The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] EAM(900hit)

301-320hit(900hit)

  • Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack

    Jiageng CHEN  Atsuko MIYAJI  

     
    PAPER-Cryptography

      Vol:
    E95-A No:12
      Page(s):
    2148-2159

    In this paper, we propose two new attacks against stream cipher RC4 which can recover the secret key in different length with practical computational amount. However, we have to point out that the proposed attacks are performed under relatively strong related key models. The same as the usual related key models, the adversary can specify the key differentials without knowing the target key information. However, in our attacks, only the relation between two keystream outputs or the two final internal states are required for the attacker. In addition, we discover a statistical bias of RC4 which is the key point to one of the attacks. Besides the inappropriate usage during the WEP environment, RC4 is still considered to be secure with the proper setting, and we believe the result of this paper will add to the understanding of RC4 and how to use it correctly and safely.

  • On Improving JPEG Entropy Coding by means of Sub-Stream Extraction

    Youngjin KIM  Hyun Joon SHIN  Jung-Ju CHOI  Youngcheul WEE  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E95-D No:11
      Page(s):
    2737-2740

    We introduce an entropy coding method to enhance the compression efficiency of JPEG. Because run-length coding and early-termination work more effectively for longer zero sequences, we extract ones and negative ones from the coefficients and reduce the magnitude of all coefficients by one. The extracted coefficients are encoded with a designated entropy coding method. The proposed method can transmit images in two parts progressively, where the first contains JPEG-compatible image with a small amount of degradation and the second is used to add fine details. Our method improves the compression ratio by more than 5% without sacrificing the efficiency of JPEG.

  • Development of Optically Controlled Beam-Forming Network

    Akira AKAISHI  Takashi TAKAHASHI  Yoshiyuki FUJINO  Mitsugu OHKAWA  Toshio ASAI  Ryutaro SUZUKI  Tomohiro AKIYAMA  Hirofumi MATSUZAWA  

     
    PAPER

      Vol:
    E95-B No:11
      Page(s):
    3404-3411

    NICT has developed a test model of an optically controlled beam-forming network (OBF) for a future multiple-beam antenna. The OBF test model consists of an electro-optic converter unit, an OBF unit, and an optoelectronic converter unit. A Ka-band OBF test model was manufactured to demonstrate the OBF. Radiation patterns obtained from the measured OBF data confirmed agreement between the expected and calculated results. Communication tests of the bit error rate (BER) for the digital communication link were performed. The results confirmed the OBF had no serious degradation below 1 dB of Eb/N0 on BER performance at 110-8.

  • Low-Complexity GSVD-Based Beamforming and Power Allocation for a Cognitive Radio Network

    Jaehyun PARK  Yunju PARK  Sunghyun HWANG  Byung Jang JEONG  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:11
      Page(s):
    3536-3544

    In this paper, low-complexity generalized singular value decomposition (GSVD) based beamforming schemes are proposed for a cognitive radio (CR) network in which multiple secondary users (SUs) with multiple antennas coexist with multiple primary users (PUs). In general, optimal beamforming, which suppresses the interference caused at PUs to below a certain threshold and maximizes the signal-to-interference-plus-noise ratios (SINRs) of multiple SUs simultaneously, requires a complicated iterative optimization process. To overcome the computational complexity, we introduce a signal-to-leakage-plus-noise ratio (SLNR) maximizing beamforming scheme in which the weight can be obtained by using the GSVD algorithm, and does not require any iterations or matrix squaring operations. Here, to satisfy the leakage constraints at PUs, two linear methods, zero forcing (ZF) preprocessing and power allocation, are proposed.

