The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IoU(110hit)

41-60hit(110hit)

  • Ultra Linear Modulator with High Output RF Gain Using a 12 MMI Coupler

    Peng YUE  Qian-nan LI  Xiang YI  Tuo WANG  Zeng-ji LIU  Geng CHEN  Hua-xi GU  

     
    BRIEF PAPER-Lasers, Quantum Electronics

      Vol:
    E95-C No:12
      Page(s):
    1883-1886

    A novel and compact electro-optic modulator implemented by a combination of a 12 multimode interference (MMI) coupler and an integrated Mach-Zehnder interferometer (MZI) modulator consisting of a microring and a phase modulator (PM) is presented and analyzed theoretically. It is shown that the proposed modulator offers both ultra-linearity and high output RF gain simultaneously, with no requirements for complicated and precise direct current (DC) control.

  • Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions

    Bernardo MACHADO DAVID  Anderson C.A. NASCIMENTO  Rafael T. DE SOUSA, JR.  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:11
      Page(s):
    2059-2066

    We introduce an efficient fully simulatable construction of oblivious transfer based on the McEliece assumptions in the common reference string model. This is the first efficient fully simulatable oblivious protocol based on coding assumptions. Moreover, being based on the McEliece assumptions, the proposed protocol is a good candidate for the post-quantum scenario.

  • Analysis of Effect of User Misbehaviours on the Reservation-Based MAC Protocols in Wireless Communication Networks Open Access

    Norrarat WATTANAMONGKHOL  Warakorn SRICHAVENGSUP  Pisit VANICHCHANUNT  Robithoh ANNUR  Jun-ichi TAKADA  Lunchakorn WUTTISITTIKULKIJ  

     
    PAPER-Network

      Vol:
    E95-B No:9
      Page(s):
    2794-2806

    In a shared medium communication system, mobile users contend for channel access according to a given set of rules to avoid collisions and achieve efficient use of the medium. If one or more users do not comply with the agree rules either due to selfish or malicious behaviours, they will cause some impacts on the system performance, especially to the well-behaved users. In this paper, we consider the problem of user misbehaviours on the performance of a wireless infrastructure-based network using reservation-based MAC protocols. Key misbehaving strategies possible in such a network are identified and explained. To quantify the impact of these misbehaviours upon the network performance, three different misbehaving scenarios are developed to allow a systematic investigation of each misbehaving strategy. For each scenario, we have derived mathematical formulations for evaluating and analyzing the key performance metrics, i.e., probabilities of success of well-behaved and misbehaved users and the fairness index. Numerical results show that the presence of misbehaviours can cause different levels of damage depending on the misbehavior strategy used. The combined multi-token and increasing permission probability strategies where the misbehaved user selfishly accesses the channel more times and with higher probabilities than allowed is shown to cause the most severe impairment of performance and fairness.

  • A Robust Cooperative Spectrum Sensing Based on Kullback-Leibler Divergence

    Hiep VU-VAN  Insoo KOO  

     
    LETTER

      Vol:
    E95-B No:4
      Page(s):
    1286-1290

    Reliable detection of the licensed user signal is a pre-requirement for avoiding interference to the licensed user in a CR network. Cooperative spectrum sensing (CSS) is able to offer improved sensing performance compared to individual sensing. In this paper, we propose a robust soft combination rule based on the Kullback-Leibler divergence (KL-divergence) for CSS. The proposed scheme is able to obtain a similar sensing performance compared to that of maximum gain combination (MGC) without requiring signal to noise ratio (SNR) information. In addition, the proposed scheme protects the sensing process against common types of malicious users without a malicious user identification step. The simulation results demonstrate the effectiveness of the proposed scheme.

  • Oblivious Transfer Based on the McEliece Assumptions

    Rafael DOWSLEY  Jeroen van de GRAAF  Jorn MULLER-QUADE  Anderson C. A. NASCIMENTO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:2
      Page(s):
    567-575

    We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only. We present two different constructions for oblivious transfer, one based on cut-and-chose arguments and another one which is based on a novel generalization of Bennett-Rudich commitments which may be of independent interest. Finally, we also present a variant of our protocol which is based on the Niederreiter cryptosystem.

