The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] GES(423hit)

181-200hit(423hit)

  • The Sum-Rate Capacity of Strong Interference Channels with Correlated Messages

    Suhan CHOI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E92-B No:3
      Page(s):
    1013-1016

    The transmission of correlated messages over strong interference channels is examined. The result is the proposal of a single-letter characterization of the sum-rate capacity of strong interference channels with correlated messages. It is shown that if the messages are independent, the sum-rate capacity is equal to that of [1] obtained by Costa and El Gamal. However, it can be larger than that of [1] if the messages are correlated. It is also shown that, in terms of the sum-rate, the achievable rate region in [2] is indeed the sum-rate capacity.

  • Polynomial Time Inductive Inference of TTSP Graph Languages from Positive Data

    Ryoji TAKAMI  Yusuke SUZUKI  Tomoyuki UCHIDA  Takayoshi SHOUDAI  

     
    PAPER

      Vol:
    E92-D No:2
      Page(s):
    181-190

    Two-Terminal Series Parallel (TTSP, for short) graphs are used as data models in applications for electric networks and scheduling problems. We propose a TTSP term graph which is a TTSP graph having structured variables, that is, a graph pattern over a TTSP graph. Let TGTTSP be the set of all TTSP term graphs whose variable labels are mutually distinct. For a TTSP term graph g in TGTTSP, the TTSP graph language of g, denoted by L(g), is the set of all TTSP graphs obtained from g by substituting arbitrary TTSP graphs for all variables in g. Firstly, when a TTSP graph G and a TTSP term graph g are given as inputs, we present a polynomial time matching algorithm which decides whether or not L(g) contains G. The minimal language problem for the class LTTSP={L(g) | g ∈ TGTTSP} is, given a set S of TTSP graphs, to find a TTSP term graph g in TGTTSP such that L(g) is minimal among all TTSP graph languages which contain all TTSP graphs in S. Secondly, we give a polynomial time algorithm for solving the minimal language problem for LTTSP. Finally, we show that LTTSP is polynomial time inductively inferable from positive data.

  • CRRT: Congestion-Aware and Rate-Controlled Reliable Transport in Wireless Sensor Networks

    Muhammad Mahbub ALAM  Choong Seon HONG  

     
    PAPER-Network

      Vol:
    E92-B No:1
      Page(s):
    184-199

    For successful data collection in wireless sensor networks, it is important to ensure that the required delivery ratio is maintained while keeping a fair rate for every sensor. Furthermore, emerging high-rate applications might require complete reliability and the transfer of large volume of data, where persistent congestion might occur. These requirements demand a complete but efficient solution for data transport in sensor networks which reliably transports data from many sources to one or more sinks, avoids congestion and maintains fairness. In this paper, we propose congestion-aware and rate-controlled reliable transport (CRRT), an efficient and low-overhead data transport mechanism for sensor networks. CRRT uses efficient MAC retransmission to increase one-hop reliability and end-to-end retransmission for loss recovery. It also controls the total rate of the sources centrally, avoids the congestion in the bottleneck based on congestion notifications from intermediate nodes and centrally assigns the rate to the sources based on rate assignment policy of the applications. Performance of CRRT is evaluated in NS-2 and simulation results demonstrate the effectiveness of CRRT.

  • Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Yu SASAKI  Lei WANG  Kazuo OHTA  Noboru KUNIHIRO  

     
    PAPER-Hash Function

      Vol:
    E92-A No:1
      Page(s):
    96-104

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  • Transmission of Correlated Messages over Interference Channels with Strong Interference

    Suhan CHOI  Eunchul YOON  Hichan MOON  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E91-B No:12
      Page(s):
    3998-4002

    Transmission of correlated messages over interference channels with strong interference is considered. As a result, an achievable rate region is presented. It is shown that if the messages are correlated, the achievable rate region can be larger than the capacity region given by Costa and El Gamal. As an example, the Gaussian interference channel is considered.

  • TCP Congestion Control Mechanisms for Achieving Predictable Throughput Using Inline Network Measurement

    Go HASEGAWA  Kana YAMANEGI  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E91-B No:12
      Page(s):
    3945-3955

    Recently, real-time media delivery services such as video streaming and VoIP have rapidly become popular. For these applications requiring high-level QoS guarantee, our research group has proposed a transport-layer approach to provide predictable throughput for upper-layer applications. In the present paper, we propose a congestion control mechanism of TCP for achieving predictable throughput. It does not mean we can guarantee the throughput, while we can provide the throughput required by an upper-layer application at high probability when network congestion level is not so high by using the inline network measurement technique for available bandwidth of the network path. We present the evaluation results for the proposed mechanism obtained in simulation and implementation experiments, and confirm that the proposed mechanism can assure a TCP throughput if the required bandwidth is not so high compared to the physical bandwidth, even when other ordinary TCP (e.g., TCP Reno) connections occupy the link.

  • StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies

    KokSheik WONG  Kiyoshi TANAKA  

     
    PAPER-Image Security

      Vol:
    E91-A No:10
      Page(s):
    2897-2908

    This paper proposes a DCT-based steganographic method named StegErmelc in the JPEG domain. Three strategies are proposed, namely (i) edge-like block selection, (ii) recursive matrix encoding, and (iii) largest coefficient serving, to form a novel steganographic method for achieving scalable carrier capacity, low detectability by universal blind steganalyzer, and high image quality, simultaneously. For a given message length, StegErmelc flexibly scales its carrier capacity to accommodate the message while trading off with stego detectability. At full capacity, StegErmelc has comparable carrier capacity relative to the existing methods. When embedding the same amount of information, StegErmelc remarkably reduces the stego detection rate to about 0.3-0.5 lower than that of the existing methods considered, and consequently StegErmelc can withstand blind steganalyzer when embedding up to 0.10 bpc. Under the same condition, StegErmelc produces stego image with quality higher than that of the existing methods considered. Graphical comparison with three additional evaluation metrics is also presented to show the relative performance of StegErmelc with respect to the existing methods considered.

  • Autonomous Distributed Congestion Control Scheme in WCDMA Network

    Hafiz Farooq AHMAD  Hiroki SUGURI  Muhammad Qaisar CHOUDHARY  Ammar HASSAN  Ali LIAQAT  Muhammad Umer KHAN  

     
    PAPER

      Vol:
    E91-D No:9
      Page(s):
    2267-2275

    Wireless technology has become widely popular and an important means of communication. A key issue in delivering wireless services is the problem of congestion which has an adverse impact on the Quality of Service (QoS), especially timeliness. Although a lot of work has been done in the context of RRM (Radio Resource Management), the deliverance of quality service to the end user still remains a challenge. Therefore there is need for a system that provides real-time services to the users through high assurance. We propose an intelligent agent-based approach to guarantee a predefined Service Level Agreement (SLA) with heterogeneous user requirements for appropriate bandwidth allocation in QoS sensitive cellular networks. The proposed system architecture exploits Case Based Reasoning (CBR) technique to handle RRM process of congestion management. The system accomplishes predefined SLA through the use of Retrieval and Adaptation Algorithm based on CBR case library. The proposed intelligent agent architecture gives autonomy to Radio Network Controller (RNC) or Base Station (BS) in accepting, rejecting or buffering a connection request to manage system bandwidth. Instead of simply blocking the connection request as congestion hits the system, different buffering durations are allocated to diverse classes of users based on their SLA. This increases the opportunity of connection establishment and reduces the call blocking rate extensively in changing environment. We carry out simulation of the proposed system that verifies efficient performance for congestion handling. The results also show built-in dynamism of our system to cater for variety of SLA requirements.

  • On Algebraic Properties of Delay-Nonconflicting Languages in Supervisory Control under Communication Delays

    Jung-Min YANG  Seong-Jin PARK  

     
    LETTER-Systems and Control

      Vol:
    E91-A No:8
      Page(s):
    2237-2239

    In networked control systems, uncontrollable events may unexpectedly occur in a plant before a proper control action is applied to the plant due to communication delays. In the area of supervisory control of discrete event systems, Park and Cho [5] proposed the notion of delay-nonconflictingness for the existence of a supervisor achieving a given language specification under communication delays. In this paper, we present the algebraic properties of delay-nonconflicting languages which are necessary for solving supervisor synthesis problems under communication delays. Specifically, we show that the class of prefix-closed and delay-nonconflicting languages is closed under intersection, which leads to the existence of a unique infimal prefix-closed and delay-nonconflicting superlanguage of a given language specification.

  • Enhanced TCP Congestion Control Realizing Higher Throughput and Inter-Session Fairness in Multihop Wireless Networks

    Takehito YAMAMOTO  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Internet

      Vol:
    E91-B No:7
      Page(s):
    2279-2286

    It is known that TCP data transfer in a wireless multihop network experiences a degradation in inter-connection fairness and throughput. This is because TCP is designed for use in wired networks, and the wireless multihop network has characteristics of sharing of the medium resources among nodes, which wired networks do not have. In particular, in wireless multihop networks where wireless nodes widely exist, hidden/exposed terminal problems are caused even if an RTS/CTS handshake is used. In this paper, two methods are proposed to improve fairness and throughput, without any feedback information from the intermediate nodes or cross-layer information. One method restricts the transfer period, while the other restrains the TCP congestion window. We evaluated these methods using computer simulations.

