The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] FA(3430hit)

1261-1280hit(3430hit)

  • A Simple Approximation for the Symbol Error Rate of Triangular Quadrature Amplitude Modulation

    Tran Trung DUY  Hyung Yun KONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:3
      Page(s):
    753-756

    In this paper, we consider the error performance of the regular triangular quadrature amplitude modulation (TQAM). In particular, using an accurate exponential bound of the complementary error function, we derive a simple approximation for the average symbol error rate (SER) of TQAM over Additive White Gaussian Noise (AWGN) and fading channels. The accuracy of our approach is verified by some simulation results.

  • A Novel Cooperative-Aided Transmission in Multi-Hop Wireless Networks

    Tran Trung DUY  Beongku AN  Hyung-Yun KONG  

     
    LETTER-Network

      Vol:
    E93-B No:3
      Page(s):
    716-720

    Cooperative transmission protocols attract a great deal of attention in recent years as an efficient way to increase the capacity of multi-hop wireless networks in fading environments. In this paper, we propose and analyze a cooperative transmission method, called Cooperative-Aided Skipping multi-Hop protocol (CASH), for multi-hop wireless networks with Rayleigh fading environments. For performance evaluation, we compare and verify the results of the theoretical analysis with the results of simulations.

  • Traffic Control Algorithm Offering Multi-Class Fairness in PON Based Access Networks

    Yasuyuki OKUMURA  

     
    LETTER-Fiber-Optic Transmission for Communications

      Vol:
    E93-B No:3
      Page(s):
    712-715

    This letter proposes a dynamic bandwidth allocation algorithm for access networks based PON (Passive Optical Network). It considers the mixture of transport layer protocols when responding to traffic congestion at the SNI (Service Node Interface). Simulations on a mixture of TCP (Transmission Control Protocol), and UDP (User Datagram Protocol) traffic flows show that the algorithm increases the throughput of TCP, improves the fairness between the two protocols, and solves the congestion problem at the SNI.

  • Global Asymptotic Stability of FAST TCP Network with Heterogeneous Feedback Delays

    Joon-Young CHOI  Kyungmo KOO  Jin Soo LEE  

     
    PAPER-Network

      Vol:
    E93-B No:3
      Page(s):
    571-580

    We consider a single-link multi-source network with FAST TCP sources. We adopt a continuous-time dynamic model for FAST TCP sources, and propose a static model to adequately describe the queuing delay dynamics at the link. The proposed model turns out to have a structure that reveals the time-varying network feedback delay, which allows us to analyze FAST TCP with due consideration of the time-varying network feedback delay. Based on the proposed model, we establish sufficient conditions for the boundedness of congestion window of each source and for the global asymptotic stability. The asymptotic stability condition shows that the stability property of each source is affected by all other sources sharing the link. Simulation results illustrate the validity of the sufficient condition for the global asymptotic stability.

  • Secured Fast Handoff in 802.11-Based Wireless Mesh Networks for Pervasive Internet Access

    Gang YAO  Jiannong CAO  Ye YAN  Yusheng JI  

     
    INVITED PAPER

      Vol:
    E93-D No:3
      Page(s):
    411-420

    Authentication issue has been mostly ignored to ensure fast handoff in 802.11 Wireless Mesh Network (WMN). With the proliferation of WMNs in recent years for practical deployment, secured fast handoff has drawn much attention to enforce authenticated access while reduce the extra delay caused by enabling authentication operations. In this paper, we present an overview on the state-of-the-art advance in this field and tackle the problem from a practical perspective based on experiments and analysis on our real-world testbed HAWK. We propose a novel fast handoff scheme Network-assisted Radio Signature to eliminate probing delay by taking advantage of the characteristic of the actual dynamic topology about mesh routers in WMN. Moreover, we apply an optimistic authentication mechanism Dual Re-authentication to counteract the authentication delay while providing the secured wireless access. In this manner, we have reduced the end-to-end handoff delay of WMN back again to a level below 50 ms to achieve secured handoff and support time-sensitive applications. We describe detailed mechanisms, simulation, implementation and experimental results. To our best knowledge, we are the first to achieve such an optimal performance of secured fast handoff.