  • An Improved Triple-Tunable Millimeter-Wave Frequency Synthesizer with High Performance

    Yuanwang YANG  Jingye CAI  Haiyan JIN  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E94-C No:11
      Page(s):
    1802-1806

    In this letter, an improved triple-tunable frequency synthesizer structure to achieve both high frequency resolution and fast switching speed without degradation of spurious signals (spurs) level performance is proposed. According to this structure, a high performance millimeter-wave frequency synthesizer with low spurious, low phase noise, and fast switching speed, is developed. This synthesizer driven by the direct digital synthesizer (DDS) AD9956 can adjust the output of a DDS and frequency division ratios of two variable frequency dividers (VFDs) to move the spurious components outside the loop bandwidth of the phase-locked loop (PLL). Moreover, the ADF4252 based microwave PLL can further suppress the phase noise. Experimental results from the implemented synthesizer show that remarkable performance improvements have been achieved.

  • Robust Detection of Incumbents in Cognitive Radio Networks Using Groups

    Helena RIFA-POUS  Mercedes JIMENEZ BLASCO  Jose Carlos MUT ROJAS  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:9
      Page(s):
    2558-2564

    Cognitive radio is a wireless technology aimed at improving the efficient use of the radio-electric spectrum, thus facilitating a reduction in the load on the free frequency bands. Cognitive radio networks can scan the spectrum and adapt their parameters to operate in the unoccupied bands. To avoid interfering with licensed users operating on a given channel, the networks need to be highly sensitive, which is achieved by using cooperative sensing methods. Current cooperative sensing methods are not robust enough against occasional or continuous attacks. This article outlines a Group Fusion method that takes into account the behaviour of users over the short and long term. On fusing the data, the method is based on giving more weight to user groups that are more unanimous in their decisions. Simulations of a dynamic environment with interference are performed. Results prove that when attackers are present (both reiterative or sporadic), the proposed Group Fusion method has superior sensing capability than other methods.

  • A Single-Chip RF Tuner/OFDM Demodulator for Mobile Digital TV Application

    Yoshimitsu TAKAMATSU  Ryuichi FUJIMOTO  Tsuyoshi SEKINE  Takaya YASUDA  Mitsumasa NAKAMURA  Takuya HIRAKAWA  Masato ISHII  Motohiko HAYASHI  Hiroya ITO  Yoko WADA  Teruo IMAYAMA  Tatsuro OOMOTO  Yosuke OGASAWARA  Masaki NISHIKAWA  Yoshihiro YOSHIDA  Kenji YOSHIOKA  Shigehito SAIGUSA  Hiroshi YOSHIDA  Nobuyuki ITOH  

     
    PAPER

      Vol:
    E94-C No:4
      Page(s):
    557-566

    This paper presents a single-chip RF tuner/OFDM demodulator for a mobile digital TV application called “1-segment broadcasting.” To achieve required performances for the single-chip receiver, a tunable technique for a low-noise amplifier (LNA) and spurious suppression techniques are proposed in this paper. Firstly, to receive all channels from 470 MHz to 770 MHz and to relax distortion characteristics of following circuit blocks such as an RF variable-gain amplifier and a mixer, a tunable technique for the LNA is proposed. Then, to improve the sensitivity, spurious signal suppression techniques are also proposed. The single-chip receiver using the proposed techniques is fabricated in 90 nm CMOS technology and total die size is 3.26 mm 3.26 mm. Using the tunable LNA and suppressing undesired spurious signals, the sensitivities of less than -98.6 dBm are achieved for all the channels.

  • Unconditionally Secure Oblivious Transfer from Algebraic Signaling over the Gaussian Channel

    Motohiko ISAKA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:11
      Page(s):
    2017-2025

    We study the use of the additive white Gaussian noise channel to achieve a cryptographic primitive that is important in secure multiparty computation. A protocol for unconditionally secure oblivious transfer is presented. We show that channel input alphabets with a certain algebraic structure and their partitions are useful in achieving the requirements on the primitive. Signal design for a protocol with high information rate is discussed.

