The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

6601-6620hit(20498hit)

  • Symbol-Spaced Turbo Frequency Domain Equalization for Precoded Continuous Phase Modulation

    Qing YAN  Qiang LI  Sheng LUO  Shaoqian LI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:6
      Page(s):
    2065-2073

    In this paper, a low-complexity symbol-spaced turbo frequency domain equalization (FDE) algorithm based on Laurent decomposition is proposed for precoded binary continuous phase modulation (CPM) with modulation index h=1/2. At the transmitter, a precoder is utilized to eliminate the inherent memory of the CPM signal. At the receiver, a matched filter based on Laurent decomposition is utilized to make the detection symbol-spaced. As a result, the symbol-spaced iteration can be taken between the equalizer and the decoder directly without a CPM demodulator, and we derive a symbol-spaced soft interference cancellation frequency domain equalization (SSIC-FDE) algorithm for binary CPM with h=1/2. A new data block structure for FDE of partial response CPM is also presented. The computational complexity analysis and simulations show that this approach provides a complexity reduction and an impressive performance improvement over previously proposed turbo FDE algorithm for binary CPM with h=1/2 in multi-path fading channels.

  • Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme

    Ying SUN  Yong YU  Yi MU  

     
    LETTER-Information Network

      Vol:
    E95-D No:6
      Page(s):
    1690-1693

    Hu, Huang and Fan proposed a fully secure hierarchical identity-based encryption (IEICE Trans. Fundamentals, Vol.E92-A, No.6, pp.1494–1499, 2009) that achieves constant size of ciphertext and tight security reduction. Unfortunately, Park and Lee (IEICE Trans. Fundamentals, Vol.E93-A, No.6, pp.1269–1272, 2010) found that the security proof of Hu et al.'s scheme is incorrect; that is, the security of Hu et al.'s scheme cannot be reduced to their claimed q-ABDHE assumption. However, it is unclear whether Hu et al.'s scheme is still secure. In this letter, we provide an attack to show that the scheme is not secure against the chosen-plaintext attack.

  • Long-Range Asynchronous On-Chip Link Based on Multiple-Valued Single-Track Signaling

    Naoya ONIZAWA  Atsushi MATSUMOTO  Takahiro HANYU  

     
    PAPER-Circuit Theory

      Vol:
    E95-A No:6
      Page(s):
    1018-1029

    We have developed a long-range asynchronous on-chip data-transmission link based on multiple-valued single-track signaling for a highly reliable asynchronous Network-on-Chip. In the proposed signaling, 1-bit data with control information is represented by using a one-digit multi-level signal, so serial data can be transmitted asynchronously using only a single wire. The small number of wires alleviates the routing complexity of wiring long-range interconnects. The use of current-mode signaling makes it possible to transmit data at high speed without buffers or repeaters over a long interconnect wire because of the low-voltage swing of signaling, and it leads to low-latency data transmission. We achieve a latency of 0.45 ns, a throughput of 1.25 Gbps, and energy dissipation of 0.58 pJ/bit with a 10-mm interconnect wire under a 0.13 µm CMOS technology. This represents an 85% decrease in latency, a 150% increase in throughput, and a 90% decrease in energy dissipation compared to a conventional serial asynchronous data-transmission link.

  • 100–1000 MHz Programmable Continuous-Time Filter with Auto-Tuning Schemes and Digital Calibration Sequences for HDD Read Channels

    Takahide TERADA  Koji NASU  Taizo YAMAWAKI  Masaru KOKUBO  

     
    PAPER

      Vol:
    E95-C No:6
      Page(s):
    1050-1058

    A 4th-order programmable continuous-time filter (CTF) for hard-disk-drive (HDD) read channels was developed with 65-nm CMOS process technology. The CTF cutoff frequency and boost are programmable by switching units of the operational trans-conductance amplifier (OTA) banks and the capacitor banks. The switches are operated by lifted local-supply voltage to reduce on-resistance of the transistors. The CTF characteristics were robust against process technology variations and supply voltage and temperature ranges due to the introduction of a digitally assisted compensation scheme with analog auto-tuning circuits and digital calibration sequences. The digital calibration sequences, which fit into the operation sequence of the HDD read channel, compensate for the tuning circuits of the process technology variations, and the tuning circuits compensate for the CTF characteristics over the supply voltage and temperature ranges. As a result, the CTF had a programmability of 100–1000-MHz cutoff frequency and 0–12-dB boost.