  • A Channel-Aware Scheduling Scheme for (m,k)-Firm Streams in Wireless Multimedia Sensor Networks

    Changxiao ZHAO  Huagang XIONG  

     
    LETTER-Network

      Vol:
    E95-B No:10
      Page(s):
    3312-3315

    In this letter, we propose a channel-aware scheduling algorithm to support real-time applications in wireless multimedia sensor networks. Multimedia streams are sensitive to real-time delivery but can tolerate some packet loss. Therefore, this specific application is modelled as an (m,k)-firm stream. To satisfy the real-time requirements, a scheduling scheme that provides packet partitioning and real-time delivery is proposed. Packet partitioning combines static assignment and dynamic adjustment while considering the channel state. The scheme is designed to minimize the number of mandatory packets delivered in a bad channel state to avoid dynamic failure. In addition, automatic repeat request technology is introduced to enhance the reliability of real-time delivery. Simulations and analyses show that the proposed scheme has a good ability to withstand a bad channel status.

  • Optimal Distributed Beamforming for Two-User MISO Interference Channel Based on a Game-Theoretic Viewpoint

    Jiamin LI  Dongming WANG  Pengcheng ZHU  Lan TANG  Xiaohu YOU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:10
      Page(s):
    3345-3348

    All points on the Pareto boundary can be obtained by solving the weighted sum rate maximization problem for some weighted coefficients. Unfortunately, the problem is non-convex and difficult to solve without performing an exhaustive search. In this paper, we propose an optimal distributed beamforming strategy for the two-user multiple-input single-output (MISO) interference channel (IC). Through minimizing the interference signal power leaked to the other receiver for fixed useful signal power received at the intended receiver, the original non-convex optimization problem can be converted into a family of convex optimization problems, each which can be solved in distributed manner with only local channel state information at each transmitter. After some conversion, we derive the closed-form solutions to all Pareto optimal points based on a game-theoretic viewpoint which indicates that linear combinations of the maximum-ratio transmit (MRT) and zero-forcing (ZF) beamforming strategies can achieve any point on the Pareto boundary of the rate region for the two-user MISO interference channel, and the only computation involved is to solve a basic quadratic equation. Finally, the result is validated via numerical simulations.

  • Miniaturization of Parallel-Plate Lens Antenna for Evaluation of Wave Absorber Placed on Ceiling of ETC Gate Open Access

    Takenori YASUZUMI  Nayuta KAMIYA  Ryosuke SUGA  Osamu HASHIMOTO  Yukinori MATSUSHITA  Yasuyuki MATSUDA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E95-B No:10
      Page(s):
    3225-3231

    This paper presents a compact metal plate lens antenna for evaluating a wave absorber placed on ceiling of the ETC gate. The focal distance of the lens was derived to be 129 cm by the geometrical optics procedure. By arranging the lens in front of a horn antenna, the gain and beamwidth characteristics were improved from 18 dBi to 26 dBi and from 22 degrees to 7 degrees, respectively. Then the antenna characteristics were evaluated when the distance between the antenna and the lens was changed in order to miniaturize the lens antenna. As the result, the changes in beamwidth were held to within 1 dB when the lens came close to the horn antenna. Scattering, phase and electric field intensity of electromagnetic wave were evaluated to clarify the foundation of the given characteristics. It was found that the field intensity for the miniaturized lens antenna is stronger than that for GO designed one though the phase uniformity is worse. The distance between the horn antenna and lens can be reduced to 80 cm. The absorption characteristics for the arranged absorbers which have different absorptions were measured, and it was shown that the proposed method was suitable for specifying the deteriorated absorber in the ETC system.

  • Adaptive Wideband Beamforming with Mainlobe Control Using Iterative Second-Order Cone Programming

    Jie LI  Gang WEI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:10
      Page(s):
    3290-3293

    A wideband beamformer with mainlobe control is proposed. To make the beamformer robust against pointing errors, inequality rather than equality constraints are used to restrict the mainlobe response, thus more degrees of freedom are saved. The constraints involved are nonconvex, therefore are linearly approximated so that the beamformer can be obtained by iterating a second-order cone program. Moreover, the response variance element is introduced to achieve a frequency invariant beamwidth. The effectiveness of the technique is demonstrated by numerical examples.