  • A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data

    Jungsuk SONG  Hiroki TAKAKURA  Yasuo OKABE  Daisuke INOUE  Masashi ETO  Koji NAKAO  

     
    PAPER-Information Network

      Vol:
    E93-D No:9
      Page(s):
    2544-2554

    Intrusion Detection Systems (IDS) have been received considerable attention among the network security researchers as one of the most promising countermeasures to defend our crucial computer systems or networks against attackers on the Internet. Over the past few years, many machine learning techniques have been applied to IDSs so as to improve their performance and to construct them with low cost and effort. Especially, unsupervised anomaly detection techniques have a significant advantage in their capability to identify unforeseen attacks, i.e., 0-day attacks, and to build intrusion detection models without any labeled (i.e., pre-classified) training data in an automated manner. In this paper, we conduct a set of experiments to evaluate and analyze performance of the major unsupervised anomaly detection techniques using real traffic data which are obtained at our honeypots deployed inside and outside of the campus network of Kyoto University, and using various evaluation criteria, i.e., performance evaluation by similarity measurements and the size of training data, overall performance, detection ability for unknown attacks, and time complexity. Our experimental results give some practical and useful guidelines to IDS researchers and operators, so that they can acquire insight to apply these techniques to the area of intrusion detection, and devise more effective intrusion detection models.

  • Wide Band Spurious Suppression of Multi-Strip Resonator BPF -- Comprehensive Way to Suppress Spurious Responses in BPFs -- Open Access

    Ikuo AWAI  

     
    INVITED PAPER

      Vol:
    E93-C No:7
      Page(s):
    942-948

    A new comprehensive method to suppress the spurious modes in a BPF is proposed taking the multi-strip resonator BPF as an example. It consists of disturbing the resonant frequency, coupling coefficient and external Q of the higher-order modes at the same time. The designed example has shown an extraordinarily good out-of-band response in the computer simulation.

  • Oblivious Transfer from the Additive White Gaussian Noise Channel

    Motohiko ISAKA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:2
      Page(s):
    516-525

    We consider the use of the additive white Gaussian noise channel to achieve information theoretically secure oblivious transfer. A protocol for this primitive that ensures the correctness and privacy for players is presented together with the signal design. We also study the information theoretic efficiency of the protocol, and some more practical issues where the parameter of the channel is unknown to the players.

  • A Robust Secure Cooperative Spectrum Sensing Scheme Based on Evidence Theory and Robust Statistics in Cognitive Radio

    Nhan NGUYEN-THANH  Insoo KOO  

     
    PAPER-Spectrum Sensing

      Vol:
    E92-B No:12
      Page(s):
    3644-3652

    Spectrum sensing is a key technology within Cognitive Radio (CR) systems. Cooperative spectrum sensing using a distributed model provides improved detection for the primary user, which opens the CR system to a new security threat. This threat is the decrease of the cooperative sensing performance due to the spectrum sensing data falsification which is generated from malicious users. Our proposed scheme, based on robust statistics, utilizes only available past sensing nodes' received power data for estimating the distribution parameters of the primary signal presence and absence hypotheses. These estimated parameters are used to perform the Dempster-Shafer theory of evidence data fusion which causes the elimination of malicious users. Furthermore, in order to enhance performance, a node's reliability weight is supplemented along with the data fusion scheme. Simulation results indicate that our proposed scheme can provide a powerful capability in eliminating malicious users as well as a high gain of data fusion under various cases of channel condition.

  • TCP-Friendly Retransmission Persistence Management for SR-ARQ Protocols

    Jechan HAN  Beomjoon KIM  Jaiyong LEE  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E92-B No:10
      Page(s):
    3243-3246

    This letter proposes a new retransmission persistence management scheme for selective repeat automatic repeat request (SR-ARQ). By considering the overall traffic load that has to be managed by SR-ARQ, the proposed scheme arbitrates the retransmission persistence to prevent an abrupt delay increment due to excessive link-level local retransmissions. OPNET simulations show that SR-ARQ performs better with the proposed scheme than with a fixed value of retransmission persistence in terms of the throughput of transmission control protocol (TCP).

