The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

3841-3860hit(8214hit)

  • Practical Hierarchical Identity Based Encryption Scheme without Random Oracles

    Xiaoming HU  Shangteng HUANG  Xun FAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E92-A No:6
      Page(s):
    1494-1499

    Recently, Au et al. proposed a practical hierarchical identity-based encryption (HIBE) scheme and a hierarchical identity-based signature (HIBS) scheme. In this paper, we point out that there exists security weakness both for their HIBE and HIBS scheme. Furthermore, based on q-ABDHE, we present a new HIBE scheme which is proved secure in the standard model and it is also efficient. Compared with all previous HIBE schemes, ciphertext size as well as decryption cost are independent of the hierarchy depth. Ciphertexts in our HIBE scheme are always just four group elements and decryption requires only two bilinear map computations.

  • Directional Sound Radiation System Using a Large Planar Diaphragm Incorporating Multiple Vibrators

    Yoko YAMAKATA  Michiaki KATSUMOTO  Toshiyuki KIMURA  

     
    PAPER-Engineering Acoustics

      Vol:
    E92-A No:6
      Page(s):
    1399-1407

    In this paper, we propose a new system for controlling radiated sound directivity. The proposed system artificially induces a bending vibration on a planar diaphragm by vibrating it artificially using multiple vibrators. Because the bending vibration in this case is determined by not one but all of the accelerated vibrations, the vibration of the diaphragm can be controlled by modulating the accelerated vibration waveforms relatively for each frequency. As a consequence, the directivity of the radiated sound is also varied. To investigate the feasibility of this system, we constructed a prototype that has for a diaphragm a circular plate-one of the most typical shapes considered for discussing plate vibration-and three vibrators. The measurement data showed visually that with this system, surface vibration and sound directivity change depending on the phases of the accelerated vibrations.

  • A Space-Time Signal Decomposition Algorithm for Downlink MIMO DS-CDMA Receivers

    Yung-Yi WANG  Wen-Hsien FANG  Jiunn-Tsair CHEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:6
      Page(s):
    2131-2141

    We propose a dimension reduction algorithm for the receiver of the downlink of direct-sequence code-division multiple access (DS-CDMA) systems in which both the transmitters and the receivers employ antenna arrays of multiple elements. To estimate the high order channel parameters, we develop a layered architecture using dimension-reduced parameter estimation algorithms to estimate the frequency-selective multipath channels. In the proposed architecture, to exploit the space-time geometric characteristics of multipath channels, spatial beamformers and constrained (or unconstrained) temporal filters are adopted for clustered-multipath grouping and path isolation. In conjunction with the multiple access interference (MAI) suppression techniques, the proposed architecture jointly estimates the direction of arrivals, propagation delays, and fading amplitudes of the downlink fading multipaths. With the outputs of the proposed architecture, the signals of interest can then be naturally detected by using path-wise maximum ratio combining. Compared to the traditional techniques, such as the Joint-Angle-and-Delay-Estimation (JADE) algorithm for DOA-delay joint estimation and the space-time minimum mean square error (ST-MMSE) algorithm for signal detection, computer simulations show that the proposed algorithm substantially mitigate the computational complexity at the expense of only slight performance degradation.

  • Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM

    Jungsuk SONG  Hiroki TAKAKURA  Yasuo OKABE  Yongjin KWON  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:6
      Page(s):
    1981-1990

    Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.

  • Feature Interaction Verification Using Unbounded Model Checking with Interpolation

    Takafumi MATSUO  Tatsuhiro TSUCHIYA  Tohru KIKUNO  

     
    PAPER-Dependable Computing

      Vol:
    E92-D No:6
      Page(s):
    1250-1259

    In this paper, we propose an unbounded model checking method for feature interaction verification for telecommunication systems. Unbounded model checking is a SAT-based verification method and has attracted recent attention as a powerful approach. The interpolation-based approach is one of the most promising unbounded model checking methods and has been proven to be effective for hardware verification. However, the application of unbounded model checking to asynchronous systems, such as telecommunication systems, has rarely been practiced. This is because, with the conventional encoding, the behavior of an asynchronous system can only be represented as a large propositional formula, thus resulting in large computational cost. To overcome this problem we propose to use a new scheme for encoding the behavior of the system and adapt the unbounded model checking algorithm to this encoding. By exploiting the concurrency of an asynchronous system, this encoding scheme allows a very concise formula to represent system's behavior. To demonstrate the effectiveness of our approach, we conduct experiments where 21 pairs of telecommunication services are verified using several methods including ours. The results show that our approach exhibits significant speed-up over unbounded model checking using the traditional encoding.

