The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] NIST(134hit)

81-100hit(134hit)

  • Performance Analysis of an Opportunistic Transmission Scheme for Wireless Sensor Networks

    Jeong Geun KIM  Ca Van PHAN  Wonha KIM  

     
    LETTER-Network

      Vol:
    E92-B No:6
      Page(s):
    2259-2262

    We analyze the performance of an opportunistic transmission strategy for Wireless Sensor Networks (WSNs). We consider a transmission strategy called Binary Decision-Based Transmission (BDT), which is a common form of opportunistic transmission. The BDT scheme initiates transmission only when the channel quality exceeds the optimum threshold to avoid unsuccessful transmissions that waste energy. We formulate the Markov Decision Process (MDP) to identify an optimum threshold for transmission decisions in the BDT scheme.

  • On Ergodic Capacity of Spectrum-Sharing Systems in Fading Channels

    Peng WANG  Xiang CHEN  Shidong ZHOU  Jing WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:5
      Page(s):
    1904-1907

    In spectrum-sharing systems where the secondary user (SU) opportunistically accesses the primary user (PU)'s licensed channel, the SU should satisfy both the transmit power constraint of the SU transmitter and the received power constraint at the PU receiver. This letter studies the ergodic capacity of spectrum-sharing systems in fading channels. The ergodic capacity expression along with the optimal power allocation scheme is derived considering both the average transmit and received power constraints. The capacity function in terms of the two power constraints is found to be divided into transmit power limited region, received power limited region and dual limited region. Numerical results in Rayleigh fading channels are presented to verify our analysis.

  • A New Randomness Test Based on Linear Complexity Profile

    Kenji HAMANO  Fumio SATO  Hirosuke YAMAMOTO  

     
    PAPER-Mathematics

      Vol:
    E92-A No:1
      Page(s):
    166-172

    Linear complexity can be used to detect predictable nonrandom sequences, and hence it is included in the NIST randomness test suite. But, as shown in this paper, the NIST test suite cannot detect nonrandom sequences that are generated, for instance, by concatenating two different M-sequences with low linear complexity. This defect comes from the fact that the NIST linear complexity test uses deviation from the ideal value only in the last part of the whole linear complexity profile. In this paper, a new faithful linear complexity test is proposed, which uses deviations in all parts of the linear complexity profile and hence can detect even the above nonrandom sequences. An efficient formula is derived to compute the exact area distribution needed for the proposed test. Furthermore, a simple procedure is given to compute the proposed test statistic from linear complexity profile, which requires only O(M) time complexity for a sequence of length M.

  • Exact and Closed-Form Outage Probability of Opportunistic Single Relay Selection in Decode-and-Forward Relaying

    Jung-Bin KIM  Dongwoo KIM  

     
    LETTER-Broadcast Systems

      Vol:
    E91-B No:12
      Page(s):
    4085-4088

    In this letter, we first provide the closed-form exact outage probability of opportunistic single relay selection in decode-and-forward (DF) relaying with the direct source-destination link under arbitrarily distributed Rayleigh fading channels. The signals from the source and the selected relay are combined at the destination by using maximal ratio combining (MRC). We derive the probability density function (PDF) and the cumulative density function (CDF) of received SNR at the destination. Numerical results show that the analytic results exactly match with the simulated ones.

  • Multiple Random Beams Selection Exploiting Chordal Distances

    Lan TANG  Pengcheng ZHU  Xiaohu YOU  Yan WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:11
      Page(s):
    3722-3726

    We consider a time-division multiple access (TDMA) transmission scheme in MIMO broadcast channels. To cope with the fairness issue in heterogeneous networks with slow fading, an opportunistic scheduling algorithm based on the channel eigen-direction is investigated. In the system with sparse users, the mismatch between a random beamforming vector and the principle eigenvector of the channel incurs a throughput penalty. To reduce such a throughput loss, a multiple random beams selection (MRBS) scheme exploiting chordal distances is proposed. Two feedback schemes (unquantized or quantized chordal distances) are considered. The closed-form throughput expressions of the proposed schemes are derived.