  • New Closed-Form of the Largest Eigenvalue PDF for Max-SNR MIMO System Performances

    Jonathan LETESSIER  Baptiste VRIGNEAU  Philippe ROSTAING  Gilles BUREL  

     
    PAPER-Communication Theory and Signals

      Vol:
    E91-A No:7
      Page(s):
    1791-1796

    Multiple-input multiple-output (MIMO) maximum-SNR (max-SNR) system employs the maximum ratio combiner (MRC) at the receiver side and the maximum ratio transmitter (MRT) at the transmitter side. Its performances highly depend on MIMO channel characteristics, which vary according to both the number of antennas and their distribution between the transmitter and receiver sides. By using the decomposition of the ordered Wishart distribution in the uncorrelated Rayleigh case, we derived a closed-form expression of the largest eigenvalue probability density function (PDF). The final result yields to an expression form of the PDF where polynomials are multiplied by exponentials; it is worth underlining that, though this form had been previously observed for given couples of antennas, to date no formally-written closed-form was available in the literature for an arbitrary couple. Then, this new expression permits one to quickly and easily get the well known largest eigenvalue PDF and use it to determine the binary error probability (BEP) of the max-SNR.

  • TCP Context Switching Scheme to Enhance Throughput by Adapting Well to Vertical Handoff in Heterogeneous Wireless Networks

    Woojin SEOK  Sang-Ha KIM  

     
    PAPER-Network

      Vol:
    E91-B No:5
      Page(s):
    1423-1435

    Vertical handoff is a new type of handoff that is triggered when a mobile node moves over heterogeneous wireless networks with each proving different access bandwidth, transmission latency, and coverage. A mobile node can achieve higher throughput by accessing a higher bandwidth providing wireless network. However, TCP has to experience drastic changes of the bandwidth and the latency due to the vertical handoff which must be recognized as a network congestion, and this degrades end-to-end performance. In this paper, we propose a TCP context switching scheme, named Context-Switching TCP, that maintains TCP variables separately for different types of wireless networks. Through simulations, Context-Switching TCP shows higher performance than TCP SACK for vertical handoff. Especially, it shows much higher performance gain when vertical handoff occurs frequently.

  • Quick Vegas: Improving Performance of TCP Vegas for High Bandwidth-Delay Product Networks

    Yi-Cheng CHAN  Chia-Liang LIN  Cheng-Yuan HO  

     
    PAPER-Network

      Vol:
    E91-B No:4
      Page(s):
    987-997

    An important issue in designing a TCP congestion control algorithm is that it should allow the protocol to quickly adjust the end-to-end communication rate to the bandwidth on the bottleneck link. However, the TCP congestion control may function poorly in high bandwidth-delay product networks because of its slow response with large congestion windows. In this paper, we propose an enhanced version of TCP Vegas called Quick Vegas, in which we present an efficient congestion window control algorithm for a TCP source. Our algorithm improves the slow-start and congestion avoidance techniques of original Vegas. Simulation results show that Quick Vegas significantly improves the performance of connections as well as remaining fair when the bandwidth-delay product increases.

  • Near-Optimal Block Alignments

    Kuo-Tsung TSENG  Chang-Biau YANG  Kuo-Si HUANG  Yung-Hsing PENG  

     
    PAPER-Algorithm Theory

      Vol:
    E91-D No:3
      Page(s):
    789-795

    The optimal alignment of two given biosequences is mathematically optimal, but it may not be a biologically optimal one. To investigate more possible alignments with biological meaning, one can relax the scoring functions to get near-optimal alignments. Though the near optimal alignments increase the possibility of finding the correct alignment, they may confuse the biologists because the size of candidates is large. In this paper, we present the filter scheme for the near-optimal alignments. An easy method for tracing the near-optimal alignments and an algorithm for filtering those alignments are proposed. The time complexity of our algorithm is O(dmn) in the worst case, where d is the maximum distance between the near-optimal alignments and the optimal alignment, and m and n are the lengths of the input sequences, respectively.

  • Robust Watermarking Scheme Applied to Radiological Medical Images

    Raul RODRIGUEZ COLIN  Claudia FEREGRINO URIBE  Jose-Alberto MARTINEZ VILLANUEVA  

     
    LETTER-Application Information Security

      Vol:
    E91-D No:3
      Page(s):
    862-864

    We present a watermarking scheme that combines data compression and encryption in application to radiological medical images. In this approach we combine the image moment theory and image homogeneity in order to recover the watermark after a geometrical distortion. Image quality is measured with metrics used in image processing, such as PSNR and MSE.