  • Virtual Network Configuration Management System for Data Center Operations and Management

    Hideki OKITA  Masahiro YOSHIZAWA  Keitaro UEHARA  Kazuhiko MIZUNO  Toshiaki TARUI  Ken NAONO  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1924-1933

    Virtualization technologies are widely deployed in data centers to improve system utilization. However, they increase the workload for operators, who have to manage the structure of virtual networks in data centers. A virtual-network management system which automates the integration of the configurations of the virtual networks is provided. The proposed system collects the configurations from server virtualization platforms and VLAN-supported switches, and integrates these configurations according to a newly developed XML-based management information model for virtual-network configurations. Preliminary evaluations show that the proposed system helps operators by reducing the time to acquire the configurations from devices and correct the inconsistency of operators' configuration management database by about 40 percent. Further, they also show that the proposed system has excellent scalability; the system takes less than 20 minutes to acquire the virtual-network configurations from a large scale network that includes 300 virtual machines. These results imply that the proposed system is effective for improving the configuration management process for virtual networks in data centers.

  • Estimation of Sea Wave Heights by Two-Frequency Cross-Correlation Function of Reflected Signals of a Spaceborne Radar Altimeter with Nadir Synthesis of Antenna Aperture

    Min-Ho KA  Aleksandr I. BASKAKOV  Vladimir A. TEREKHOV  

     
    PAPER-Sensing

      Vol:
    E95-B No:6
      Page(s):
    2095-2100

    In the work we introduce novel approach to remote sensing from space for the estimation of sea wave heights with a spaceborne high precision two-frequency radar altimeter with nadir synthesis antenna aperture. Experiments show considerable reduction of the decorrelation factor of the correlation coefficient and so significant enhancement of the sensitivity of the altimeter for the estimation for the sea wave status.

  • Inertial Estimator Learning Automata

    Junqi ZHANG  Lina NI  Chen XIE  Shangce GAO  Zheng TANG  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E95-A No:6
      Page(s):
    1041-1048

    This paper presents an inertial estimator learning automata scheme by which both the short-term and long-term perspectives of the environment can be incorporated in the stochastic estimator – the long term information crystallized in terms of the running reward-probability estimates, and the short term information used by considering whether the most recent response was a reward or a penalty. Thus, when the short-term perspective is considered, the stochastic estimator becomes pertinent in the context of the estimator algorithms. The proposed automata employ an inertial weight estimator as the short-term perspective to achieve a rapid and accurate convergence when operating in stationary random environments. According to the proposed inertial estimator scheme, the estimates of the reward probabilities of actions are affected by the last response from environment. In this way, actions that have gotten the positive response from environment in the short time, have the opportunity to be estimated as “optimal”, to increase their choice probability and consequently, to be selected. The estimates become more reliable and consequently, the automaton rapidly and accurately converges to the optimal action. The asymptotic behavior of the proposed scheme is analyzed and it is proved to be ε-optimal in every stationary random environment. Extensive simulation results indicate that the proposed algorithm converges faster than the traditional stochastic-estimator-based S ERI scheme, and the deterministic-estimator-based DGPA and DPRI schemes when operating in stationary random environments.

