The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

5841-5860hit(20498hit)

  • An Advanced Incident Response Methodology Based on Correlation Analysis of Polymorphic Security Events

    Haeng-Gon LEE  Jungsuk SONG  Sang-Soo CHOI  Gi-Hwan CHO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E96-B No:7
      Page(s):
    1803-1813

    In order to cope with the continuous evolution in cyber threats, many security products (e.g., IDS/IPS, TMS, Firewalls) are being deployed in the network of organizations, but it is not so easy to monitor and analyze the security events triggered by the security products constantly and effectively. Thus, in many cases, real-time incident analysis and response activities for each organization are assigned to an external dedicated security center. However, since the external security center deploys its security appliances to only the boundary or the single point of the network, it is very difficult to understand the entire network situation and respond to security incidents rapidly and accurately if they depend on only a single type of security information. In addition, security appliances trigger an unmanageable amount of alerts (in fact, by some estimates, several thousands of alerts are raised everyday, and about 99% of them are false positives), this situation makes it difficult for the analyst to investigate all of them and to identify which alerts are more serious and which are not. In this paper, therefore, we propose an advanced incident response methodology to overcome the limitations of the existing incident response scheme. The main idea of our methodology is to utilize polymorphic security events which can be easily obtained from the security appliances deployed in each organization, and to subject them to correlation analysis. We evaluate the proposed methodology using diverse types of real security information and the results show the effectiveness and superiority of the proposed incident response methodology.

  • Simplified Soft Demapping Algorithm for Gray-APSK

    Jiachen HUANG  Changyong PAN  Kewu PENG  Liwen FAN  Jian SONG  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E96-B No:7
      Page(s):
    1814-1818

    Amplitude phase shift keying (APSK) constellation with Gray mapping was proposed recently. Inspired by the simplified soft demapping for regular Gray-QAM, a simplified soft demapping algorithm for Gray-APSK is proposed in this paper. Compared with conventional soft demapping schemes, its complexity is greatly reduced with only a little SNR loss, which is validated by the complexity analysis and FPGA compilation results.

  • Path Loss Model with Low Antenna Height for Microwave Bands in Residential Areas Open Access

    Motoharu SASAKI  Wataru YAMADA  Naoki KITA  Takatoshi SUGIYAMA  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:7
      Page(s):
    1930-1944

    A new path loss model of interference between mobile terminals in a residential area is proposed. The model uses invertible formulas and considers the effects on path loss characteristics produced by paths having many corners or corners with various angles. Angular profile and height pattern measurements clarify three paths that are dominant in terms of their effect on the accurate modeling of path loss characteristics in residential areas: paths along a road, paths between houses, and over-roof propagation paths. Measurements taken in a residential area to verify the model's validity show that the model is able to predict path loss with greater accuracy than conventional models.

  • A Situational Training System for Developmentally Disabled People Based on Augmented Reality

    Tae-Young KIM  

     
    LETTER-Educational Technology

      Vol:
    E96-D No:7
      Page(s):
    1561-1564

    Nowadays, many interface devices or training systems have been developed with recent developments in IT technology, but only a few training systems for developmentally disabled people have been introduced. In this paper, we present a real-time, interactional and situational training system based on augmented reality in order to improve cognitive capability and adaptive ability in the daily lives of developmentally disabled people. Our system is specifically based on serving food in restaurants. It allows disabled people wearing the HMD attached with camera to conduct the training to cope with a series of situations safely while serving customers food and drinks and take the training session as much as they want. After experimenting on our presented system for 3 months, we found that they actively participated in the training and their cognitive abilities increasingly went faster through repeated training, resulting in the improvement in their cognitive ability and their ability to deal with situations.

  • Feature Selection via 1-Penalized Squared-Loss Mutual Information

    Wittawat JITKRITTUM  Hirotaka HACHIYA  Masashi SUGIYAMA  

     
    PAPER-Pattern Recognition

      Vol:
    E96-D No:7
      Page(s):
    1513-1524

    Feature selection is a technique to screen out less important features. Many existing supervised feature selection algorithms use redundancy and relevancy as the main criteria to select features. However, feature interaction, potentially a key characteristic in real-world problems, has not received much attention. As an attempt to take feature interaction into account, we propose 1-LSMI, an 1-regularization based algorithm that maximizes a squared-loss variant of mutual information between selected features and outputs. Numerical results show that 1-LSMI performs well in handling redundancy, detecting non-linear dependency, and considering feature interaction.