  • Longest Path Problems on Ptolemaic Graphs

    Yoshihiro TAKAHARA  Sachio TERAMOTO  Ryuhei UEHARA  

     
    PAPER-Graph Algorithms

      Vol:
    E91-D No:2
      Page(s):
    170-177

    Longest path problem is a problem for finding a longest path in a given graph. While the graph classes in which the Hamiltonian path problem can be solved efficiently are widely investigated, there are few known graph classes such that the longest path problem can be solved efficiently. Polynomial time algorithms for finding a longest cycle and a longest path in a Ptolemaic graph are proposed. Ptolemaic graphs are the graphs that satisfy the Ptolemy inequality, and they are the intersection of chordal graphs and distance-hereditary graphs. The algorithms use the dynamic programming technique on a laminar structure of cliques, which is a recent characterization of Ptolemaic graphs.

  • Detection of Displacement Vectors through Edge Segment Detection

    Haiyang YU  Seizaburo NIITSUMA  

     
    PAPER-Computation and Computational Models

      Vol:
    E91-D No:2
      Page(s):
    234-242

    The research on displacement vector detection has gained increasing attention in recent years. However, no relationship between displacement vectors and the outlines of objects in motion has been established. We describe a new method of detecting displacement vectors through edge segment detection by emphasizing the correlation between displacement vectors and their outlines. Specifically, after detecting an edge segment, the direction of motion of the edge segment can be inferred through the variation in the values of the Laplacian-Gaussian filter at the position near the edge segment before and after the motion. Then, by observing the degrees of displacement before and after the motion, the displacement vector can be calculated. The accuracy compared to other methods of displacement vector detection demonstrates the feasibility of this method.

  • Improvements of HITS Algorithms for Spam Links

    Yasuhito ASANO  Yu TEZUKA  Takao NISHIZEKI  

     
    PAPER-Scoring Algorithms

      Vol:
    E91-D No:2
      Page(s):
    200-208

    The HITS algorithm proposed by Kleinberg is one of the representative methods of scoring Web pages by using hyperlinks. In the days when the algorithm was proposed, most of the pages given high score by the algorithm were really related to a given topic, and hence the algorithm could be used to find related pages. However, the algorithm and the variants including Bharat's improved HITS, abbreviated to BHITS, proposed by Bharat and Henzinger cannot be used to find related pages any more on today's Web, due to an increase of spam links. In this paper, we first propose three methods to find "linkfarms," that is, sets of spam links forming a densely connected subgraph of a Web graph. We then present an algorithm, called a trust-score algorithm, to give high scores to pages which are not spam pages with a high probability. Combining the three methods and the trust-score algorithm with BHITS, we obtain several variants of the HITS algorithm. We ascertain by experiments that one of them, named TaN+BHITS using the trust-score algorithm and the method of finding linkfarms by employing name servers, is most suitable for finding related pages on today's Web. Our algorithms take time and memory no more than those required by the original HITS algorithm, and can be executed on a PC with a small amount of main memory.

  • Learning of Finite Unions of Tree Patterns with Internal Structured Variables from Queries

    Satoshi MATSUMOTO  Takayoshi SHOUDAI  Tomoyuki UCHIDA  Tetsuhiro MIYAHARA  Yusuke SUZUKI  

     
    PAPER-Algorithmic Learning Theory

      Vol:
    E91-D No:2
      Page(s):
    222-230

    A linear term tree is defined as an edge-labeled rooted tree pattern with ordered children and internal structured variables whose labels are mutually distinct. A variable can be replaced with arbitrary edge-labeled rooted ordered trees. We consider the polynomial time learnability of finite unions of linear term trees in the exact learning model formalized by Angluin. The language L(t) of a linear term tree t is the set of all trees obtained from t by substituting arbitrary edge-labeled rooted ordered trees for all variables in t. Moreover, for a finite set S of linear term trees, we define L(S)=∪t∈S L(t). A target of learning, denoted by T*, is a finite set of linear term trees, where the number of edge labels is infinite. In this paper, for any set T* of m linear term trees (m ≥ 0), we present a query learning algorithm which exactly identifies T* in polynomial time using at most 2mn2 Restricted Subset queries and at most m+1 Equivalence queries, where n is the maximum size of counterexamples. Finally, we note that finite sets of linear term trees are not learnable in polynomial time using Restricted Equivalence, Membership and Subset queries.

  • New Methods for Maintaining Fairness between Well-Behaved TCP Flows and Tampered-TCP Flows at Edge Routers

    Junichi MARUYAMA  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E91-B No:1
      Page(s):
    197-206

    In this paper, we propose new methods which detect tampered-TCP connections at edge routers and protect well-behaved TCP connections from tampered-TCP connections, which results in fairness among TCP connections. The proposed methods monitor the TCP packets at an edge router and estimate the window size or the throughput for each TCP connection. By using estimation results, the proposed methods assess whether each TCP connection is tampered or not and drop packets intentionally if necessary to improve the fairness amongst TCP connections. From the results of simulation experiments, we confirm that the proposed methods can accurately identify tampered-TCP connections and regulate throughput ratio between tampered-TCP connections and competing TCP Reno connections to about 1.

181-200hit(423hit)