  • A Class of Array Codes Correcting a Cluster of Unidirectional Errors for Two-Dimensional Matrix Symbols

    Haruhiko KANEKO  Eiji FUJIWARA  

     
    PAPER-Coding Theory

      Vol:
    E92-A No:6
      Page(s):
    1508-1519

    Two-dimensional (2D) matrix symbols have higher storage capacity than conventional bar-codes, and hence have been used in various applications, including parts management in factories and Internet site addressing in camera-equipped mobile phones. These symbols generally utilize strong error control codes to protect data from errors caused by blots and scratches, and therefore require a large number of check bits. Because 2D matrix symbols are expressed in black and white dot patterns, blots and scratches often induce clusters of unidirectional errors (i.e., errors that affect black but not white dots, or vice versa). This paper proposes a new class of unidirectional lm ln-clustered error correcting codes capable of correcting unidirectional errors confined to a rectangle with lm rows and ln columns. The proposed code employs 2D interleaved parity-checks, as well as vertical and horizontal arithmetic residue checks. Clustered error pattern is derived using the 2D interleaved parity-checks, while vertical and horizontal positions of the error are calculated using the vertical and horizontal arithmetic residue checks. This paper also derives an upper bound on the number of codewords based on Hamming bound. Evaluation shows that the proposed code provides high code rate close to the bound. For example, for correcting a cluster of unidirectional 40 40 errors in 150 150 codeword, the code rate of the proposed code is 0.9272, while the upper bound is 0.9284.

  • Dual Imager Core Chip with 24.8 Rangemaps/s 3-D and 58 fps 2-D Simultaneous Capture Capability

    Shingo MANDAI  Toru NAKURA  Makoto IKEDA  Kunihiro ASADA  

     
    PAPER

      Vol:
    E92-C No:6
      Page(s):
    798-805

    This paper presents a multi functional range finder employing dual imager core on a single chip. Each imager core has functionalities of 2-D imaging and 3-D capture using the light section method with combinations of the dual imager core. The presented chip achieves, 2-D imaging mode, 3-D capture mode with the conventional light-section method, high-speed 3-D capture mode with the stereo matching mode, and 2-D and 3-D simultaneous capture mode. We demonstrate 58 fps 2-D imaging with 8 bit gray scale, and 24.8 rangemaps/s 3-D range-finder with the maximum range error of 1.619 mm and the standard deviation of 0.385 mm at 700 mm.

  • A Highly Linear and Wide Input Range Four-Quadrant CMOS Analog Multiplier Using Active Feedback

    Zhangcai HUANG  Minglu JIANG  Yasuaki INOUE  

     
    PAPER

      Vol:
    E92-C No:6
      Page(s):
    806-814

    Analog multipliers are one of the most important building blocks in analog signal processing circuits. The performance with high linearity and wide input range is usually required for analog four-quadrant multipliers in most applications. Therefore, a highly linear and wide input range four-quadrant CMOS analog multiplier using active feedback is proposed in this paper. Firstly, a novel configuration of four-quadrant multiplier cell is presented. Its input dynamic range and linearity are improved significantly by adding two resistors compared with the conventional structure. Then based on the proposed multiplier cell configuration, a four-quadrant CMOS analog multiplier with active feedback technique is implemented by two operational amplifiers. Because of both the proposed multiplier cell and active feedback technique, the proposed multiplier achieves a much wider input range with higher linearity than conventional structures. The proposed multiplier was fabricated by a 0.6 µm CMOS process. Experimental results show that the input range of the proposed multiplier can be up to 5.6Vpp with 0.159% linearity error on VX and 4.8Vpp with 0.51% linearity error on VY for 2.5V power supply voltages, respectively.

