The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] DoS(76hit)

21-40hit(76hit)

  • Quasistatic Approximation for Exposure Assessment of Wireless Power Transfer Open Access

    Ilkka LAAKSO  Takuya SHIMAMOTO  Akimasa HIRATA  Mauro FELIZIANI  

     
    INVITED PAPER

      Vol:
    E98-B No:7
      Page(s):
    1156-1163

    Magnetic resonant coupling between two coils allows effective wireless transfer of power over distances in the range of tens of centimeters to a few meters. The strong resonant magnetic field also extends to the immediate surroundings of the power transfer system. When a user or bystander is exposed to this magnetic field, electric fields are induced in the body. For the purposes of human and product safety, it is necessary to evaluate whether these fields satisfy the human exposure limits specified in international guidelines and standards. This work investigates the effectiveness of the quasistatic approximation for computational modeling human exposure to the magnetic fields of wireless power transfer systems. It is shown that, when valid, this approximation can greatly reduce the computational requirements of the assessment of human exposure. Using the quasistatic modeling approach, we present an example of the assessment of human exposure to the non-uniform magnetic field of a realistic WPT system for wireless charging of an electric vehicle battery, and propose a coupling factor for practical determination of compliance with the international exposure standards.

  • Innovations Leading Capsule Endoscopy into the New Frontier: Screening and Therapy at Home Open Access

    Hidetoshi OHTA  

     
    INVITED PAPER

      Vol:
    E98-B No:4
      Page(s):
    526-534

    This paper proposed patient friendly capsule endoscopy (CE) for not only screening but also treatment. Two different types of CEs with an Internet utility were investigated. The first type used magnetic navigation in the stomach and colon for screening. Magnetic navigation enabled the capsule to explore the whole of the gastrointestinal tract with less risk of missing lesions and complete the screening within the battery life. The system's design was patiently friendly as it allowed the subjects to leave the hospital after the capsule had been navigated in the stomach. The second investigated two different therapeutic robotic endoscopes. Both prototypes were driven by DC motors and controlled remotely via the internet. In addition, they were equipped with therapeutic tools and each prototype's ability with the tools was assessed. The investigation showed it was possible to remotely control both prototypes and operate therapeutic tools via the Internet. The investigation identified areas for improvement, such as size, connection speed, security of data, and the holding the capsule's position during treatment, In conclusion, both methods have the potential to make capsule endoscopy a very patient friendly procedure that can be carried out anywhere.

  • A Novel Intrusion Tolerant System Using Live Migration

    Yongjoo SHIN  Sihu SONG  Yunho LEE  Hyunsoo YOON  

     
    LETTER-Dependable Computing

      Vol:
    E97-D No:4
      Page(s):
    984-988

    This letter proposes a novel intrusion tolerant system consisting of several virtual machines (VMs) that refresh the target system periodically and by live migration, which monitors the many features of the VMs to identify and replace exhausted VMs. The proposed scheme provides adequate performance and dependability against denial of service (DoS) attacks. To show its efficiency and security, we conduct experiments on the CSIM20 simulator, which showed 22% improvement in a normal situation and approximately 77.83% improvement in heavy traffic in terms of the response time compared to that reported in the literature. We measure and compare the response time. The result show that the proposed scheme has shorter response time and maintains than other systems and supports services during the heavy traffic.

  • Dosimetric Assessment of Two-Layer Cell Culture Configurations for Fertility Research at 1950MHz

    Yijian GONG  Manuel MURBACH  Teruo ONISHI  Myles CAPSTICK  Toshio NOJIMA  Niels KUSTER  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E97-B No:3
      Page(s):
    631-637

    The objective of this paper is to extend the dosimetric assessment of 35mm Petri dishes exposed in the standing wave of R18 waveguides operated at 1950MHz for a medium-oil two-layer configuration for cells in monolayer and suspension. The culture medium inside the Petri dish is covered by oil that prevents evaporation and seals the cells below in the medium. The exposure of the cells was analyzed for one suspension-medium configuration, two different suspension-multilayer configurations, and one monolayer-multilayer configuration. The numerical dosimetry is verified by dosimetric temperature measurements. The non-uniformity of the specific absorption rate (SAR) distribution is 30% for monolayer, and 59-75% for suspension configurations. The latter should be taken into account when biological experiment is performed.