  • A Cross-Layer Design for Wireless Ad-Hoc Peer-to-Peer Live Multimedia Streaming

    Chen-Hua SHIH  Jun-Li KUO  Yaw-Chung CHEN  

     
    LETTER-Network

      Vol:
    E95-B No:10
      Page(s):
    3316-3319

    Establishing peer-to-peer (P2P) live streaming for mobile ad hoc network (MANET) requires an efficient scheme to deliver the real-time data in the infrastructure-less disaster environment. However, P2P membership management is difficult in the dynamic mobility and resource limited MANET. In this paper, we present a cross-layer design for P2P-MANET which integrates P2P DHT-based routing protocol and IPv6 routing protocol. Therefore, the proposed scheme can manage and recover the P2P overlay as well as selecting efficient routing path to multicast video streaming. The simulation results demonstrate that the proposed scheme performs relatively better than the layered approach or the off-the-shelf design in terms of the playback continuity and signaling overhead.

  • Feeding Matrix Placed on a Single Layer with Hybrid Coupler Controlling Beams in Three Directions Including Boresight

    Masatoshi TSUJI  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:10
      Page(s):
    3324-3327

    This paper proposes an easy-to-design, theory-consistent compact feeding circuit, with a single input and four outputs, being comprised of two hybrid circuits that are capable of switching a beam in three directions. The circuits that determine the phase differences between the antennas are present on the same single layer, and thus there is no effect of vias and the design agrees well with the underlying theory. In addition, the vertically and horizontally symmetrical circuit pattern contributes to a substantial reduction in design time. The circuit is designed for use in the ISM band and its properties are evaluated using an RF circuit simulator. A prototype is fabricated and evaluated. The results of the simulation and measurement agree well with the theoretical values. The dimensions of the feeding circuit are 75 (H)55 (W)3.0 (T) mm.

  • Computing the k-Error Linear Complexity of q-Ary Sequences with Period 2pn

    Zhihua NIU  Zhe LI  Zhixiong CHEN  Tongjiang YAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:9
      Page(s):
    1637-1641

    The linear complexity and its stability of periodic sequences are of fundamental importance as measure indexes on the security of stream ciphers and the k-error linear complexity reveals the stability of the linear complexity properly. Recently, Zhou designed an algorithm for computing the k-error linear complexity of 2pn periodic sequences over GF(q). In this paper, we develop a genetic algorithm to confirm that one can't get the real k-error linear complexity for some sequenes by the Zhou's algorithm. Analysis indicates that the Zhou's algorithm is unreasonable in some steps. The corrected algorithm is presented. Such algorithm will increase the amount of computation, but is necessary to get the real k-error linear complexity. Here p and q are odd prime, and q is a primitive root (mod p2).

  • Wireless Secure Communications via Cooperative Relaying and Jamming

    Ling TANG  Hao CHEN  Jianhui WU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2774-2784

    We consider wireless secure communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored: cooperative relaying (CR) and cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdropper's channel state information (ECSI). Then, for the case with ECSI, we derive the conditions under which CR achieves a higher secrecy rate than CJ; for the case without ECSI, we compare the secrecy rates of CR and CJ in high transmit power regimes. Building on this, we propose a novel hybrid scheme in which the relay utilizes both CR and CJ, and study the power allocation of the relay between CR and CJ for maximizing the secrecy rate under individual power constraints. Further, we study the case with imperfect channel state information (CSI) for both CR and CJ. At last, extensive numerical results are provided.

  • Analysis on Sum Rate of Random Beamforming with Minimum Mean Squared Error (MMSE) Receive Beamforming

    Janghoon YANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3033-3037

    Random beamforming(RBF) is a simple and practical method that can realize multi-user multi-input multi-output (MU-MIMO) systems. In this letter, we analyze the average sum rate of RBF with minimum mean squared error (MMSE) receive beamforming. To this end, we exploit the empirical eigenvalue distribution [5] and extreme value theory. The numerical verification shows that the proposed analysis provides a good approximation of the average sum rate of RBF even for the small number of antennas.