  • Ultrahigh-Sensitivity Pickup Tube Using 35-µm-Thick HARP Photoconductive Film

    Yuji OHKAWA  Kazunori MIYAKAWA  Tomoki MATSUBARA  Kenji KIKUCHI  Shirou SUZUKI  Misao KUBOTA  Norifumi EGAMI  Akira KOBAYASHI  

     
    LETTER-Semiconductor Materials and Devices

      Vol:
    E92-C No:6
      Page(s):
    894-897

    A high-sensitivity pickup tube using HARP (high-gain avalanche rushing amorphous photoconductor) photoconductive film, which makes use of the avalanche multiplication phenomenon, has been studied for making a high-sensitivity television camera. The avalanche multiplication factor, i.e., sensitivity, was increased by thickening the film. A 35-µm-thick HARP film, which was more sensitive than the previous 25-µm-thick film with an avalanche multiplication factor of about 600, and a 2/3rd-inch pickup tube using the film were developed. Measurements on the pickup tube demonstrated that it had an avalanche multiplication factor of about 1000, low lag, and high resolution. Moreover, image defects caused by shooting of intense spot lights were investigated, and it was found that exposing the film to UV light before operation and controlling the temperature of the film during operation could suppress the defects.

  • A Blind OFDM Detection and Identification Method Based on Cyclostationarity for Cognitive Radio Application

    Ning HAN  Sung Hwan SOHN  Jae Moung KIM  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E92-B No:6
      Page(s):
    2235-2238

    The key issue in cognitive radio is to design a reliable spectrum sensing method that is able to detect the signal in the target channel as well as to recognize its type. In this paper, focusing on classifying different orthogonal frequency-division multiplexing (OFDM) signals, we propose a two-step detection and identification approach based on the analysis of the cyclic autocorrelation function. The key parameters to separate different OFDM signals are the subcarrier spacing and symbol duration. A symmetric peak detection method is adopted in the first step, while a pulse detection method is used to determine the symbol duration. Simulations validate the proposed method.

  • Analysis of Incoming Wave Distribution in Vertical Plane in Urban Area and Evaluation of Base Station Antenna Effective Gain

    Koshiro KITAO  Tetsuro IMAI  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:6
      Page(s):
    2175-2181

    In order to reduce the amount of interference to neighboring cells in cellular systems, we generally use base station (BS) antennas that have sharp beam patterns in the vertical plane; however, the distribution of incoming waves at the BS affects the effective gain of the BS antennas which have directional pattern. Therefore, we have to clarify the characteristics of the distribution of the incoming waves. A recent trend is decreasing the cell radius; therefore, clarifying the distribution of the incoming waves at the BS when mobile stations (MSs) are located within 1 km from the BS is important. In this report, we evaluate the effective gains of the BS antennas, which are calculated using the measured vertical power angle profile (PAP). Moreover, we examine the application of a simple incoming wave model to the evaluation of the antenna effective gains. In the model, the average power of the incoming waves is set to the Laplacian function and each wave is changed to a lognormal distribution. The antenna effective gain calculated using the model agrees well with that calculated using the measured PAP.

  • Bayesian Optimal Release Time Based on Inflection S-Shaped Software Reliability Growth Model

    Hee Soo KIM  Dong Ho PARK  Shigeru YAMADA  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E92-A No:6
      Page(s):
    1485-1493

    The inflection S-shaped software reliability growth model (SRGM) proposed by Ohba (1984) is one of the well- known SRGMs. This paper deals with the optimal software release problem with regard to the expected software cost under this model based on the Bayesian approach. To reflect the effect of the learning experience for the updated software system, we consider several improvement factors to adjust the values of parameters characterizing the inflection S-shaped SRGM. Appropriate prior distributions are assumed for such factors and the expected total software cost is formulated. The optimal release time is shown to be finite and uniquely determined. Because of the flexibility of prior distributions, the proposed Bayesian methods may be applied in many different situations. Numerical results are presented on the basis of the real data.