  • Performance Analysis of Code Combining Based Cooperative Protocol with Amplified-and-Forward (AF) Relaying

    Asaduzzaman   Hyung-Yun KONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    411-414

    In this letter, we analyze the error performance of a code combining based cooperative diversity protocol. For coded transmission schemes, code-combining can obtain a near optimal low rate code by combining repeated codewords. An analytical method for evaluating the performances of such scheme is presented. We develop a closed form expression for pairwise error probability and tight upper bounds for bit error rate (BER) and frame error rate (FER) under Rayleigh fading environment. The analytical upper bounds are verified with simulation results.

  • The Software Reliability Model Based on Fractals

    Yong CAO  Qingxin ZHU  

     
    LETTER-Software Engineering

      Vol:
    E93-D No:2
      Page(s):
    376-379

    Fractals are mathematical or natural objects that are made of parts similar to the whole in certain ways. In this paper a software reliability forecasting method of software failure is proposed based on predictability of fractal time series. The empirical failure data (three data sets of Musa's) are used to demonstrate the performance of the reliability prediction. Compared with other methods, our method is effective.

  • Fast Surface Profiling by White-Light Interferometry Using Symmetric Spectral Optical Filter

    Akira HIRABAYASHI  

     
    PAPER-Measurement Technology

      Vol:
    E93-A No:2
      Page(s):
    542-549

    We propose a surface profiling algorithm by white-light interferometry that extends sampling interval to twice of the widest interval among those used in conventional algorithms. The proposed algorithm uses a novel function called an in-phase component of an interferogram to detect the peak of the interferogram, while conventional algorithms used the squared-envelope function or the envelope function. We show that the in-phase component has the same peak as the corresponding interferogram when an optical filter has a symmetric spectral distribution. We further show that the in-phase component can be reconstructed from sampled values of the interferogram using the so-called quadrature sampling technique. Since reconstruction formulas used in the algorithm are very simple, the proposed algorithm requires low computational costs. Simulation results show the effectiveness of the proposed algorithm.

  • Noncoherent Maximum Likelihood Detection for Differential Spatial Multiplexing MIMO Systems

    Ziyan JIA  Katsunobu YOSHII  Shiro HANDA  Fumihito SASAMORI  Shinjiro OSHITA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:2
      Page(s):
    361-368

    In this paper, we propose a novel noncoherent maximum likelihood detection (NMLD) method for differential spatial multiplexing (SM) multiple-input multiple-output (MIMO) systems. Unlike the conventional maximum likelihood detection (MLD) method which needs the knowledge of channel state information (CSI) at the receiver, NMLD method has no need of CSI at either the transmitter or receiver. After repartitioning the observation block of multiple-symbol differential detection (MSDD) and following a decision feedback process, the decision metric of NMLD is derived by reforming that of MSDD. Since the maximum Doppler frequency and noise power are included in the derived decision metric, estimations of both maximum Doppler frequency and noise power are needed at the receiver for NMLD. A fast calculation algorithm (FCA) is applied to reduce the computational complexity of NMLD. The feasibility of the proposed NMLD is demonstrated by computer simulations in both slow and fast fading environments. Simulation results show that the proposed NMLD has good bit error rate (BER) performance, approaching that of the conventional coherent MLD with the extension of reference symbols interval. It is also proved that the BER performance is not sensitive to the estimation errors in maximum Doppler frequency and noise power.

  • Proportional Fair Based Subcarrier Allocation for OFDMA System with DF Relay

    Bin FAN  Wenbo WANG  Yicheng LIN  Kan ZHENG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:1
      Page(s):
    187-191

    This paper considers the proportional fair (PF) based subcarrier allocation problem in a multihop orthogonal frequency division multiple access (OFDMA) broadcast system with decode-and-forward (DF) relays. The problem is formulated as a mixed binary integer programming problem with the objective to achieve proportional fairness among users and exploit the diversity provided by the independent frequency selective fading among hops. Since it is prohibitive to find the optimal solution, two efficient heuristic schemes are proposed. Simulation results indicate that with the same fairness performance, the proposed schemes achieve considerable capacity gain over the conventional PF scheduling method.

  • Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    Junko TAKAHASHI  Toshinori FUKUNAGA  

     
    PAPER-Cryptanalysis

      Vol:
    E93-A No:1
      Page(s):
    136-143

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  • Estimation of Radio Communication Distance along Random Rough Surface

    Junichi HONDA  Kazunori UCHIDA  Kwang-Yeol YOON  

     
    PAPER

      Vol:
    E93-C No:1
      Page(s):
    39-45

    This paper is concerned with the estimation of radio communication distance when both the transmitter and receiver are arbitrarily distributed on a random rough surface such as desert, terrain, sea surface and so on. First, we simulate electromagnetic wave propagation along the rough surface by using the discrete ray tracing method (DRTM) proposed by authors recently. Second, we determine three parameters by conjugate gradient method (CGM) combined with the method of least-squares. Finally, we derive an analytical expression which can estimate the maximum communication distance when the input power of a transmitter and the minimum detectable electric intensity of a receiver are specified. Random rough surfaces are assumed to be Gaussian, pn-th order power law or exponential distributions.

  • A Rational Secret-Sharing Scheme Based on RSA-OAEP

    Toshiyuki ISSHIKI  Koichiro WADA  Keisuke TANAKA  

     
    PAPER-Public Key Cryptography

      Vol:
    E93-A No:1
      Page(s):
    42-49

    In this paper, we propose a rational m-out-of-n secret sharing scheme, a dealer wishes to entrust a secret with a group of n players such that any subset of m or more players can reconstruct the secret, but a subset of less than m players cannot learn anything about the secret. The reconstruction protocol of our scheme is fair and stable in the rational settings, allowing all players to obtain the designated secret. Our scheme is based on RSA-OAEP with the distributed decryption. The security of our scheme relies on a computational assumption and uses the random oracles. The size of each share in our scheme is independent of the utility function and the computation cost of the reconstruction protocol is constant. Moreover, our scheme prevents the attacks with at most m-1 coalitions.

  • Software Reliability Modeling Considering Fault Correction Process

    Lixin JIA  Bo YANG  Suchang GUO  Dong Ho PARK  

     
    LETTER-Software Engineering

      Vol:
    E93-D No:1
      Page(s):
    185-188

    Many existing software reliability models (SRMs) are based on the assumption that fault correction activities take a negligible amount of time and resources, which is often invalid in real-life situations. Consequently, the estimated and predicted software reliability tends to be over-optimistic, which could in turn mislead management in related decision-makings. In this paper, we first make an in-depth analysis of real-life software testing process; then a Markovian SRM considering fault correction process is proposed. Parameter estimation method and software reliability prediction method are established. A numerical example is given which shows that by using the proposed model and methods, the results obtained tend to be more appropriate and realistic.

  • A Fault Signature Characterization Based Analog Circuit Testing Scheme and the Extension of IEEE 1149.4 Standard

    Wimol SAN-UM  Masayoshi TACHIBANA  

     
    PAPER

      Vol:
    E93-D No:1
      Page(s):
    33-42

    An analog circuit testing scheme is presented. The testing technique is a sinusoidal fault signature characterization, involving the measurement of DC offset, amplitude, frequency and phase shift, and the realization of two crossing level voltages. The testing system is an extension of the IEEE 1149.4 standard through the modification of an analog boundary module, affording functionalities for both on-chip testing capability, and accessibility to internal components for off-chip testing. A demonstrating circuit-under-test, a 4th-order Gm-C low-pass filter, and the proposed analog testing scheme are implemented in a physical level using 0.18-µm CMOS technology, and simulated using Hspice. Both catastrophic and parametric faults are potentially detectable at the minimum parameter variation of 0.5%. The fault coverage associated with CMOS transconductance operational amplifiers and capacitors are at 94.16% and 100%, respectively. This work offers the enhancement of standardizing test approach, which reduces the complexity of testing circuit and provides non-intrusive analog circuit testing.

  • A New Reactive FMIPv6 Mechanism for Minimizing Packet Loss

    PyungSoo KIM  

     
    LETTER-Network

      Vol:
    E93-B No:1
      Page(s):
    166-169

    This paper considers a new reactive fast handover MIPv6 (FMIPv6) mechanism to minimize packet loss of the existing mechanism. The primary idea of the proposed reactive FMIPv6 mechanism is that the serving access router buffers packets toward the mobile node (MN) as soon as the link layer between MN and serving base station is disconnected. To implement the proposed mechanism, the router discovery message exchanged between MN and serving access router is extended. In addition, the IEEE 802.21 Media Independent Handover Function event service message is defined newly. Through analytic performance evaluation and experiments, the proposed reactive FMIPv6 mechanism can be shown to minimize packet loss much than the existing mechanism.

