The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CHAIN(220hit)

161-180hit(220hit)

  • Non-saturated Throughput Analysis of IEEE 802.11 Ad Hoc Networks

    Changchun XU  Zongkai YANG  

     
    LETTER

      Vol:
    E89-D No:5
      Page(s):
    1676-1678

    This letter presents a simple but accurate analytical model to evaluate the throughput of IEEE 802.11 distributed coordination function in non-saturated conditions. The influence of offered load on the throughput of both basic and RTS/CTS access mechanisms are analyzed and compared. It's shown that basic access scheme can achieve the same maximal throughput as that of RTS/CTS mechanism in non-saturated conditions while the latter is robust to the number of contending stations compared to basic mechanism. The analytical results are validated by extensive simulations.

  • Study of Medium Access Delay in IEEE 802.11 Wireless Networks

    Liang ZHANG  Yantai SHU  Oliver YANG  Guanghong WANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:4
      Page(s):
    1284-1293

    With the rising popularity of delay-sensitive real-time multimedia applications (video, voice, and data) in IEEE 802.11 wireless local area networks (WLANs), it is becoming important to study the medium access control (MAC) layer delay performance of WLANs. The MAC layer delay can be classified into two categories: 1) medium access delay, and 2) delay at interface queue (IFQ). In this paper, based on a two-dimensional chain model, we analyze the medium access delay and give a method to calculate the IFQ delay. The proposed analysis is applicable to both the basic access and the RTS/CTS access mechanisms. Through extensive simulations, we evaluate our model. The simulation results show that our analysis is extremely accurate for both basic access and RTS/CTS access mechanism of the 802.11 DCF protocol.

  • Behavioral Analysis of a Fault-Tolerant Software System with Rejuvenation

    Koichiro RINSAKA  Tadashi DOHI  

     
    PAPER

      Vol:
    E88-D No:12
      Page(s):
    2681-2690

    In recent years, considerable attention has been devoted to continuously running software systems whose performance characteristics are smoothly degrading in time. Software aging often affects the performance of a software system and eventually causes it to fail. A novel approach to handle transient software failures due to software aging is called software rejuvenation, which can be regarded as a preventive and proactive solution that is particularly useful for counteracting the aging phenomenon. In this paper, we focus on a high assurance software system with fault-tolerance and preventive rejuvenation, and analyze the stochastic behavior of such a highly critical software system. More precisely, we consider a fault-tolerant software system with two-version redundant structure and random rejuvenation schedule, and evaluate quantitatively some dependability measures like the steady-state system availability and MTTF based on the familiar Markovian analysis. In numerical examples, we examine the dependence of two fault tolerant techniques; design and environment diversity techniques, on the system dependability measures.

  • Global Asymptotic Stabilization of a Class of Nonlinear Time-Delay Systems by Output Feedback

    Ho-Lim CHOI  Jong-Tae LIM  

     
    PAPER-Systems and Control

      Vol:
    E88-A No:12
      Page(s):
    3604-3609

    We consider the chains of integrators with nonlinear terms which allow state and input delays. We provide an output feedback controller which globally asymptotically stabilizes the given system under certain sufficient conditions. It turns out that the obtained result includes several existing results as particular cases. This point is shown through two applications of the main result. Also, industrial processes are presented to illustrate the practicability of our result.

  • On Bit Error Probabilities of SSMA Communication Systems Using Spreading Sequences of Markov Chains

    Hiroshi FUJISAKI  Yosuke YAMADA  

     
    PAPER

      Vol:
    E88-A No:10
      Page(s):
    2669-2677

    We study asynchronous SSMA communication systems using binary spreading sequences of Markov chains and prove the CLT (central limit theorem) for the empirical distribution of the normalized MAI (multiple-access interference). We also prove that the distribution of the normalized MAI for asynchronous systems can never be Gaussian if chains are irreducible and aperiodic. Based on these results, we propose novel theoretical evaluations of bit error probabilities in such systems based on the CLT and compare these and conventional theoretical estimations based on the SGA (standard Gaussian approximation) with experimental results. Consequently we confirm that the proposed theoretical evaluations based on the CLT agree with the experimental results better than the theoretical evaluations based on the SGA. Accordingly, using the theoretical evaluations based on the CLT, we give the optimum spreading sequences of Markov chains in terms of bit error probabilities.