  • A Music Similarity Function Based on the Centroid Model

    Jin Soo SEO  

     
    LETTER-Music Information Processing

      Vol:
    E96-D No:7
      Page(s):
    1573-1576

    Music-similarity computation is an essential building block for the browsing, retrieval, and indexing of digital music archives. This paper proposes a music similarity function based on the centroid model, which divides the feature space into non-overlapping clusters for the efficient computation of the timber distance of two songs. We place particular emphasis on the centroid deviation as a feature for music-similarity computation. Experiments show that the centroid-model representation of the auditory features is promising for music-similarity computation.

  • An Improved Generalized Optimization of Polarimetric Contrast Enhancement and Its Application to Ship Detection

    Junjun YIN  Jian YANG  Chunhua XIE  Qingjun ZHANG  Yan LI  Yalin QI  

     
    PAPER-Sensing

      Vol:
    E96-B No:7
      Page(s):
    2005-2013

    The optimization of polarimetric contract enhancement (OPCE) is one of the important problems in radar polarimetry since it provides a substantial benefit for target enhancement. Considering different scattering mechanisms between the desired targets and the undesired targets, Yang et al. extended the OPCE model to the generalized OPCE (GOPCE) problem. Based on a modified GOPCE model and the linear discriminant analysis, a ship detector is proposed in this paper to improve the detection performance for polarimetric Synthetic Aperture Radar (SAR) imagery. In the proposed method, we modify the combination form of the three polarimetric parameters (i.e., the plane scattering similarity parameter, the diplane scattering similarity parameter and the Cloude entropy), then use an optimization function resembling the classical Fisher criterion to optimize the optimal polarization states corresponding to the radar received power and the fusion vector corresponding to the polarimetric parameters. The principle of the optimization detailed in this paper lies in maximizing the difference between the desired targets and sea clutter, and minimizing the clutter variance at the same time. RADARSAT-2 polarimetric SAR data acquired over Tanggu Port (Tianjin, China) on June 23, 2011 are used for validation. The experimental results show that the proposed method improves the contrast of the targets and sea clutter and meanwhile reduces the clutter variance. In comparison to another GOPCE based ship detector and the classical polarimetric whitening filter (PWF), the proposed method shows a better performance for weak targets. In addition, we also use the RADARSAT-2 data acquired over San-Francisco on April 9, 2008 to further demonstrate the improvement of this method for target contrast.

  • Performance Evaluation of Network-Based Global Mobility Management Protocol in Proxy Mobile IPv6

    Van Hanh NGUYEN  Soonghwan RO  

     
    PAPER-Internet

      Vol:
    E96-B No:7
      Page(s):
    1886-1895

    Proxy Mobile IPv6 (PMIPv6) is a network-based localized mobility management protocol that is independent of global mobility management protocols. In a single local mobility domain, the mobile node (MN) is not involved in any IP mobility-related signaling, but when the MN moves into another local mobility domain, the MN must change its PMIPv6 home address. In this case, host-based mobility signaling is activated, and PMIPv6's network-based mobility cannot be retained. Additionally, if the MN does not support global mobility, it cannot maintain its communication sessions with its correspondent node. In this paper, we propose a solution for network-based global mobility support in PMIPv6 networks, which allows the MN to maintain active communication sessions without mobility protocol stacks when the MN moves into another local mobility domain. In the proposed mechanism, the MN remains unaware of its movement when it moves to another local mobility domain, and it is forced to use only its MIPv6 home address for all its communication. Thus, the MN is not involved in any IP mobility-related signaling, despite its movement. The proposed protocol provides for global mobility while retaining the advantages of the network-based localized mobility in the Proxy Mobile IPv6 protocol. In this paper, we propose a solution for global mobility support in PMIPv6 networks by which the MAG (Mobile Access Gateway) can maintain the MN's communication sessions during inter-domain handover. In the proposed mechanism, the MN remains unaware of its movement when it moves to another local mobility domain, and it is forced to use only its MIPv6 home address for all its communication. Thus, the MN is not involved in any IP mobility-related signaling, despite its movement. We evaluate and compare network performance between our proposed solution and PMIPv6 and the main host-based mobility protocol. We evaluate and compare handover delays, and packet loss cost of the two protocols.