  • RING: A Cross-Layer P2P Group Conferencing Mechanism over Mobile Ad-Hoc Networks

    Jun-Li KUO  Chen-Hua SHIH  Cheng-Yuan HO  Ming-Ching WANG  Yaw-Chung CHEN  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2759-2768

    In the infrastructure-less disaster environment, the application of the peer-to-peer (P2P) group conference over mobile ad hoc network (MANET) can be used to communicate with each other when the rescue crews search the survivors but work separately. However, there still are several problems of in-time multimedia delivery in P2P-MANET: (1) MANET mobility influences the maintenance of P2P overlay. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the difficulty of multi-source P2P group conferencing. Therefore, P2P conferencing cannot work well on MANET. To overcome the above disadvantages, in this paper, we present a cross-layer P2P group conferencing mechanism over MANET, called RING (Real-time Intercommunication Network Gossip). The RING uses the ring overlay to manage peers and utilizes the cross-layer mechanism to force the ring overlay to be proximal to MANET topology. Therefore, RING can lead efficient in-time multimedia streaming delivery. On the other hand, the ring overlay can deal with peer joining/leaving fast and simply, and improves the delivery efficiency with the minimum signaling overhead. Through mathematical theory and a series of experiments, we demonstrate that RING is workable and it can shorten the source-to-end delay with minimal signaling overhead.

  • Beam Tilting Slot Antenna Elements with a Forced Resonance by Reactance Loading

    Ki-Chai KIM  Kazuhiro HIRASAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E95-B No:8
      Page(s):
    2610-2618

    This paper presents the basic characteristics of a beam tilting slot antenna element whose forced resonance is realized by reactance loading; its structure complements that of a dipole antenna element. The radiation pattern is tilted using a properly determined driving point position; a single loading reactance is used to obtain the forced resonance without great changes in the tilt angle. Numerical results show that the reactance element needs to be loaded near the driving point in order to obtain the forced resonance of the antenna and the minimum changes in the beam tilt angle at the same time. When the proposed forced resonant beam tilting slot antenna with a 0.8 λ length is driven at -0.2 λ from the center, the main beam tilt angle of 57.7 degrees and the highest power gain of 3.8 dB are obtained. This slot element has a broad bandwidth, unlike the complementary dipole element.

  • A Dynamically Reconfigurable FPGA-Based Pattern Matching Hardware for Subclasses of Regular Expressions

    Yusaku KANETA  Shingo YOSHIZAWA  Shin-ichi MINATO  Hiroki ARIMURA  Yoshikazu MIYANAGA  

     
    PAPER-Computer System

      Vol:
    E95-D No:7
      Page(s):
    1847-1857

    In this paper, we propose a novel architecture for large-scale regular expression matching, called dynamically reconfigurable bit-parallel NFA architecture (Dynamic BP-NFA), which allows dynamic loading of regular expressions on-the-fly as well as efficient pattern matching for fast data streams. This is the first dynamically reconfigurable hardware with guaranteed performance for the class of extended patterns, which is a subclass of regular expressions consisting of union of characters and its repeat. This class allows operators such as character classes, gaps, optional characters, and bounded and unbounded repeats of character classes. The key to our architecture is the use of bit-parallel pattern matching approach, in which the information of an input non-deterministic finite automaton (NFA) is first compactly encoded in bit-masks stored in a collection of registers and block RAMs. Then, the NFA is efficiently simulated by a fixed circuitry using bitwise Boolean and arithmetic operations consuming one input character per clock regardless of the actual contents of an input text. Experimental results showed that our hardwares for both string and extended patterns were comparable to previous dynamically reconfigurable hardwares in their performances.

  • Multipath Binomial Congestion Control Algorithms

    Tuan Anh LE  Choong Seon HONG  Sungwon LEE  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1934-1943

    Nowadays portable devices with multiple wireless interfaces and using multimedia services are becoming more popular on the Internet. This paper describes a family of multipath binomial congestion control algorithms for audio/video streaming, where a low variant of transmission rate is important. We extend the fluid model of binomial algorithms for single-path transmission to support the concurrent transmission of packets across multiple paths. We focus on the extension of two particular algorithms, SQRT and IIAD, for multiple paths, called MPSQRT and MPIIAD, respectively. Additionally, we apply the design technique (using the multipath fluid model) for multipath TCP (MPTCP) into the extension of SQRT and IIAD, called fbMPSQRT and fbMPIIAD, respectively. Both two approaches ensure that multipath binomial congestion control algorithms achieve load-balancing, throughput improvement, and fairness to single-path binomial algorithms at shared bottlenecks. Through the simulations and comparison with the uncoordinated protocols MPSQRT/MPIIAD, fbMPSQRT/fbMPIIAD and MPTCP, we find that our extended multipath transport protocols can preserve lower latency and transmission rate variance than MPTCP, fairly share with single-path SQRT/IIAD, MPTCP and TCP, and also can achieve throughput improvements and load-balancing equivalent to those of MPTCP under various scenarios and network conditions.