  • Malfunction Issue of SiC-SIT Based DC Circuit Breaker in 400 V DC Power Distribution Systems for Data Centers

    Seiya ABE  Sihun YANG  Masahito SHOYAMA  Tamotsu NINOMIYA  Akira MATSUMOTO  Akiyoshi FUKUI  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E95-B No:6
      Page(s):
    1990-1996

    400 V DC power distribution systems for data centers require a fast response DC circuit breaker is required. The semiconductor DC circuit breaker is an important key technology in DC power distribution systems. This paper considers the malfunction of Silicon Carbide- Static Induction Transistor (SiC-SIT) based DC circuit breakers in 400 V DC power distribution systems for data centers. The malfunction mechanism is explained, and a solution is proposed. Investigations are achieved by MATLAB/Simulink and experimental verification.

  • Extended Darknet: Multi-Dimensional Internet Threat Monitoring System

    Akihiro SHIMODA  Tatsuya MORI  Shigeki GOTO  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1915-1923

    Internet threats caused by botnets/worms are one of the most important security issues to be addressed. Darknet, also called a dark IP address space, is one of the best solutions for monitoring anomalous packets sent by malicious software. However, since darknet is deployed only on an inactive IP address space, it is an inefficient way for monitoring a working network that has a considerable number of active IP addresses. The present paper addresses this problem. We propose a scalable, light-weight malicious packet monitoring system based on a multi-dimensional IP/port analysis. Our system significantly extends the monitoring scope of darknet. In order to extend the capacity of darknet, our approach leverages the active IP address space without affecting legitimate traffic. Multi-dimensional monitoring enables the monitoring of TCP ports with firewalls enabled on each of the IP addresses. We focus on delays of TCP syn/ack responses in the traffic. We locate syn/ack delayed packets and forward them to sensors or honeypots for further analysis. We also propose a policy-based flow classification and forwarding mechanism and develop a prototype of a monitoring system that implements our proposed architecture. We deploy our system on a campus network and perform several experiments for the evaluation of our system. We verify that our system can cover 89% of the IP addresses while darknet-based monitoring only covers 46%. On our campus network, our system monitors twice as many IP addresses as darknet.

  • Computationally Efficient ML Soft Decision Calculation for MIMO Systems with Two Spatial Streams

    Jaekwon KIM  Tae-Ho IM  Yong-Soo CHO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:6
      Page(s):
    2153-2156

    In this letter, we propose a computationally efficient maximum likelihood log-likelihood ratio (LLR) calculation method for multiple input multiple output (MIMO) systems with two spatial streams.

  • On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme

    Eun-Jun YOON  Kee-Young YOO  

     
    LETTER-Information Network

      Vol:
    E95-D No:6
      Page(s):
    1684-1686

    In 2009, Wang et al. proposed an efficient and secure dynamic ID-based remote user authentication scheme based on the one-way secure hash function. This letter demonstrates that Wang et al.'s scheme is still vulnerable to impersonation attacks.

  • Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications

    Eun-Jun YOON  Kee-Young YOO  

     
    LETTER-Information Network

      Vol:
    E95-D No:6
      Page(s):
    1687-1689

    A user identity anonymity is an important property for roaming services. In 2011, Kang et al. proposed an improved user authentication scheme that guarantees user anonymity in wireless communications. This letter shows that Kang et al.'s improved scheme still cannot provide user anonymity as they claimed.

  • An Adaptive Multi-Range-Sensing Method for 3D Localization of Passive RFID Tags

    Tomotaka WADA  Toshihiro HORI  Manato FUJIMOTO  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E95-A No:6
      Page(s):
    1074-1083

    The RFID tag system has received a lot of attention for ubiquitous computing. An RFID tag is attached to an object. With the unique ID of the RFID tag, a user identifies the object provided with the RFID tag and derives appropriate information about the object. One important application in the RFID technology is localizing RFID tags, which can be very useful in acquiring the position information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for mobile robots. This paper proposes a new adaptive multi-range-sensing method for 3D localization of passive RFID tags by using a probabilistic approach. In this method, a mobile object (human, robot, etc.) with an RFID reader estimates the positions of RFID tags with multiple communication ranges dynamically. The effectiveness of the proposed method was demonstrated in experiments.