  • An Opportunistic Forwarding Scheme Exploiting both Long Progress and Adaptive Rate in Wireless Networks

    Suhua TANG  Mehdad N. SHIRAZI  Oyunchimeg SHAGDAR  Ryutaro SUZUKI  Sadao OBANA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3241-3250

    In Mobile Ad hoc Networks (MANET) geographic routing is characterized by local forwarding decision. Links with a long progress are preferred under the greedy forwarding rule. However in a real system long links tend to have a high packet loss rate due to multipath fading. A sub-optimal solution may separately exploit path diversity or rate adaptation. In this paper we study channel efficiency of multi-hop forwarding and try to jointly optimize rate adaptation and forwarder selection in geographic routing by the tradeoff between progress and instantaneous rate. We define a new metric -- Bit Transfer Speed (BTS) -- as the ratio of the progress made towards the destination to the equivalent time taken to transfer a payload bit. This metric takes overhead, rate and progress into account. Then we propose a packet forwarding scheme that Opportunistically exploits both long Progress and Adaptive Rate (OPAR) by a cross-layer design of routing and MAC. In OPAR each node selects for a packet the forwarder with the highest BTS. The forwarder changes as local topology (progress), packet size (overhead ratio) or channel state (data rate) varies. Simulation results show that compared with the normalized advance (NADV) [7] scheme and contention-based forwarding (CBF) [17] scheme, OPAR has lower packet loss and can effectively reduce channel occupation time by over 30% in the scenario with moderate mobility speeds.

  • An Efficient Bottom-up Filtering of XML Messages by Exploiting the Postfix Commonality of XPath Queries

    Jaehoon KIM  Youngsoo KIM  Seog PARK  

     
    PAPER-Contents Technology and Web Information Systems

      Vol:
    E91-D No:8
      Page(s):
    2124-2133

    Recently, for more efficient filtering of XML data, YFilter system has been suggested to exploit the prefix commonalities that exist among path expressions. Sharing the prefix commonality gives the benefit of improving filtering performance through the tremendous reduction in filtering machine size. However, exploiting the postfix commonality can also be useful for an XML filtering situation. For example, when a stream of XML messages does not have any defined schema, or users cannot remember the defined schema exactly, users often use the partial matching path queries which begins with the descendant axis ("//"), e.g., '//science/article/title', '//entertainment/article/title', and '//title'. If so, the registered XPath queries are most likely to have the postfix commonality, e.g., the sample queries share the partial path expressions 'article/title' and 'title'. Therefore, in this paper, we introduce a bottom-up filtering approach exploiting the postfix commonality against the top-down approach of YFilter exploiting the prefix commonality. Some experimental results show that our method has better filtering performance when registered XPath queries mainly consist of the partial matching path queries with the postfix commonality.

  • Polynomial Time Identification of Strict Deterministic Restricted One-Counter Automata in Some Class from Positive Data

    Mitsuo WAKATSUKI  Etsuji TOMITA  

     
    PAPER-Algorithm Theory

      Vol:
    E91-D No:6
      Page(s):
    1704-1718

    A deterministic pushdown automaton (dpda) having just one stack symbol is called a deterministic restricted one-counter automaton (droca). When it accepts an input by empty stack, it is called strict. This paper is concerned with a subclass of real-time strict droca's, called Szilard strict droca's, and studies the problem of identifying the subclass in the limit from positive data. The class of languages accepted by Szilard strict droca's coincides with the class of Szilard languages (or, associated languages) of strict droca's and is incomparable to each of the class of regular languages and that of simple languages. After providing some properties of languages accepted by Szilard strict droca's, we show that the class of Szilard strict droca's is polynomial time identifiable in the limit from positive data in the sense of Yokomori. This identifiability is proved by giving an exact characteristic sample of polynomial size for a language accepted by a Szilard strict droca. The class of very simple languages, which is a proper subclass of simple languages, is also proved to be polynomial time identifiable in the limit from positive data by Yokomori, but it is yet unknown whether there exists a characteristic sample of polynomial size for any very simple language.

  • New Hardware Architecture for Multiplication over GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography

    Soonhak KWON  Taekyoung KWON  Young-Ho PARK  

     
    PAPER-Implementation

      Vol:
    E91-A No:1
      Page(s):
    236-243

    We propose a new linear array for multiplication in GF(2m) which outperforms most of the existing linear multipliers in terms of the area and time complexity. Moreover we will give a very detailed comparison of our array with other existing architectures for the five binary fields GF(2m), m=163,233,283,409,571, recommended by NIST for elliptic curve cryptography.

  • Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite

    Kenji HAMANO  Toshinobu KANEKO  

     
    PAPER

      Vol:
    E90-A No:9
      Page(s):
    1788-1792

    Accurate values for occurrence probabilities of the template used in the overlapping template matching test included in NIST randomness test suite (NIST SP800-22) have been analyzed. The inaccurate values used in the NIST randomness test suite cause significant difference of pass rate. When the inaccurate values are used and significance level is set to 1%, the experimental mean value of pass rate, which is calculated by use of random number sequences taken from DES (Data Encryption Standard), is about 98.8%. In contrast, our new values derived from a set of recurrence formulas for the NIST randomness test suite give an empirical distribution of pass rate that meets the theoretical binomial distribution. Here, the experimental mean value of pass rate is about 99%, which corresponds to the significance level 1%.