  • Online Anomaly Prediction for Real-Time Stream Processing

    Yuanqiang HUANG  Zhongzhi LUAN  Depei QIAN  Zhigao DU  Ting CHEN  Yuebin BAI  

     
    PAPER-Network Management/Operation

      Vol:
    E95-B No:6
      Page(s):
    2034-2042

    With the consideration of real-time stream processing technology, it's important to develop high availability mechanism to guarantee stream-based application not interfered by faults caused by potential anomalies. In this paper, we present a novel online prediction technique for predicting some anomalies which may occur in the near future. Concretely, we first present a value prediction which combines the Hidden Markov Model and the Mixture of Expert Model to predict the values of feature metrics in the near future. Then we employ the Support Vector Machine to do anomaly identification, which is a procedure to identify the kind of anomaly that we are about to alarm. The purpose of our approach is to achieve a tradeoff between fault penalty and resource cost. The experiment results show that our approach is of high accuracy for common anomaly prediction and low runtime overhead.

  • An Optimal Pull-Push Scheduling Algorithm Based on Network Coding for Mesh Peer-to-Peer Live Streaming

    Laizhong CUI  Yong JIANG  Jianping WU  Shutao XIA  

     
    PAPER-Network

      Vol:
    E95-B No:6
      Page(s):
    2022-2033

    Most large-scale Peer-to-Peer (P2P) live streaming systems are constructed as a mesh structure, which can provide robustness in the dynamic P2P environment. The pull scheduling algorithm is widely used in this mesh structure, which degrades the performance of the entire system. Recently, network coding was introduced in mesh P2P streaming systems to improve the performance, which makes the push strategy feasible. One of the most famous scheduling algorithms based on network coding is R2, with a random push strategy. Although R2 has achieved some success, the push scheduling strategy still lacks a theoretical model and optimal solution. In this paper, we propose a novel optimal pull-push scheduling algorithm based on network coding, which consists of two stages: the initial pull stage and the push stage. The main contributions of this paper are: 1) we put forward a theoretical analysis model that considers the scarcity and timeliness of segments; 2) we formulate the push scheduling problem to be a global optimization problem and decompose it into local optimization problems on individual peers; 3) we introduce some rules to transform the local optimization problem into a classical min-cost optimization problem for solving it; 4) We combine the pull strategy with the push strategy and systematically realize our scheduling algorithm. Simulation results demonstrate that decode delay, decode ratio and redundant fraction of the P2P streaming system with our algorithm can be significantly improved, without losing throughput and increasing overhead.

  • An Approach to Extract Informative Rules for Web Page Recommendation by Genetic Programming

    Jaekwang KIM  KwangHo YOON  Jee-Hyong LEE  

     
    PAPER

      Vol:
    E95-B No:5
      Page(s):
    1558-1565

    Clickstreams in users' navigation logs have various data which are related to users' web surfing. Those are visit counts, stay times, product types, etc. When we observe these data, we can divide clickstreams into sub-clickstreams so that the pages in a sub-clickstream share more contexts with each other than with the pages in other sub-clickstreams. In this paper, we propose a method which extracts more informative rules from clickstreams for web page recommendation based on genetic programming and association rules. First, we split clickstreams into sub-clickstreams by contexts for generating more informative rules. In order to split clickstreams in consideration of context, we extract six features from users' navigation logs. A set of split rules is generated by combining those features through genetic programming, and then informative rules for recommendation are extracted with the association rule mining algorithm. Through experiments, we verify that the proposed method is more effective than the other methods in various conditions.

301-320hit(900hit)