  • How to Make Content Centric Network (CCN) More Robust against DoS/DDoS Attack

    DaeYoub KIM  Jihoon LEE  

     
    LETTER-Network

      Vol:
    E96-B No:1
      Page(s):
    313-316

    Content-centric networking (CCN) is one of candidates being spotlighted as the technologies of the future Internet to solve the problems of the current Internet. Since DoS/DDoS attack is the most serious threat to the current Internet, this letter introduces the possibility of DoS/DDoS attack on CCN for the first time. And we introduce an attack method using fake-request packets and propose countermeasures in order to detect and/or react to CCN DoS/DDoS attack, and then analyze the result of our proposal.

  • Survivability Analysis for a Wireless Ad Hoc Network Based on Semi-Markov Model

    Zhipeng YI  Tadashi DOHI  

     
    PAPER-Network and Communication

      Vol:
    E95-D No:12
      Page(s):
    2844-2851

    Network survivability is defined as the ability of a network keeping connected under failures and/or attacks. In this paper, we propose two stochastic models; binomial model and negative binomial model, to quantify the network survivability and compare them with the existing Poisson model. We give mathematical formulae of approximate network survivability for respective models and use them to carry out the sensitivity analysis on model parameters. Throughout numerical examples it is shown that the network survivability can change drastically when the number of network nodes is relatively small under a severe attack mode which is called the Black hole attack.

  • A Design of Genetically Optimized Linguistic Models

    Keun-Chang KWAK  

     
    LETTER-Biocybernetics, Neurocomputing

      Vol:
    E95-D No:12
      Page(s):
    3117-3120

    In this paper, we propose a method for designing genetically optimized Linguistic Models (LM) with the aid of fuzzy granulation. The fundamental idea of LM introduced by Pedrycz is followed and their design framework based on Genetic Algorithm (GA) is enhanced. A LM is designed by the use of information granulation realized via Context-based Fuzzy C-Means (CFCM) clustering. This clustering technique builds information granules represented as a fuzzy set. However, it is difficult to optimize the number of linguistic contexts, the number of clusters generated by each context, and the weighting exponent. Thus, we perform simultaneous optimization of design parameters linking information granules in the input and output spaces based on GA. Experiments on the coagulant dosing process in a water purification plant reveal that the proposed method shows better performance than the previous works and LM itself.

  • Variations in SAR of Wireless Communication Devices Caused by Host Devices

    Takahiro IYAMA  Teruo ONISHI  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E94-B No:12
      Page(s):
    3603-3606

    The specific absorption rate (SAR) measurement procedure for wireless communication devices used in close proximity to the human body other than the ear was standardized by the International Electrotechnical Commission (IEC). This procedure is applicable to SAR measurement of data communication terminals that are used with host devices. Laptop PCs are assumed as host devices in this study. First, numerical modeling of laptop PCs and the validity of computations are verified with corresponding measurements. Next, mass averaged SARs are calculated dependent on the dimensions of the laptop PCs and the position of the terminals. The results show that the ratio of the maximum to minimum SARs is at most 2.0 for USB dongle and card-type terminals at 1950 MHz and 835 MHz.

  • Performance Evaluation of Wireless Communications for Capsule Endoscopy

    Kenichi TAKIZAWA  Takahiro AOYAGI  Kiyoshi HAMAGUCHI  

     
    LETTER

      Vol:
    E94-B No:9
      Page(s):
    2488-2491

    This letter presents a performance evaluation of wireless communications applicable into a capsule endoscope. A numerical model to describe the received signal strength (RSS) radiated from a capsule-sized signal generator is derived through measurements in which a liquid phantom is used that has electrical constants equivalent to human tissue specified by IEC 62209-1. By introducing this model and taking into account the characteristics of its direction pattern of the capsule and propagation distance between the implanted capsule and on-body antenna, a cumulative distribution function (CDF) of the received SNR is evaluated. Then, simulation results related to the error ratio in the wireless channel are obtained. These results show that the frequencies of 611 MHz or lesser would be useful for the capsule endoscope applications from the view point of error rate performance. Further, we show that the use of antenna diversity brings additional gain to this application.

