The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

9001-9020hit(20498hit)

  • Performance Evaluation of Symbol-Wise XOR Based Bi-directional Relaying

    Jianming WU  Shunji MIYAZAKI  Kazuhisa OHBUCHI  Tomohiko TANIGUCHI  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1796-1807

    In this paper, we investigate the system performance of decode and forward based bi-directional relaying based on symbol-wise XOR operation. This technique gives more freedom in selecting the modulation and coding scheme at relay stations, and significantly relaxes the transmission bottleneck. However, the performance degradation occurs when the modulation orders of both links differ from each other. To mitigate such an impact, we exploit a repetition coding scheme in conjunction with a redundant modulation code scheme by overlapping MCS levels. To this end, a system level simulation proves that the proposed scheme achieves about 43% capacity gain over bit-wise XOR based bi-directional relaying and gives additional 10% gain over symbol-wise XOR based bi-directional relaying.

  • High-Speed Photonic Functional Circuits Using Electrically Controllable PLZT Waveguides

    Jiro ITO  Mitsuhiro YASUMOTO  Keiichi NASHIMOTO  Hiroyuki TSUDA  

     
    PAPER-Optoelectronics

      Vol:
    E92-C No:5
      Page(s):
    713-718

    We fabricated a high-speed wavelength tunable arrayed-waveguide grating (AWG) and an AWG integrated with optical switches using (Pb,La)(Zr,Ti)O3-(PLZT). PLZT has a high electro-optic (EO) coefficient, which means these devices have considerable potential for use in reconfigurable optical add drop multiplexers (ROADMs). The PLZT waveguides in this work have a rib waveguide structure with an effective relative index difference (Δ) of 0.65%. Both AWGs have 8 channels with a frequency spacing of 500 GHz. The fabricated wavelength tunable AWGs allows us to freely shift the output at a particular wavelength to an arbitrary port by applying voltages to 3 mm long electrodes formed on each of the waveguides. We confirmed that the maximum tuning range with driving voltage of 22 V was approximately 32 nm at 1.55 µm. With the integrated 8-ch PLZT waveguide switch array, we could also select the output port by setting the drive voltage applied to the switch array. 2 2 directional coupler switches were used for the switch array. The two devices exhibited insertion losses of 17 dB and 19 dB, adjacent crosstalk of -18.5 dB and -19.7 dB, and a maximum extinction ratio of 19.6 dB and 12.6 dB, respectively. The tuning speed of both devices was 15 ns and their physical sizes were 9.0 23.0 mm and 8.0 29.5 mm, respectively.

  • Quantum Random Access Coding

    Harumichi NISHIMURA  Rudy RAYMOND  

     
    INVITED PAPER

      Vol:
    E92-A No:5
      Page(s):
    1268-1275

    Quantum random access coding (QRAC) is one of the basic tools in quantum computing. It uses a quantum state for encoding the sender's bit string so that the receiver can recover any single bit of the bit string with high probability. This article surveys recent developments of QRAC, with some concrete examples of QRAC using one quantum bit, and its applications, focusing on communication complexity and locally decodable codes.

  • From Bell Inequalities to Tsirelson's Theorem

    David AVIS  Sonoko MORIYAMA  Masaki OWARI  

     
    INVITED PAPER

      Vol:
    E92-A No:5
      Page(s):
    1254-1267

    The first part of this paper contains an introduction to Bell inequalities and Tsirelson's theorem for the non-specialist. The next part gives an explicit optimum construction for the "hard" part of Tsirelson's theorem. In the final part we describe how upper bounds on the maximal quantum violation of Bell inequalities can be obtained by an extension of Tsirelson's theorem, and survey very recent results on how exact bounds may be obtained by solving an infinite series of semidefinite programs.

  • A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies

    Ping DU  Shunji ABE  Yusheng JI  Seisho SATO  Makio ISHIGURO  

     
    PAPER-Internet Security

      Vol:
    E92-D No:5
      Page(s):
    929-936

    Traffic volume anomalies refer to apparently abrupt changes in the time series of traffic volume, which can propagate through the network. Detecting and tracing these anomalies is a critical and difficult task for network operators. In this paper, we first propose a traffic decomposition method, which decomposes the traffic into three components: the trend component, the autoregressive (AR) component, and the noise component. A traffic volume anomaly is detected when the AR component is outside the prediction band for multiple links simultaneously. Then, the anomaly is traced using the projection of the detection result matrices for the observed links which are selected by a shortest-path-first algorithm. Finally, we validate our detection and tracing method by using the real traffic data from the third-generation Science Information Network (SINET3) and show the detected and traced results.

  • Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Katsunari YOSHIOKA  Daisuke INOUE  Masashi ETO  Yuji HOSHIZAWA  Hiroki NOGAWA  Koji NAKAO  

     
    PAPER-Malware Detection

      Vol:
    E92-D No:5
      Page(s):
    955-966

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  • Pre- and Post-Conditions Expressed in Variants of the Modal µ-Calculus

    Yoshinori TANABE  Toshifusa SEKIZAWA  Yoshifumi YUASA  Koichi TAKAHASHI  

     
    PAPER-Foundation

      Vol:
    E92-D No:5
      Page(s):
    995-1002

    Properties of Kripke structures can be expressed by formulas of the modal µ-calculus. Despite its strong expressive power, the validity problem of the modal µ-calculus is decidable, and so are some of its variants enriched by inverse programs, graded modalities, and nominals. In this study, we show that the pre- and post-conditions of transformations of Kripke structures, such as addition/deletion of states and edges, can be expressed using variants of the modal µ-calculus. Combined with decision procedures we have developed for those variants, the properties of sequences of transformations on Kripke structures can be deduced. We show that these techniques can be used to verify the properties of pointer-manipulating programs.

  • Results of Linear Cryptanalysis Using Linear Sieve Methods

    Yukiyasu TSUNOO  Hiroki NAKASHIMA  Hiroyasu KUBO  Teruo SAITO  Takeshi KAWABATA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E92-A No:5
      Page(s):
    1347-1355

    Linear cryptanalysis using sieve methods is a technique proposed by Takeda et al. in 1998 as an attack capable of breaking ciphers with smaller amounts of data than linear cryptanalysis (LC) by using data that satisfies linear sieve conditions. This paper shows that when considering the amount of data required for cryptanalysis in Takeda et al.'s proposed sieved linear cryptanalysis (S-LC), it is necessary to take into account the independence of keys relating to the linear mask (Linear key) and keys relating to the linear sieve mask (Sieve key) in rounds that are affected by these keys. If p is the probability that the linear approximate expression holds and p* is the probability after applying the linear sieve, then it has been shown that when the Linear keys are independent of the Sieve keys, then it is necessary to select the linear mask and linear sieve mask so that a larger value of p*-p is obtained. It is also shown that the amount of data needed for S-LC cannot be reduced below the amount of data needed for LC when the Linear key and Sieve key are not independent. In fixed sieve linear cryptanalysis, it is shown that the amount of data needed for cryptanalysis cannot be reduced regardless of the independence of the Linear key and Sieve key.

  • Generating Test Cases for Invariant Properties from Proof Scores in the OTS/CafeOBJ Method

    Masaki NAKAMURA  Takahiro SEINO  

     
    PAPER-Software Testing

      Vol:
    E92-D No:5
      Page(s):
    1012-1021

    In the OTS/CafeOBJ method, software specifications are described in CafeOBJ executable formal specification language, and verification is done by giving scripts to the CafeOBJ system. The script is called a proof score. In this study, we propose a test case generator from an OTS/CafeOBJ specification together with a proof score. Our test case generator gives test cases by analyzing the proof score. The test cases are used to test whether an implementation satisfies the specification and the property verified by the proof score. Since a proof score involves important information for verifying a property, the generated test cases are also expected to be suitable to test the property.

  • Joint Frequency-Domain Equalization and Despreading for Multi-Code DS-CDMA Using Cyclic Delay Transmit Diversity

    Tetsuya YAMAMOTO  Kazuki TAKEDA  Fumiyuki ADACHI  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1563-1572

    Frequency-domain equalization (FDE) based on the minimum mean square error (MMSE) criterion can provide a better bit error rate (BER) performance than rake combining. To further improve the BER performance, cyclic delay transmit diversity (CDTD) can be used. CDTD simultaneously transmits the same signal from different antennas after adding different cyclic delays to increase the number of equivalent propagation paths. Although a joint use of CDTD and MMSE-FDE for direct sequence code division multiple access (DS-CDMA) achieves larger frequency diversity gain, the BER performance improvement is limited by the residual inter-chip interference (ICI) after FDE. In this paper, we propose joint FDE and despreading for DS-CDMA using CDTD. Equalization and despreading are simultaneously performed in the frequency-domain to suppress the residual ICI after FDE. A theoretical conditional BER analysis is presented for the given channel condition. The BER analysis is confirmed by computer simulation.