  • Statistical Mechanical Analysis of Fuzzy Clustering Based on Fuzzy Entropy

    Makoto YASUDA  Takeshi FURUHASHI  Shigeru OKUMA  

     
    PAPER-Computation and Computational Models

      Vol:
    E90-D No:6
      Page(s):
    883-888

    This paper deals with statistical mechanical characteristics of fuzzy clustering regularized with fuzzy entropy. We obtain the Fermi-Dirac distribution function as a membership function by regularizing the fuzzy c-means with fuzzy entropy. Then we formulate it as a direct annealing clustering, and examine the meanings of Fermi-Dirac function and fuzzy entropy from a statistical mechanical point of view, and show that this fuzzy clustering method is none other than the Fermi-Dirac statistics.

  • A Low Power Deterministic Test Using Scan Chain Disable Technique

    Zhiqiang YOU  Tsuyoshi IWAGAKI  Michiko INOUE  Hideo FUJIWARA  

     
    PAPER-Dependable Computing

      Vol:
    E89-D No:6
      Page(s):
    1931-1939

    This paper proposes a low power scan test scheme and formulates a problem based on this scheme. In this scheme the flip-flops are grouped into N scan chains. At any time, only one scan chain is active during scan test. Therefore, both average power and peak power are reduced compared with conventional full scan test methodology. This paper also proposes a tabu search-based approach to minimize test application time. In this approach we handle the information during deterministic test efficiently. Experimental results demonstrate that this approach drastically reduces both average power and peak power dissipation at a little longer test application time on various benchmark circuits.

  • A Clustered RIN BIST Based on Signal Probabilities of Deterministic Test Sets

    Dong-Sup SONG  Sungho KANG  

     
    LETTER-Dependable Computing

      Vol:
    E89-D No:1
      Page(s):
    354-357

    In this paper, we propose a new clustered reconfigurable interconnect network (CRIN) BIST that can improve the embedding probabilities of random-pattern-resistant-patterns. A simulated annealing based algorithm that maximizes the embedding probabilities of scan test cubes has been developed to reorder scan cells. Experimental results demonstrate that the proposed CRIN BIST technique reduces test time by 35% and the storage requirement by 39% in comparison with previous work.

  • Deterministic Delay Fault BIST Using Adjacency Test Pattern Generation

    Kazuteru NAMBA  Hideo ITO  

     
    PAPER-Dependable Computing

      Vol:
    E88-D No:9
      Page(s):
    2135-2142

    In delay fault BIST (Built-In-Self-Test), an adjacency test pattern generation scheme effectively generates robust test patterns. The traditional adjacency test pattern generation schemes use LFSR to generate first patterns, and thus they cannot generate test patterns for circuits with more than 30 inputs with high fault coverage in a practical amount of time. This paper proposes a deterministic delay fault BIST method using adjacency test pattern generation. The proposed scheme uses first patterns generated by a deterministic algorithm based on the analysis of independent partial circuits on the circuit under test. Experiments show that test patterns generated by the proposed method have both high fault coverage and short test length, resulting in a short test time.

  • Extracting Partial Parsing Rules from Tree-Annotated Corpus: Toward Deterministic Global Parsing

    Myung-Seok CHOI  Kong-Joo LEE  Key-Sun CHOI  Gil Chang KIM  

     
    PAPER-Natural Language Processing

      Vol:
    E88-D No:6
      Page(s):
    1248-1255

    It is not always possible to find a global parse for an input sentence owing to problems such as errors of a sentence, incompleteness of lexicon and grammar. Partial parsing is an alternative approach to respond to these problems. Partial parsing techniques try to recover syntactic information efficiently and reliably by sacrificing completeness and depth of analysis. One of the difficulties in partial parsing is how the grammar might be automatically extracted. In this paper we present a method of automatically extracting partial parsing rules from a tree-annotated corpus using the decision tree method. Our goal is deterministic global parsing using partial parsing rules, in other words, to extract partial parsing rules with higher accuracy and broader expansion. First, we define a rule template that enables to learn a subtree for a given substring, so that the resultant rules can be more specific and stricter to apply. Second, rule candidates extracted from a training corpus are enriched with contextual and lexical information using the decision tree method and verified through cross-validation. Last, we underspecify non-deterministic rules by merging substructures with ambiguity in those rules. The learned grammar is similar to phrase structure grammar with contextual and lexical information, but allows building structures of depth one or more. Thanks to automatic learning, the partial parsing rules can be consistent and domain-independent. Partial parsing with this grammar processes an input sentence deterministically using longest-match heuristics, and recursively applies rules to an input sentence. The experiments showed that the partial parser using automatically extracted rules is not only accurate and efficient but also achieves reasonable coverage for Korean.