  • Anomaly Detection in Electronic Shelf Label Systems

    Yulia PONOMARCHUK  Dae-Wha SEO  

     
    LETTER-Network

      Vol:
    E94-B No:1
      Page(s):
    315-318

    This paper proposes a lightweight, fast and efficient method for the detection of jamming attacks, interference, and other anomalies in electronic shelf label (ESL) systems and wireless sensor networks (WSNs) with periodic data transmission. The proposed method is based on the thresholding technique, which is applied to selected parameters of traffic and allows discrimination of random failures from anomalies and intrusions. It does not require the installation of additional hardware and does not create extra communication costs; its computational requirements are negligible, since it is based on statistical methods. Herein recommendations are provided for choosing a thresholds type. Extensive simulations, made by Castalia simulator for WSNs, show that the proposed method has superior accuracy compared to existing algorithms.

  • Development of an Implantable WBAN Path-Loss Model for Capsule Endoscopy

    Takahiro AOYAGI  Kenichi TAKIZAWA  Takehiko KOBAYASHI  Jun-ichi TAKADA  Kiyoshi HAMAGUCHI  Ryuji KOHNO  

     
    LETTER

      Vol:
    E93-B No:4
      Page(s):
    846-849

    An implantable WBAN path-loss model for a capsule endoscopy which is used for examining digestive organs, is developed by conducting simulations and experiments. First, we performed FDTD simulations on implant WBAN propagation by using a numerical human model. Second, we performed FDTD simulations on a vessel that represents the human body. Third, we performed experiments using a vessel of the same dimensions as that used in the simulations. On the basis of the results of these simulations and experiments, we proposed the gradient and intercept parameters of the simple path-loss in-body propagation model.

  • Systematic Generation of Tardos's Fingerprint Codes

    Minoru KURIBAYASHI  Masakatu MORII  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:2
      Page(s):
    508-515

    Digital fingerprinting is used to trace back illegal users, where unique ID known as digital fingerprints is embedded into a content before distribution. On the generation of such fingerprints, one of the important properties is collusion-resistance. Binary codes for fingerprinting with a code length of theoretically minimum order were proposed by Tardos, and the related works mainly focused on the reduction of the code length were presented. In this paper, we present a concrete and systematic construction of the Tardos's fingerprinting code using a chaotic map. Using a statistical model for correlation scores, the actual number of true-positive and false-positive detection is measured. The collusion-resistance of the generated fingerprinting codes is evaluated by a computer simulation.

  • Quasi-Static FDTD Method for Dosimetry in Human due to Contact Current

    Akimasa HIRATA  Yukinori TAKANO  Toshihiro NAGAI  

     
    PAPER

      Vol:
    E93-C No:1
      Page(s):
    60-65

    The present study proposes a quasi-static finite-difference time-domain (FDTD) method for dosimetry in humans due to contact current at low frequencies (10 kHz). Our attention focused on wave sources which can reduce computational time. The computational time was found to be reduced using a voltage source of a step function with smooth start. The computational time required for the proposed method was smaller than a quasi-static FDTD method proposed in a previous study. Comparison between our computational results and those in a previous study suggested the effectiveness of our proposal. The difference in in-situ electric field due to different human models was a factor of 2 or so.

  • Security-Enhanced Fast Mobile IPv6 Handover

    Chang-Seop PARK  

     
    LETTER-Internet

      Vol:
    E93-B No:1
      Page(s):
    178-181

    Motivated by the fact that the existing FMIPv6 security scheme has several weaknesses in terms of security and efficiency, we propose a security-enhanced fast mobile IPv6 in this letter. Based on the concept of a secret key-based CGA (Cryptographically Generated Address), we show how to establish a new security association between the MN and AR (Access Router) whenever a handover occurs. We also show that the proposed scheme is robust against several types of security attacks feasible with the existing scheme. Our scheme is more efficient in that it requires fewer public key operations.