  • Novel via Chain Structure for Failure Analysis at 65 nm-Node Fixing OPC Using Inner and Outer via Chain Dummy Patterns

    Takashi NASUNO  Yoshihisa MATSUBARA  Hiromasa KOBAYASHI  Akiyuki MINAMI  Eiichi SODA  Hiroshi TSUDA  Koichiro TSUJITA  Wataru WAKAMIYA  Nobuyoshi KOBAYASHI  

     
    PAPER

      Vol:
    E88-C No:5
      Page(s):
    796-803

    A novel via chain structure for failure analysis at 65 nm-node fixing OPC using inner and outer via chain dummy patterns has been proposed. The inner dummy is necessary to localize failure site in 200 nm pitch via chain using an optical beam induced resistance change method. The outer dummy protects via chain pattern from local flare and optical proximity effects. Using this test structure, we can identify the failure point in the 1.2 k and 15 k via chain fabricated by Cu/low-k single damascene process. This test structure is beneficial in the application to the 65 nm-node technologies and beyond.

  • Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication

    Katsuyuki OKEYA  Dong-Guk HAN  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1140-1147

    Side channel attacks (SCA) are serious attacks on mobile devices. In SCA, the attacker can observe the side channel information while the device performs the cryptographic operations, and he/she can detect the secret stored in the device using such side channel information. Ha-Moon proposed a novel countermeasure against side channel attacks in elliptic curve cryptosystems (ECC). The countermeasure is based on the signed scalar multiplication with randomized concept, and does not pay the penalty of speed. Ha-Moon proved that the countermeasure is secure against side channel attack theoretically, and confirmed its immunity experimentally. Thus Ha-Moon's countermeasure seems to be very attractive. In this paper we propose a novel attack against Ha-Moon's countermeasure, and show that the countermeasure is vulnerable to the proposed attack. The proposed attack utilizes a Markov chain for detecting the secret. The attacker determines the transitions in the Markov chain using side channel information, then detects the relation between consecutive two bits of the secret key, instead of bits of the secret key as they are. The use of such relations drastically reduces the search space for the secret key, and the attacker can easily reveal the secret. In fact, around twenty observations of execution of the countermeasure are sufficient to detect the secret in the case of the standard sizes of ECC. Therefore, the single use of Ha-Moon's countermeasure is not recommended for cryptographic use.

  • Evaluation of Website Usability Using Markov Chains and Latent Semantic Analysis

    Muneo KITAJIMA  Noriyuki KARIYA  Hideaki TAKAGI  Yongbing ZHANG  

     
    PAPER

      Vol:
    E88-B No:4
      Page(s):
    1467-1475

    The development of information/communication technology has made it possible to access substantial amounts of data and retrieve information. However, it is often difficult to locate the desired information, and it becomes necessary to spend considerable time determining how to access specific available data. This paper describes a method to quantitatively evaluate the usability of large-scale information-oriented websites and the effects of improvements made to the site design. This is achieved by utilizing the Cognitive Walkthrough for the Web and website modeling using Markov chains. We further demonstrate that we can greatly improve usability through simple modification of the link structure by applying our approach to an actual informational database website with over 40,000 records.

  • Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining

    Namhi KANG  Christoph RULAND  

     
    LETTER-Internet

      Vol:
    E88-B No:3
      Page(s):
    1264-1265

    In this letter, we show that some stream authentication schemes using hash chaining are highly vulnerable to denial of service (DoS) attacks. An adversary can disrupt all receivers of group by making use of modifying a few packets in those schemes.

  • Solutions to Security Problems of Rivest and Shamir's PayWord Scheme

    Norio ADACHI  Satoshi AOKI  Yuichi KOMANO  Kazuo OHTA  

     
    PAPER-Application

      Vol:
    E88-A No:1
      Page(s):
    195-202

    The PayWord Scheme, invented by Rivest and Shamir, is an efficient micropayment scheme utilizing a hash function. We point out that the scheme has the following problem: a malicious customer can damage the bank by purchasing in excess of the customer's credit which the bank has guaranteed by issuing a certificate. Generally, there are two positions of the bank with regard to the certificate. Position 1: the bank takes full responsibility for the certificate and compensates all payments created by the customer's purchases; and Position 2: the bank does not redeem payments exceeding a limit set for the customer and shares the loss with the shop if trouble occurs. In the PayWord Scheme, the bank can reduce its risk by adopting Position 2 rather than Position 1. However, this paper points out that the bank can damage the shop in Position 2 by impersonating an imaginary customer and making the shop share the loss with the bank. We propose a micropayment scheme (countermeasure) that overcomes these problems.