  • WHIT: A More Efficient Hybrid Method for Single-Packet IP Traceback Using Walsh Matrix and Router Degree Distribution

    Yulong WANG  Ji REN  

     
    PAPER-Internet

      Vol:
    E96-B No:7
      Page(s):
    1896-1907

    Single-packet attack can be tracked with logging-based IP traceback approaches, whereas DDoS attack can be tracked with marking-based approaches. However, both approaches have their limits. Logging-based approaches incur heavy overhead for packet-digest storage as well as time overhead for both path recording and recovery. Marking-based approaches incur little traceback overhead but are unable to track single packets. Simply deploying both approaches in the same network to deal with single-packet and DDoS attacks is not an efficient solution due to the heavy traceback overhead. Recent studies suggest that hybrid approaches are more efficient as they consume less router memory to store packet digests and require fewer attack packets to recover attack paths. Thus, the hybrid single packet traceback approach is more promising in efficiently tracking both single-packet and DDoS attacks. The major challenge lies in reducing storage and time overhead while maintaining single-packet traceback capability. We present in this paper a new hybrid approach to efficiently track single-packet attacks by designing a novel path fragment encoding scheme using the orthogonality of Walsh matrix and the degree distribution characteristic of router-level topologies. Compared to HIT (Hybrid IP Traceback), which, to the best of our knowledge, is the most efficient hybrid approach for single-packet traceback, our approach has three advantages. First, it reduces the overhead by 2/3 in both storage and time for recording packet paths. Second, the time overhead for recovering packet paths is also reduced by a calculatable amount. Finally, our approach generates no more than 2/3 of the false-positive paths generated by HIT.

  • Effective Fixed-Point Pipelined Divider for Mobile Rendering Processors

    Yong-Jin PARK  Woo-Chan PARK  Jun-Hyun BAE  Jinhong PARK  Tack-Don HAN  

     
    PAPER-Computer System

      Vol:
    E96-D No:7
      Page(s):
    1443-1448

    In this paper, we proposed that an area- and speed-effective fixed-point pipelined divider be used for reducing the bit-width of a division unit to fit a mobile rendering processor. To decide the bit-width of a division unit, error analysis has been carried out in various ways. As a result, when the original bit-width was 31-bit, the proposed method reduced the bit-width to 24-bit and reduced the area by 42% with a maximum error of 0.00001%.

  • Four-Channel Integrated Receiver with a Built-In Spatial Demultiplexer Optics for 100 Gb/s Ethernet

    Keita MOCHIZUKI  Hiroshi ARUGA  Hiromitsu ITAMOTO  Keitaro YAMAGISHI  Yuichiro HORIGUCHI  Satoshi NISHIKAWA  Ryota TAKEMURA  Masaharu NAKAJI  Atsushi SUGITATSU  

     
    PAPER

      Vol:
    E96-C No:7
      Page(s):
    981-988

    We have succeeded in demonstrating high-performance four-channel 25 Gb/s integrated receiver for 100 Gb/s Ethernet with a built-in spatial Demux optics and an integrated PD array. All components which configure to the Demux optics adhered to a prism. Because of the shaping accuracy for prism, the insertion loss was able to suppress to 0.8 dB with small size. The connection point of the package for high speed electrical signals was improved to decrease the transmission loss. The small size of 12 mm 17 mm 7 mm compact package with a side-wall electrical connector has been achieved, which is compatible with the assembly in CFP2 form-factor. We observed the sensitivity at average power of -12.1 dBm and the power penalty of sensitivity due to the crosstalk of less than 0.1 dB.

  • Maximum Multiflow in Wireless Network Coding

    Jinyi ZHOU  Shutao XIA  Yong JIANG  Haitao ZHENG  Laizhong CUI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E96-B No:7
      Page(s):
    1780-1790

    In a multihop wireless network, wireless interference is a crucial factor in the maximum multiflow (MMF) problem, which studies the maximum throughput between multiple pairs of sources and sinks with a link schedule to support it. In this paper, we observe that network coding could help to decrease the impact of wireless interference, and thus propose a framework to study the MMF problem for multihop wireless networks with network coding. Firstly, a network model is established to describe the new conflict relations and schedulability modified by network coding. Next, we formulate the MMF problem to compute the maximum throughput of multiple unicast flows supported by the multihop wireless network with network coding, and show that its capacity region could be enlarged by performing network coding. Finally, we show that determining the capacity region of a multihop wireless network with network coding is an NP-hard problem, and thus propose a greedy heuristic algorithm, called coding-first collecting (CFC), to determine a capacity subregion of the network. We also show that finding an optimal hyperarc schedule to meet a given link demand function is NP-hard, and propose a polynomial algorithm, called coding-first scheduling (CFS), to find an approximate fractional hyperarc schedule in the multihop wireless network with network coding. A numerical analysis of a grid wireless network and a random wireless network is presented to demonstrate the efficiencies of the CFC algorithm and the CFS algorithm based on the framework.