  • Hand-Shape Recognition Using the Distributions of Multi-Viewpoint Image Sets

    Yasuhiro OHKAWA  Kazuhiro FUKUI  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E95-D No:6
      Page(s):
    1619-1627

    This paper proposes a method for recognizing hand-shapes by using multi-viewpoint image sets. The recognition of a hand-shape is a difficult problem, as appearance of the hand changes largely depending on viewpoint, illumination conditions and individual characteristics. To overcome this problem, we apply the Kernel Orthogonal Mutual Subspace Method (KOMSM) to shift-invariance features obtained from multi-viewpoint images of a hand. When applying KOMSM to hand recognition with a lot of learning images from each class, it is necessary to consider how to run the KOMSM with heavy computational cost due to the kernel trick technique. We propose a new method that can drastically reduce the computational cost of KOMSM by adopting centroids and the number of images belonging to the centroids, which are obtained by using k-means clustering. The validity of the proposed method is demonstrated through evaluation experiments using multi-viewpoint image sets of 30 classes of hand-shapes.

  • Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy

    Mingfu XUE  Aiqun HU  Chunlong HE  

     
    LETTER-Dependable Computing

      Vol:
    E95-D No:6
      Page(s):
    1694-1697

    We propose a new security model based on MLS Policy to achieve a better security performance on confidentiality, integrity and availability. First, it realizes a combination of BLP model and Biba model through a two-dimensional independent adjustment of integrity and confidentiality. And, the subject's access range is adjusted dynamically according to the security label of related objects and the subject's access history. Second, the security level of the trusted subject is extended to writing and reading privilege range respectively, following the principle of least privilege. Third, it adjusts the objects' security levels after adding confidential information to prevent the information disclosure. Fourth, it uses application-oriented logic to protect specific applications to avoid the degradation of security levels. Thus, it can ensure certain applications operate smoothly. Lastly, examples are presented to show the effectiveness and usability of the proposed model.

  • Over-The-Air Measurements of Small Radio Terminals Using Spheroidal Coupler

    Tasuku TESHIROGI  Takashi KAWAMURA  Aya YAMAMOTO  Toru SAKUMA  Yasuhiko NAGO  Shigenori MATTORI  

     
    PAPER-Antennas and Propagation

      Vol:
    E95-B No:6
      Page(s):
    2043-2050

    We propose a novel method for measuring the matched total radiated power (TRP) and matched total radiated sensitivity (TRS) of small radio terminals, called over-the-air (OTA) measurement, using a spheroidal coupler (SC). To measure these parameters accurately in a multiple-reflection environment, such as in an SC, we developed two key techniques, i.e. displacement method and reflection compensation method, and verified their effectiveness by several simulations and fundamental experiments on a test transmitter. We also describe an absolute method for measuring antenna radiation efficiency using the displacement method. Furthermore, we describe TRP and TRS measurements for actual UMTS (Universal Mobile Telecommunications System) terminals, and verify that the proposed method achieves quick measurements with good accuracy. The SC provides a compact, low-cost OTA measurement system with high sensitivity and high speed.

  • Gaze Estimation Method Involving Corneal Reflection-Based Modeling of the Eye as a General Surface of Revolution about the Optical Axis of the Eye

    Takashi NAGAMATSU  Yukina IWAMOTO  Ryuichi SUGANO  Junzo KAMAHARA  Naoki TANAKA  Michiya YAMAMOTO  

     
    PAPER-Multimedia Pattern Processing

      Vol:
    E95-D No:6
      Page(s):
    1656-1667

    We have proposed a novel geometric model of the eye in order to avoid the problems faced while using the conventional spherical model of the cornea for three dimensional (3D) model-based gaze estimation. The proposed model models the eye, including the boundary region of the cornea, as a general surface of revolution about the optical axis of the eye. Furthermore, a method for calculating the point of gaze (POG) on the basis of our model has been proposed. A prototype system for estimating the POG was developed using this method. The average root mean square errors (RMSEs) of the proposed method were experimentally found to be smaller than those of the gaze estimation method that is based on a spherical model of the cornea.

