved by allowing delay of data traffic under low and medium traffic conditions, and by decreasing the transmission rate of video traffic under heavy traffic conditions.

  • Adaptive Search Range Decision and Early Termination for Multiple Reference Frame Motion Estimation for H.264

    Gwo-Long LI  Mei-Juan CHEN  

     
    LETTER-Multimedia Systems for Communications" Multimedia Systems for Communications

      Vol:
    E89-B No:1
      Page(s):
    250-253

    The newest video coding standard called H.264 provides considerable performance improvement over a wide range of bit rates and video resolutions compared to previous standards. However, these features result in an extraordinary increase in encoder complexity, mainly regarding to mode decision and multiple reference frame motion estimation (ME). This letter presents two algorithms to reduce the computational complexity caused by motion estimation. The adaptive search range decision method determines the search range size according to the motion vector predictor dynamically and the early termination scheme defines a criterion to early terminate the search processing for multiple reference frames. Experimental results show that the proposed algorithms provide significant improvement of coding speed with negligible objective quality degradation compared to the fast motion estimation algorithms adopted by reference software.

  • Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses

    Lihua WANG  Zhenfu CAO  Takeshi OKAMOTO  Ying MIAO  Eiji OKAMOTO  

     
    PAPER-Protocol

      Vol:
    E89-A No:1
      Page(s):
    106-114

    In this paper authorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al.[8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al.[10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.

  • Stochastic Method of Determining Substream Modulation Levels for MIMO Eigenbeam Space Division Multiplexing

    Satoshi TAKAHASHI  Chang-Jun AHN  Hiroshi HARADA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:1
      Page(s):
    142-149

    Multiple-input multiple-output (MIMO) eigenbeam space division multiplexing that uses adaptive modulations for substreams is a promising technology for improving transmission capacity. A fundamental drawback of this approach is that the modulation levels determined from the carrier-to-noise ratio at each substream are sometimes overly optimistic so the use of these modulation levels results in transmission errors and diminished transmission performance. A novel method of determining substream modulation levels is proposed that alleviates this degradation. In the proposed method, the expected bit error rates for possible modulations of each substream are calculated from delay profiles. Simulation results indicate that transmission capacity is improved by 30% using the new method compared with the conventional method.

11001-11020hit(18690hit)