  • A Network-Based Approach to Improve TCP Performance in Wireless Systems with Opportunistic Scheduling

    Yi WU  Zhisheng NIU  Junli ZHENG  

     
    PAPER-Internet

      Vol:
    E88-B No:1
      Page(s):
    247-257

    As a highly efficient radio link technology, the opportunistic scheduling policy has been widely investigated and implemented. Therefore, new challenges come up in the case of TCP over opportunistic scheduling systems. In this paper we investigate the impact of wireless opportunistic scheduling on TCP throughput. It shows that the optimization of the wireless link mechanisms needs to be maintained at the transport layer by cooperation of the adjacent layers. We propose a new ACK Reservoir Method to smooth the TCP behavior combating against the spurious timeout caused by scheduling. Based on performance analysis and simulation results, the proposed method is shown to enhance the TCP throughput by up to 100% in the presence of opportunistic scheduling. Finally, the proposed method is evaluated in a practical simulation scenario of CDMA/HDR system.

  • Three-Way Two-Dimensional Deterministic Finite Automata with Rotated Inputs

    Hisao HIRAKAWA  Katsushi INOUE  Akira ITO  

     
    PAPER

      Vol:
    E88-D No:1
      Page(s):
    31-38

    Inoue et al. introduced an automaton on a two-dimensional tape, which decides acceptance or rejection of an input tape by scanning the tape from various sides by various automata which move one way, and investigated the accepting power of such an automaton. This paper continues the investigation of this type of automata, especially, -type automata (obtained by combining four three-way two-dimensional deterministic finite automata (tr2-dfa's) in "or" fashion) and -type automata (obtained by combining four tr2-dfa's in "and" fashion). We first investigate a relationship between the accepting powers of -type automata and -type automata, and show that they are incomparable. Then, we investigate a hierarchy of the accepting powers based on the number of tr2-dfa's combined. Finally, we briefly describe a relationship between the accepting powers of automata obtained by combining three-way two-dimensional deterministic and nondeterministic finite automata.

  • The Distribution of the Spectrum for the Discrete Fourier Transform Test Included in SP800-22

    Kenji HAMANO  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E88-A No:1
      Page(s):
    67-73

    In this paper, the problem in the distribution of the test statistic of the Discrete Fourier Transform (DFT) test included in SP800-22 released by the National Institute of Standards and Technology (NIST), which causes a very high rate of rejection compared with the significance level, is considered on the basis of the distribution of the spectrum. The statistic of the DFT test, which was supposed to follow the standard normal distribution N(0, 1) according to the central limit theorem, seems to follow the normal distribution N(0.691, 0.5) approximately. The author derived the distribution function of the spectrum, and changed the threshold value from the default value of to the value of 1.7308 , where n is the length of a random number sequence. By this modification, the test statistic becomes to follow the normal distribution N(0, 0.5) approximately. The disagreement between this variance (= 0.5) and that of the standard normal distribution (= 1) can be considered to originate in the dependence of the spectrum. The evidences of the dependence are shown.

  • Information and Signal Processing for Sensor Networks

    Akira OGAWA  Takaya YAMAZATO  Tomoaki OHTSUKI  

     
    INVITED PAPER

      Vol:
    E87-A No:10
      Page(s):
    2599-2606

    Sensor networks, in which a large number of sensor nodes are connected with each other through communication networks, are potential to provide extensive new applications with various research and technical challenges and attracting much attention all over the world. In this paper we describe information and signal processing for sensor networks with emphasis on the concepts of collaboration and fusion as one of the most important issues for the sensor networks. We also review some basic aspects of sensor networks in terms of their features and the network architecture.

  • Ω Line Problem in Optimistic Log-Based Rollback Recovery Protocol

    MaengSoon BAIK  SungJin CHOI  ChongSun HWANG  JoonMin GIL  ChanYeol PARK  HeonChang YOO  

     
    PAPER-Distributed, Grid and P2P Computing

      Vol:
    E87-D No:7
      Page(s):
    1834-1842

    Optimistic log-based rollback recovery protocols have been regarded as an attractive fault-tolerant solution in distributed systems based on message-passing paradigm due to low overhead in failure-free time. These protocols are based on a Piecewise Deterministic (PWD) Assumption model. They, however, assumed that all logged non-deterministic events in a consistent global recovery line must be determinately replayed in recovery time. In this paper, we give the impossibility of deterministic replaying of logged non-deterministic event in a consistent global recovery line as a Ω Line Problem, because of asynchronous properties of distributed systems: no bound on the relative speeds of processes, no bound on message transmission delays and no global time source. In addition, we propose a new optimistic log-based rollback recovery protocol, which guarantees the deterministic replaying of all logged non-deterministic events belonged in a consistent global recovery line and solves a Ω Line Problem in recovery time.

81-100hit(134hit)