  • Proactive Load Control Scheme at Mobility Anchor Point in Hierarchical Mobile IPv6 Networks

    Sangheon PACK  Byoungwook LEE  Yanghee CHOI  

     
    PAPER-Protocols, Applications and Services

      Vol:
    E87-D No:12
      Page(s):
    2578-2585

    In IP-based mobile networks, a few of mobility agents (e.g., home agent, foreign agent, etc.) are used for mobility management. Recently, Hierarchical Mobile IPv6 (HMIPv6) was proposed to reduce signaling overhead and handoff latency occurred in Mobile IPv6. In HMIPv6, a new mobility agent, called mobility anchor point (MAP), is deployed in order to handle binding update procedures locally. However, the MAP can be a single point of performance bottleneck when there are a lot of mobile node (MNs) performing frequent local movements. This is because the MAP takes binding update procedures as well as data packet tunneling. Therefore, it is required to control the number of MNs serviced by a single MAP. In this paper, we propose a load control scheme at the MAP utilizing an admission control algorithm. We name the proposed load control scheme proactive load control scheme to distinct from the existing load control schemes in cellular networks. In terms of admission control, we use the cutoff priority scheme. We develop Markov chain models for the proactive load control scheme and evaluate the ongoing MN dropping and the new MN blocking probabilities. As a result, the proactive load control scheme can reduce the ongoing MN dropping probability while keeping the new MN blocking probability to a reasonable level.

  • A Hybrid Dictionary Test Data Compression for Multiscan-Based Designs

    Youhua SHI  Shinji KIMURA  Masao YANAGISAWA  Tatsuo OHTSUKI  

     
    PAPER-Test

      Vol:
    E87-A No:12
      Page(s):
    3193-3199

    In this paper, we present a test data compression technique to reduce test data volume for multiscan-based designs. In our method the internal scan chains are divided into equal sized groups and two dictionaries were build to encode either an entire slice or a subset of the slice. Depending on the codeword, the decompressor may load all scan chains or may load only a group of the scan chains, which can enhance the effectiveness of dictionary-based compression. In contrast to previous dictionary coding techniques, even for the CUT with a large number of scan chains, the proposed approach can achieve satisfied reduction in test data volume with a reasonable smaller dictionary. Experimental results showed the proposed test scheme works particularly well for the large ISCAS'89 benchmarks.

  • A Selective Scan Chain Reconfiguration through Run-Length Coding for Test Data Compression and Scan Power Reduction

    Youhua SHI  Shinji KIMURA  Masao YANAGISAWA  Tatsuo OHTSUKI  

     
    PAPER-Test

      Vol:
    E87-A No:12
      Page(s):
    3208-3215

    Test data volume and power consumption for scan-based designs are two major concerns in system-on-a-chip testing. However, test set compaction by filling the don't-cares will invariably increase the scan-in power dissipation for scan testing, then the goals of test data reduction and low-power scan testing appear to be conflicted. Therefore, in this paper we present a selective scan chain reconfiguration method for test data compression and scan-in power reduction. The proposed method analyzes the compatibility of the internal scan cells for a given test set and then divides the scan cells into compatible classes. After the scan chain reconfiguration a dictionary is built to indicate the run-length of each compatible class and only the scan-in data for each class should be transferred from the ATE to the CUT so as to reduce test data volume. Experimental results for the larger ISCAS'89 benchmarks show that the proposed approach overcomes the limitations of traditional run-length coding techniques, and leads to highly reduced test data volume with significant power savings during scan testing in all cases.

  • Cost Reduction for Highly Mobile Users with Commonly Visited Sites

    Takaaki ARAKAWA  Ken'ichi KAWANISHI  Yoshikuni ONOZATO  

     
    PAPER-Location Management

      Vol:
    E87-A No:7
      Page(s):
    1700-1711

    In this paper, we consider a location management scheme using Limited Pointer forwarding from Commonly visited sites (LPC) strategy for Personal Communication Services (PCS) networks. The Commonly Visited Site (CVS) is defined as a site in which a mobile user is found with high probability. A feature of the strategy is that it skips updating location information of the mobile user, provided that the mobile user moves within its CVSs. Such a strategy is expected to significantly reduce the location update cost. We evaluate the location management cost of the LPC scheme by employing a Continuous-Time Markov Chain (CTMC) model. We show that the LPC scheme can reduce the location management cost of a highly mobile user who is found in its CVS with high probability.

  • QoS-Guaranteed Wavelength Allocation for WDM Networks with Limited-Range Wavelength Conversion

    Takuji TACHIBANA  Shoji KASAHARA  

     
    PAPER-Fiber-Optic Transmission

      Vol:
    E87-B No:6
      Page(s):
    1439-1450

    In this paper, we consider QoS-guaranteed wavelength allocation for WDM networks with limited-range wavelength conversion. In the wavelength allocation, the pre-determined number of wavelengths are allocated to each QoS class depending on the required loss probability. Moreover, we consider two wavelength selection rules and three combinations of the rules. We analyze the connection loss probability of each QoS class for a single link using continuous-time Markov chain. We also investigate the connection loss probability for a uni-directional ring network by simulation. In numerical examples, we compare connection loss probabilities for three combinations of selection rules and show how each combination of selection rules affects the connection loss probability of each QoS class. Furthermore, we show how wavelength conversion capability affects the connection loss probability. It is shown that the proposed allocation with appropriate wavelength selection rule is effective for QoS provisioning when the number of wavelengths is large. We also show the effective combination of wavelength selection rules for the case with small wavelength conversion capability.