  • TE Plane Wave Scattering and Diffraction from a Periodic Surface with Semi-infinite Extent

    Yasuhiko TAMURA  

     
    PAPER

      Vol:
    E93-C No:1
      Page(s):
    9-16

    This paper studies scattering and diffraction of a TE plane wave from a periodic surface with semi-infinite extent. By use of a combination of the Wiener-Hopf technique and a perturbation method, a concrete representation of the wavefield is explicitly obtained in terms of a sum of two types of Fourier integrals. It is then found that effects of surface roughness mainly appear on the illuminated side, but weakly on the shadow side. Moreover, ripples on the angular distribution of the first-order scattering in the shadow side are newly found as interference between a cylindrical wave radiated from the edge and an inhomogeneous plane wave supported by the periodic surface.

  • Multiple-Symbol Differential Detection for Unitary Space-Time-Frequency Coding

    Ziyan JIA  Shiro HANDA  Fumihito SASAMORI  Shinjiro OSHITA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:1
      Page(s):
    90-98

    In this paper, multiple-symbol differential detection (MSDD) is applied to the differential unitary space-time-frequency coding (DUSTFC) scheme over frequency selective fading multiple-input multiple-output (MIMO) channels. The motivation of applying MSDD is to compensate for the performance loss of conventional (two-symbol observation) differential detection comparing with coherent detection, by extending the observation interval and considering the fading autocorrelations. Since the differential coding of DUSTFC can be performed in time or frequency domain, both the time-domain and frequency-domain MSDD are investigated. After calculating the frequency-domain fading autocorrelation, the decision metrics of MSDD considering appropriate fading autocorrelations are derived in time and frequency domain respectively. Bit error rate (BER) performances of the two kinds of MSDD are analyzed by computer simulations. Simulation results demonstrate that a considerable performance gain can be got by applying MSDD in both cases, and the transmit diversity gain can also be enhanced by applying MSDD. So that it is proved that full advantage of transmit diversity with DUSTFC can be taken by applying MSDD.

  • A Fault Dependent Test Generation Method for State-Observable FSMs to Increase Defect Coverage under the Test Length Constraint

    Ryoichi INOUE  Toshinori HOSOKAWA  Hideo FUJIWARA  

     
    PAPER

      Vol:
    E93-D No:1
      Page(s):
    24-32

    Since scan testing is not based on the function of the circuit, but rather the structure, it is considered to be both a form of over testing and under testing. Moreover, it is important to test VLSIs using the given function. Since the functional specifications are described explicitly in the FSMs, high test quality is expected by performing logical fault testing and timing fault testing. This paper proposes a fault-dependent test generation method to detect specified fault models completely and to increase defect coverage as much as possible under the test length constraint. We present experimental results for MCNC'91 benchmark circuits to evaluate bridging fault coverage, transition fault coverage, and statistical delay quality level and to show the effectiveness of the proposed test generation method compared with a stuck-at fault-dependent test generation method.

  • On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL

    Kazuo SAKIYAMA  Kazuo OHTA  

     
    PAPER-Cryptanalysis

      Vol:
    E93-A No:1
      Page(s):
    172-179

    As one of the logic-level countermeasures against DPA (Differential Power Analysis) attacks, Random Switching Logic (RSL) was proposed by Suzuki, Saeki and Ichikawa in 2004 . The RSL technique was applied to AES hardware and a prototype chip was implement with a 0.13-µm standard CMOS library for evaluating the DPA resistance . Although the main purpose of using RSL is to resist the DPA attacks, our experimental results of Clock-based Fault Analysis (CFA) show that one can reveal the secret information from the prototype chip. This paper explains the mechanism of the CFA attack and discusses the reason for the success of the attack against a prototype implementation of AES with RSL (RSL-AES). Furthermore, we consider an ideal RSL-AES implementation that counteracts the CFA attacks.

1261-1280hit(3430hit)