  • Time Zone Correlation Analysis of Malware/Bot Downloads

    Khamphao SISAAT  Hiroaki KIKUCHI  Shunji MATSUO  Masato TERADA  Masashi FUJIWARA  Surin KITTITORNKUN  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1753-1763

    A botnet attacks any Victim Hosts via the multiple Command and Control (C&C) Servers, which are controlled by a botmaster. This makes it more difficult to detect the botnet attacks and harder to trace the source country of the botmaster due to the lack of the logged data about the attacks. To locate the C&C Servers during malware/bot downloading phase, we have analyzed the source IP addresses of downloads to more than 90 independent Honeypots in Japan in the CCC (Cyber Clean Center) dataset 2010 comprising over 1 million data records and almost 1 thousand malware names. Based on GeoIP services, a Time Zone Correlation model has been proposed to determine the correlation coefficient between bot downloads from Japan and other source countries. We found a strong correlation between active malware/bot downloads and time zone of the C&C Servers. As a result, our model confirms that malware/bot downloads are synchronized with time zone (country) of the corresponding C&C Servers so that the botmaster can be possibly traced.

  • A Step Size Control Method Improving Estimation Speed in Double Talk Term

    Takuto YOSHIOKA  Kana YAMASAKI  Takuya SAWADA  Kensaku FUJII  Mitsuji MUNEYASU  Masakazu MORIMOTO  

     
    PAPER-Digital Signal Processing

      Vol:
    E96-A No:7
      Page(s):
    1543-1551

    In this paper, we propose a step size control method capable of quickly canceling acoustic echo even when double talk continues from the echo path change. This method controls the step size by substituting the norm of the difference vector between the coefficient vectors of a main adaptive filter (Main-ADF) and a sub-adaptive filter (Sub-ADF) for the estimation error provided by the former. Actually, the number of taps of Sub-ADF is limited to a quarter of that of Main-ADF, and the larger step size than that applied to Main-ADF is given to Sub-ADF; accordingly the norm of the difference vector quickly approximates to the estimation error. The estimation speed can be improved by utilizing the norm of the difference vector for the step size control in Main-ADF. We show using speech signals that in single talk the proposed method can provide almost the same estimation speed as the method whose step size is fixed at the optimum one and verify that even in double talk the estimation error, quickly decreases.

  • Managing Disconnected Mobile Nodes in a Delay Tolerant Network with HALF Routing Protocol

    Anika AZIZ  Md. Enamul HAQUE  Cristian BORCEA  Yasser Kamal HASSAN  Shigeki YAMADA  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1691-1705

    Delay and Disruption Tolerant Networks (DTN) can provide an underlying base to support mobility environments. DTN is equipped with advanced features such as custody transfer and hop by hop routing which can tackle the frequent disconnections of mobile devices by buffering bundles and dynamically making hop-by-hop routing decisions under intermittent connectivity environment. In this paper, we have proposed a DTN routing protocol HALF (Handoff-based And Limited Flooding) which can manage and improve performance of disrupted and challenging communication between mobile nodes in the presence of an infrastructure network consisting of fixed interconnected nodes (routers). HALF makes use of the general handoff mechanisms intended for the IP network, in a DTN way and also integrates a limited flooding technique to it. Simulation results show that HALF attains better performance than other existing DTN routing protocols under diverse network conditions. As the traffic intensity changes from low to high, delivery ratio of other DTN routing protocols decreased by 50% to 75% whereas in HALF such ratio is reduced by less than 5%. HALF can deliver about 3 times more messages than the other protocols when the disrupted network has to deal with larger size of messages. If we calculate the overhead ratio in terms of 'how many extra (successful) transfer' is needed for each delivery, HALF gives less than 20% overhead ratio while providing a good delivery ratio.