  • Comparison of the Expressive Power of Language-Based Access Control Models

    Yoshiaki TAKATA  Hiroyuki SEKI  

     
    LETTER

      Vol:
    E92-D No:5
      Page(s):
    1033-1036

    This paper compares the expressive power of five language-based access control models. We show that the expressive powers are incomparable between any pair of history-based access control, regular stack inspection and shallow history automata. Based on these results, we introduce an extension of HBAC, of which expressive power exceeds that of regular stack inspection.

  • Access Probability Aware Cell Reselection for 3G Evolution

    Mingju LI  Lei DU  Lan CHEN  

     
    LETTER

      Vol:
    E92-B No:5
      Page(s):
    1825-1827

    In LTE, AC barring check is performed before RRC connection. In some cells with a low access probability, the UEs keep retrying access which results in higher connection failure and longer access delay. We therefore propose balancing the UEs by adjusting the cell reselection criteria based on the access probability, so that the UEs shall be more encouraged to reselect a cell with a higher access probability.

  • Salient Edge Detection in Natural Images

    Yihang BO  Siwei LUO  Qi ZOU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E92-D No:5
      Page(s):
    1209-1212

    Salient edge detection which is mentioned less frequently than salient point detection is another important cue for subsequent processing in computer vision. How to find the salient edges in natural images is not an easy work. This paper proposes a simple method for salient edge detection which preserves the edges with more salient points on the boundaries and cancels the less salient ones or noise edges in natural images. According to the Gestalt Principles of past experience and entirety, we should not detect the whole edges in natural images. Only salient ones can be an advantageous tool for the following step just like object tracking, image segmentation or contour detection. Salient edges can also enhance the efficiency of computing and save the space of storage. The experiments show the promising results.

  • 3-Dimensional Terraced NAND (3D TNAND) Flash Memory-Stacked Version of Folded NAND Array

    Yoon KIM  Seongjae CHO  Gil Sung LEE  Il Han PARK  Jong Duk LEE  Hyungcheol SHIN  Byung-Gook PARK  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    653-658

    We propose a 3-dimensional terraced NAND flash memory. It has a vertical channel so it is possible to make a long enough channel in 1F2 size. And it has 3-dimensional structure whose channel is connected vertically along with two stairs. So we can obtain high density as in the stacked array structure, without silicon stacking process. We can make NAND flash memory with 3F2 cell size. Using SILVACO ATLAS simulation, we study terraced NAND flash memory characteristics such as program, erase, and read. Also, its fabrication method is proposed.

  • Comparisons between Common and Dedicated Reference Signals for MIMO Multiplexing Using Precoding in Evolved UTRA Downlink

    Hidekazu TAOKA  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  Mamoru SAWAHASHI  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1669-1679

    This paper presents comparisons between common and dedicated reference signals (RSs) for channel estimation in MIMO multiplexing using codebook-based precoding for orthogonal frequency division multiplexing (OFDM) radio access in the Evolved UTRA downlink with frequency division duplexing (FDD). We clarify the best RS structure for precoding-based MIMO multiplexing based on comparisons of the structures in terms of the achievable throughput taking into account the overhead of the common and dedicated RSs and the precoding matrix indication (PMI) signal. Based on extensive simulations on the throughput in 2-by-2 and 4-by-4 MIMO multiplexing with precoding, we clarify that channel estimation based on common RSs multiplied with the precoding matrix indicated by the PMI signal achieves higher throughput compared to that using dedicated RSs irrespective of the number of spatial multiplexing streams when the number of available precoding matrices, i.e., the codebook size, is less than approximately 16 and 32 for 2-by-2 and 4-by-4 MIMO multiplexing, respectively.