  • Applicability of Large Effective Area PCF to DRA Transmission

    Chisato FUKAI  Kazuhide NAKAJIMA  Takashi MATSUI  

     
    LETTER-Optical Fiber for Communications

      Vol:
    E92-B No:6
      Page(s):
    2251-2253

    We describe the applicability of photonic crystal fiber (PCF) with an enlarged effective area Aeff to a distributed Raman amplification (DRA) transmission. We investigate the DRA transmission performance numerically over a large Aeff PCF taking account of the signal-to-noise ratio (SNR) improvement RSNR in the S, C, and L bands. We show that an RSNR of 3 dB can be expected by utilizing DRA with a maximum pump power of 500 mW when the Aeff of the PCF is 230 µm2.

  • CFAR Detector Based on Goodness-of-Fit Tests

    Xiaobo DENG  Yiming PI  Zhenglin CAO  

     
    PAPER-Sensing

      Vol:
    E92-B No:6
      Page(s):
    2209-2217

    This paper develops a complete architecture for constant false alarm rate (CFAR) detection based on a goodness-of-fit (GOF) test. This architecture begins with a logarithmic amplifier, which transforms the background distribution, whether Weibull or lognormal into a location-scale (LS) one, some relevant properties of which are exploited to ensure CFAR. A GOF test is adopted at last to decide whether the samples under test belong to the background or are abnormal given the background and so should be declared to be a target of interest. The performance of this new CFAR scheme is investigated both in homogeneous and multiple interfering targets environment.

  • Fast Packet Classification Using Multi-Dimensional Encoding

    Chi Jia HUANG  Chien CHEN  

     
    PAPER-Internet

      Vol:
    E92-B No:6
      Page(s):
    2044-2053

    Internet routers need to classify incoming packets quickly into flows in order to support features such as Internet security, virtual private networks and Quality of Service (QoS). Packet classification uses information contained in the packet header, and a predefined rule table in the routers. Packet classification of multiple fields is generally a difficult problem. Hence, researchers have proposed various algorithms. This study proposes a multi-dimensional encoding method in which parameters such as the source IP address, destination IP address, source port, destination port and protocol type are placed in a multi-dimensional space. Similar to the previously best known algorithm, i.e., bitmap intersection, multi-dimensional encoding is based on the multi-dimensional range lookup approach, in which rules are divided into several multi-dimensional collision-free rule sets. These sets are then used to form the new coding vector to replace the bit vector of the bitmap intersection algorithm. The average memory storage of this encoding is θ (LNlog N) for each dimension, where L denotes the number of collision-free rule sets, and N represents the number of rules. The multi-dimensional encoding practically requires much less memory than bitmap intersection algorithm. Additionally, the computation needed for this encoding is as simple as bitmap intersection algorithm. The low memory requirement of the proposed scheme means that it not only decreases the cost of packet classification engine, but also increases the classification performance, since memory represents the performance bottleneck in the packet classification engine implementation using a network processor.

  • Scheduling Algorithm to Provide QoS over a Shared Wireless Link

    Augusto FORONDA  Chikara OHTA  Hisashi TAMAKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:6
      Page(s):
    2160-2167

    Several scheduling algorithms have been proposed for the downlink of a Code Division Multiple Access (CDMA) system with High Data Rate (HDR). Modified Largest Weighted Delay First (M-LWDF) scheduling algorithm selects a user according to the user current channel condition, user head-of-line packet delay and user Quality of Service (QoS) requirement. Proportional Fair (PF) scheduling algorithm has also been proposed for CDMA/HDR system and it selects a user according to the ratio of the user current channel rate and the user average channel rate, which provides good performance in terms of fairness. However, when variable bit rate (VBR) traffic is considered under different channel conditions for each user, both schedulers' performance decrease. M-LWDF scheduler can not guarantee the QoS requirement to be achieved and PF scheduler can not achieve a good fairness among the users. In this work, we propose a new scheduling algorithm to enhance M-LWDF and PF schedulers performance. Proposed scheduler selects a user according to the user input traffic characteristic, user current channel condition and user QoS requirement, which consists of a delay value with a maximum violation probability. We consider the well-known effective bandwidth expression, which takes into account the user QoS requirement and the user input traffic characteristics, to select a user to be scheduled. Properties of the proposed scheduling algorithm are investigated through simulations with constant bit rate (CBR) and VBR flows and performance comparisons with M-LWDF and PF schedulers. The results show a better performance of the proposed scheduler compared with M-LWDF and PF schedulers.