  • Performance Analysis of Robust Hierarchical Mobile IPv6 for Fault-Tolerant Mobile Services

    Sangheon PACK  Taewan YOU  Yanghee CHOI  

     
    PAPER-Mobility Management

      Vol:
    E87-B No:5
      Page(s):
    1158-1165

    In mobile multimedia environment, it is very important to minimize handoff latency due to mobility. In terms of reducing handoff latency, Hierarchical Mobile IPv6 (HMIPv6) can be an efficient approach, which uses a mobility agent called Mobility Anchor Point (MAP) in order to localize registration process. However, MAP can be a single point of failure or performance bottleneck. In order to provide mobile users with satisfactory quality of service and fault-tolerant service, it is required to cope with the failure of mobility agents. In, we proposed Robust Hierarchical Mobile IPv6 (RH-MIPv6), which is an enhanced HMIPv6 for fault-tolerant mobile services. In RH-MIPv6, an MN configures two regional CoA and registers them to two MAPs during binding update procedures. When a MAP fails, MNs serviced by the faulty MAP (i.e., primary MAP) can be served by a failure-free MAP (i.e., secondary MAP) by failure detection/recovery schemes in the case of the RH-MIPv6. In this paper, we investigate the comparative study of RH-MIPv6 and HMIPv6 under several performance factors such as MAP unavailability, MAP reliability, packet loss rate, and MAP blocking probability. To do this, we utilize a semi-Markov chain and a M/G/C/C queuing model. Numerical results indicate that RH-MIPv6 outperforms HMIPv6 for all performance factors, especially when failure rate is high.

  • Markov Chain Modeling of Intermittency Chaos and Its Application to Hopfield NN

    Yoko UWATE  Yoshifumi NISHIO  Akio USHIDA  

     
    PAPER

      Vol:
    E87-A No:4
      Page(s):
    774-779

    In this study, a modeling method of the intermittency chaos using the Markov chain is proposed. The performances of the intermittency chaos and the Markov chain model are investigated when they are injected to the Hopfield Neural Network for a quadratic assignment problem or an associative memory. Computer simulated results show that the proposed modeling is good enough to gain similar performance of the intermittency chaos.

  • Histogram Based Chain Codes for Shape Description

    Jong-An PARK  Min-Hyuk CHANG  Tae-Sun CHOI  Muhammad Bilal AHMAD  

     
    LETTER-Multimedia Systems

      Vol:
    E86-B No:12
      Page(s):
    3662-3665

    Chain codes were developed for storing contour information for shape matching. The traditional chain codes are highly susceptible to small perturbations in the contours of the objects. Therefore, traditional chain codes could not be used for image retrieval based on the shape boundaries from the large databases. In this paper, a histogram based chain codes are proposed which could be used for image retrieval. The proposed chain codes are invariant to translation, rotation and scaling transformations, and have high immunity to noise and small perturbations.

  • Motion Estimation Based on Chain Code and Dynamic Programming

    Mikhail MOZEROV  Vitaly KOBER  Tae-Sun CHOI  

     
    LETTER-Fundamental Theories

      Vol:
    E86-B No:12
      Page(s):
    3617-3621

    A new method for computing precise estimates of the motion vectors of moving objects in a sequence of images is proposed. The proposed method is based on dynamic programming matching applied along chain-coded binary contours of images. This significantly reduces the computational complexity of the correspondence matching applied to the 2-D optimization problem. Computer simulation and experimental results demonstrate a good performance of the method in terms of dynamic motion analysis.

  • A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems

    Katsuyuki OKEYA  Kouichi SAKURAI  

     
    PAPER

      Vol:
    E86-A No:5
      Page(s):
    1171-1180

    We show that a randomized addition-sub-traction chains countermeasure against side channel attacks is vulnerable to an SPA attack, which is a kind of side channel attack, under distinguishability between addition and doubling. The side channel attack takes advantage of information leaked during execution of a cryptographic procedure. The randomized addition-subtraction chains countermeasure was proposed by Oswald-Aigner, and is based on a random decision inserted into computations. However, the question of its immunity to side channel attacks is still controversial. The randomized addition-subtraction chains countermeasure has security flaw in timing attacks, another kind of side channel attack. We have implemented the proposed attack algorithm, whose input is a set of AD sequences, which consist of the characters "A" and "D" to indicate addition and doubling, respectively. Our program has clarified the effectiveness of the attack. The attack algorithm could actually detect secret scalars for given AD sequences. The average time to detect a 160-bit scalar was about 6 milliseconds, and only 30 AD sequences were enough to detect such a scalar. Compared with other countermeasures against side channel attacks, the randomized addition-subtraction chains countermeasure is much slower.

161-180hit(220hit)