  • Word-Level Equivalence Checking in Bit-Level Accuracy by Synthesizing Designs onto Identical Datapath

    Tasuku NISHIHARA  Takeshi MATSUMOTO  Masahiro FUJITA  

     
    PAPER-Hardware Verification

      Vol:
    E92-D No:5
      Page(s):
    972-984

    Equivalence checking is one of the most important issues in VLSI design to guarantee that bugs do not enter designs during optimization steps or synthesis steps. In this paper, we propose a new word-level equivalence checking method between two models before and after high-level synthesis or behavioral optimization. Our method converts two given designs into RTL models which have same datapaths so that behaviors by identical control signals become the same in the two designs. Also, functional units become common to the two designs. Then word-level equivalence checking techniques can be applied in bit-level accuracy. In addition, we propose a rule-based equivalence checking method which can verify designs which have complicated control structures faster than existing symbolic simulation based methods. Experimental results with realistic examples show that our method can verify such designs in practical periods.

  • Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs

    Shuhui HOU  Tetsutaro UEHARA  Takashi SATOH  Yoshitaka MORIMURA  Michihiko MINOH  

     
    PAPER-Contents Protection

      Vol:
    E92-D No:5
      Page(s):
    876-887

    In recent years, with the rapid growth of the Internet as well as the increasing demand for broadband services, live pay-television broadcasting via the Internet has become a promising business. To get this implemented, it is necessary to protect distributed contents from illegal copying and redistributing after they are accessed. Fingerprinting system is a useful tool for it. This paper shows that the anti-collusion code has advantages over other existing fingerprinting codes in terms of efficiency and effectivity for live pay-television broadcasting. Next, this paper presents how to achieve efficient and effective anti-collusion codes based on unital and affine plane, which are two known examples of balanced incomplete block design (BIBD). Meanwhile, performance evaluations of anti-collusion codes generated from unital and affine plane are conducted. Their practical explicit constructions are given last.

  • A Novel Cooperative Relaying Network Scheme with Inter-Relay Data Exchange

    Salma Ait FARES  Fumiyuki ADACHI  Eisuke KUDOH  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1786-1795

    In this paper, we propose a novel scheme of cooperative relaying network based on data exchange between relays before forwarding their received data to destination. This inter-relay data exchange step is done during an additional middle-slot in order to enhance the transmit signals from relays to the destination under low transmit power condition. To reduce the propagation errors between relays as well as the required transmit power during this data exchange, only the relay possessing the highest SNR is engaged into exchanging data by forwarding its received signal to the other relays. As for the remaining non-selected relays, i.e. with low SNR, the transmitted signal is estimated by using both signals received separately at different time slots (i.e., 1st and 2nd slot) from source and the 'best' selected relay, respectively, emulating virtual antenna array where appropriate weights for the antenna array are developed. In addition, we investigate distributed transmit beamforming and maximum ratio combining at the relays and the destination, respectively, to combine coherently the received signals. At the relay optimal location and for low SNR condition, the proposed method has significant better outage behavior and average throughput than conventional methods using one or two time slots for transmission.

  • Teletraffic Analysis of Direct Communication with Clustering

    Janne LEHTOMAKI  Isameldin SULIMAN  Kenta UMEBAYASHI  Yasuo SUZUKI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E92-A No:5
      Page(s):
    1356-1362

    In direct communication, terminals that are close to each other can communicate directly without traffic going through centralized controller such as a base station (BS). This brings several advantages. We study direct communication with localized distribution, so that users tend to gather around some areas (clusters/hot-spots) within the cell such as buildings. Previous analysis about clustering has focused on one dimensional scenarios. Here we present theoretical analysis of direct communication with two dimensional clustering. Additional analysis is presented for direct communication with correlated clusters. With correlated clusters some pairs of source and destination clusters are more probable than other pairs. According to our best knowledge, this is the first time that theoretical analysis is presented about clustering and correlated clusters in two dimensional scenarios. Simulations confirm the validity of the analysis. In addition to the exact results, we also suggest using the point-based approximation to rapidly and easily obtain results. The numerical results show that the gains from direct communication, in terms of blocking probability and carried traffic, depend on the offered traffic. Additionally, correlation in cluster selection is shown to significantly improve performance. Point-based approximation is shown to be very useful when the number of clusters is large.

  • A Trade-off Traitor Tracing Scheme

    Go OHTAKE  Kazuto OGAWA  Goichiro HANAOKA  Hideki IMAI  

     
    PAPER-Contents Protection

      Vol:
    E92-D No:5
      Page(s):
    859-875

    There has been a wide-ranging discussion on the issue of content copyright protection in digital content distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of content redistribution. Therefore, it cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that provides the advantages of dynamic traitor tracing schemes and also overcomes their problems.

9001-9020hit(20498hit)