  • On Approximating a Multicast Routing Tree with Multiple Quality-of-Service Constraints

    Jun HUANG  Yoshiaki TANAKA  Yan MA  

     
    PAPER-Network

      Vol:
    E95-B No:6
      Page(s):
    2005-2012

    Multicast routing with Quality-of-Service (QoS) guarantees is the key to efficient content distribution and sharing. Developing QoS-aware multicast routing algorithm is an important open topic. This paper investigates QoS-aware multicast routing problem with K constraints where K > 2. The contributions made in this paper include a heuristic that employs the concept of nonlinear combination to extend the existing well-known algorithm for fast computation of a QoS multicast tree, and a Fully Polynomial Time Approximation Scheme (FPTAS) to approximate a multicast routing tree with QoS guarantees. The theoretical analyses and simulations conducted on both algorithms show that the algorithms developed in this paper are general and flexible, thus are applicable to the various networking systems.

  • A New Cloud Architecture of Virtual Trusted Platform Modules

    Dongxi LIU  Jack LEE  Julian JANG  Surya NEPAL  John ZIC  

     
    PAPER-Information Network

      Vol:
    E95-D No:6
      Page(s):
    1577-1589

    We propose and implement a cloud architecture of virtual Trusted Platform Modules (TPMs) to improve the usability of TPMs. In this architecture, virtual TPMs can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have physical TPMs in their local platforms. Moreover, the TPM cloud allows users to access their keys and data in the same virtual TPM even if they move to untrusted platforms. The TPM cloud is easy to access for applications in different languages since cloud computing delivers services in standard protocols. The functionality of the TPM cloud is demonstrated by applying it to implement the Needham-Schroeder public-key protocol for web authentications, such that the strong security provided by TPMs is integrated into high level applications. The chain of trust based on the TPM cloud is discussed and the security properties of the virtual TPMs in the cloud is analyzed.

  • Noise Robust Feature Scheme for Automatic Speech Recognition Based on Auditory Perceptual Mechanisms

    Shang CAI  Yeming XIAO  Jielin PAN  Qingwei ZHAO  Yonghong YAN  

     
    PAPER-Speech and Hearing

      Vol:
    E95-D No:6
      Page(s):
    1610-1618

    Mel Frequency Cepstral Coefficients (MFCC) are the most popular acoustic features used in automatic speech recognition (ASR), mainly because the coefficients capture the most useful information of the speech and fit well with the assumptions used in hidden Markov models. As is well known, MFCCs already employ several principles which have known counterparts in the peripheral properties of human hearing: decoupling across frequency, mel-warping of the frequency axis, log-compression of energy, etc. It is natural to introduce more mechanisms in the auditory periphery to improve the noise robustness of MFCC. In this paper, a k-nearest neighbors based frequency masking filter is proposed to reduce the audibility of spectra valleys which are sensitive to noise. Besides, Moore and Glasberg's critical band equivalent rectangular bandwidth (ERB) expression is utilized to determine the filter bandwidth. Furthermore, a new bandpass infinite impulse response (IIR) filter is proposed to imitate the temporal masking phenomenon of the human auditory system. These three auditory perceptual mechanisms are combined with the standard MFCC algorithm in order to investigate their effects on ASR performance, and a revised MFCC extraction scheme is presented. Recognition performances with the standard MFCC, RASTA perceptual linear prediction (RASTA-PLP) and the proposed feature extraction scheme are evaluated on a medium-vocabulary isolated-word recognition task and a more complex large vocabulary continuous speech recognition (LVCSR) task. Experimental results show that consistent robustness against background noise is achieved on these two tasks, and the proposed method outperforms both the standard MFCC and RASTA-PLP.

6601-6620hit(20498hit)