  • Low Complexity Image/Video Super Resolution Using Edge and Nonlocal Self-Similarity Constraint

    Zongliang GAN  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E96-D No:7
      Page(s):
    1569-1572

    In this letter, we present a fast image/video super resolution framework using edge and nonlocal constraint. The proposed method has three steps. First, we improve the initial estimation using content-adaptive bilateral filtering to strengthen edge. Second, the high resolution image is estimated by using classical back projection method. Third, we use joint content-adaptive nonlocal means filtering to get the final result, and self-similarity structures are obtained by the low resolution image. Furthermore, content-adaptive filtering and fast self-similarity search strategy can effectively reduce computation complexity. The experimental results show the proposed method has good performance with low complexity and can be used for real-time environment.

  • Ultra-High Extinction Ratio and Low Cross Talk Characteristics of 4-Array Integrated SOA Module with Novel Wavelength-Insensitive Parallel Optical Coupling Scheme

    Goji NAKAGAWA  Yutaka KAI  Kyosuke SONE  Setsuo YOSHIDA  Shinsuke TANAKA  Ken MORITO  Susumu KINOSHITA  

     
    PAPER

      Vol:
    E96-C No:7
      Page(s):
    1003-1011

    We have designed and fabricated a compact 4-array integrated SOA module using a novel parallel optical coupling scheme and polarization-insensitive built-in array isolators. We achieved ultra-high On/Off extinction ratio of more than 60 dB and low cross talk of better than -60 dB as well as high-isolation of over 47 dB in wide wavelength ranges. We also developed a wavelength-insensitive parallel optical coupling scheme and an efficient thermal dissipating structure for a 4-array SOA module. We applied these technologies into 4-array SOA module fabrication and demonstrated a uniform optical coupling with the loss variance of 1 dB over the 140-nm wavelength ranges. We also demonstrated simultaneous operation of 300 mA 4 channels with low thermal degradation of the module gain less than 1 dB.

  • Bidirectional Limited-Magnitude Error Correction Codes for Flash Memories

    Myeongwoon JEON  Jungwoo LEE  

     
    PAPER-Coding Theory

      Vol:
    E96-A No:7
      Page(s):
    1602-1608

    NAND multi-level cell (MLC) flash memories are widely used due to low cost and high capacity. However, the increased number of levels in MLC results in larger interference and errors. The errors in MLC flash memories tend to be directional and limited-magnitude. Many related works focus on asymmetric errors, but bidirectional errors also occur because of the bidirectional interference and the adjustment of the hard-decision reference voltages. To take advantage of the characteristics, we propose t bidirectional (lu,ld) limited-magnitude error correction codes, which can reduce errors more effectively. The proposed code is systematic, and can correct t bidirectional errors with upward and downward magnitude of lu and ld, respectively. The proposed method is advantageous in that the parity size is reduced, and it has lower bit error rate than conventional error correction codes with the same code rate.

  • Performance Enhanced Efficient Precoder Design with Power Allocation for Multiuser MIMO Downlinks

    Yuan CAO  Wei XU  Hideo NAKAMURA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:7
      Page(s):
    1962-1967

    This paper investigates a preprocessing technique for a multiuser MIMO downlink system. An efficient joint precoder design with adaptive power allocation is proposed by adopting the channel-diagonalization technique and the minimum mean square error (MMSE) criterion. By exploiting an MMSE-based decoder, we propose an iterative algorithm to design the precoder with further derived closed-form solutions for implementing adaptive power allocation. Simulation results verify the effectiveness of our proposed approach. Compared with conventional benchmark schemes, they show that our proposal matches the performance but with reduced computational complexity.

  • ASPnP: An Accurate and Scalable Solution to the Perspective-n-Point Problem

    Yinqiang ZHENG  Shigeki SUGIMOTO  Masatoshi OKUTOMI  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E96-D No:7
      Page(s):
    1525-1535

    We propose an accurate and scalable solution to the perspective-n-point problem, referred to as ASPnP. Our main idea is to estimate the orientation and position parameters by directly minimizing a properly defined algebraic error. By using a novel quaternion representation of the rotation, our solution is immune to any parametrization degeneracy. To obtain the global optimum, we use the Grobner basis technique to solve the polynomial system derived from the first-order optimality condition. The main advantages of our proposed solution lie in accuracy and scalability. Extensive experiment results, with both synthetic and real data, demonstrate that our proposed solution has better accuracy than the state-of-the-art noniterative solutions. More importantly, by exploiting vectorization operations, the computational cost of our ASPnP solution is almost constant, independent of the number of point correspondences n in the wide range from 4 to 1000. In our experiment settings, the ASPnP solution takes about 4 milliseconds, thus best suited for real-time applications with a drastically varying number of 3D-to-2D point correspondences.

5841-5860hit(20498hit)