  • Controlling the Display of Capsule Endoscopy Video for Diagnostic Assistance

    Hai VU  Tomio ECHIGO  Ryusuke SAGAWA  Keiko YAGI  Masatsugu SHIBA  Kazuhide HIGUCHI  Tetsuo ARAKAWA  Yasushi YAGI  

     
    PAPER-Biological Engineering

      Vol:
    E92-D No:3
      Page(s):
    512-528

    Interpretations by physicians of capsule endoscopy image sequences captured over periods of 7-8 hours usually require 45 to 120 minutes of extreme concentration. This paper describes a novel method to reduce diagnostic time by automatically controlling the display frame rate. Unlike existing techniques, this method displays original images with no skipping of frames. The sequence can be played at a high frame rate in stable regions to save time. Then, in regions with rough changes, the speed is decreased to more conveniently ascertain suspicious findings. To realize such a system, cue information about the disparity of consecutive frames, including color similarity and motion displacements is extracted. A decision tree utilizes these features to classify the states of the image acquisitions. For each classified state, the delay time between frames is calculated by parametric functions. A scheme selecting the optimal parameters set determined from assessments by physicians is deployed. Experiments involved clinical evaluations to investigate the effectiveness of this method compared to a standard-view using an existing system. Results from logged action based analysis show that compared with an existing system the proposed method reduced diagnostic time to around 32.5 7 minutes per full sequence while the number of abnormalities found was similar. As well, physicians needed less effort because of the systems efficient operability. The results of the evaluations should convince physicians that they can safely use this method and obtain reduced diagnostic times.

  • Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Chang-Seop PARK  Hyun-Sun KANG  

     
    PAPER-Network

      Vol:
    E92-B No:3
      Page(s):
    838-849

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  • Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

    Yuichi OHSITA  Shingo ATA  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E91-B No:8
      Page(s):
    2618-2630

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i.e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

  • Complementing Security Breach of Authentication by Using Shared Authentication Information in Mobile WiMAX Networks

    Youngwook KIM  Hyoung-Kyu LIM  Saewoong BAHK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:8
      Page(s):
    2728-2730

    The signalling protocol vulnerability opens DDoS problem in Mobile WiMAX networks. This letter proposes an authentication method that uses the unrevealed upper 64 bits of Cipher-based MAC as a solution. It runs for MSs in idle mode and reduces the calculation complexity by 59% under DDoS attack while incurring 1% overhead under normal condition.

  • Analyzing the Number of Varieties in Frequently Found Flows

    Yusuke SHOMURA  Yoshinori WATANABE  Kenichi YOSHIDA  

     
    PAPER-Network Management/Operation

      Vol:
    E91-B No:6
      Page(s):
    1896-1905

    Abnormal traffic that causes various problems on the Internet, such as P2P flows, DDoS attacks, and Internet worms, is increasing; therefore, the importance of methods that identify and control abnormal traffic is also increasing. Though the application of frequent-itemset-mining techniques is a promising way to analyze Internet traffic, the huge amount of data on the Internet prevents such techniques from being effective. To overcome this problem, we have developed a simple frequent-itemset-mining method that uses only a small amount of memory but is effective even with the large volumes of data associated with broadband Internet traffic. Using our method also involves analyzing the number of distinct elements in the itemsets found, which helps identify abnormal traffic. We used a cache-based implementation of our method to analyze actual data on the Internet and demonstrated that such an implementation can be used to provide on-line analysis of data while using only a small amount of memory.

  • Endoscopic Feature Tracking and Scale-Invariant Estimation of Soft-Tissue Structures

    Chia-Hsiang WU  Yung-Nien SUN  Yi-Chiao CHEN  Chien-Chen CHANG  

     
    PAPER-Biological Engineering

      Vol:
    E91-D No:2
      Page(s):
    351-360

    In this study, we introduce a software pipeline to track feature points across endoscopic video frames. It deals with the common problems of low contrast and uneven illumination that afflict endoscopic imaging. In particular, irregular feature trajectories are eliminated to improve quality. The structure of soft tissue is determined by an iterative factorization method based on collection of tracked features. A shape updating mechanism is proposed in order to yield scale-invariant structures. Experimental results show that the tracking method produced good tracking performance and increased the number of tracked feature trajectories. The real scale and structure of the target scene was successfully estimated, and the recovered structure is more accuracy than the conventional method.

21-40hit(76hit)