  • Spurious Suppression Effect by Transmit Bandpass Filters with HTS Dual-Mode Resonators for 5 GHz Band Open Access

    Kazunori YAMANAKA  Kazuaki KURIHARA  Akihiko AKASEGAWA  Masatoshi ISHII  Teru NAKANISHI  

     
    INVITED PAPER

      Vol:
    E92-C No:3
      Page(s):
    288-295

    We report on the spurious suppression effect in low-microwave power transmitters by high temperature superconducting (HTS) bandpass filters (BPFs) which are promising for devices requiring BPFs with high-frequency selectivity. Some of the major issues on the power BPFs with HTS planar circuits for wireless communication applications are reviewed. As a case study for the HTS filter and its spurious suppression effect, this paper describes an example of the measured power spectrum density (PSD) on the suppression effect by one of our developed power BPFs with YBCO films for the 5 GHz band. It was designed with equivalent cascade resonators of 16 poles. We demonstrated the effect by HTS power filter in a power amplifier for the 5 GHz band.

  • Spurious Reduction Techniques for DDS-Based Synthesizers

    Jianming ZHOU  

     
    PAPER-Electronic Circuits

      Vol:
    E92-C No:2
      Page(s):
    252-257

    This paper analyzes the spurious sources in DDS synthesizers and deduces the simple model of DDS output signal. The method of feeding pseudo-random noise into the phase accumulator for spurious reduction is discussed. A new method for spurious reduction by compensating for DAC integer nonlinearity is proposed with two DACs and a power combiner. One DAC generates the error signal to compensate for the other DAC INL. The factor how the amplitude error and the phase error between the two combined signals affect the spurious level is also analyzed. The experiment shows that the spurious reduction can be improved by at least 18 dB, which proves the validity of the DAC INL compensation method for the spurious reduction.

  • Reduction of Charge Injection and Current-Mismatch Errors of Charge Pump for Phase-Locked Loop

    Masahiro YOSHIOKA  Nobuo FUJII  

     
    PAPER

      Vol:
    E92-A No:2
      Page(s):
    381-388

    This paper proposes a new charge pump to suppress spurious noise of phase-locked loops. The spurious noise is induced by charge injection generated from the parasitic capacitors associated with switches and the current-mismatch between the charging and discharging currents of the charge pump. A new charge pump is configured by adding an operational amplifier, a sample-and-hold circuit, and switches to a basic charge pump. During the idling time of the charge pump, the currents of the current sources are adjusted and the current-mismatch are reduced to 0.3%. Applying the proposed charge pump to a phase-locked loop, we can suppress the spurious noise by 18 dB compared with a PLL using a basic one.

  • Artificial Dielectric Resonator Made of Spherical Metal Particles

    Ikuo AWAI  Osamu MIZUE  Arun Kumar SAHA  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    72-76

    A microwave resonator is fabricated by a lump of spherical metal particles for the first time. It is the evidence that those particles constitute artificial dielectrics. The effective permittivity is calculated numerically together with the permeability. Resonant mode frequencies in the experiment are compared with the theoretical result obtained by the effective material constants above. Their reasonable agreement indicates the validity of material constant extraction. The unique diamagnetism of spherical particles could be utilized for improvement of spurious property of a resonator.

  • Symmetricity of the Protocols Related to Oblivious Transfer

    Daisuke INOUE  Keisuke TANAKA  

     
    LETTER

      Vol:
    E92-A No:1
      Page(s):
    217-221

    In this paper, we show that each of the special cases of strong conditional oblivious transfer can be obtained from only one instance of its inverse. Each of our constructions is simple and efficient, and preserves the same security level of its inverse.

  • A Very Low Spurious X-Band Frequency Quadrupler with Very High Integration Using 3D-MMIC Technology

    Yo YAMAGUCHI  Takana KAHO  Kazuhiro UEHARA  

     
    PAPER

      Vol:
    E91-C No:11
      Page(s):
    1744-1750

    A highly integrated frequency quadrupler MMIC that uses three-dimensional MMIC (3D-MMIC) technology is presented. It consists of four driver amplifiers, two doublers, and a 2-band elimination filter. These seven circuits are integrated in only a 2.36 mm2 area. The filter sufficiently suppresses spurious output components. The third and fifth harmonic components, which are the spurious components nearest to the desired component, are well suppressed. The desired/undesired ratio is about 40 dB. The driver amplifiers make the quadrupler output a constant power of the desired multiplied signal under low input power. The MMIC supplies +5 dBm of the fourth harmonic component in the input power range from -10 dBm to +5 dBm. The power dissipation of the MMIC is only 160 mW.

41-60hit(110hit)