  • Adaptive Code Assignment Algorithm for a Multi-User/Multi-Rate CDMA System

    Qiyue YU  Fumiyuki ADACHI  Weixiao MENG  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1600-1607

    Code division multiple access (CDMA) technique is used widely since it can flexibly support multi-rate multi-media services by changing the number of orthogonal spreading codes. In this paper, we present a new adaptive code assignment algorithm, which consists of three steps: reserved-space, improved-crowded-first-space, and multi-code combination to fully use the code space. Compared with the existing algorithms, the proposed algorithm can avoid the code blocking problem and lower its total blocking probability while keeping its computational complexity relatively low. Simulation results show that increasing the free space reduces the average total blocking probability while increasing the blocking probability of high rate users.

  • Investigation on Optimum Control Interval for Intra-Cell Fractional TPC Using AMC for Shared Channel in Evolved UTRA Uplink

    Daisuke NISHIKAWA  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  Mamoru SAWAHASHI  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1627-1633

    This paper presents the optimum control interval for intra-cell fractional transmission power control (TPC) for a shared data channel employing frequency domain channel-dependent scheduling and adaptive modulation and coding (AMC) in the Evolved UTRA uplink using single-carrier (SC)-FDMA radio access. The simulation results show that the best attenuation factor in the fractional TPC is approximately 0.6 for achieving the maximum user throughput when the maximum target received signal power, P0 is -60 dBm. Then, we show that the optimum averaging interval for the desired signal level, which corresponds to a substantial control interval for the fractional TPC, is approximately 100-200 msec regardless of the maximum Doppler frequency up to 222 Hz and the distance at the shadowing correlation of 0.5. Throughout the simulation results, we verify that slow intra-cell fractional TPC associated with fast AMC is effective in achieving the maximum cell throughput and cell-edge user throughput.

  • Relay Selection in Amplify-and-Forward Relay Network with Multiple Antennas at the Destination

    Zhenjie FENG  Taiyi ZHANG  Runping YUAN  

     
    PAPER

      Vol:
    E92-B No:5
      Page(s):
    1769-1777

    In this paper, we consider an amplify-and-forward (AF) relay network where a source node transmits information to a destination node through the cooperation of multiple relay nodes. It is shown in prior works that the outage behavior and average throughput of the selection AF (S-AF) scheme where only the best relay node is chosen to assist can outperform the conventional all-participate AF (AP-AF) scheme. Assuming multiple antennas at the destination node and single antennas at other nodes in this paper, we propose a relay selection scheme according to the criterion of maximizing receive signal to noise ratio (SNR), where a group of relays is chosen to assist in the transmission simultaneously in a manner similar to cyclic delay diversity (CDD). Compared with S-AF, the proposed scheme achieves better outage behavior and average throughput. It can be seen from simulation results that the performance improvement of symbol error rate (SER) is significant compared with S-AF.

  • Access Probability Aware Cell Reselection for 3G Evolution

    Mingju LI  Lei DU  Lan CHEN  

     
    LETTER

      Vol:
    E92-B No:5
      Page(s):
    1825-1827

    In LTE, AC barring check is performed before RRC connection. In some cells with a low access probability, the UEs keep retrying access which results in higher connection failure and longer access delay. We therefore propose balancing the UEs by adjusting the cell reselection criteria based on the access probability, so that the UEs shall be more encouraged to reselect a cell with a higher access probability.

3841-3860hit(8214hit)